DR. ADEEL ANJUM
PROFESSOR/ DIRECTOR
051-9064-3052
aanjum@qau.edu.pk
Dr. Adeel Anjum is a distinguished faculty member, HEC Approved PhD Supervisor, and NCEAC Evaluator, currently serving as the Director and Associate Professor at the Institute of Information Technology, Quaid-i-Azam University, Islamabad, Pakistan. Holding a Ph.D. from the University of Nantes, France, an MPhil from the University Paris Sud 11, France, and an M.Sc. from Quaid-i-Azam University Islamabad, Dr. Anjum is a highly qualified academic with expertise in various areas.
As a prolific researcher, Dr. Anjum's research interests span diverse domains, including Object-Oriented Programming, Database Systems, and Research Methodology. His commitment to academic excellence is reflected in his role as an HEC Approved PhD Supervisor and NCEAC Evaluator.
Dr. Anjum has an extensive record of publications, including 100 journal papers with a cumulative impact factor exceeding 250. Notably, he has authored papers in top international journals such as Computer & Security, IEEE Transactions on Industrial Informatics, ACM Transactions on Internet Technology, and more. His research covers topics like privacy preservation in the Internet of Vehicles, blockchain-enabled models for sharing patient data, privacy preservation in the Internet of Vehicles using local differential privacy, and various other cutting-edge areas.
In addition to his research contributions, Dr. Anjum has successfully completed four funded projects, showcasing his ability to bridge theoretical research with practical applications. His dedication to education is evident in his role as a teacher, covering subjects like Object-Oriented Programming, Database Systems, and Research Methodology at the postgraduate level.
To stay connected with the academic community, Dr. Anjum actively shares his research through various platforms, including his faculty profile at Quaid-i-Azam University Check Profile at University Website and ResearchGate Check Profile on Research Gate. His scholarly impact is further evident through his Google Scholar profile Check Profile on Google Scholar.
NO. | Courses |
---|---|
01. | Object Oriented Programming |
02. | Database Systems |
03. | Research Methodology (MS) |
100 journal papers (Cumulative IF = 250+) (10 of which as a first author, 50 as a corresponding author, with the in top international journals, such as computer & Security, IEEE Transaction on Industrial Informatics, ACM Transactions on Internet Technology, and so on,
4 funded projects completed
[1] Saqib, N. U., Malik, S. U., Anjum, A., Syed, M. H., Moqurrab, S. A., Srivastava, G., & Lin, J. C.
W. (2023). Preserving Privacy in the Internet of Vehicles (IoV): A Novel Group Leader-based-Shadowing Scheme using Blockchain. IEEE Internet of Things Journal.
[2] Javed, L., Anjum, A., Yakubu, B. M., Iqbal, M., Moqurrab, S. A., & Srivastava, G. (2023).
ShareChain: Blockchain‐enabled model for sharing patient data using federated learning and-differential privacy. Expert Systems, 40(5), e13131.
[3] Iftikhar, Z., Anjum, A., Khan, A., Shah, M. A., & Jeon, G. (2023). Privacy preservation in the-internet of vehicles using local differential privacy and IOTA ledger. Cluster Computing, 1-17.
[4] Fazal, R., Khan, R., Anjum, A., Syed, M. H., Khan, A., & Rehman, S. (2023). Improved-angelization technique against background knowledge attack for 1: M microdata. PeerJ Computer-Science, 9, e1255.
[5] S.A.Moqurrab, A. Anjum, N. Tariq, G. Srivastava, “Instant_Anonymity: A Lightweight Semantic-Privacy Guarantee for 5G-enabled IIoT,” IEEE Transactions on Industrial Informatics,2022, (Early-Access), DOI: 10.1109/TII.2022.3179536.
[6] R. Khan, X. Tao, A. Anjum, S. R. Malik, S. Yu, A. Khan, W. U. Rehman, H. Malik, “(τ, m)slicedBucket privacy model for sequential anonymization for improving privacy and utility-”Transactions on Emerging Telecommunications Technologies,2022,DOI: 10.1002/ett.4130.
[7] A. A. Khaliq,A. Anjum, A. B. Ajmal, J. L. Webber, A.Mehbodniya; S. Khan, “A Secure and Privacy-Preserved Parking Recommender System Using Elliptic Curve Cryptography and Local Differential-Privacy,”IEEE Access,2022, DOI: 10.1109/ACCESS.2022.3175829.
