Publications

S#Manuscript TitleAuthorsPublished inCategoryYear of Publication
1Deep learning framework for congestion detection at public places via learning from synthetic dataSaleh Basalamah, Sultan Daud Khan, Emad Felemban, Atif Naseer, Faizan ur RehmanJournal of King Saud University - Computer and Information SciencesJournal2022
2A Lightweight Convolution Neural Network for Automatic Disasters RecognitionMuhammad Munsif, Hina Afridi, Mohib Ullah, Sultan Daud Khan, Faouzi Alaya Cheikh, Muhammad Sajjad10th European Workshop on Visual Information Processing (EUVIP)Conference2022
3Deep learning framework for congestion detection and prediction in human crowdsEmad Felemban, Sultan Daud Khan, Atif Naseer, Faizan Ur Rehman, Saleh BasalamahUS-20220254162A1Patent2022
4DSMSA-Net: Deep Spatial and Multi-scale Attention Network for Road Extraction in High Spatial Resolution Satellite ImagesSultan Daud Khan, Louai Alarabi, Saleh BasalamahArabian Journal for Science and EngineeringJournal2022
5Toward Authentication of Videos: Integer Transform Based Motion Vector WatermarkingRafi Ullah, Sultan Daud Khan, Mohib Ullah, Fadi Al-Machot, Habib UllahIEEE AccessJournal2022
6An Encoder–Decoder Deep Learning Framework for Building Footprints Extraction from Aerial ImagerySultan Daud Khan, Louai Alarabi, Saleh BasalamahArabian Journal for Science and EngineeringJournal2022
7An Efficient Deep Learning Framework for Face Mask Detection in Complex ScenesSultan Daud Khan, Rafi Ullah, Mussadiq Abdul Rahim, Muhammad Rashid, Zulfiqar Ali, Mohib Ullah, Habib UllahInternational Conference on Artificial Intelligence Applications and InnovationsBook Chapter2022
8A Novel Detection Refinement Technique for Accurate Identification of Nephrops norvegicus Burrows in Underwater ImageryAtif Naseer, Enrique Nava Baro, Sultan Daud Khan, Yolanda VilaSensorsJournal2022
9A Deep-Fusion Network for Crowd Counting in High-Density Crowded ScenesSultan Daud Khan, Yasir Saleh, Basim Zafar, Abdulfattah NoorwaliInternational Journal of Computational Intelligence SystemsJournal2021
10Automatic Detection of Nephrops Norvegicus Burrows from Underwater Imagery Using Deep LearningNaseer Atif, Enrique Nava Baro, Sultan Daud Khan, Vila Yolanda, Jennifer DoyleComputers, materials, & continuaJournal2021
11A Unified Deep Learning Framework of Multi-scale Detectors for Geo-spatial Object Detection in High-Resolution Satellite ImagesSultan Daud Khan, Louai Alarabi, Saleh BasalamahArabian Journal for Science and EngineeringJournal2021
12Deep Hybrid Network for Land Cover Semantic Segmentation in High-Spatial Resolution Satellite ImagesSultan Daud Khan, Louai Alarabi, Saleh BasalamahInformationJournal2021
13Multi-Scale Person Localization With Multi-Stage Deep Sequential FrameworkSultan Daud Khan, Saleh BasalamahInternational Journal of Computational Intelligence SystemsJournal2021
14Motion-shape-based deep learning approach for divergence behavior detection in high-density crowdMuhammad Umer Farooq, Mohamad Naufal M Saad, Sultan Daud KhanThe Visual ComputerJournal2021
15Evaluating deep semi-supervised learning methods for computer vision applicationsHabib Ullah, Mohib Ullah, Sultan Daud Khan, Faouzi Alaya CheikhElectronic ImagingJournal2021
16Attention-based LSTM network for action recognition in sportsMohib Ullah, Muhammad Mudassar Yamin, Ahmed Mohammed, Sultan Daud Khan, Habib Ullah, Faouzi Alaya CheikhElectronic ImagingJournal2021
