Chaos based efficient selective image encryption JS Khan, J Ahmad Multidimensional Systems and Signal Processing 30, 943-961, 2019 | 229 | 2019 |
A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices J Ahmad, MA Khan, SO Hwang, JS Khan Neural Computing and Applications, 1-15, 2016 | 94 | 2016 |
DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption JS Khan, W Boulila, J Ahmad, S Rubaiee, AU Rehman, R Alroobaea, ... IEEE Access 8, 159732-159744, 2020 | 87 | 2020 |
An efficient image encryption scheme based on: Henon map, skew tent map and S-Box J Khan, J Ahmad, SO Hwang 2015 6th International Conference on Modeling, Simulation, and Applied …, 2015 | 84 | 2015 |
A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation J Ahmad, MA Khan, F Ahmed, JS Khan Neural Computing and Applications 30, 3847-3857, 2018 | 82 | 2018 |
A new image encryption scheme based on dynamic s-boxes and chaotic maps AU Rehman, JS Khan, J Ahmad, SO Hwang 3D Research 7, 1-8, 2016 | 68 | 2016 |
Chaos and compressive sensing based novel image encryption scheme JS Khan, SK Kayhan Journal of Information Security and Applications 58, 102711, 2021 | 66 | 2021 |
A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S 8 permutation FA Khan, J Ahmed, JS Khan, J Ahmad, MA Khan Journal of Intelligent & Fuzzy Systems 33 (6), 3753-3765, 2017 | 66 | 2017 |
DNA key based visual chaotic image encryption JS Khan, J Ahmad, SS Ahmed, HA Siddiqa, SF Abbasi, SK Kayhan Journal of Intelligent & Fuzzy Systems 37 (2), 2549-2561, 2019 | 49 | 2019 |
Visual meaningful encryption scheme using intertwinning logistic map SF Abbasi, J Ahmad, JS Khan, MA Khan, SA Sheikh Intelligent Computing: Proceedings of the 2018 Computing Conference, Volume …, 2019 | 46 | 2019 |
Td-ercs map-based confusion and diffusion of autocorrelated data JS Khan, J Ahmad, MA Khan Nonlinear Dynamics 87, 93-107, 2017 | 40 | 2017 |
Intrusion detection using machine learning techniques: an experimental comparison KA Tait, JS Khan, F Alqahtani, AA Shah, FA Khan, MU Rehman, W Boulila, ... 2021 International Congress of Advanced Technology and Engineering (ICOTEN …, 2021 | 39 | 2021 |
A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map F Masood, W Boulila, A Alsaeedi, JS Khan, J Ahmad, MA Khan, ... Multimedia Tools and Applications 81 (21), 30931-30959, 2022 | 36 | 2022 |
A new chaos-based secure image encryption scheme using multiple substitution boxes JS Khan, A ur Rehman, J Ahmad, Z Habib 2015 Conference on Information Assurance and Cyber Security (CIACS), 16-21, 2015 | 33 | 2015 |
A novel substitution box for encryption based on Lorenz equations FA Khan, J Ahmed, JS Khan, J Ahmad, MA Khan 2017 International Conference on Circuits, System and Simulation (ICCSS), 32-36, 2017 | 30 | 2017 |
Network Intrusion Detection Leveraging Machine Learning and Feature Selection A Ali, S Shaukat, M Tayyab, MA Khan, JS Khan, J Ahmad 2020 IEEE 17th International Conference on Smart Communities: Improving …, 2020 | 25 | 2020 |
Secure speech communication algorithm via DCT and TD-ERCS chaotic map Z Habib, JS Khan, J Ahmad, MA Khan, FA Khan 2017 4th International Conference on Electrical and Electronic Engineering …, 2017 | 25 | 2017 |
An Improved Image Encryption Scheme Based on a Non-Linear Chaotic Algorithm and Substitution Boxes JS Khan, MA Khan, J Ahmad, SO Hwang, W Ahmed Informatica 28 (4), 629-649, 2017 | 25 | 2017 |
DNA Sequence Based Medical Image Encryption Scheme JS Khan, J Ahmad, SF Abbasi, SK Kayhan 2018 10th Computer Science and Electronic Engineering (CEEC), 24-29, 2018 | 24 | 2018 |
Intrusion Detection and Attack Classification Leveraging Machine Learning Technique S Shaukat, A Ali, A Batool, F Alqahtani, JS Khan, J Ahmad 2020 14th International Conference on Innovations in Information Technology …, 2020 | 21 | 2020 |