[8] S. A. Moqurrab; A. Anjum; N. Tariq; G. Srivastava, “An efficient framework for semanticallycorrelated term detection and sanitization in clinical documents,” ELSEVIER Computers and Electrical-Engineering,2022,DOI: 10.1016/j.compeleceng.2022.107985.
[9] A. Shaukat, A. Anjum, S. U. R. Malik, M. A. Shah and C. Maple, “A Novel Privacy Paradigm for-Improving Serial Data Privacy,” Sensors,2022, DOI: 10.1007/s11042-022-12724-3
[10] S. Beg, F. Baig, Y. Hameed, A. Anjum and A. Khan, “Thermal image encryption based on laser-diodefeedback and 2D logistic chaotic map,” Multimedia Tools and Applications,2022,-DOI: 10.1007/s11042-022-12724-3
[11] S. A. Moqurrab, A. Anjum, A. Khan, M. Ahmed, A. Ahmad, G. Jeon, “Deep-Confidentiality: An-IoT- Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data,” ACM-Transactions onInternet Technology,2021,DOI: 10.1145/3421509.
[12] T. Kanwal, A. Anjum, S. U.R.Malik, A. Khan, M. A.Khan, “Privacy preservation of electronic-health records with adversarial attacks identification in hybrid cloud,” Computer Standards &-Interfaces,2021,DOI: 10.1016/j.csi.2021.103522.
[13] H. M. Khan, A. Khan, F.Jabeen, A. Anjum, G. Jeon, “Fog-enabled secure multiparty-computation- based aggregation scheme in smart grid,” Computers & Electrical Engineering,2021,-DOI:10.1016/j.compeleceng.2021.107358.
[14] S. Akbar, S. U. R. Malik, K. K. R. Choo, S. U. Khan, N. Ahmad and A. Anjum “A Game-based-Thermal-Aware Resource Allocation Strategy for Data Centers,” IEEE Transactions on Cloud-Computing, 2021,DOI: 10.1109/TCC.2019.2899310.
[15] H. Attaullah, T. Kanwal, A. Anjum, G. Ahmed, S. Khan, D. B. Rawat and R. Khan, “FuzzyLogic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data,” IEEE INTERNET OF-THINGS JOURNAL,DOI: 10.1109/JIOT.2021.3103939.
[16] H. Attaullah, T. Kanwal, A. Anjum, G. Ahmed, S. Khan, D. B. Rawat and R. Khan, “Fuzzy-LogicBased Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data,” IEEE INTERNET OF-THINGS JOURNAL,2021,DOI: 10.1109/JIOT.2021.3103939.
[17] M. Ahmed, K. Ansar, C. B. Muckley, A. Khan, A. Anjum, M. Talha, “A semantic rule based digital-fraud detection,” PeerJ Computer Science, 2021, DOI: 10.1109/JIOT.2021.3103939.
[18] M. Abrar, B. Zuhaira and A. Anjum, “Privacy-preserving data collection for 1: M dataset,”-Multimedia Tools and Applications, 2021,DOI: 10.1007/s11042-021-10562-3.
[19] T. Kanwal, A. Anjum, A. Khan, A. Asheralieva and G. Jeon, “A formal adversarial perspective:-Secure and efficient electronic health records collection scheme for multi-records datasets,” Trans-Emerging Tel Tech. 2021,DOI: 10.1002/ett.4180.
[20] S. Beg, A. Anjum, M. Ahmed, S. U. R. Malik, H. Malik, N. Sharma and O. Waqar, “Dynamic-Parameters-Based Reversible Data Transform (RDT) Algorithm in Recommendation System,” IEEE-Access, 2021, DOI: 10.1109/ACCESS.2021.3101150.
[21] S. A.Moqurrab, U.Ayub, A. Anjum, S. Asghar and G. Srivastava, “An Accurate Deep Learning-Model for Clinical Entity Recognition from Clinical Notes,” IEEE J Biomed Health Inform, 2021,DOI:-10.1109/JBHI.2021.3099755.
