default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 114 matches
- 2024
- Abdullah Alaklabi, Arslan Munir, Muhammad Asfand Hafeez, Muazzam Ali Khan Khattak:
Z-Crypt: Chirp Z-Transform-Based Image Encryption Leveraging Chaotic Logistic Maps and Substitution Permutation Network. IEEE Access 12: 123401-123422 (2024) - Zakir Khan, Syed Hamad Shirazi, Muhammad Shahzad, Arslan Munir, Assad Rasheed, Yong Xie, Sarah Gul:
A Framework for Segmentation and Classification of Blood Cells Using Generative Adversarial Networks. IEEE Access 12: 51995-52015 (2024) - Abid Mehmood, Arslan Shafique, Moatsum Alawida, Abdul Nasir Khan:
Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques. IEEE Access 12: 27530-27555 (2024) - Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, Saad Nasser Altamimi, Sultan Noman Qasem, Mohammed Al-Sarem:
Innovative Cybersecurity for Enhanced Data Protection: An Extended Bit-Plane Extraction and Chaotic Permutation-Diffusion Approach in Information Security. IEEE Access 12: 17926-17944 (2024) - Mujeeb Ur Rehman, Arslan Shafique, Muhammad Shahbaz Khan, Maha Driss, Wadii Boulila, Yazeed Yasin Ghadi, Suresh Babu Changalasetty, Majed Alhaisoni, Jawad Ahmad:
A novel medical image data protection scheme for smart healthcare system. CAAI Trans. Intell. Technol. 9(4): 821-836 (2024) - Sagheer Khan, Aaesha Alzaabi, Tharmalingam Ratnarajah, Tughrul Arslan:
Novel statistical time series data augmentation and machine learning based classification of unobtrusive respiration data for respiration Digital Twin model. Comput. Biol. Medicine 168: 107825 (2024) - Ramsha Shahid, Waqar S. Qureshi, Umar Shahbaz Khan, Arslan Munir, Ayesha Zeb, Syed Imran Moazzam:
Aerial imagery-based tobacco plant counting framework for efficient crop emergence estimation. Comput. Electron. Agric. 217: 108557 (2024) - Ramin Ghiasi, Muhammad Arslan Khan, Danilo Sorrentino, Cassandre Diaine, Abdollah Malekjafarian:
An unsupervised anomaly detection framework for onboard monitoring of railway track geometrical defects using one-class support vector machine. Eng. Appl. Artif. Intell. 133: 108167 (2024) - Arslan Munir, Alexander J. Aved, Khanh Pham, Joonho Kong:
Trustworthiness of Situational Awareness: Significance and Quantification. J. Cybersecur. Priv. 4(2): 223-240 (2024) - Imran Ali, Ahmad Arslan, Zaheer Khan, Shlomo Yedidia Y. Tarba:
The Role of Industry 4.0 Technologies in Mitigating Supply Chain Disruption: Empirical Evidence From the Australian Food Processing Industry. IEEE Trans. Engineering Management 71: 10600-10610 (2024) - Abderaouf Bouguerra, Ismail Gölgeci, David M. Gligor, Zaheer Khan, Ahmad Arslan, Ekrem Tatoglu:
Strategic Agility and Product Development in Emerging Markets: The Role of Employee Resilience and Self-Efficacy as Microfoundations. IEEE Trans. Engineering Management 71: 1598-1612 (2024) - Syed Ghazanfar Abbas, Muslum Ozgur Ozmen, Abdulellah Alsaheel, Arslan Khan, Z. Berkay Celik, Dongyan Xu:
SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants. USENIX Security Symposium 2024 - Muqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian:
D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation. USENIX Security Symposium 2024 - Muhammad Arslan, Muhammad Mubeen, Saadullah Farooq Abbasi, Muhammad Shahbaz Khan, Wadii Boulila, Jawad Ahmad:
A Single Channel-Based Neonatal Sleep-Wake Classification using Hjorth Parameters and Improved Gradient Boosting. CoRR abs/2408.07925 (2024) - 2023