17Social Modeling Meets Virtual Reality: An Immersive ImplicationHabib Ullah, Sultan Daud Khan, Mohib Ullah, Faouzi Alaya CheikhPattern Recognition. ICPR International Workshops and ChallengesConference2021
18Deep Trajectory Classification Model for Congestion Detection in Human CrowdsEmad Felemban, Sultan Daud Khan, Atif Naseer, Faizan Ur Rehman, Saleh BasalamahCMC-COMPUTERS MATERIALS & CONTINUAJournal2021
19Characterization of different crowd behaviors using novel deep learning framework.Abdullah J ALZAHRANI, Sultan Daud KHANTurkish Journal of Electrical Engineering & Computer SciencesJournal2021
20Impact of code smells on software fault prediction at class level and method levelUm-E-Safia, Tamim Ahmed KhanFIT Conference 2022Conference2022
21RFM-based repurchase behavior for customer classification and segmentationMussadiq Abdul Rahim, Muhammad Mushafiq, Salabat Khan, Zulfiqar Ali ArainJournal of Retailing and Consumer ServicesJournal2021
22Survey on Issues and Recent Advances in Vehicular Public-key Infrastructure (VPKI)Salabat Khan, Fei Luo, Zijain Zhang, Mussadiq Abdul Rahim, Mubashir Ahmad, Kaishun WuIEEE Communications Surveys & TutorialsJournal2022
23A Privacy-Preserving and Transparent Identity Management Scheme for Vehicular Social NetworkingSalabat Khan, Fei Luo, Zijian Zhang, Mussadiq Abdul Rahim, Siraj Khan, Syed Furqan Qadri, Kaishun WuIEEE Transactions on Vehicular TechnologyJournal2022
24An Efficient Deep Learning Framework for Face Mask Detection in Complex ScenesSultan Daud Khan, Rafi Ullah, Mussadiq Abdul Rahim, Muhammad Rashid, Zulfiqar Ali, Mohib Ullah & Habib UllahIFIP Advances in Information and Communication Technology / ChapterConference2022
25Hill Matrix and Radix-64 Bit Algorithm to Preserve Data ConfidentialityA. Arshad, M. Nadeem, S. Riaz, A. Alruban, S.W Zahra, A. K. Dutta, Z. Alzaid R. Alabdan, B. Almutairi, S. AlmotairiTSP- CMCJournal2022
26Development of Security Rules and Mechanisms to Protect Data from AssaultsZahra, S.W.; Arshad, A.; Nadeem, M.; Riaz, S.; Dutta, A.K.; Alzaid, Z.; Alabdan, R.; Almutairi, B.; Almotairi, S. MDPI- Applied ScienceJournal2022
27An Optimization Approach for Convolutional Neural Network Using Non-Dominated Sorted Genetic Algorithm-IIA. Zafar, M. Aamir, N. M Nawi, A. Arshad, S. Riaz, A. Alruban, A. K. Dutta, B. Almutairi, S. Almotairi,TSP- CMCJournal2022
28Two-Layer Security Algorithms to Prevent Attacks on Data in CyberspaceNadeem, M.; Arshad, A.; Riaz, S.; Zahra, S.W.; Dutta, A.K.; Alruban A.; Almutairi, B.; Almotairi, S. MDPI- Applied ScienceJournal2022
29An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption AlgorithmsM. Nadeem, A. Arshad, S. Riaz, S.W Zahra, Ashit Kumar Dutta, Moteeb Al Moteri and Sultan Almotairi, TSP- CMCJournal2022
30A Comparison of Pooling Methods for Convolutional Neural NetworksZafar A, Aamir M, Mohd Nawi N, Arshad A, Riaz S, Alruban A, Dutta AK, Almotairi S. MDPI- Applied ScienceJournal2022
31A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data TransmissionNadeem, M.; Arshad, A.; Riaz, S.; Zahra, S.W.; Dutta, A.K.; Almotairi, S. MDPI- Applied ScienceJournal2022
32Preventing the Cloud Networks through Semi-Supervised Clustering from both sides attacksNadeem, M.; Arshad, A.; Riaz, S.; Zahra, S.W.; Dutta, A.K.; Almotairi, S. MDPI- Applied ScienceJournal2022
33Two Layer Symmetric Cryptography Algorithm for Protecting Data from AttacksM. Nadeem, A. Arshad, S.Riaz, S.W Zahra, S. Band, A. MosaviTSP- CMCJournal2022