[22] T. Kanwal, A. Anjum, S. U.R.Malik, H. Sajjad, A. Khan, U. Manzoor and A. Asheralieva, “A robust-privacy preserving approach for electronic health records using multiple datasets with multiple sensitive-attributes,” Computers & Security, 2021,DOI: 10.1016/j.cose.2021.102224.
[23] A. Ali, M. Ahmed, A. Khan, A. Anjum, M. Ilyas, M.Helfert, “VisTAS: blockchain-based visible and-trusted remote authentication system,” PeerJ Computer Science, 2021,DOI: 10.7717/peerj-cs.516.
[24] S. Khan,S. Khan, M.Zareei, F.Alanazi, N. Kama, M.Alam, A. Anjum, “ABKS-PBM: AttributeBased Keyword Search with Partial Bilinear Map,” IEEEAccess,2021,DOI:
10.1109/ACCESS.2021.3068194.
[25] T. Kanwal, A. Anjum and A. Khan, “Privacy preservation in e-health cloud: taxonomy, privacy-requirements, feasibility analysis, and opportunities,” Cluster Computing, 2021, DOI: 10.1007/s10586020-03106-1.
[26] S. Beg, A. Anjum, M. Ahmad, S. Hussain, G. Ahmad, S. Khan, Kim-Kwang Raymond Choo, “A-privacy-preserving protocol for continuous and dynamic data collection
in IoT enabled mobile app recommendation system (MARS),” Journal of Network and Computer-Application, 2021,DOI: 10.1016/j.jnca.2020.102874.
[27] S. Rehman,N. T.Bajwa, M. A. Shah, A. O. Aseeri and A. Anjum, “Hybrid AES-ECC Model for the-Security of Data over Cloud Storage,” Electronics2021,DOI: 10.3390/electronics10212673.
[28] S. Shakeel, A. Anjum, A. Asheralieva and M.Alam, “k-NDDP: An Efficient Anonymization Model-for Social Network Data Release,” Electronics 2021,DOI: 10.3390/electronics10192440.
[29] H. Attaullah,A. Anjum,T. Kanwal, S. U. R. Malik, A. Asheralieva, H. Malik, A.Zoha, K. Arshad and-M. A. Imran, “F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple-Sensitive Attributes,” Sensors 2021,DOI: 10.3390/s21144933.
[30] A. Shaukat, A. Anjum, S. U. R. Malik, M. A. Shah and C. Maple, “A Novel Privacy Paradigm for-Improving Serial Data Privacy,” Sensors 2021,DOI: 10.3390/s22072811.
[31] F. Zafar, A. Khan, S. U. R. Malik, M. Ahmed, C. Maple and A. Anjum, “MobChain: Three-Way-Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus,”-Sensors 2021,DOI: 10.3390/s21155096.
[32] S. Aslam, M. Ahmed, I. Ahmed, A. Khan, A. Ahmad, M. Imran, A.Anjum and S. Hussain, “OBAC:-towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed-environment,” Multimedia Tools and Applications 2020,DOI: 10.1007/s11042-020-08764-2.
[33] F. Zafar, A. Khan, A. Anjum, C. Maple and M. A. Shah, “Location Proof Systems for Smart Internet-of Things: Requirements, Taxonomy, and Comparative Analysis,” Electronics 2020,DOI:-10.3390/electronics9111776
[34]R. Khan, X. Tao, A. Anjum, S. R. Malik, S. Yu, A. Khan, W. Rehman, H. Malik, “(τ, m)-slicedBucket-privacy model for sequential anonymization for improving privacy and utility,” Trans Emerging Tel Tech,-2020,DOI: 10.1002/ett.4130.
[35] C.Iwendiab, S. A. Moqurrab,A. Anjum, S. Khand, S. Mohan and G. Srivastava, “N-Sanitization: A-semantic privacy-preserving framework for unstructured medical datasets,”Computer-Communications,2020,DOI: 10.1016/j.comcom.2020.07.032.
[36] S. Beg, N. Ahmad, A. Anjum, M. Ahmad, A. Khan, F.Baig and A. Khan, “S-box design based on-optimize LFT parameter selection: a practical approach in recommendation system domain,” Multimedia-Tools and Applications, 2020,DOI: 10.1007/s11042-019-08464-6.
