Zahid Mehmood

Orcid: 0000-0003-4888-2594

According to our database1, Zahid Mehmood authored at least 42 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Copy-move image forged information detection and localisation in digital images using deep convolutional network.
J. Inf. Sci., October, 2023

Correction to: A review of machine learning-based human activity recognition for diverse applications.
Neural Comput. Appl., March, 2023

Two-Way Approach for Improved Real-Time Transmission in Fog-IoT-Based Health Monitoring System for Critical Patients.
Comput. Syst. Sci. Eng., 2023

A Comparative Analysis of Traditional SARIMA and Machine Learning Models for CPI Data Modelling in Pakistan.
Appl. Comput. Intell. Soft Comput., 2023

2022
A review of machine learning-based human activity recognition for diverse applications.
Neural Comput. Appl., 2022

Passive Framework of Sparse Region Duplication Detection from Digital Images.
J. Sensors, 2022

2021
Security risks in cyber physical systems - A systematic mapping study.
J. Softw. Evol. Process., 2021

Steganography-assisted secure localization of smart devices in internet of multimedia things (IoMT).
Multim. Tools Appl., 2021

Single and multiple regions duplication detections in digital images with applications in image forensic.
J. Intell. Fuzzy Syst., 2021

Localization and classification of human facial emotions using local intensity order pattern and shape-based texture features.
J. Intell. Fuzzy Syst., 2021

Image dehazing based on dark channel spatial stimuli gradient model and image morphology.
J. Ambient Intell. Humaniz. Comput., 2021

Intrusion Detection System Through Advance Machine Learning for the Internet of Things Networks.
IT Prof., 2021

A Machine-Learning-Based Approach for Autonomous IoT Security.
IT Prof., 2021

CryptoGA: a cryptosystem based on genetic algorithm for cloud data security.
Clust. Comput., 2021

Corrections to "GCORP: Geographic and Cooperative Opportunistic Routing Protocol for Underwater Sensor Networks".
IEEE Access, 2021

GCORP: Geographic and Cooperative Opportunistic Routing Protocol for Underwater Sensor Networks.
IEEE Access, 2021

Automatic Image Annotation Based on Deep Learning Models: A Systematic Review and Future Challenges.
IEEE Access, 2021

2020
Unifying user similarity and social trust to generate powerful recommendations for smart cities using collaborating filtering-based recommender systems.
Soft Comput., 2020

A security risk mitigation framework for cyber physical systems.
J. Softw. Evol. Process., 2020

A Deep Learning Approach for Automated Diagnosis and Multi-Class Classification of Alzheimer's Disease Stages Using Resting-State fMRI and Residual Neural Networks.
J. Medical Syst., 2020

A 4-Stage Pipelined Architecture for Point Multiplication of Binary Huff Curves.
J. Circuits Syst. Comput., 2020

Query-by-visual-search: multimodal framework for content-based image retrieval.
J. Ambient Intell. Humaniz. Comput., 2020

BoVW model based on adaptive local and global visual words modeling and log-based relevance feedback for semantic retrieval of the images.
EURASIP J. Image Video Process., 2020

An Improved Product Recommendation Method for Collaborative Filtering.
IEEE Access, 2020

A Novel Optimized Semi-Blind Scheme for Color Image Watermarking.
IEEE Access, 2020

2019
Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption.
Soft Comput., 2019

Sensitivity Enhancement of Silicon-on-Insulator CMOS MEMS Thermal Hot-Film Flow Sensors by Minimizing Membrane Conductive Heat Losses.
Sensors, 2019

A novel method for content-based image retrieval to improve the effectiveness of the bag-of-words model using a support vector machine.
J. Inf. Sci., 2019

Data hiding technique in steganography for information security using number theory.
J. Inf. Sci., 2019

Scene analysis and search using local features and support vector machine for effective content-based image retrieval.
Artif. Intell. Rev., 2019

Authentication and Secure Key Management in E-Health Services: A Robust and Efficient Protocol Using Biometrics.
IEEE Access, 2019

Security Risk Mitigation of Cyber Physical Systems: A Case Study of a Flight Simulator.
Proceedings of the Database and Expert Systems Applications, 2019

2018
A Novel Technique for Speech Recognition and Visualization Based Mobile Application to Support Two-Way Communication between Deaf-Mute and Normal Peoples.
Wirel. Commun. Mob. Comput., 2018

A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform.
J. Vis. Commun. Image Represent., 2018

Effect of complementary visual words versus complementary features on clustering for effective content-based image search.
J. Intell. Fuzzy Syst., 2018

An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment.
Int. J. Commun. Syst., 2018

Scene search based on the adapted triangular regions and soft clustering to improve the effectiveness of the visual-bag-of-words model.
EURASIP J. Image Video Process., 2018

Content-based image retrieval and semantic automatic image annotation based on the weighted average of triangular histograms using support vector machine.
Appl. Intell., 2018

An efficient forensic technique for exposing region duplication forgery in digital images.
Appl. Intell., 2018

2017
<i>K</i>-means based multiple objects tracking with long-term occlusion handling.
IET Comput. Vis., 2017

Saliency Based Object Detection and Enhancements in Static Images.
Proceedings of the Information Science and Applications 2017, 2017

2016
Image retrieval by addition of spatial information based on histograms of triangular regions.
Comput. Electr. Eng., 2016


  Loading...