


default search action
Sani M. Abdullahi
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j21]Tianyu Yang, Canghong Shi, Minfeng Shao, Sani M. Abdullahi
, Imran Mumtaz
, Yong Liu, Ling Xiong:
An adaptive and large payload audio watermarking against jittering attacks. Comput. Electr. Eng. 124: 110321 (2025)
[j20]Canghong Shi, Xin Qiu, Min Wu, Xianhua Niu, Xiaojie Li, Sani M. Abdullahi:
Audio copy-move forgery detection with decreasing convolutional kernel neural network and spectrogram fusion. Complex Intell. Syst. 11(9) (2025)
[j19]Lanxi Liu, Pengpeng Yang, Suwen Du, Sani M. Abdullahi
:
Recaptured Image Detection Based on Multi-Scale Residual Features of Discriminative Regions. IEICE Trans. Inf. Syst. 108(4): 384-391 (2025)
[j18]Sani M. Abdullahi
, Sanja Lazarova-Molnar
:
On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances. Int. J. Inf. Sec. 24(1): 53 (2025)
[j17]Xin Qiu, Canghong Shi, Xiaojie Li
, Min Wu
, Sani M. Abdullahi
, Yong Liu
:
S-Faster R-CNN: Intraspectral Similarity Learning for Audio Copy-Move Forgery Localization in IoT Security. IEEE Internet Things J. 12(15): 30185-30202 (2025)
[c11]Sani M. Abdullahi
, Sanja Lazarova-Molnar
:
Cybersecurity-oriented Digital Twins: A Double-Edged Sword or a Game Changer? CSR 2025: 626-631
[c10]Sani M. Abdullahi
, Manuel Götz, Sanja Lazarova-Molnar
:
Simulation-Based Analysis of OPC UA Set-Up Vulnerability and Its Security Risks in Cyber-Physical Manufacturing Systems. CSR 2025: 1119-1126
[c9]Imran Riaz Hasrat
, Sani M. Abdullahi
, Eun-Young Kang
:
Quantitative Assessment of Energy Efficiency, Comfort, and Safety in an Intelligent Heating System Under False Data Injection Attacks. SAFECOMP (Workshops) 2025: 327-339- 2024
[j16]Sani M. Abdullahi
, Shuifa Sun, Beng Wang, Ning Wei, Hong-Xia Wang:
Biometric template attacks and recent protection mechanisms: A survey. Inf. Fusion 103: 102144 (2024)
[j15]Jinghong Xia, Hongxia Wang
, Sani M. Abdullahi
, Heng Wang, Fei Zhang, Bingling Luo:
Enhanced Fourier-Mellin domain watermarking for social networking platforms. J. Inf. Secur. Appl. 86: 103884 (2024)
[c8]Sani M. Abdullahi
, Sanja Lazarova-Molnar
:
Toward a Unified Security Framework for Digital Twin Architectures. CSR 2024: 612-617
[c7]Sani M. Abdullahi, Ashkan Zare, Sanja Lazarova-Molnar:
Cybersecurity in Distributed Industrial Digital Twins: Threats, Defenses, and Key Takeaways. DiDit@DisCoTec 2024- 2023
[j14]Sani M. Abdullahi
, Shuifa Sun, Hongxia Wang, Beng Wang:
The reversibility of cancelable biometric templates based on iterative perturbation stochastic approximation strategy. Pattern Recognit. Lett. 172: 221-229 (2023)
[j13]Sani M. Abdullahi
, Ke Lv
, Shuifa Sun
, Hongxia Wang:
Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Ordering. IEEE Trans. Dependable Secur. Comput. 20(5): 3828-3844 (2023)
[j12]Mingze He
, Hongxia Wang, Fei Zhang
, Sani M. Abdullahi
, Ling Yang
:
Robust Blind Video Watermarking Against Geometric Deformations and Online Video Sharing Platform Processing. IEEE Trans. Dependable Secur. Comput. 20(6): 4702-4718 (2023)
[j11]Wanjie Li
, Hongxia Wang, Yijing Chen
, Sani M. Abdullahi
, Jie Luo
:
Constructing Immunized Stego-Image for Secure Steganography via Artificial Immune System. IEEE Trans. Multim. 25: 8320-8333 (2023)