- Sagheer Khan, Aaesha Alzaabi, Zafar Iqbal, Tharmalingam Ratnarajah, Tughrul Arslan:
A Novel Digital Twin (DT) Model Based on WiFi CSI, Signal Processing and Machine Learning for Patient Respiration Monitoring and Decision-Support. IEEE Access 11: 103554-103568 (2023) - Arslan Shafique, Mujeeb Ur Rehman, Kashif Hesham Khan, Sajjad Shaukat Jamal, Abid Mehmood, Shehzad Ashraf Chaudhry:
Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method. IEEE Access 11: 44559-44577 (2023) - Talha Ali Khan, Sai Ho Ling, Arslan A. Rizvi:
Optimisation of electrical Impedance tomography image reconstruction error using heuristic algorithms. Artif. Intell. Rev. 56(12): 15079-15099 (2023) - Khan Muhammad, Hayat Ullah, Mohammad S. Obaidat, Amin Ullah, Arslan Munir, Muhammad Sajjad, Victor Hugo C. de Albuquerque:
AI-Driven Salient Soccer Events Recognition Framework for Next-Generation IoT-Enabled Environments. IEEE Internet Things J. 10(3): 2202-2214 (2023) - Abid Mehmood, Arslan Shafique, Shehzad Ashraf Chaudhry, Moatsum Alawida, Abdul Nasir Khan, Neeraj Kumar:
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption. J. Inf. Secur. Appl. 78: 103590 (2023) - Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, Mohammad Mazyad Hazzazi:
Efficient and secure image encryption using key substitution process with discrete wavelet transform. J. King Saud Univ. Comput. Inf. Sci. 35(7): 101613 (2023) - Arslan Sheikh, Nadeem Siddique, Saima Qutab, Muhammad Ajmal Khan, Khalid Mahmood:
An investigation of emerging COVID-19 research trends and future implications for LIS field: A bibliometric mapping and visualization. J. Libr. Inf. Sci. 55(1): 3-17 (2023) - Md Sahabuddin, Qingmei Tan, Arslan Ayub, Tehreem Fatima, Mustafa Ishaq, Junaid Ali Khan:
Workplace ostracism and employee silence: an identity-based perspective. Kybernetes 52(1): 97-120 (2023) - Abdollah Malekjafarian, Chalres-Antoine Sarrabezolles, Muhammad Arslan Khan, Fatemeh Golpayegani:
A Machine-Learning-Based Approach for Railway Track Monitoring Using Acceleration Measured on an In-Service Train. Sensors 23(17): 7568 (2023) - Arslan Khan, Muqi Zou, Kyungtae Kim, Dongyan Xu, Antonio Bianchi, Dave Jing Tian:
Fuzzing SGX Enclaves via Host Program Mutations. EuroS&P 2023: 472-488 - Arslan Khan, Dongyan Xu, Dave Jing Tian:
EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation. SP 2023: 2990-3007 - Arslan Khan, Dongyan Xu, Dave Jing Tian:
Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems. SP 2023: 3008-3025 - Hafsa Gulzar, Jiyun Li, Arslan Manzoor, Sadaf Rehmat, Usman Amjad, Hadiqa Jalil Khan:
Transfer Learning Based Diagnosis and Analysis of Lung Sound Aberrations. CoRR abs/2303.08362 (2023) - 2022
- Jameel Arif, Muazzam Ali Khan, Baraq Ghaleb, Jawad Ahmad, Arslan Munir, Umer Rashid, Ahmed Yassin Al-Dubai:
A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access 10: 12966-12982 (2022) - Sagheer Khan, Tughrul Arslan, Tharmalingam Ratnarajah:
Digital Twin Perspective of Fourth Industrial and Healthcare Revolution. IEEE Access 10: 25732-25754 (2022) - Waheed Aftab Khan, Shahzaib Hamid, Muhammad Rehan Usman, Ali Raza, Muhammad Arslan Usman, Christos Politis, Gandeva Bayu Satrya:
HVDC Transmission Line Fault Identification: A Learning Based UAV Control Strategy. IEEE Access 10: 121561-121579 (2022)
skipping 84 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-04 00:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint