RNN-LSTM-GRU based language transformation A Khan, A Sarfaraz Soft Computing 23 (24), 13007-13024, 2019 | 38 | 2019 |
An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues MA Fayyaz, A Anjum, S Ziauddin, A Khan, A Sarfaraz Multimedia Tools and Applications 79, 5767-5788, 2020 | 32 | 2020 |
AccessChain: An access control framework to protect data access in blockchain enabled supply chain A Sarfaraz, RK Chakrabortty, DL Essam Future Generation Computer Systems 148, 380-394, 2023 | 28 | 2023 |
The implications of blockchain-coordinated information sharing within a supply chain: A simulation study A Sarfaraz, RK Chakrabortty, DL Essam Blockchain: Research and Applications 4 (1), 100110, 2023 | 28 | 2023 |
A tree structure-based improved blockchain framework for a secure online bidding system A Sarfaraz, RK Chakrabortty, DL Essam Computers & Security 102, 102147, 2021 | 27 | 2021 |
Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption R Noor, A Khan, A Sarfaraz, Z Mehmood, AM Cheema soft computing 23, 9821-9829, 2019 | 25 | 2019 |
Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method A Khan, A Sarfaraz Soft Computing 23, 8045-8056, 2019 | 20 | 2019 |
Reputation based proof of cooperation: an efficient and scalable consensus algorithm for supply chain applications A Sarfaraz, RK Chakrabortty, DL Essam Journal of Ambient Intelligence and Humanized Computing, 1-17, 2023 | 12 | 2023 |
Vetting the security of mobile applications A Khan, A Sarfaraz Sci Int 29 (2), 361-365, 2017 | 11 | 2017 |
FFT-ETM based distortion less and high payload image steganography A Khan, A Sarfaraz Multimedia Tools and Applications 78, 25999-26022, 2019 | 9 | 2019 |
High performance and energy efficient image watermarking for video using a mobile device R Noor, A Khan, A Sarfaraz Wireless Personal Communications 104 (4), 1535-1551, 2019 | 8 | 2019 |
Practical guidelines for securing wireless local area networks (WLANs) A Khan, A Sarfaraz International Journal of Security and Its Applications 12 (3), 19-28, 2018 | 8 | 2018 |
Feature selection based correlation attack on HTTPS secure searching A Sarfaraz, A Khan Wireless Personal Communications 103 (4), 2995-3008, 2018 | 5 | 2018 |
Efficient GPU Isosurface Ray-casting of BCC Datasets M Kim, H Kim, A Sarfaraz Journal of the Korea Computer Graphics Society 19 (2), 19-27, 2013 | 4 | 2013 |
Enhancing Malicious URL Detection: A Novel Framework Leveraging Priority Coefficient and Feature Evaluation AS Rafsanjani, NB Kamaruddin, M Behjati, S Aslam, A Sarfaraz, ... IEEE Access, 2024 | 3 | 2024 |
Towards a scalable permissioned blockchain framework for supply chain management A Sarfaraz, RK Chakrabortty, DL Essam 2022 IEEE International Conference on Industrial Engineering and Engineering …, 2022 | 3 | 2022 |
Blockchain-Coordinated Frameworks for Scalable and Secure Supply Chain Networks A Sarfaraz UNSW Sydney, 2023 | 2 | 2023 |
Real-time volume rendering of FCC datasets using box-splines on the mobile platforms A Sarfaraz, M Shaban Br. J. Math. Comput. Sci. 11 (1), 1-15, 2015 | 1 | 2015 |
RPoC: An efficient and scalable consensus algorithm for SCM applications A Sarfaraz, RK Chakrabortty, DL Essam TechRxiv, 0 | 1* | |
Optimized Key Recovery for Blockchain Wallets in Sustainable Supply Chains A Sarfaraz, RK Chakrabortty, S Aslam, AS Rafsanjani 2024 IEEE International Conference on Industrial Engineering and Engineering …, 2024 | | 2024 |