default search action
Abid Mehmood
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j26]Abid Mehmood, Arslan Shafique, Moatsum Alawida, Abdul Nasir Khan:
Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques. IEEE Access 12: 27530-27555 (2024) - [j25]Fatima Rashed Alzaabi, Abid Mehmood:
A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods. IEEE Access 12: 30907-30927 (2024) - [j24]Malik Hasnain Ahmed, Yousaf Saeed, Abid Mehmood, Muhammad Saeed, Naeem Ahmed, Qazi Mudassar Ilyas, Sajid Iqbal, Naushad Abid:
Real-Time Driver Depression Monitoring for Accident Prevention in Smart Vehicles. IEEE Access 12: 79838-79850 (2024) - [j23]Muhammad Khalid Mehmood, Humaira Arshad, Moatsum Alawida, Abid Mehmood:
Enhancing Smishing Detection: A Deep Learning Approach for Improved Accuracy and Reduced False Positives. IEEE Access 12: 137176-137193 (2024) - [j22]Abid Mehmood, Arslan Shafique, Neeraj Kumar, Muhammad Nasir Mumtaz Bhutta:
Data security in the Industrial Internet of Things (IIoT) through a triple-image encryption framework leveraging 3-D NEAT, 1DCJ, and 4DHCFO techniques. Comput. Electr. Eng. 118: 109354 (2024) - [j21]Abid Mehmood, Iynkaran Natgunanathan, Yong Xiang:
Efficient and Privacy Preserving Clustering Algorithm for Spatiotemporal Data. Int. J. Inf. Technol. Decis. Mak. 23(2): 967-992 (2024) - [j20]Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara, Ahmad K. Al Hwaitat:
Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness. Inf. 15(1): 27 (2024) - 2023
- [j19]Muhammad Usman Ghani Khan, Mourad Elhadef, Abid Mehmood:
Intelligent Urban Cities: Optimal Path Selection Based on Ad Hoc Network. IEEE Access 11: 19259-19268 (2023) - [j18]Arslan Shafique, Mujeeb Ur Rehman, Kashif Hesham Khan, Sajjad Shaukat Jamal, Abid Mehmood, Shehzad Ashraf Chaudhry:
Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method. IEEE Access 11: 44559-44577 (2023) - [j17]Imtiaz Ali shah, Abid Mehmood, Abdul Nasir Khan, Mourad Elhadef, Atta ur Rehman Khan:
HeuCrip: a malware detection approach for internet of battlefield things. Clust. Comput. 26(2): 977-992 (2023) - [j16]Moatsum Alawida, Sami Mejri, Abid Mehmood, Belkacem Chikhaoui, Oludare Isaac Abiodun:
A Comprehensive Study of ChatGPT: Advancements, Limitations, and Ethical Considerations in Natural Language Processing and Cybersecurity. Inf. 14(8): 462 (2023) - [j15]Abid Mehmood, Arslan Shafique, Shehzad Ashraf Chaudhry, Moatsum Alawida, Abdul Nasir Khan, Neeraj Kumar:
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption. J. Inf. Secur. Appl. 78: 103590 (2023) - 2022
- [j14]Abdullah Tariq, Abid Mehmood, Mourad Elhadef, Muhammad Usman Ghani Khan:
Adversarial Training for Fake News Classification. IEEE Access 10: 82706-82715 (2022) - [j13]Abid Mehmood, Dayang N. A. Jawawi:
AJFCode: An Approach for Full Aspect-Oriented Code Generation from Reusable Aspect Models. KSII Trans. Internet Inf. Syst. 16(6): 1973-1993 (2022) - [j12]Moatsum Alawida, Je Sen Teh, Abid Mehmood, Abdulhadi Shoufan, Wafa' Hamdan Alshoura:
A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8136-8151 (2022) - 2021
- [j11]Arslan Shafique, Abid Mehmood, Mourad Elhadef:
Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles. IEEE Access 9: 46927-46948 (2021) - [j10]Arslan Shafique, Abid Mehmood, Mourad Elhadef:
Detecting Signal Spoofing Attack in UAVs Using Machine Learning Models. IEEE Access 9: 93803-93815 (2021) - [j9]Abid Mehmood:
Efficient Anomaly Detection in Crowd Videos Using Pre-Trained 2D Convolutional Neural Networks. IEEE Access 9: 138283-138295 (2021) - [j8]Abid Mehmood:
LightAnomalyNet: A Lightweight Framework for Efficient Abnormal Behavior Detection. Sensors 21(24): 8501 (2021) - 2019
- [j7]Iynkaran Natgunanathan, Abid Mehmood, Yong Xiang, Longxiang Gao, Shui Yu:
Location Privacy Protection in Smart Health Care System. IEEE Internet Things J. 6(2): 3055-3069 (2019) - 2018
- [j6]Abid Mehmood, Iynkaran Natgunanathan, Yong Xiang, Howard Poston, Yushu Zhang:
Anonymous Authentication Scheme for Smart Cloud Based Healthcare Applications. IEEE Access 6: 33552-33567 (2018) - [j5]Iynkaran Natgunanathan, Abid Mehmood, Yong Xiang, Guang Hua, Gang Li, Shaun Bangay:
An overview of protection of privacy in multibiometrics. Multim. Tools Appl. 77(6): 6753-6773 (2018) - 2017
- [j4]Furkh Zeshan, Radziah Mohamad, Mohammad Nazir Ahmad, Syed Asad Hussain, Adnan Ahmad, Imran Raza, Abid Mehmood, Ikram Ulhaq, Arafat Abdulgader, Imran Babar:
Ontology-based service discovery framework for dynamic environments. IET Softw. 11(2): 64-74 (2017) - 2016
- [j3]Iynkaran Natgunanathan, Abid Mehmood, Yong Xiang, Gleb Beliakov, John Yearwood:
Protection of Privacy in Biometric Data. IEEE Access 4: 880-892 (2016) - [j2]Abid Mehmood, Iynkaran Natgunanathan, Yong Xiang, Guang Hua, Song Guo:
Protection of Big Data Privacy. IEEE Access 4: 1821-1834 (2016) - 2013
- [j1]Abid Mehmood, Dayang N. A. Jawawi:
Aspect-oriented model-driven code generation: A systematic mapping study. Inf. Softw. Technol. 55(2): 395-411 (2013)
Conference and Workshop Papers
- 2020
- [c1]Yonis Gulzar, Ali Amer Alwan, Abedallah Zaid Abualkishik, Abid Mehmood:
A Model for Computing Skyline Data Items in Cloud Incomplete Databases. ANT/EDI40 2020: 249-256
Informal and Other Publications
- 2014
- [i1]Abid Mehmood, Dayang N. A. Jawawi:
An exploratory study of the suitability of UML-based aspect modeling techniques with respect to their integration into Model-Driven Engineering context. CoRR abs/1410.3582 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint