Protection of big data privacy A Mehmood, I Natgunanathan, Y Xiang, G Hua, S Guo IEEE access 4, 1821-1834, 2016 | 341 | 2016 |
Protection of privacy in biometric data I Natgunanathan, A Mehmood, Y Xiang, G Beliakov, J Yearwood IEEE access 4, 880-892, 2016 | 111 | 2016 |
Survey of security protocols and vulnerabilities in unmanned aerial vehicles A Shafique, A Mehmood, M Elhadef IEEE Access 9, 46927-46948, 2021 | 62 | 2021 |
A comprehensive study of ChatGPT: advancements, limitations, and ethical considerations in natural language processing and cybersecurity M Alawida, S Mejri, A Mehmood, B Chikhaoui, O Isaac Abiodun Information 14 (8), 462, 2023 | 59 | 2023 |
Detecting signal spoofing attack in uavs using machine learning models A Shafique, A Mehmood, M Elhadef IEEE access 9, 93803-93815, 2021 | 57 | 2021 |
Anonymous authentication scheme for smart cloud based healthcare applications A Mehmood, I Natgunanathan, Y Xiang, H Poston, Y Zhang IEEE access 6, 33552-33567, 2018 | 48 | 2018 |
A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations M Alawida, JS Teh, A Mehmood, A Shoufan Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022 | 44 | 2022 |
Location privacy protection in smart health care system I Natgunanathan, A Mehmood, Y Xiang, L Gao, S Yu IEEE Internet of Things Journal 6 (2), 3055-3069, 2018 | 33 | 2018 |
Adversarial training for fake news classification A Tariq, A Mehmood, M Elhadef, MUG Khan IEEE Access 10, 82706-82715, 2022 | 12 | 2022 |
HeuCrip: A malware detection approach for internet of battlefield things IA Shah, A Mehmood, AN Khan, M Elhadef, AR Khan Cluster Computing 26 (2), 977-992, 2023 | 11 | 2023 |
A lightweight noise-tolerant encryption scheme for secure communication: An unmanned aerial vehicle application A Shafique, A Mehmood, M Elhadef, KH Khan PLoS One 17 (9), e0273661, 2022 | 11 | 2022 |
An overview of protection of privacy in multibiometrics I Natgunanathan, A Mehmood, Y Xiang, G Hua, G Li, S Bangay Multimedia Tools and Applications 77, 6753-6773, 2018 | 11 | 2018 |
Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness M Alawida, B Abu Shawar, OI Abiodun, A Mehmood, AE Omolara, ... Information 15 (1), 27, 2024 | 8 | 2024 |
A novel machine learning technique for selecting suitable image encryption algorithms for IoT applications A Shafique, A Mehmood, M Alawida, AN Khan, AUR Khan Wireless communications and mobile computing 2022 (1), 5108331, 2022 | 8 | 2022 |
Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques A Mehmood, A Shafique, M Alawida, AN Khan IEEE Access 12, 27530-27555, 2024 | 4 | 2024 |
A fusion of machine learning and cryptography for fast data encryption through the encoding of high and moderate plaintext information blocks A Shafique, A Mehmood, M Alawida, M Elhadef, MU Rehman Multimedia Tools and Applications, 1-27, 2024 | 3 | 2024 |
A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods FR Alzaabi, A Mehmood IEEE Access 12, 30907-30927, 2024 | 3 | 2024 |
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption A Mehmood, A Shafique, SA Chaudhry, M Alawida, AN Khan, N Kumar Journal of Information Security and Applications 78, 103590, 2023 | 3 | 2023 |
Intelligent Urban Cities: Optimal Path Selection Based on Ad Hoc Network MUG Khan, M Elhadef, A Mehmood IEEE Access 11, 19259-19268, 2022 | 2 | 2022 |
Securing high-resolution images from unmanned aerial vehicles with dna encoding and bit-plane extraction method A Shafique, MU Rehman, KH Khan, SS Jamal, A Mehmood, SA Chaudhry IEEE Access, 2023 | 1 | 2023 |