[33]R. Khan, X. Tao, A. Anjum and T. Kanwal, “θ-Sensitive k-Anonymity: An Anonymization Model-for IoT based Electronic Health Records,” electronics, 2020,DOI: 10.3390/electronics9050716.
[34]I. Ahmed, A. Khan, A. Anjum, M. Ahmed and M. A. Habib, “A Secure Provenance Scheme for-Detecting Consecutive Colluding Users in Distributed Networks,” electronics, 2020,DOI:-10.1007/s10766-018-0601-y.
[35] M. A. Fayyaz, A. Anjum, S. Ziauddin, A. Khan and A. Sarfaraz, “An improved surveillance video-forgery detection technique using sensor pattern noise and correlation of noise residues,” Multimedia-Tools and Applications, 2020,DOI: 10.1007/s11042-019-08236-2.
[36] R. Khan, X. Tao, A. Anjum, H. Sajjad, S.U. R. Malik, A. Khan and F. Amiri, “Privacy Preserving-for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity,” Wireless-Communications and Mobile Computing, 2020,DOI: 10.1155/2020/8416823.
[37] A. Rehman, T. Saba, T. Mahmood, Z. Mehmood, M. Shah andA. Anjum, “Data hiding technique in-steganography for information security using number theory,” Journal of Information Science, 2019,DOI:-10.1177/0165551518816303.
[38] J. Haseeb, N. Ahmad, S. U.R. Malik and A. Anjum, “Application of formal methods tomodelling-and analysis aspects ofbusiness process reengineering,”Business Process ManagementJournal,-2019,DOI: 10.1177/0165551518816303.
[39] M. H. Waseem, M. S. A. Nadeem, A. Abbas, A.Shaheen, W. Aziz, A. Anjum, U. Manzoor, M. A.
Balubaid and Seong-O Shim, “On the Feature Selection Methods and RejectOption Classifiers for Robust-Cancer Prediction, IEEE Access, 2019,DOI: 10.1109/ACCESS.2019.2944295.
[40] H. Sajjad, T. Kanwal, A. Anjum, S.U Rehman, M. A. Khan, A. Khan, U. Manzoor,“An efficient-privacy preserving protocol for dynamic continuous data collection, Computers & Security, 2019, DOI:-10.1016/j.cose.2019.06.017.
[41] T. Kanwal,S. A. A. Shaukat, A. Anjum, S.U R. Malik, K. K. W. R.Chooc, A. Khan, N. Ahmad, M.
Ahmad, S. U. Khan,“Privacy-preserving model and generalization correlationattacks for 1:M data with-multiple sensitive attributes, Information Sciences, 2019, DOI: 10.1016/j.ins.2019.03.004.
[42] T. Kanwal, A. A. Jabbar, A. Anjum, S. UR Malik, A. Khan, N. Ahmad, U. Manzoor, M. N. Shahzad-and M. A Balubaid,“Privacy-aware relationship semantics–based XACML access control modelfor-electronic health records in hybridcloud,”International Journal of Distributed Sensor Networks,-2019,DOI: 10.1177/1550147719846050
[43] Z.Kouahla, A. Anjum, S.Akram, T. Saba and J. Martinez, “XM-tree: data driven computational-model by using metric extended nodes with non-overlapping in high-dimensional metric-spaces,”Computational and Mathematical Organization Theory, 2019,DOI: 10.1007/s10588-018-9272x.
[44] M. Waqas, S. U. Rehman, M. S. Akbar, A. Anjum and N. Ahmad “Convergence time analysis of-OSPF routing protocol using social network metrics, Future Generation Computer Systems, 2019, DOI:-10.1016/j.future.2018.11.003.
[45] M. N. Shehzad, Q. Bashir, G. Ahmad, A. Anjum, M. N.Awais, U. Manzoor, Z. A. Shaikh, M.
A.Balubaid and T. Saba“Thermal-aware resource allocation inearliest deadline first using-fluidscheduling,”International Journal of Distributed Sensor Networks, 2019, DOI:-10.1177/1550147719834417.
[46] A. Anjum, N. Farooq, S. U R. Malik, A. Khan, M. Ahmed, M. Gohar “An effective privacy-preserving mechanism for 1: M microdata with high utility,”Sustainable Cities and Society, 2019, DOI:-10.1016/j.scs.2018.11.037.
