A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2 A Ur Rehman, X Liao, R Ashraf, S Ullah, H Wang Optik 159, 348-367, 2018 | 154 | 2018 |
An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules A Kulsoom, D Xiao, SA Abbas Multimedia Tools and Applications 75, 1-23, 2016 | 151 | 2016 |
Selective encryption for gray images based on chaos and DNA complementary rules A ur Rehman, X Liao, A Kulsoom, SA Abbas Multimedia Tools and Applications 74, 4655-4677, 2015 | 145 | 2015 |
An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos X Liao, MA Hahsmi, R Haider Optik-International Journal for Light and Electron Optics 153, 117-134, 2018 | 121 | 2018 |
K-means and k-medoids: Cluster analysis on birth data collected in city Muzaffarabad, Kashmir SA Abbas, A Aslam, AU Rehman, WA Abbasi, S Arif, SZH Kazmi IEEE Access 8, 151847-151855, 2020 | 64 | 2020 |
A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps X Liao, A Kulsoom, S Ullah Multimedia Tools and Applications 75 (18), 11241-11266, 2016 | 64 | 2016 |
A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2 AU Rehman, X Liao Multimedia Tools and Applications 78 (2), 2105-2133, 2019 | 53 | 2019 |
Cost estimation: A survey of well-known historic cost estimation techniques SA Abbas, X Liao, AU Rehman, A Azam, MI Abdullah Journal of Emerging Trends in Computing and Information Sciences 3 (4), 612-636, 2012 | 44 | 2012 |
A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2 A Firdous, A ur Rehman, MM Saad Missen Multimedia Tools and Applications 78, 24809-24835, 2019 | 41 | 2019 |
A color image encryption algorithm based on one time key, chaos theory, and concept of rotor machine AU Rehman, A Firdous, S Iqbal, Z Abbas, MMA Shahid, H Wang, F Ullah IEEE Access 8, 172275-172295, 2020 | 38 | 2020 |
Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules A Ur Rehman, D Xiao, A Kulsoom, MA Hashmi, SA Abbas Multimedia Tools and Applications 78 (7), 9355-9382, 2019 | 38 | 2019 |
A gray image encryption technique using the concept of water waves, chaos and hash function A Firdous, AU Rehman, MMS Missen Ieee Access 9, 11675-11693, 2021 | 37 | 2021 |
A Selective Cross-Substitution Technique for Encrypting Color Images Using Chaos, DNA Rules and SHA-512 A Rehman, H Wang, A Shahid, S Iqbal, Z Abbas, A Firdous IEEE ACCESS 7, 2019 | 26 | 2019 |
Machine Learning Based Prediction of Reference Evapotranspiration (ET0) Using IoT Z Hu, RN Bashir, AU Rehman, SI Iqbal, MMA Shahid, T Xu IEEE Access 10, 70526-70540, 2022 | 21 | 2022 |
Performance analysis of classification algorithms on birth dataset SA Abbas, AU Rehman, F Majeed, A Majid, MSA Malik, ZH Kazmi, S Zafar IEEE Access 8, 102146-102154, 2020 | 15 | 2020 |
Proactive Security Mechanism and Design for Firewall. SU Lar, X Liao, A Rehman, MA Qinglu J. Information Security 2 (3), 122-130, 2011 | 12 | 2011 |
Intermittently differential privacy in smart meters via rechargeable batteries X Liu, H Wang, G Chen, B Zhou, A ur Rehman Electric Power Systems Research 199, 107410, 2021 | 9 | 2021 |
An innovative technique for image encryption using tri-partite graph and chaotic maps A Ur Rehman, X Liao, H Wang Multimedia Tools and Applications 80 (14), 21979-22005, 2021 | 9 | 2021 |
DM-GKM: A key management scheme for dynamic group based applications S Iqbal, MLM Kiah, A ur Rehman, Z Abbas, B Daghighi Computer Networks 182, 107476, 2020 | 7 | 2020 |
Estimation of surface heat flux and surface temperature during inverse heat conduction under varying spray parameters and sample initial temperature M Aamir, Q Liao, Z Xun, W Hong, M Zubair The Scientific World Journal 2014 (1), 721620, 2014 | 5 | 2014 |