[c6]Jinghong Xia
, Hongxia Wang, Sani M. Abdullahi
, Heng Wang, Fei Zhang, Bingling Luo:
Adaptive and Robust Fourier-Mellin-Based Image Watermarking for Social Networking Platforms. ICME 2023: 2843-2848- 2022
[j10]Asad Malik
, Minoru Kuribayashi
, Sani M. Abdullahi
, Ahmad Neyaz Khan
:
DeepFake Detection for Human Face Images and Videos: A Survey. IEEE Access 10: 18757-18775 (2022)
[j9]Jialong Li, Hongxia Wang, Peisong He
, Sani M. Abdullahi
, Bin Li:
Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection. Digit. Signal Process. 120: 103256 (2022)
[j8]Sani M. Abdullahi
, Shuifa Sun, Yifei Wang, Pengpeng Yang, HuaZheng Wang, Beng Wang:
A hybrid BTP approach with filtered BCH codes for improved performance and security. J. Inf. Secur. Appl. 71: 103355 (2022)
[j7]Otabek Khudayberdiev, Jiashu Zhang, Sani M. Abdullahi
, Sheng Zhang:
Light-FireNet: an efficient lightweight network for fire detection in diverse environments. Multim. Tools Appl. 81(17): 24553-24572 (2022)
[j6]Lei Zhang, Sani M. Abdullahi
, Peisong He, Hongxia Wang:
Dataset mismatched steganalysis using subdomain adaptation with guiding feature. Telecommun. Syst. 80(2): 263-276 (2022)
[c5]Sani Mohammed Abdullahi
, Shuifa Sun, Asad Malik, Otabek Khudayberdiev, Riskhan Basheer:
Spoofed Fingerprint Image Detection Using Local Phase Patch Segment Extraction and a Lightweight Network. IFIP Int. Conf. Digital Forensics 2022: 85-105- 2021
[i1]Sani M. Abdullahi, Shuifa Sun:
Random Hash Code Generation for Cancelable Fingerprint Templates using Vector Permutation and Shift-order Process. CoRR abs/2105.10227 (2021)- 2020
[j5]Asad Malik
, Peisong He
, Hongxia Wang, Ahmad Neyaz Khan
, Saied Pirasteh
, Sani M. Abdullahi
:
High-Capacity Reversible Data Hiding in Encrypted Images Using Multi-Layer Embedding. IEEE Access 8: 148997-149010 (2020)
[j4]Sani M. Abdullahi
, Hongxia Wang, Tao Li
:
Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing. IEEE Trans. Inf. Forensics Secur. 15: 2587-2601 (2020)
2010 – 2019
- 2019
[j3]Asad Malik
, Hongxia Wang, Hanzhou Wu
, Sani M. Abdullahi
:
Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image. Int. J. Digit. Crime Forensics 11(1): 46-61 (2019)- 2018
[j2]Sani M. Abdullahi
, Hongxia Wang, Asad Malik
:
Fingerprint Image Hashing Based on Minutiae Points and Shape Context. Int. J. Digit. Crime Forensics 10(4): 1-20 (2018)
[j1]Sani M. Abdullahi
, Hongxia Wang:
Robust enhancement and centroid-based concealment of fingerprint biometric data into audio signals. Multim. Tools Appl. 77(16): 20753-20782 (2018)
[c4]Sani M. Abdullahi
, Hongxia Wang:
Fourier-Mellin Transform and Fractal Coding for Secure and Robust Fingerprint Image Hashing. AVSS 2018: 1-7- 2016
[c3]Qing Qian, Hongxia Wang, Sani M. Abdullahi
, Huan Wang, Canghong Shi
:
Speech Authentication and Recovery Scheme in Encrypted Domain. IWDW 2016: 46-60
[c2]Wencheng Cao, Hongxia Wang, Hong Zhao, Qing Qian, Sani M. Abdullahi
:
Identification of Electronic Disguised Voices in the Noisy Environment. IWDW 2016: 75-87
[c1]Sani M. Abdullahi
, Hongxia Wang, Qing Qian, Wencheng Cao:
Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication. IWDW 2016: 129-144
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-03 06:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