34Preventing Cloud Network from Spamming Attacks using Cloudflare and KNNM. Nadeem, A. Arshad, S.Riaz, S.W Zahra, S. Band, A. Mosavi,TSP- CMCJournal2022
35Deep Bimodal Fusion Approach for Apparent Personality AnalysisS. Riaz, A. Arshad, Shahab S.Band and A. MosaviTSP- CMCJournal2022
36Transforming Hand Drawn Wireframes into Front-End Code with Deep LearningS. Riaz, A. Arshad, Shahab S.Band and A. MosaviTSP- CMCJournal2022
37Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention SystemM. Nadeem, A. Arshad, S. Riaz, S. S. Band and A. MosaviIEEE ACCESSJournal2021
38Empirical Study of Semi-Supervised Deep Fuzzy C-Mean Clustering AlgorithmA. Arshad, M. Hassam, S. Riaz and S. ShamshirbandIEEE EUROCON 2021 Conference2021
39Hill Matrix and Radix-64 Bit Algorithm to Preserve Data ConfidentialityA. Arshad, M. Nadeem, S. Riaz, A. Alruban, S.W Zahra, A. K. Dutta, Z. Alzaid R. Alabdan, B. Almutairi, S. AlmotairiTSP- CMCJournal2022
40Development of Security Rules and Mechanisms to Protect Data from AssaultsZahra, S.W.; Arshad, A.; Nadeem, M.; Riaz, S.; Dutta, A.K.; Alzaid, Z.; Alabdan, R.; Almutairi, B.; Almotairi, S. MDPI- Applied ScienceJournal2022
41An Optimization Approach for Convolutional Neural Network Using Non-Dominated Sorted Genetic Algorithm-IIA. Zafar, M. Aamir, N. M Nawi, A. Arshad, S. Riaz, A. Alruban, A. K. Dutta, B. Almutairi, S. Almotairi,TSP- CMCJournal2022
42Two-Layer Security Algorithms to Prevent Attacks on Data in CyberspaceNadeem, M.; Arshad, A.; Riaz, S.; Zahra, S.W.; Dutta, A.K.; Alruban A.; Almutairi, B.; Almotairi, S. MDPI- Applied ScienceJournal2022
43An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption AlgorithmsM. Nadeem, A. Arshad, S. Riaz, S.W Zahra, Ashit Kumar Dutta, Moteeb Al Moteri and Sultan Almotairi, TSP- CMCJournal2022
44A Comparison of Pooling Methods for Convolutional Neural NetworksZafar A, Aamir M, Mohd Nawi N, Arshad A, Riaz S, Alruban A, Dutta AK, Almotairi S. MDPI- Applied ScienceJournal2022
45A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data TransmissionNadeem, M.; Arshad, A.; Riaz, S.; Zahra, S.W.; Dutta, A.K.; Almotairi, S. MDPI- Applied ScienceJournal2022
46Preventing the Cloud Networks through Semi-Supervised Clustering from both sides attacksNadeem, M.; Arshad, A.; Riaz, S.; Zahra, S.W.; Dutta, A.K.; Almotairi, S. MDPI- Applied ScienceJournal2022
47Two Layer Symmetric Cryptography Algorithm for Protecting Data from AttacksM. Nadeem, A. Arshad, S.Riaz, S.W Zahra, S. Band, A. MosaviTSP- CMCJournal2022
48Preventing Cloud Network from Spamming Attacks using Cloudflare and KNNM. Nadeem, A. Arshad, S.Riaz, S.W Zahra, S. Band, A. Mosavi,TSP- CMCJournal2022
49Deep Bimodal Fusion Approach for Apparent Personality AnalysisS. Riaz, A. Arshad, Shahab S.Band and A. MosaviTSP- CMCJournal2022
50Transforming Hand Drawn Wireframes into Front-End Code with Deep LearningS. Riaz, A. Arshad, Shahab S.Band and A. MosaviTSP- CMCJournal2022
51Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention SystemM. Nadeem, A. Arshad, S. Riaz, S. S. Band and A. MosaviIEEE ACCESSJournal2021
52Empirical Study of Semi-Supervised Deep Fuzzy C-Mean Clustering AlgorithmA. Arshad, M. Hassam, S. Riaz and S. ShamshirbandIEEE EUROCON 2021 Conference2021
53An Empirical Analysis on Software Development Efforts Estimation in Machine Learning PerspectiveZulfiqar Ali, Israr ur Rehman and Zahoor Jan ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal.Journal2021
