RNN-LSTM-GRU based language transformation A Khan, A Sarfaraz Soft Computing 23 (24), 13007-13024, 2019 | 33 | 2019 |
An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues MA Fayyaz, A Anjum, S Ziauddin, A Khan, A Sarfaraz Multimedia Tools and Applications 79, 5767-5788, 2020 | 28 | 2020 |
Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption R Noor, A Khan, A Sarfaraz, Z Mehmood, AM Cheema soft computing 23, 9821-9829, 2019 | 23 | 2019 |
An efficient privacy preserving protocol for dynamic continuous data collection H Sajjad, T Kanwal, A Anjum, A Khan, A Khan, U Manzoor computers & security 86, 358-371, 2019 | 21 | 2019 |
Information hiding in text to improve performance for word document U Khadim, A Khan, B Ahmad, A Khan International Journal of Technology and Research 3 (3), 50, 2015 | 20 | 2015 |
Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method A Khan, A Sarfaraz Soft Computing 23, 8045-8056, 2019 | 19 | 2019 |
S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain S Beg, N Ahmad, A Anjum, M Ahmad, A Khan, F Baig, A Khan Multimedia Tools and Applications 79, 11667-11684, 2020 | 18 | 2020 |
Stabilization of sunflower oil by using potato peel extract as a natural antioxidant A Saeed, A Shabbir, A Khan Biomass Conversion and Biorefinery 14 (4), 5275-5284, 2024 | 12 | 2024 |
Robust textual steganography A Khan Journal of Science 4 (4), 426-434, 2015 | 12 | 2015 |
Vetting the security of mobile applications A Khan, A Sarfaraz Sci Int 29 (2), 361-365, 2017 | 9 | 2017 |
Comparative Analysis of Watermarking Techniques A Khan Science International 27 (6), 6091-6096, 2015 | 9 | 2015 |
FFT-ETM based distortion less and high payload image steganography A Khan, A Sarfaraz Multimedia Tools and Applications 78, 25999-26022, 2019 | 8 | 2019 |
High performance and energy efficient image watermarking for video using a mobile device R Noor, A Khan, A Sarfaraz Wireless Personal Communications 104 (4), 1535-1551, 2019 | 8 | 2019 |
Practical guidelines for securing wireless local area networks (WLANs) A Khan, A Sarfaraz International Journal of Security and Its Applications 12 (3), 19-28, 2018 | 8 | 2018 |
High-capacity multi-layer framework for highly robust textual steganography A Khan, M Sohaib, FM Amjad Sci Int 28 (5), 4451-4457, 2016 | 8 | 2016 |
Survey to improve software quality assurance in developing countries N Naqvi, A Khan, A Khan International Journal of Technology and Research 3 (1), 1, 2015 | 6 | 2015 |
Joint ownership verification for digital text A Khan Adv Comput Sci Appl 3 (4), 525-531, 2014 | 6 | 2014 |
High payload watermarking based on enhanced image saliency detection A Khan, KS Wong Multimedia Tools and Applications 82 (10), 15553-15571, 2023 | 5 | 2023 |
Feature selection based correlation attack on HTTPS secure searching A Sarfaraz, A Khan Wireless Personal Communications 103 (4), 2995-3008, 2018 | 5 | 2018 |
Image watermarking based on saliency detection and multiple transformations A Khan, KS Wong, VM Baskaran 2022 Asia-Pacific Signal and Information Processing Association Annual …, 2022 | 4 | 2022 |