Segui
Abid Mehmood
Titolo
Citata da
Citata da
Anno
Protection of big data privacy
A Mehmood, I Natgunanathan, Y Xiang, G Hua, S Guo
IEEE access 4, 1821-1834, 2016
3652016
A comprehensive study of ChatGPT: advancements, limitations, and ethical considerations in natural language processing and cybersecurity
M Alawida, S Mejri, A Mehmood, B Chikhaoui, O Isaac Abiodun
Information 14 (8), 462, 2023
1642023
Protection of privacy in biometric data
I Natgunanathan, A Mehmood, Y Xiang, G Beliakov, J Yearwood
IEEE access 4, 880-892, 2016
1242016
Detecting signal spoofing attack in uavs using machine learning models
A Shafique, A Mehmood, M Elhadef
IEEE access 9, 93803-93815, 2021
972021
Survey of security protocols and vulnerabilities in unmanned aerial vehicles
A Shafique, A Mehmood, M Elhadef
IEEE Access 9, 46927-46948, 2021
872021
A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations
M Alawida, JS Teh, A Mehmood, A Shoufan
Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022
582022
Anonymous authentication scheme for smart cloud based healthcare applications
A Mehmood, I Natgunanathan, Y Xiang, H Poston, Y Zhang
IEEE access 6, 33552-33567, 2018
542018
A review of recent advances, challenges, and opportunities in malicious insider threat detection using machine learning methods
FR Alzaabi, A Mehmood
IEEE Access 12, 30907-30927, 2024
422024
Location privacy protection in smart health care system
I Natgunanathan, A Mehmood, Y Xiang, L Gao, S Yu
IEEE Internet of Things Journal 6 (2), 3055-3069, 2018
382018
Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness
M Alawida, B Abu Shawar, OI Abiodun, A Mehmood, AE Omolara, ...
Information 15 (1), 27, 2024
372024
Advances and vulnerabilities in modern cryptographic techniques: A comprehensive survey on cybersecurity in the domain of machine/deep learning and quantum techniques
A Mehmood, A Shafique, M Alawida, AN Khan
IEEE Access 12, 27530-27555, 2024
222024
A lightweight noise-tolerant encryption scheme for secure communication: An unmanned aerial vehicle application
A Shafique, A Mehmood, M Elhadef, KH Khan
PLoS One 17 (9), e0273661, 2022
162022
HeuCrip: A malware detection approach for internet of battlefield things
IA Shah, A Mehmood, AN Khan, M Elhadef, AR Khan
Cluster Computing 26 (2), 977-992, 2023
152023
Adversarial training for fake news classification
A Tariq, A Mehmood, M Elhadef, MUG Khan
IEEE Access 10, 82706-82715, 2022
152022
A novel machine learning technique for selecting suitable image encryption algorithms for IoT applications
A Shafique, A Mehmood, M Alawida, AN Khan, AUR Khan
Wireless communications and mobile computing 2022 (1), 5108331, 2022
112022
An overview of protection of privacy in multibiometrics
I Natgunanathan, A Mehmood, Y Xiang, G Hua, G Li, S Bangay
Multimedia Tools and Applications 77, 6753-6773, 2018
112018
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption
A Mehmood, A Shafique, SA Chaudhry, M Alawida, AN Khan, N Kumar
Journal of Information Security and Applications 78, 103590, 2023
82023
A fusion of machine learning and cryptography for fast data encryption through the encoding of high and moderate plaintext information blocks
A Shafique, A Mehmood, M Alawida, M Elhadef, MU Rehman
Multimedia Tools and Applications, 1-27, 2024
52024
Data security in the Industrial Internet of Things (IIoT) through a triple-image encryption framework leveraging 3-D NEAT, 1DCJ, and 4DHCFO techniques
A Mehmood, A Shafique, N Kumar, MN Bhutta
Computers and Electrical Engineering 118, 109354, 2024
32024
Securing high-resolution images from unmanned aerial vehicles with dna encoding and bit-plane extraction method
A Shafique, MU Rehman, KH Khan, SS Jamal, A Mehmood, SA Chaudhry
IEEE Access 11, 44559-44577, 2023
32023
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20