[47] A. Asif, A. Anjum, I. Fatima, S. U. R. Malik“Towards the Performance Investigation of-AutomaticMelanoma Diagnosis Applications,”International Journal of Advanced Computer Science and-Applications, 2019,DOI: 10.14569/IJACSA.2019.0100351.
[48] F. Jamil, A. Khan, A. Anjum, M. Ahmed, F.Jabeen and N. Javaid“Secure provenance using an-authenticated data structure approach, Computers & Security, 2018,DOI: 10.1016/j.cose.2017.10.005-[49] B. M. N. Ahmad, S. U.R. Malik, A. Anjum and S. Islam “Power-efficient scheduling of parallel realtime tasks on performance asymmetric multicore processors,”Sustainable Computing: Informatics and-Systems, 2018,DOI: 10.1016/j.suscom.2017.10.012.
[50] A. Yaseen, S. M. A. Abbas, A. Anjum, T. Saba, A. khan, S. U. R Rehman Malik, Naveed Ahmad,-Basit Shahzad, and Ali Kashif Bashir,“Improved Generalization for SecureData Publishing,”IEEE-Access, 2018,DOI: 10.1109/ACCESS.2018.2828398.
[52] A. Anjum, T. Ahmed, A. Khan, N. Ahmad, M. Ahmad, M. Asif, A. G. Reddy, T. Saba and N. Farooq-“Privacy preserving data by conceptualizing smart cities using MIDR-Angelization,” Sustainable Cities-and Society, 2018,DOI: 10.1016/j.scs.2018.04.014
[53] B. Raza, Y. J. Kumar, A. K. Malik, A. Anjum and M. Faheem“Performance prediction and adaptation-for database management system workload using Case-Based Reasoning approach,”Information Systems,-2018,DOI: 10.1016/j.is.2018.04.005.
[54] B. Raza, Y. J. Kumar, A. K. Malik, A. Anjum and M. Faheem“Performance prediction and adaptation-for database management system workload using Case-Based Reasoning approach,”Information Systems,-2018,DOI: 10.1016/j.is.2018.04.005.
[55] R.0Ullah, N.Ahmad, S. U.R.Malik, S.Akbar, A. Anjum“Simulator for modeling, analysis, and-visualizations of thermal status in data centers,”Sustainable Computing: Informatics and Systems, 2018,-DOI: 10.1016/j.suscom.2017.12.005.
[56] A. Anjum, N. Ahmad, S. U. R. Malik, S. Zubair and B. Shahzad“An efficient approach for publishing-microdata for multiple sensitive attributes,”The Journal of Supercomputing, 2018,DOI: 10.1007/s11227018-2390-x.
[57] Z.Kouahla,A. Anjum, H.Seridi“Indexing through separable partitioning for complex data sharing in-P2P systems,”Journal of Intelligent & Fuzzy Systems, 2018,DOI: 10.3233/JIFS-18398.
[58] A. Anjum, S.UR. Malik, K. K. R. Choo, A. Khan, A. Haroon, S. Khan, S. U. Khan,N. Ahmad and-B. Raza, An efficient privacy mechanism for electronic health records,”Computers and Security,-2018,DOI: 10.1016/j.cose.2017.09.014.
[59] M.Alam, S. U.R. Malik, Q.Javed, A. Khan, S. B. Khan, A. Anjum,N.Javed, A Akhunzadaand M. K.
Khan“Formal modeling and verification of security controls for multimedia systems in the-cloud,”Multimedia Tools and Applications, 2017,DOI: 10.1007/s11042-017-4853-0.
[60] S. Amjad, N. Ahmad, T. Saba,A. Anjum, U. Manzoor, M. A. Balubaid, S. U. R. Malik “Calculating-Completeness of Agile Scope in Scaled Agile Development,”IEEE Access, 2017,DOI:
10.1109/ACCESS.2017.2765351.
[61] A. Aslam, N. Ahmad, T. Saba, A. S. Almazyad, A. Rehman,A. Anjum, A. Khan,“Decision Support-System for Risk Assessment and Management Strategies in Distributed Software Development, IEEE-Access, 2017, DOI: 10.1109/ACCESS.2017.2757605.
[62] B.Zuhaira, N. Ahmad, T. Saba, J. Haseeb, S. U. R. Malik, U. Manzoor, M. A. Balubaid, A.
Anjum,“Identifying Deviations in Software Processes, IEEE Access, 2017,DOI:
10.1109/ACCESS.2017.2757954.
[63] M. Nasir,A. Anjum,U. Manzoor, M. A. Balubaid, M. Ahmed, A.Khan, N. Ahmad, S.U. R.Malik,-MAlam,“Privacy Preservation in Skewed Data Using Frequency Distribution and Weightage-(FDW),”Journal of Medical Imaging and Health Informatics,2017,DOI: 10.1166/jmihi.2017.2206.
[64] S.T.Muntaha, A. Khan, U. Manzoor, K. Sarwar, M. Ahmed, M. Tahir,A. Anjum, S.UR Rehman,-M.Alam, N. Javaid, and M. A. Balubaid,” Towards Preserving Privacy of Outsourced Genomic Data-Over the Cloud,”Journal of Medical Imaging and Health Informatics, 2017,DOI:
10.1166/jmihi.2017.2186.
[65]S. A.Moqurrab,A. Anjum, U.Manzoor, S.Nefti, N.Ahmad,M.S. U. Rehman,“Differential Average-Diversity: An Efficient Privacy Mechanism for Electronic Health Records,”American Scientific-Publishers, 2017,DOI: 10.1166/jmihi.2017.2146.
[66]S.A.Moqurrab,A. Anjum, U.Manzoor, S.Nefti, N.Ahmad,M.S. U. R Rehman,“Differential Average-Diversity: An Efficient Privacy Mechanism for Electronic Health Records,”American Scientific-Publishers, 2017,DOI: 10.1166/jmihi.2017.2146.
[67]A.Saleha, S.Tanzila, H. Shariq, A. Mansoor, A.Sheeraz,A. Khan,A. Anjum, S.M. Ali, J.Nadeem,“An-Ontology-Based Approach for Detecting Drug Abuse Epidemiology,”American Scientific Publishers,-2017,DOI: doi.org/10.1166/jmihi.2017.2253.
[68]A.Saleha, S.Tanzila, H. Shariq, M.Ahmed, S.Akram,A. Khan,A. Anjum, M. A. Shah,-J.Nadeem,“Trustworthy data: A survey, taxonomy and future trends of secure provenance-schemes,”Journal of Network and Computer Applications, 2017, DOI:
doi.org/10.1016/j.jnca.2017.06.003.
[69]A. Anjum, G.Raschia, M.Gelgon, A. Khan, S.U. R Malik, N. Ahmad, M. Ahmed, S. Suhail, M. M.
Alam,“τ-safety: A privacy model for sequential publication with arbitrary updates,”Computers &-Security, 2017,DOI: doi.org/10.1016/j.cose.2016.12.014.
[70]A. Anjum,and G.Raschia,“BangA: An Efficient and Flexible Generalization-Based Algorithm for-Privacy Preserving Data Publication,”Computers, 2017,DOI: doi.org/10.3390/computers6010001
Refereed Conference Papers:
[71] M.Jadoon,A. Anjum,“Differentiation of bacterial and viral pneumonia in children under five using-deep learning,”Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud-Computing Companion, 2021,DOI: doi.org/10.1145/3492323.3495631.
[72]M. Rizwan,M. N.Sohail, A. Asheralieva, A. Anjum, P. Angin,“SAID: ECC-Based Secure-Authentication and Incentive Distribution Mechanism for Blockchain-Enabled Data Sharing System,-IEEE International Conference on Blockchain (Blockchain), 2021,
DOI: 10.1109/Blockchain53845.2021.00080
[73]A. B. Ajmal, A. Anjum, A. Anjum, M. A Khan,“Novel Approach for Concealing Penetration Testing-Payloads Using Data Privacy Obfuscation Techniques”, 2021 IEEE 18th International Conference on-Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET),DOI:-10.1109/HONET53078.2021.9615485.
[74]M. Ali,A. Anjum, A. Anjum, M. A. Khan,“Efficient and Secure Energy Trading in Internet of Electric-Vehicles Using IOTA Blockchain”, 2020 IEEE 17th International Conference on Smart Communities:-Improving Quality of Life Using ICT, IoT and AI (HONET),
DOI: 10.1109/HONET50430.2020.9322826.
