关注
Fawad Ahmed
Fawad Ahmed
Department of Cyber Security, PNEC, NUST
在 pnec.nust.edu.pk 的电子邮件经过验证
标题
引用次数
引用次数
年份
A secure and robust hash-based scheme for image authentication
F Ahmed, MY Siyal, VU Abbas
Signal Processing 90 (5), 1456-1470, 2010
2272010
Efficiency analysis and security evaluation of image encryption schemes
J Ahmad, F Ahmed
computing 23 (04), 25, 2010
1982010
Chaotic substitution for highly autocorrelated data in encryption algorithm
A Anees, AM Siddiqui, F Ahmed
Communications in Nonlinear Science and Numerical Simulation 19 (9), 3106-3118, 2014
1362014
Gastrointestinal diseases segmentation and classification based on duo-deep architectures
MA Khan, MA Khan, F Ahmed, M Mittal, LM Goyal, DJ Hemanth, ...
Pattern Recognition Letters 131, 193-204, 2020
1092020
A noisy channel tolerant image encryption scheme
F Ahmed, A Anees, VU Abbas, MY Siyal
Wireless personal communications 77, 2771-2791, 2014
802014
A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation
J Ahmad, MA Khan, F Ahmed, JS Khan
Neural Computing and Applications 30, 3847-3857, 2018
712018
Recognizing apple leaf diseases using a novel parallel real‐time processing framework based on MASK RCNN and transfer learning: An application for smart agriculture
ZU Rehman, MA Khan, F Ahmed, R Damaševičius, SR Naqvi, W Nisar, ...
IET Image Processing 15 (10), 2157-2168, 2021
692021
A novel CNN-LSTM-based approach to predict urban expansion
W Boulila, H Ghandorh, MA Khan, F Ahmed, J Ahmad
Ecological Informatics 64, 101325, 2021
682021
Chest X-ray classification for the detection of COVID-19 using deep learning techniques
E Khan, MZU Rehman, F Ahmed, FA Alfouzan, NM Alzahrani, J Ahmad
Sensors 22 (3), 1211, 2022
492022
Image encryption using dynamic S-box substitution in the wavelet domain
A Shafique, F Ahmed
Wireless Personal Communications 115, 2243-2268, 2020
382020
Classification of citrus plant diseases using deep transfer learning
M Zia Ur Rehman, F Ahmed, M Attique Khan, U Tariq, S Shaukat Jamal, ...
Computers, Materials & Continua 70 (1), 2021
372021
A perceptually scalable and jpeg compression tolerant image encryption scheme
F Ahmed, MY Siyal, VU Abbas
2010 Fourth Pacific-Rim Symposium on Image and Video Technology, 232-238, 2010
362010
Privacy-preserving non-wearable occupancy monitoring system exploiting Wi-Fi imaging for next-generation body centric communication
S Aziz Shah, J Ahmad, A Tahir, F Ahmed, G Russell, SY Shah, ...
Micromachines 11 (4), 379, 2020
292020
Detection of COVID-19 using transfer learning and grad-cam visualization on indigenously collected X-ray dataset
M Umair, MS Khan, F Ahmed, F Baothman, F Alqahtani, M Alian, J Ahmad
Sensors 21 (17), 5813, 2021
282021
Intrusion detection framework for the internet of things using a dense random neural network
S Latif, Z e Huma, SS Jamal, F Ahmed, J Ahmad, A Zahid, K Dashtipour, ...
IEEE Transactions on Industrial Informatics 18 (9), 6435-6444, 2021
262021
Semantic segmentation and edge detection—Approach to road detection in very high resolution satellite images
H Ghandorh, W Boulila, S Masood, A Koubaa, F Ahmed, J Ahmad
Remote Sensing 14 (3), 613, 2022
252022
Robust image hashing scheme using laplacian pyramids
H Hamid, F Ahmed, J Ahmad
Computers & Electrical Engineering 84, 106648, 2020
222020
Hash-based authentication of digital images in noisy channels
F Ahmed, A Anees
Robust image authentication in the presence of noise, 1-42, 2015
222015
A secure and robust image hashing scheme using Gaussian pyramids
I Bashir, F Ahmed, J Ahmad, W Boulila, N Alharbi
Entropy 21 (11), 1132, 2019
212019
Dynamic hand gesture recognition using 3D-CNN and LSTM networks
M Ur Rehman, F Ahmed, M Attique Khan, U Tariq, F Abdulaziz Alfouzan, ...
Computers, Materials & Continua 70 (3), 2021
202021
系统目前无法执行此操作,请稍后再试。
文章 1–20