54User context ontology for adaptive mobile-phone interfacesMuhammad Waseem Iqbal, Nadeem Ahmad Ch, Syed Khuram Shahzad, Muhammad Raza Naqvi, Babar Ayub Khan, and Zulfiqar AliIEEE Access Journal2021
55An Efficient Deep Learning Framework for Face Mask Detection in Complex ScenesSultan Daud Khan, Rafi Ullah, Mussadiq Abdul Rahim, Muhammad Rashid, Zulfiqar Ali, Mohib Ullah, and Habib UllahIFIP International Conference on Artificial Intelligence Applications and InnovationsConference2022
56Motion-shape-based deep learning approach for divergence behavior detection in high-density crowdMuhammad Umer Farooq, Mohamad Naufal M. Saad, Sultan Daud Khan The visual computerJournal2021
57Deep Trajectory Classification Model for Congestion Detection in Human CrowdsEmad Felemban Sultan Daud Khan, Atif Naseer, Faizan Ur Rehman,*and Saleh BasalamahComputers, Materials, and ContinuaJournal2021
58Multi-Scale Person Localization With Multi-Stage Deep Sequential FrameworkSultan Daud Khan, Saleh BasalamahInternational Journal of Computational Intelligence SystemsJournal2021
59Characterization of different crowd behaviors using novel deep learning framework.Abdullah J. ALZAHRANI, Sultan Daud KHANTurkish Journal of Electrical Engineering & Computer SciencesJournal2021
60Automatic Detection of Nephrops norvegicus Burrows in Underwater Images Using Deep LearningAtif Naseer; Enrique Nava Baro; Sultan Daud Khan; Yolanda Vila GordilloGlobal Conference on Wireless & Optical TechnologiesConference2020
61Who is driving? Event-driven Driver Identification and Impostor Detection through
Support Vector Machine
Mussadiq Abdul Rahim, Jiamou Liu, Zijian Zhang, Liehuang Zhu, Xin Li, Salabat KhanIEEE Sensors JournalJournal2020
62Attack-Resilient TLS Certificate TransparencySalabat Khan, Liehuang Zhu, Zijian Zhang, Mussadiq Abdul Rahim,IEEE AccessJournal2020
63SCM: Secure and Accountable TLS Certificate ManagementSalabat Khan,Zijian Zhang,Liehuang Zhu,Mussadiq Abdul Rahim,Sadique AhmadInternational Journal of Communication
Systems
Journal2020
64Patient's Feedback Platform for Quality of Services via "Free Text Analysis" in Healthcare IndustryAhthasham Sajid, Muhammad Awais, Mirza Amir , Mehmood,Shazia Batool, Afia ZafarEMITTER International Engineering TechnologyJournal2020
65Sparse To Dense Scale Prediction For CrowdCounting In High Density CrowdsSultan Daud Khan, Saleh BasalamahArabian Journal for Science and EngineeringJournal2020
66Scale and density invariant head detection deepmodel for crowd counting in pedestrian crowdsSultan Daud Khan, Saleh BasalamahThe visual computerJournal2020
67Robust Head Detectionin Complex Videos Using Two-stage Deep Convolution FrameworkSultan Daud Khan, Yasir Ali, C14Basim Zafar,Abdulfattah NoorwaliIEEE AccessJournal2020
68Multi-feature-based crowd video modeling for visual event detectionHabib Ullah, Ihtesham Ul Islam, Mohib Ullah, Muhammad Afaq, Sultan Daud Khan, Javed Iqbal Multimedia systemsJournal2020
69Motion Estimation of High Density Crowd Using Fluid DynamicsMuhammad Umer Farooq, Mohamed Naufal B. M. Saad,,Aamir Saeed Malik,Aamir Saeed Malik,Yasir Salih Ali,Sultan Daud KhanImaging science journalJournal2020
70TCM: Temporal Consistency Model for Head Detection in Complex VideosSultan Daud Khan, Ahmed B. Altamimi, Mohib Ullah, Habib Ullah, Faouzi AlayaJournal of SensorsJournal2020
71Toward Smart Lockdown: A Novel Approach for COVID-19 Hotspots Prediction Using a Deep Hybrid Neural NetworkSultan Daud Khan, Louai Alarabi, Saleh M.ComputersJournal2020
