default search action
Fawad Ahmed
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Ali Akbar Siddique, Wadii Boulila, Mohammed S. Alshehri, Fawad Ahmed, Thippa Reddy Gadekallu, Nancy Victor, Muhammed Tahir Qadri, Jawad Ahmad:
Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0. IEEE Trans. Consumer Electron. 70(1): 1923-1939 (2024) - 2023
- [j27]Ejaz Khan, Muhammad Zia Ur Rehman, Fawad Ahmed, Suliman A. Alsuhibany, Muhammad Zulfiqar Ali, Jawad Ahmad:
An Automated Classification Technique for COVID-19 Using Optimized Deep Learning Features. Comput. Syst. Sci. Eng. 46(3): 3799-3814 (2023) - [j26]Shahid Allah Bakhsh, Muhammad Almas Khan, Fawad Ahmed, Mohammed S. Alshehri, Hisham Ali, Jawad Ahmad:
Enhancing IoT network security through deep learning-powered Intrusion Detection System. Internet Things 24: 100936 (2023) - [j25]Fawad Ahmed, Muneeb Ur Rehman, Jawad Ahmad, Muhammad Shahbaz Khan, Wadii Boulila, Gautam Srivastava, Jerry Chun-Wei Lin, William J. Buchanan:
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder. ACM Trans. Multim. Comput. Commun. Appl. 19(3s): 128:1-128:21 (2023) - [i4]Laiba Asghar, Fawad Ahmed, Muhammad Shahbaz Khan, Arshad Arshad, Jawad Ahmad:
Noise-Crypt: Image Encryption with Non-linear Noise, Hybrid Chaotic Maps, and Hashing. CoRR abs/2309.11471 (2023) - 2022
- [j24]Jawad Ahmad, Syed Aziz Shah, Shahid Latif, Fawad Ahmed, Zhuo Zou, Nikolaos Pitropakis:
DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8112-8121 (2022) - [j23]Hamza Ghandorh, Wadii Boulila, Sharjeel Masood, Anis Koubaa, Fawad Ahmed, Jawad Ahmad:
Semantic Segmentation and Edge Detection - Approach to Road Detection in Very High Resolution Satellite Images. Remote. Sens. 14(3): 613 (2022) - [j22]Amir Anees, Iqtadar Hussain, Umar Mujahid Khokhar, Fawad Ahmed, Sajjad Shaukat Jamal:
Machine Learning and Applied Cryptography. Secur. Commun. Networks 2022: 9797604:1-9797604:3 (2022) - [j21]Ejaz Khan, Muhammad Zia Ur Rehman, Fawad Ahmed, Faisal Abdulaziz Alfouzan, Nouf M. Alzahrani, Jawad Ahmad:
Chest X-ray Classification for the Detection of COVID-19 Using Deep Learning Techniques. Sensors 22(3): 1211 (2022) - [j20]Muhammad Zia Ur Rehman, Fawad Ahmed, Suliman A. Alsuhibany, Sajjad Shaukat Jamal, Muhammad Zulfiqar Ali, Jawad Ahmad:
Classification of Skin Cancer Lesions Using Explainable Deep Learning. Sensors 22(18): 6915 (2022) - [j19]Shahid Latif, Zil E. Huma, Sajjad Shaukat Jamal, Fawad Ahmed, Jawad Ahmad, Adnan Zahid, Kia Dashtipour, Muhammad Umar Aftab, Muhammad Ahmad, Qammer Hussain Abbasi:
Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network. IEEE Trans. Ind. Informatics 18(9): 6435-6444 (2022) - [j18]Jan Sher Khan, Sema Koç Kayhan, Saygin Siddiq Ahmed, Jawad Ahmad, Hafza Ayesha Siddiqa, Fawad Ahmed, Baraq Ghaleb, Ahmed Al-Dubai:
Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme. Wirel. Pers. Commun. 125(1): 513-530 (2022) - [i3]Fawad Ahmed, Muneeb Ur Rehman, Jawad Ahmad, Muhammad Shahbaz Khan, Wadii Boulila, Gautam Srivastava, Jerry Chun-Wei Lin, William J. Buchanan:
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder. CoRR abs/2211.03662 (2022) - 2021
- [j17]Wadii Boulila, Hamza Ghandorh, Mehshan Ahmed Khan, Fawad Ahmed, Jawad Ahmad:
A novel CNN-LSTM-based approach to predict urban expansion. Ecol. Informatics 64: 101325 (2021) - [j16]Zia ur Rehman, Muhammad Attique Khan, Fawad Ahmed, Robertas Damasevicius, Syed Rameez Naqvi, Muhammad Wasif Nisar, Kashif Javed:
Recognizing apple leaf diseases using a novel parallel real-time processing framework based on MASK RCNN and transfer learning: An application for smart agriculture. IET Image Process. 15(10): 2157-2168 (2021) - [j15]Muhammad Khalid Iqbal, Ali Raza, Fawad Ahmed, Naveed Ahmad Faraz, Umair Saeed Bhutta:
Research on influencing mechanism of big five personality traits on customers online purchase intention: a mediating role of trust. Int. J. Electron. Bus. 16(1): 52-76 (2021) - [j14]Syed Qasim Abbas, Fawad Ahmed, Yi-Ping Phoebe Chen:
Perceptual image hashing using transform domain noise resistant local binary pattern. Multim. Tools Appl. 80(7): 9849-9875 (2021) - [j13]Muhammad Umair, Muhammad Shahbaz Khan, Fawad Ahmed, Fatmah Baothman, Fehaid Alqahtani, Muhammad Alian, Jawad Ahmad:
Detection of COVID-19 Using Transfer Learning and Grad-CAM Visualization on Indigenously Collected X-ray Dataset. Sensors 21(17): 5813 (2021) - [c5]Imad El Hanouti, Hakim el Fadili, Fawad Ahmed, Jawad Ahmad:
On the Inadequacy of Multimodal Maps for Cryptographic Hash Applications with Phase-Space Modulation. ICMC 2021: 51-62 - [i2]Wadii Boulila, Hamza Ghandorh, Mehshan Ahmed Khan, Fawad Ahmed, Jawad Ahmad:
A Novel CNN-LSTM-based Approach to Predict Urban Expansion. CoRR abs/2103.01695 (2021) - 2020
- [j12]Hira Hamid, Fawad Ahmed, Jawad Ahmad:
Robust Image Hashing Scheme using Laplacian Pyramids. Comput. Electr. Eng. 84: 106648 (2020) - [j11]Jawad Ahmad, Ahsen Tahir, Hadi Larijani, Fawad Ahmed, Syed Aziz Shah, Adam James Hall, William J. Buchanan:
Energy demand forecasting of buildings using random neural networks. J. Intell. Fuzzy Syst. 38(4): 4753-4765 (2020) - [j10]Mehshan Ahmed Khan, Muhammad Attique Khan, Fawad Ahmed, Mamta Mittal, Lalit Mohan Goyal, D. Jude Hemanth, Suresh Chandra Satapathy:
Gastrointestinal diseases segmentation and classification based on duo-deep architectures. Pattern Recognit. Lett. 131: 193-204 (2020) - [j9]Arslan Shafique, Fawad Ahmed:
Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain. Wirel. Pers. Commun. 115(3): 2243-2268 (2020)
2010 – 2019
- 2019
- [j8]Iram Bashir, Fawad Ahmed, Jawad Ahmad, Wadii Boulila, Nouf Alharbi:
A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids. Entropy 21(11): 1132 (2019) - 2018
- [j7]Jawad Ahmad, Muazzam Ali Khan, Fawad Ahmed, Jan Sher Khan:
A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Comput. Appl. 30(12): 3847-3857 (2018) - [j6]Iqtadar Hussain, Fawad Ahmed, Umar Mujahid Khokhar, Amir Anees:
Applied Cryptography and Noise Resistant Data Security. Secur. Commun. Networks 2018: 3962821:1-3962821:2 (2018) - 2017
- [c4]Hamed R. Tavakoli, Fawad Ahmed, Ali Borji, Jorma Laaksonen:
Saliency Revisited: Analysis of Mouse Movements Versus Fixations. CVPR 2017: 6354-6362 - [i1]Hamed R. Tavakoli, Fawad Ahmed, Ali Borji, Jorma Laaksonen:
Saliency Revisited: Analysis of Mouse Movements versus Fixations. CoRR abs/1705.10546 (2017) - 2016
- [c3]Syed Qasim Abbas, Fawad Ahmed, Natasa Zivic, Obaid Ur Rehman:
Perceptual image hashing using SVD based Noise Resistant Local Binary Pattern. ICUMT 2016: 401-407 - 2014
- [j5]Amir Anees, Adil Masood Siddiqui, Fawad Ahmed:
Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 19(9): 3106-3118 (2014) - [j4]Fawad Ahmed, Amir Anees, Vali Uddin Abbas, Mohammed Yakoob Siyal:
A Noisy Channel Tolerant Image Encryption Scheme. Wirel. Pers. Commun. 77(4): 2771-2791 (2014) - 2010
- [j3]Fawad Ahmed, Mohammed Yakoob Siyal, Vali Uddin Abbas:
A secure and robust hash-based scheme for image authentication. Signal Process. 90(5): 1456-1470 (2010)
2000 – 2009
- 2007
- [c2]Fawad Ahmed, Mohammed Yakoob Siyal:
A Robust and Secure Signature Scheme for Video Authentication. ICME 2007: 2126-2129 - [c1]Fawad Ahmed, Mohammed Yakoob Siyal:
A Secure and Robust Wavelet-Based Hashing Scheme for Image Authentication. MMM (2) 2007: 51-62 - 2006
- [j2]Fawad Ahmed, Farook Sattar, Mohammed Yakoob Siyal, Dan Yu:
A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection. EURASIP J. Adv. Signal Process. 2006 (2006) - 2005
- [j1]Fawad Ahmed, Mohammed Yakoob Siyal:
A novel approach for regenerating a private key using password, fingerprint and smart card. Inf. Manag. Comput. Security 13(1): 39-54 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint