Muhammad Azeem

Orcid: 0000-0003-0373-6112

Affiliations:
  • University of Sialkot, Faculty of Computing & IT, Pakistan
  • Beijing University of Technology, Faculty of Information Technology, China (PhD)


According to our database1, Muhammad Azeem authored at least 19 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient scheme to perform semantic segmentation on 3-D brain tumor using 3-D u-net architecture.
Multim. Tools Appl., March, 2024

2023
A recognition model for handwritten Persian/Arabic numbers based on optimized deep convolutional neural network.
Multim. Tools Appl., April, 2023

2022
A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using unicode.
J. King Saud Univ. Comput. Inf. Sci., 2022

2020
Effective large for gestational age prediction using machine learning techniques with monitoring biochemical indicators.
J. Supercomput., 2020

An Effective and Improved CNN-ELM Classifier for Handwritten Digits Recognition and Classification.
Symmetry, 2020

Diagnosis of large-for-gestational-age infants using a semi-supervised feature learned from expert and data.
Multim. Tools Appl., 2020

A novel approach to secret data concealment with high cover text capacity and security.
Int. J. Electron. Secur. Digit. Forensics, 2020

Introducing robustness in DBR routing protocol.
Int. J. Commun. Networks Distributed Syst., 2020

2019
SEO: A unique approach to enhance the site rank by implementing Efficient Keywords Scheme.
PeerJ Prepr., 2019

A cryptographic data hiding algorithm with high cover text capacity.
Int. J. Electron. Secur. Digit. Forensics, 2019

Design of Momentum Fractional Stochastic Gradient Descent for Recommender Systems.
IEEE Access, 2019

Diagnosis of Large for Gestational Age Fetus with an Expert-Driven Feature Selection Scheme.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

2018
Wireless ad hoc network: detection of malicious node by using neighbour-based authentication approach.
Int. J. Wirel. Mob. Comput., 2018

Information hiding: a novel algorithm for enhancement of cover text capacity by using unicode characters.
Int. J. Inf. Comput. Secur., 2018

Information hiding: Arabic text steganography by using Unicode characters to hide secret data.
Int. J. Electron. Secur. Digit. Forensics, 2018

Cloud Based Face Recognition for Google Glass.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

2017
Detection of Malicious Node in Wireless Ad Hoc Network by Using Acknowledgement Based Approach.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

2015
Circumventing sinkhole attack in ad hoc networks.
Int. J. Wirel. Mob. Comput., 2015

Using different techniques of steganography deducting null cipher in plain text.
Int. J. Wirel. Mob. Comput., 2015


  Loading...