[75]Z.Kouahlaand A. Anjum,“A Parallel Implementation of GHB Tree”, IFIP International Conference-on Computational Intelligence and Its Applications, 2018,DOI: 10.1007/978-3-319-89743-1_5.
[76] A. Anjum; A. Anjum, “Differentially Private K-Anonymity”, 12th International Conference on-Frontiers of Information Technology, 2014,DOI: 10.1109/FIT.2014.37.
[77] A. Anjum,G.Raschia, “Anonymizing sequential releases under arbitrary updates”,Proceedings of the-Joint EDBT/ICDT 2013 Workshops, 2013,DOI: 10.1145/2457317.2457342.
[78] A. Anjum,A. Anjum, “Aiding web crawlers; projecting web page last modification”, 15th-International Multitopic Conference (INMIC), 2012,DOI: 10.1109/INMIC.2012.6511443.
[79] A. Anjum,G.Raschia, “Privacy-preserving data publication: A review on “updates” in continuous-data publication”, International Conference on Information and Communication Technologies, 2011,DOI:-10.1109/ICICT.2011.5983552.
Books Authored and Editing Book (HEC recognized):
[80] A. Anjum:Innovative Solutions for Access Control Management.”, 1st IGI Publishing Hershey, PA,-USA, 2016.
[81] Z. Kouahla, A. Anjum: A Parallel Implementation of GHB Tree. Computational Intelligence and Its-Applications; pages 47-55.”, 2017, ISBN: 978-3-319-49654-2, DOI:10.1007/978-3-319-49655-9_57.
[82] Z. Kouahla, A. Anjum: A Parallel Implementation of GHB Tree. Computational Intelligence and Its-Applications; pages 47-55.”, 2017, ISBN: 978-3-319-49654-2, DOI:10.1007/978-3-319-49655-9_57.
[83]A. Anjum, G.Raschia, “Privacy-preserving data publication: A review on “updates” in continuous-data publication”, International Conference on Information and Communication Technologies, 2017,-ISBN: 978-3-319-49654-2, 2011, DOI: 10.1109/ICICT.2011.5983552.
[84]K. M. Abbasi, I. U. L Haq, A. K. Malik, B. Raza, A. Anjum: Managing Access in Cloud Service-Chains Using Role-Level Agreements. Innovative Solutions for Access Control Management, 1st edited-by A. Malik, A. Anjum, B. Raza, chapter 008, pages 224-247,2016, IGI Global., ISBN:
9781522504481,DOI: 10.4018/978-1-5225-0448-1.ch008.
Research Projects (Completed):
[85] Principal Investigator: A. Anjum, Project Title: “Cow Monitoring System”, Sponsoring Agency: NGIRI,-Amount:34500 PKR, Duration: 2 Years.
[86] Principal Investigator: A. Anjum, “Smart Traffic Management”, Sponsoring Agency: NGIRI, Amount:56000-PKR, Duration: 2 Years.
[87] Co-Investigator: H. Shah, A. Anjum, Project Title: “Modeling and Forecasting Particulate Matter-Concentrations Using Dynamic Ridge Polynomial Neural Network”, Sponsoring Agency: Deanship of-Scientific Research (KSA), Amount: 85800 SR, Duration: 1 Year.
[88] Co-Investigator: A.Asif, A. Anjum, Project Title :“Automated Early Diagnosis of Chronic Skin Diseases -mSkinDiagnostic”,Sponsoring Agency: Deanship of Scientific Research (KSA), Amount: 4 million PKR,-Duration: 3 Years.
Conference and Journal Management:
[1] Conference Title: International Conference on Frontiers of Information Technology, Organizer:-COMSATS University, Islamabad, Location: Islamabad, DATE: 01,12,2014, Sponsoring-Agency: IEEE
[2] Conference Title: International Conference on Frontiers of Information Technology, Organizer:-COMSATS University, Islamabad, Location: Islamabad, DATE: 01,12,2015, Sponsoring-Agency: IEEE
[3] Served as the lead guest editor for special issue named “Novel Approaches in Data-anonymization” in Applied Sciences MDPI