72Accountable Credential Management System for Vehicular Communication (4.706)Salabat Khan, Liehuang Zhu, Xiaoyan Yu, Zijian Zhang, Mussadiq Abdul Rahim, Maqbool Khan, Xiaojiang Du, Mohsen GuizaniVehicular CommunicationsJournal2020
73Ethical Issues of Radio Frequency Identification Chips Implanted in Human Bodies: A ReviewMuhammad Nadeem Akhtar,*, Muhammad Adrees, Muhammad Mukhtar Qureshi and Zulfiqar AliIndian Journal of Science and TechnologyJournal2020
74Stacked LSTM Network for HumanActivity Recognition Using Smartphone DataMohib Ullah; Habib Ullah; Sultan Daud Khan; Faouzi Alaya CheikhEuropean Workshop on Visual Information Processing,Conference2019
75Person Head Detection Based DeepModel for People Counting in Sports Videos”,Sultan Daud Khan; Habib Ullah; Mohib Ullah; Nicola Conci; Faouzi Alaya Cheikh; Azeddine BeghdadIEEE AVSSConference2019
76DISAM: Density Independent andScale Aware Model for Crowd Counting and Localization”,Sultan Daud Khan; Habib Ullah; Mohammad Uzair; Mohib Ullah; Rehan Ullah; Faouzi Alaya CheikhIEEE ICIPConference2019
77An Image Based Prediction Model for Sleep Stage Identification’Saira Kanwal; Muhammad Uzair; Habib Ullah; Sultan Daud Khan; Mohib Ullah; Faouzi Alaya CheikhIEEE ICIPConference2019
78Zero-to-Stable Driver Identification: A Non-Intrusive and Scalable
Driver Identification Scheme
M. Rahim, L. Zhu, X.Li, J. Liu, Z. Zhang, Z. Qin, S. Khan, K. GaiIEEE Transactions on Vehicular
Technology
Journal2019
79Breast Cancer Classification using Global Discriminate Features in Mammographic ImagesNadeem Tariq, Beenish Abid, Khawaja Ali Qadeer, Imran Hashim, Zulfiqar Ali and Ikramullah KhosaInternational Journal of Advanced Computer Science and ApplicationsJournal2019
80Empirical Performance Analysis of Decision Tree and Support Vector Machine based Classifiers on Biological DatabasesMuhammad Amjad, Abid Rafiq,Zulfiqar Ali
International Journal of Advanced Computer Science and ApplicationsJournal2019
81Classification of Energy Consumption in the Balkans using Ensemble Learning MethodsRadmila Jankovic; Alessia Amelio; Zulfiqar Ali RanjhaInternational Conference on Advancements in Computational Sciences(ICACS19)Conference2019
82Optimal Compression of Medical ImagesRafi Ullah, HabibInternational Journal of Advanced Computer Science and ApplicationsJournal2019
83Medical image(s) watermarking and its Optimization Using Genetic ProgrammingRafi Ullah and Hani Ali AlquhayzInternational Journal of Advanced Computer Science and ApplicationsJournal2019
84Protection of ultrasound image sequence: employing motion vect or reversible watermarking.Rafi Ullah Habib and Fayez Al-FayezInternational Journal of Advanced Computer Science and ApplicationsJournal2019
85Congestion detection in pedestrian crowds using oscillation in motion trajectoriesSultan Daud KhanEngineering Applications of Artificial Intelligence 85:429-443 · October 2019Conference2019
86Internal Emotion Classification Using EEG Signal With Sparse Discriminative EnsembleHabib Ullah,
Muhammad Uzair,
Arif Mahmood,
Mohib Ullah
EEE Access. 7. 1-1. 10.1109/ACCESS.2019.2904400.Journal2019
87An Image Based Prediction Model for Sleep Stage IdentificationKanwal, Saira & Ullah, Habib & Khan, Sultan & Ullah, Mohib & Alaya Cheikh, FaouziIEEE International Conference on Image Processing (ICIP). doi:10.1109/icip.2019.8803026 .Conference2019
88Scale Driven Convolutional Neural Network Model For People Counting and Localization in Crowd ScenesBasalamah, Sultan & Ullah, HabibIEEE Access, 7, 71576–71584.
