Action recognition in video sequences using deep bi-directional LSTM with CNN features A Ullah, J Ahmad, K Muhammad, M Sajjad, SW Baik IEEE access 6, 1155-1166, 2017 | 794 | 2017 |
Multi-grade brain tumor classification using deep CNN with extensive data augmentation M Sajjad, S Khan, K Muhammad, W Wu, A Ullah, SW Baik Journal of computational science 30, 174-182, 2019 | 771 | 2019 |
A novel CNN-GRU-based hybrid approach for short-term residential load forecasting M Sajjad, ZA Khan, A Ullah, T Hussain, W Ullah, MY Lee, SW Baik Ieee Access 8, 143759-143768, 2020 | 352 | 2020 |
Clustering-based speech emotion recognition by incorporating learned features and deep BiLSTM M Sajjad, S Kwon IEEE access 8, 79861-79875, 2020 | 318 | 2020 |
Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities M Sajjad, M Nasir, K Muhammad, S Khan, Z Jan, AK Sangaiah, ... Future Generation Computer Systems 108, 995-1007, 2020 | 223 | 2020 |
CNN features with bi-directional LSTM for real-time anomaly detection in surveillance networks W Ullah, A Ullah, IU Haq, K Muhammad, M Sajjad, SW Baik Multimedia tools and applications 80, 16979-16995, 2021 | 213 | 2021 |
A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image K Muhammad, M Sajjad, I Mehmood, S Rho, SW Baik Multimedia Tools and Applications 75, 14867-14893, 2016 | 212 | 2016 |
Human action recognition using attention based LSTM network with dilated CNN features K Muhammad, A Ullah, AS Imran, M Sajjad, MS Kiran, G Sannino, ... Future Generation Computer Systems 125, 820-830, 2021 | 172 | 2021 |
CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method MS Khan Muhammad, Jamil Ahmad, Naeem Ur Rehman, ZahoorJan Multimedia Tools and Applications, 1-30., 2016 | 154* | 2016 |
CNN-based anti-spoofing two-tier multi-factor authentication system M Sajjad, S Khan, T Hussain, K Muhammad, AK Sangaiah, A Castiglione, ... Pattern Recognition Letters 126, 123-131, 2019 | 131 | 2019 |
Image steganography using uncorrelated color space and its application for security of visual contents in online social networks K Muhammad, M Sajjad, I Mehmood, S Rho, SW Baik Future Generation Computer Systems 86, 951-960, 2018 | 126 | 2018 |
Leukocytes classification and segmentation in microscopic blood smear: a resource-aware healthcare service in smart cities M Sajjad, S Khan, Z Jan, K Muhammad, H Moon, JT Kwak, S Rho, ... IEEE Access 5, 3475-3489, 2016 | 123 | 2016 |
Towards smart home automation using IoT-enabled edge-computing paradigm H Yar, AS Imran, ZA Khan, M Sajjad, Z Kastrati Sensors 21 (14), 4932, 2021 | 120 | 2021 |
A secure method for color image steganography using gray-level modification and multi-level encryption K Muhammad, J Ahmad, H Farman, Z Jan, M Sajjad, SW Baik KSII Transactions on Internet and Information Systems (TIIS) 9 (5), 1938-1962, 2015 | 110 | 2015 |
Raspberry Pi assisted facial expression recognition framework for smart security in law-enforcement services M Sajjad, M Nasir, FUM Ullah, K Muhammad, AK Sangaiah, SW Baik Information Sciences 479, 416-431, 2019 | 107 | 2019 |
Human behavior understanding in big multimedia data using CNN based facial expression recognition M Sajjad, S Zahir, A Ullah, Z Akhtar, K Muhammad Mobile networks and applications 25, 1611-1621, 2020 | 97 | 2020 |
Light-DehazeNet: a novel lightweight CNN architecture for single image dehazing H Ullah, K Muhammad, M Irfan, S Anwar, M Sajjad, AS Imran, ... IEEE transactions on image processing 30, 8968-8982, 2021 | 85 | 2021 |
Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy K Muhammad, M Sajjad, SW Baik Journal of medical systems 40, 1-16, 2016 | 83 | 2016 |
A review on traditional machine learning and deep learning models for WBCs classification in blood smear images S Khan, M Sajjad, T Hussain, A Ullah, AS Imran Ieee Access 9, 10657-10673, 2020 | 78 | 2020 |
Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices IM Muhammad Sajjad, Khan Muhammad, Sung Wook Baik, Seungmin Rho, Zahoor Jan Multimedia Tools and Applications, 1-18, 2016 | 78* | 2016 |