Danish Ali Khan

Orcid: 0000-0002-6669-0900

Affiliations:
  • National Institute of Technology, Jamshedpur, India


According to our database1, Danish Ali Khan authored at least 16 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Optimized convolutional neural network for the classification of lung cancer.
J. Supercomput., January, 2024

2023
Enhanced-Longest Common Subsequence based novel steganography approach for cloud storage.
Multim. Tools Appl., February, 2023

2021
Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic.
New Gener. Comput., 2021

Level by level image compression-encryption algorithm based on quantum chaos map.
J. King Saud Univ. Comput. Inf. Sci., 2021

2020
Personal characters to bits mapping using Dot Pattern Character Encoding Scheme (DPCES).
J. King Saud Univ. Comput. Inf. Sci., 2020

A modified approach to data hiding in Microsoft Word documents by change-tracking technique.
J. King Saud Univ. Comput. Inf. Sci., 2020

2019
A novel information hiding scheme based on social networking site viewers' public comments.
J. Inf. Secur. Appl., 2019

Use of 'A light weight secure image encryption scheme based on chaos and DNA computing' for encrypted audio watermarking.
Int. J. Adv. Intell. Paradigms, 2019

Comparison of Nikto and Uniscan for measuring URL vulnerability.
Proceedings of the 10th International Conference on Computing, 2019

2017
An accelerating PSO algorithm based test data generator for data-flow dependencies using dominance concepts.
Int. J. Syst. Assur. Eng. Manag., 2017

A minesweeper game-based steganography scheme.
J. Inf. Secur. Appl., 2017

A novel approach to automate test data generation for data flow testing based on hybrid adaptive PSO-GA algorithm.
Int. J. Adv. Intell. Paradigms, 2017

2015
Integrated inventory model with uniform demand for one vendor one customer.
Int. J. Bus. Perform. Supply Chain Model., 2015

2013
A Novel Approach to Text Steganography Using Font Size of Invisible Space Characters in Microsoft Word Document.
Proceedings of the Intelligent Computing, 2013

2012
Optimal inventory policies of facilities in a supply chain system under fuzzy stochastic environment.
Int. J. Bus. Perform. Supply Chain Model., 2012

2011
An integrated inventory model for vendor-customer coordination in a supply chain.
Int. J. Bus. Perform. Supply Chain Model., 2011


  Loading...