doi:10.1109/access.2019.2918650
Journal2019
89Crowd Counting in Low-Resolution Crowded Scenes Using Region-Based Deep Convolutional Neural NetworksMuhammad Saqib,Sultan Daud Khan,Nabin Sharma,Michael BlumensteinIEEE Access, 1–1. doi:10.1109/access.2019.2904712 Journal2019
90Evolutionary Algorithms for Query Optimization in Distributed Database Systems: A reviewHafiza Maria Kiran , Zulfiqar Ali and Waeem ShehzadADCAIJ: Advances in Distributed Computing and Artificial Intelligence JournalJournal2018
91Empirical Study of Associative Classifiers on Imbalanced Datasets in KEELZulfiqar Ali, Waseem Shahzad9th International Conference on Information, Intelligence, Systems and Applications (IISA2018),Conference2018
92Real-Time Drone Surveillance and Population Estimation of Marine Animals from Aerial ImageryMuhammad Saqib,Sultan Daud Khan,
Nabin Sharma
International Conference on Image and Vision Computing New Zealand (IVCNZ)Conference2018
93Requirement Elicitation Techniques for Open Source Systems: A ReviewHafiza Maria Kiran and Zulfiqar AliInternational Journal Of Advanced Computer Science And ApplicationsJournal2018
94CrashSafe: a formal model for proving crash-safety of Android applications Khan, Wilayat & Ullah, Habib & Ahmad, Aakash & Sultan, Khalid & Khan, Sultan & Alhumaid, Mohammad & Abdulaziz, Sultan.Human-centric Computing and Information Sciences. 8. 10.1186/s13673-018-0144-7.Journal2018
95Light absorption enhancement in tri-layered composite meta surface absorber for solar cell applicationsKhan, Adnan & Daud Khan, Aimal & Khan, Sultan & Noman, MuhammadOptical Materials. 84. 195-198. 10.1016/j.optmat.2018.07.009.N/A2018
96Person Head Detection in Multiple Scales Using Deep Convolutional Neural NetworksSaqib, Muhammad & Khan, Sultan & Sharma, Nabin & Blumenstein, Michael.2018 International Joint Conference on Neural Networks (IJCNN)Conference2018
97Adaptive Usage Statistical Testing for 3D Gaming ApplicationsAfza Kazmi,
Anam Fatima, Arsalan Idris
Published in 2018 International Conference on Computing, Electronic and Electrical Engineering (ICE Cube 2018).Conference2018
98Removing Disabilities: Controlling Personal Computer Through Head Movements and Voice CommandAfia Zafar ,Muhammad Asad,Rahman Wali,Muhammad Zubair Rehman, Shafique,Ahmed,Abdur Rehman,Abdul Wadood,Semad Siddiqui, Muhammad Iqbal, Maria Imdad, H M Faisal BhattiPublished in IEEE 12th International Conference on Application of Information and Communication Technologies (AICT) 2018Conference2018
99The users experience quality of responsive web design on multiple devicesAsad Jameel,Khurram Shahzad,Afia Zafar,Usman Ahmed,Syed Jawad Hussain, Ahthasham SajidPublished in:Proceeding ICFNDS '18 Proceedings of the 2nd International Conference on Future Networks and Distributed SystemsConference2018
100An Efficient Sparse Coding-Based Data-Mining Scheme in Smart GridDongshu Wang, Jialing He, Mussadiq Abdul Rahim, Zijian ZhangMobile Ad-hoc and Sensor NetworksConference2017
101EPACO: a novel ant colony optimization for emerging patterns based classification (2.04)Zulfiqar Ali, Waseem ShahzadCluster ComputingJournal2017
102Comparative Analysis and Survey of Ant Colony Optimization based Rule MinersZulfiqar Ali, Waseem ShahzadInternational Journal of Advanced Computer Science and ApplicationsJournal2017
103Performance Evaluation of Associative Classifiers in Perspective of Discretization MethodsZulfiqar Ali, Waseem ShahzadAdvances in Science, Technology and Engineering Systems JournalJournal2017
104A review on comparative performance analysis of associative classifiersZulfiqar Ali , Syed Khuram Shahzad, Waseem Shahzad International Journal of Advanced and Applied SciencesJournal2017
105Performance analysis of support vector machine based classifiersZulfiqar Ali , Syed Khuram Shahzad, Waseem Shahzad International Journal of Advanced and Applied SciencesJournal2017
106Performance Analysis of Statistical Pattern Recognition Methods in KEELZulfiqarAli, Syed KhurramShahzad, WaseemShahzadInternational Conference on Knowledge Based and Intelligent Information and Engineering Systems, KES2017Conference2017
