An energy-efficient mobility-based cluster head selection for lifetime enhancement of wireless sensor networks S Umbreen, D Shehzad, N Shafi, B Khan, U Habib Ieee Access 8, 207779-207793, 2020 | 39 | 2020 |
Securing internet of drones with identity-based proxy signcryption MA Khan, H Shah, SU Rehman, N Kumar, R Ghazali, D Shehzad, I Ullah IEEE Access 9, 89133-89142, 2021 | 29 | 2021 |
Threshold-based steganography: a novel technique for improved payload and SNR. Z Khan, M Shah, M Naeem, T Mahmood, S Khan, NU Amin, D Shahzad Int. Arab J. Inf. Technol. 13 (4), 380-386, 2016 | 28 | 2016 |
BHCNet: neural network-based brain hemorrhage classification using head CT scan MF Mushtaq, M Shahroz, AM Aseere, H Shah, R Majeed, D Shehzad, ... IEEE Access 9, 113901-113916, 2021 | 19 | 2021 |
Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching. A Hamza, D Shehzad, MS Sarfraz, U Habib, N Shafi KSII Transactions on Internet & Information Systems 15 (3), 2021 | 15 | 2021 |
LSB Image Steganography Based on Blocks Matrix Determinant Method. D Shehzad, T Dag KSII Transactions on Internet & Information Systems 13 (7), 2019 | 15 | 2019 |
A novel image steganography technique based on similarity of bits pairs D Shehzad, T Dag 2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC), 99-104, 2017 | 14 | 2017 |
A novel hybrid encryption scheme to ensure Hadoop based cloud data security D Shehzad, Z Khan, H Dag, Z Bozkus International Journal of Computer Science and Information Security (IJCSIS …, 2016 | 12 | 2016 |
Novel application software for the semi-automated analysis of infrared meibography images D Shehzad, S Gorcuyeva, T Dag, B Bozkurt Cornea 38 (11), 1456-1464, 2019 | 10 | 2019 |
Traditional and hybrid access control models: A detailed survey MU Aftab, A Hamza, A Oluwasanmi, X Nie, MS Sarfraz, D Shehzad, Z Qin, ... Security and Communication Networks 2022, 2022 | 8 | 2022 |
LSB steganography using bits complementation Z Khan, M Shah, M Naeem, D Shahzad, T Mahmood International Conference on Chemical Engineering and Advanced Computational …, 2014 | 8 | 2014 |
Optimizing NEURON brain simulator with remote memory access on distributed memory systems D Shehzad, Z Bozkus 2015 International Conference on Emerging Technologies (ICET), 1-5, 2015 | 7 | 2015 |
Performance improvement of threshold based audio steganography using parallel computation M Shoaib, Z Khan, D Shehzad, T Dag, AI Umar, NU Amin International Journal of Advanced Computer Science and Applications 7 (10), 2016 | 4 | 2016 |
An Enhanced Weight Based Clustering Algorithm for Mobile Adhoc Networks D Shehzad, W Ishaq, Z Khan, J Iqbal International conference on Computer Science and Information Systems (ICSIS …, 2014 | 4 | 2014 |
Audio steganography based on Lsb Msb difference and FMC WA Shah, D Shehzad, AI Umar, NU Amin, J Hussain, A Qadir International Journal of Computer Science and Information Security (IJCSIS …, 2017 | 3 | 2017 |
Dr. AI Umar, N. Ul Amin, & WaqarIshaq,” A Novel Mechanism for Detection of Sybil Attack in MANETs” D Shehzad International conference on Computer Science and Information Systems (ICSIS …, 2014 | 3 | 2014 |
Enhancing Localization Efficiency and Accuracy in Wireless Sensor Networks M Fawad, MZ Khan, K Ullah, H Alasmary, D Shehzad, B Khan Sensors 23 (5), 2796, 2023 | 2 | 2023 |
A Novel Hybrid Encryption Scheme to Ensure Hadoop Based Cloud Data Security [J] S Danish, Z Khan, H Dag, Z Bozkus International Journal of Computer Science and In-formation Security 194 7 …, 2016 | 2 | 2016 |
Fully Automated Skull Stripping from Brain Magnetic Resonance Images Using Mask RCNN-Based Deep Learning Neural Networks H Azam, H Tariq, D Shehzad, S Akbar, H Shah, ZA Khan Brain Sciences 13 (9), 1255, 2023 | 1 | 2023 |
A Comprehensive Survey on Blockchain Technology Applications in Different Sectors of Pakistan to Develop Smart Cities A Imtiaz, D Shehzad, I Khan, A Imran, M Arif Pakistan Journal of Emerging Science and Technologies (PJEST) 4 (3), 1-13, 2023 | 1 | 2023 |