关注
Muhammad Sajjad
Muhammad Sajjad
Dept. of Computer Science
在 icp.edu.pk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Action recognition in video sequences using deep bi-directional LSTM with CNN features
A Ullah, J Ahmad, K Muhammad, M Sajjad, SW Baik
IEEE access 6, 1155-1166, 2017
7942017
Multi-grade brain tumor classification using deep CNN with extensive data augmentation
M Sajjad, S Khan, K Muhammad, W Wu, A Ullah, SW Baik
Journal of computational science 30, 174-182, 2019
7712019
A novel CNN-GRU-based hybrid approach for short-term residential load forecasting
M Sajjad, ZA Khan, A Ullah, T Hussain, W Ullah, MY Lee, SW Baik
Ieee Access 8, 143759-143768, 2020
3522020
Clustering-based speech emotion recognition by incorporating learned features and deep BiLSTM
M Sajjad, S Kwon
IEEE access 8, 79861-79875, 2020
3182020
Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities
M Sajjad, M Nasir, K Muhammad, S Khan, Z Jan, AK Sangaiah, ...
Future Generation Computer Systems 108, 995-1007, 2020
2232020
CNN features with bi-directional LSTM for real-time anomaly detection in surveillance networks
W Ullah, A Ullah, IU Haq, K Muhammad, M Sajjad, SW Baik
Multimedia tools and applications 80, 16979-16995, 2021
2132021
A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image
K Muhammad, M Sajjad, I Mehmood, S Rho, SW Baik
Multimedia Tools and Applications 75, 14867-14893, 2016
2122016
Human action recognition using attention based LSTM network with dilated CNN features
K Muhammad, A Ullah, AS Imran, M Sajjad, MS Kiran, G Sannino, ...
Future Generation Computer Systems 125, 820-830, 2021
1722021
CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
MS Khan Muhammad, Jamil Ahmad, Naeem Ur Rehman, ZahoorJan
Multimedia Tools and Applications, 1-30., 2016
154*2016
CNN-based anti-spoofing two-tier multi-factor authentication system
M Sajjad, S Khan, T Hussain, K Muhammad, AK Sangaiah, A Castiglione, ...
Pattern Recognition Letters 126, 123-131, 2019
1312019
Image steganography using uncorrelated color space and its application for security of visual contents in online social networks
K Muhammad, M Sajjad, I Mehmood, S Rho, SW Baik
Future Generation Computer Systems 86, 951-960, 2018
1262018
Leukocytes classification and segmentation in microscopic blood smear: a resource-aware healthcare service in smart cities
M Sajjad, S Khan, Z Jan, K Muhammad, H Moon, JT Kwak, S Rho, ...
IEEE Access 5, 3475-3489, 2016
1232016
Towards smart home automation using IoT-enabled edge-computing paradigm
H Yar, AS Imran, ZA Khan, M Sajjad, Z Kastrati
Sensors 21 (14), 4932, 2021
1202021
A secure method for color image steganography using gray-level modification and multi-level encryption
K Muhammad, J Ahmad, H Farman, Z Jan, M Sajjad, SW Baik
KSII Transactions on Internet and Information Systems (TIIS) 9 (5), 1938-1962, 2015
1102015
Raspberry Pi assisted facial expression recognition framework for smart security in law-enforcement services
M Sajjad, M Nasir, FUM Ullah, K Muhammad, AK Sangaiah, SW Baik
Information Sciences 479, 416-431, 2019
1072019
Human behavior understanding in big multimedia data using CNN based facial expression recognition
M Sajjad, S Zahir, A Ullah, Z Akhtar, K Muhammad
Mobile networks and applications 25, 1611-1621, 2020
972020
Light-DehazeNet: a novel lightweight CNN architecture for single image dehazing
H Ullah, K Muhammad, M Irfan, S Anwar, M Sajjad, AS Imran, ...
IEEE transactions on image processing 30, 8968-8982, 2021
852021
Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy
K Muhammad, M Sajjad, SW Baik
Journal of medical systems 40, 1-16, 2016
832016
A review on traditional machine learning and deep learning models for WBCs classification in blood smear images
S Khan, M Sajjad, T Hussain, A Ullah, AS Imran
Ieee Access 9, 10657-10673, 2020
782020
Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices
IM Muhammad Sajjad, Khan Muhammad, Sung Wook Baik, Seungmin Rho, Zahoor Jan
Multimedia Tools and Applications, 1-18, 2016
78*2016
系统目前无法执行此操作,请稍后再试。
文章 1–20