107Intelligent watermarking for image authentication and recoveryRafi Ullah and Hani Ali AlquhayzInternational Journal of Advanced Computer Science and ApplicationsJournal2017
108Extracting descriptive motion information from crowd scenesSaqib, Muhammad & Khan, Sultan & Sharma, Nabin & Blumenstein, Michael International Conference on Image and Vision Computing New Zealand (IVCNZ). doi:10.1109/ivcnz.2017.8402493Conference2017
109Towards a Crowd Analytic Framework For Crowd Management in Majid-al-HaramSultan Daud Khan,
Muhammad Tayyab
Muhammad Khurram,Amin,
Sohaib Ahmad Khan
arXiv:1709.05952Conference2017
110Towards a Dedicated Computer Vision Tool set for Crowd Simulation ModelsKhan, Sultan & Saqib, Muhammad & Blumenstein, Michael. Published in ArXiv 2017Conference2017
111A Study on Detecting Drones Using Deep Convolutional Neural Networks.Saqib, Muhammad & Sharma, Nabin & Khan, Sultan & Blumenstein, Michael14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). doi:10.1109/avss.2017.8078541Conference2017
112Drone-vs-Bird detection challengeColuccia, Angelo & Ghenescu, Marian & Piatrik, Tomas & De Cubber, Geert & Schumann, Arne & Sommer, Lars & Klatte, Johannes & Schuchert, Tobias & Beyerer, Jürgen & Farhadi, Mohammad & Amandi, Ruhallah & Aker, Cemal & Kalkan, Sinan & Saqib, Muhammad & Sharma, Nabin & Khan, Sultan & Makkah, Khan & Blumenstein, Michael.2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). doi:10.1109/avss.2017.8078464Conference2017
113Detecting dominant motion patterns in crowds of pedestriansMuhammad Saqib, , Sultan & Makkah, KhanEighth International Conference on Graphic and Image ProcessingConference2017
114Low Cost Emergency Android Based PagingMehak Sheikh, Umay KulsoomCommunications on Applied Electronics, July 2017.Conference2017
115Why to redesign PDES framework for smart devices: An Empirical StudyFahad Maqbool,
Syed Meesam Raza Naqvi
Proceedings of the Summer Simulation Multi-Conference, Article No.20, (WA, USA)Conference2017
116Comparative Study of Discretization Methods on the Performance of Associative ClassifiersZulfiqar Ali, Waseem ShahzadFrontiers of Information Technology (FIT)Conference2016
117Location Aware Business Services for Smart DevicesUmay Kulsoom, Abeer Fatima, Fatima Safdar Malik, Sidra MehreenNACTICT,2016NACTICT,20162016
118DeVANET: Decentralized Software-Defined VANET ArchitectureAfza Kazmi,
Muazzam A. Khan,
M. Usman Akram
Published in 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW).Conference2016
119Model Driven Architecture for Decentralized Software Defined VANETsAfza Kazmi,
Muazzam A. Khan,
Faisal Bashir,
Nazar A. Saqib,
Muhammad Alam,
Masoom Alam
Part of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 185). Book
Chapters
2016
120Generalized SLA enforcement framework using feedback control systemMussadiq Abdul Rahim; Irfan Ul Haq; Hanif Durad; Erich Schikuta12th International Conference
on High-capacity Optical Networks
and Enabling/Emerging Technologies
(HONET)
Conference2015
121Tracking of EEG Activity Using Motion Estimation to Understand Brain Wiring (IF: 2.45)Humaira Nisar 1, Aamir Saeed Malik, Rafi Ullah, Seong-O Shim, Abdullah Bawakid, Muhammad Burhan Khan, Ahmad Rauf SubhaniAdvances in Experimental Medicine and Biology, SpringerJournal2015
122Analysis of Routing Protocols in AD HOC and Sensor Wireless Networks Based on Swarm IntelligenceZulfiqar Ali, Waseem ShahzadInternational Journal of Networks and CommunicationsJournal2013
123Authentication of topographic EEG: employing transform-based watermarking,Dr Rafi Ullah, and Aamir Saeed MalikJournal of Computers and Electical Engineering, Elsevier [IF: 0.928].Journal2013
124Dual-purpose semi fragile watermark; authentication and recovery of digital imagesRafi Ullah, Asifullah Khan, and Aamir Saeed MalikJournal of Computers and Electrical Engineering, Elsevier, Vol. 39, pp. 2019-2030 [IF: 0.928].Journal2013
