Fawad Ahmed

Orcid: 0000-0003-4796-1063

According to our database1, Fawad Ahmed authored at least 34 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0.
IEEE Trans. Consumer Electron., February, 2024

2023
Enhancing IoT network security through deep learning-powered Intrusion Detection System.
Internet Things, December, 2023

A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder.
ACM Trans. Multim. Comput. Commun. Appl., 2023

An Automated Classification Technique for COVID-19 Using Optimized Deep Learning Features.
Comput. Syst. Sci. Eng., 2023

Noise-Crypt: Image Encryption with Non-linear Noise, Hybrid Chaotic Maps, and Hashing.
CoRR, 2023

2022
Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme.
Wirel. Pers. Commun., 2022

Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network.
IEEE Trans. Ind. Informatics, 2022

Classification of Skin Cancer Lesions Using Explainable Deep Learning.
Sensors, 2022

Chest X-ray Classification for the Detection of COVID-19 Using Deep Learning Techniques.
Sensors, 2022

Machine Learning and Applied Cryptography.
Secur. Commun. Networks, 2022

Semantic Segmentation and Edge Detection - Approach to Road Detection in Very High Resolution Satellite Images.
Remote. Sens., 2022

DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things.
J. King Saud Univ. Comput. Inf. Sci., 2022

2021
Detection of COVID-19 Using Transfer Learning and Grad-CAM Visualization on Indigenously Collected X-ray Dataset.
Sensors, 2021

Perceptual image hashing using transform domain noise resistant local binary pattern.
Multim. Tools Appl., 2021

Research on influencing mechanism of big five personality traits on customers online purchase intention: a mediating role of trust.
Int. J. Electron. Bus., 2021

Recognizing apple leaf diseases using a novel parallel real-time processing framework based on MASK RCNN and transfer learning: An application for smart agriculture.
IET Image Process., 2021

A novel CNN-LSTM-based approach to predict urban expansion.
Ecol. Informatics, 2021

On the Inadequacy of Multimodal Maps for Cryptographic Hash Applications with Phase-Space Modulation.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

2020
Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain.
Wirel. Pers. Commun., 2020

Gastrointestinal diseases segmentation and classification based on duo-deep architectures.
Pattern Recognit. Lett., 2020

Energy demand forecasting of buildings using random neural networks.
J. Intell. Fuzzy Syst., 2020

Robust Image Hashing Scheme using Laplacian Pyramids.
Comput. Electr. Eng., 2020

2019
A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids.
Entropy, 2019

2018
Applied Cryptography and Noise Resistant Data Security.
Secur. Commun. Networks, 2018

A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation.
Neural Comput. Appl., 2018

2017
Saliency Revisited: Analysis of Mouse Movements Versus Fixations.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

2016
Perceptual image hashing using SVD based Noise Resistant Local Binary Pattern.
Proceedings of the 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2016

2014
A Noisy Channel Tolerant Image Encryption Scheme.
Wirel. Pers. Commun., 2014

Chaotic substitution for highly autocorrelated data in encryption algorithm.
Commun. Nonlinear Sci. Numer. Simul., 2014

2010
A secure and robust hash-based scheme for image authentication.
Signal Process., 2010

2007
A Secure and Robust Wavelet-Based Hashing Scheme for Image Authentication.
Proceedings of the Advances in Multimedia Modeling, 2007

A Robust and Secure Signature Scheme for Video Authentication.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection.
EURASIP J. Adv. Signal Process., 2006

2005
A novel approach for regenerating a private key using password, fingerprint and smart card.
Inf. Manag. Comput. Security, 2005


  Loading...