125Optical Attenuation Estimation from Measured Visibility Data in Islamabad, PakistanM. S. Khan ; M. R. Naqvi ; M. A. Khan ; M. Latif ; K. Ullah ; R. D. Khan ; R. Wali ; E. LeitgebPublished in IEEE conference NOC/OC & I, July 2013Conference2013
126Cognitive Radios and Cognitive Networks: A short IntroductionM. T. Mushtaq
M. S. Khan
M. R. Naqvi
R. D. Khan
M. A. Khan
Prof. Dr. Otto F. Koudelka
Published in Journal of Basic and Applied Scientific Research (J. Basic. Appl. Sci. Res., 3 (8) 56-65, 2013Journal2013
127Digital Image WatermarkingDr. Rafi Ullah and Dr. Asifullah KhanVDM Verlag Dr. Müller, ISBN. 978-3-639-32548-5 Book2012
128Intelligent reversible watermarking and authentication: hiding depth map information for 3d camerasAsifulllah Khan, Sana Ambreen Malik, Asad Ali, Rafiullah Chamlawi, Mutawwara Hussain, M. Tariq Mehmood, and Imran UsmanInformation Sciences, vol. 216, pp. 155 - 175, [IF: 3.643]Journal2012
129Authentication of images for 3d cameras: reversibly embedding information using intelligent approachesSana Ambreen Malik, Asifullah Khan, Mutawarra Hussain, Khurram Jawad, Rafiullah Chamlawi, Abdul JalilJournal of Systems and Software, vol. 85(11), pp. 2665 – 2673, [IF: 1.135].Journal2012
130Critical Analysis of Swarm Intelligence based Routing Protocols in Ad hoc and Sensor Wireless NetworksZulfiqar Ali, Waseem ShahzadInternational Conference on Computer Networks and Information Technology (ICCNIT’2011), Conference2011
131Employing intelligence in the embedding and decoding stages of a robust watermarking system.Imran Usman, Asifullah Khan, and Rafiullah ChamlawiAEU-International Journal of Electronics and Communications, vol. 65(6), pp. 582-588 [IF: 0.551].Journal2011
132Digital image authentication and recovery: Employing integer transform based information embedding and extraction.Rafiullah Chamlawi. and Asifullah KhanInformation Sciences, Elsvier, 180(24): 4909-4928 [IF: 3.643].Journal2010
133Authentication and recovery of images using multiple watermarksRafiullah Chamlawi., Asifullah Khan, and Imran UsmanComputers & Electrical Engineering, vol. 36(3), pp. 578-584 [IF: 0.928].Journal2010
134Authentication and recovery of digital images: Potential application in video surveillance and remote sensing,Rafiullah Chamlawi., Chang T-sun Li, Asifullah Khan, and Imran UsmanIEEE Consumer Electronics.N/A2009
135Dual watermarking method for secure image authentication and recoveryRafiullah Chamlawi., Imran Usman, Asifullah KhanINMIC-IEEE.Journal2009
136Perceptual shaping in digital image watermarking using LDPC codes and genetic programmingImran Usman, Asifullah Khan, and Rafiullah ChamlawiApplications of Soft Computing, Advances in Soft Computing, Vol. 58, 2009, Springer Berlin / Heidelberg, pp. 509-518.Journal2009
137Effective Memory Access Optimization by Memory Delay Modeling, Memory Allocation, and Slack Time ManagementSultan Daud Khan2009 International SoC Design Conference, ISOCC 2009Conference2009
138Towards a better robustness-imperceptibility tradeoff in digital watermarkingImran Usman, Asifullah Khan, and Rafiullah ChamlawiInnovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering, pp. 226-230.Journal2008
139A generalized approach for embedding watermark in digital images using ldpc codes and genetic programming.Imran Usman, Asifullah Khan, and Rafiullah ChamlawiWSC 2008 Online World Conference on Soft Computing in Industrial Applications, pp. 151.Conference2008
140Wavelet based image authentication and recovery."Rafiullah Chamlawi., Asifullah Khan, and Adnan IdrisJournal of Computer Science and Technology, vol. 22(6), pp. 795-804 [IF: 0.477].Journal2007
141Image authenticity and perceptual optimization via genetic algorithm and a dependence neighborhoodImran Usman, Asifullah Khan, and Rafiullah ChamlawiInternational Journal of Applied Mathematics and Computer Sciences, vol. 4(1), pp. 615-620.Journal2007
142A secure semi-fragile watermarking scheme for authentication and recovery of images based on wavelet transform, WASET.Rafiullah Chamlawi., Asifullah Khan, and Adnan IdrisWorld Academy of Science, Engineering and Technology 23 2006Conference2006