Mamoona Naveed Asghar

Orcid: 0000-0001-7460-266X

According to our database1, Mamoona Naveed Asghar authored at least 40 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Pixel tampering detection in encrypted surveillance videos on resource-constrained devices.
Internet Things, April, 2024

AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent.
CoRR, 2024

Möbius Transformation and Permutation Based S-Box to Enhance IoT Multimedia Security.
IEEE Access, 2024

GDPR-compliant Video Search and Retrieval System for Surveillance Data.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Network-Coding-Enabled and QoS-Aware Message Delivery for Wireless Sensor Networks.
Wirel. Pers. Commun., September, 2023

SecureCam: Selective Detection and Encryption Enabled Application for Dynamic Camera Surveillance Videos.
IEEE Trans. Consumer Electron., May, 2023

Privacy Preserved Video Summarization of Road Traffic Events for IoT Smart Cities.
Cryptogr., March, 2023

Real-Time Event-Driven Road Traffic Monitoring System Using CCTV Video Analytics.
IEEE Access, 2023

VidSearch: Privacy-by-Design Video Search and Retrieval System for Large-Scale CCTV Data.
Proceedings of the International Conference on Machine Learning and Applications, 2023

2022
VQProtect: Lightweight Visual Quality Protection for Error-Prone Selectively Encrypted Video Streaming.
Entropy, 2022

A survey of modern deep learning based object detection models.
Digit. Signal Process., 2022

DEMIS: A Threat Model for Selectively Encrypted Visual Surveillance Data.
CoRR, 2022

2021
Towards Estimation of Emotions From Eye Pupillometry With Low-Cost Devices.
IEEE Access, 2021

An Energy-Aware, Highly Available, and Fault-Tolerant Method for Reliable IoT Systems.
IEEE Access, 2021

Improved Privacy-Ensuring Data-Fusion and Service Recommendation for Users in Smart Cities.
Proceedings of the IEEE International Smart Cities Conference, 2021

Pixdoor: A Pixel-space Backdoor Attack on Deep Learning Models.
Proceedings of the 29th European Signal Processing Conference, 2021

Deep Learning based Customer Count/Flow Monitoring System for Social Distancing.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Deep Learning based Effective Identification of EU-GDPR Compliant Privacy Safeguards in Surveillance Videos.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Joint Crypto-Blockchain Scheme for Trust-Enabled CCTV Videos Sharing.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
An Energy-Efficient Message Scheduling Algorithm with Joint Routing Mechanism at Network Layer in Internet of Things Environment.
Wirel. Pers. Commun., 2020

Fuzzy-logic threat classification for multi-level selective encryption over real-time video streams.
J. Ambient Intell. Humaniz. Comput., 2020

Skin detection and lightweight encryption for privacy protection in real-time surveillance applications.
Image Vis. Comput., 2020

MuLViS: Multi-Level Encryption Based Security System for Surveillance Videos.
IEEE Access, 2020

SLEPX: An Efficient Lightweight Cipher for Visual Protection of Scalable HEVC Extension.
IEEE Access, 2020

Preserving Chain-of-Evidence in Surveillance Videos for Authentication and Trust-Enabled Sharing.
IEEE Access, 2020

Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
Lightweight Cipher for H.264 Videos in the Internet of Multimedia Things with Encryption Space Ratio Diagnostics.
Sensors, 2019

Effectiveness of crypto-transcoding for H.264/AVC and HEVC video bit-streams.
Multim. Tools Appl., 2019

Efficient Lightweight Encryption Algorithm for Smart Video Applications.
CoRR, 2019

Visual Surveillance Within the EU General Data Protection Regulation: A Technology Perspective.
IEEE Access, 2019

2018
Extension of grounding mechanism for abstract words: computational methods insights.
Artif. Intell. Rev., 2018

Joint Crypto-Stego Scheme for Enhanced Image Protection With Nearest-Centroid Clustering.
IEEE Access, 2018

2017
Interoperable conditional access with video selective encryption for portable devices.
Multim. Tools Appl., 2017

Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes.
J. Vis. Commun. Image Represent., 2017

2015
Sufficient encryption based on entropy coding syntax elements of H.264/SVC.
Multim. Tools Appl., 2015

2014
Confidentiality of a selectively encrypted H.264 coded video bit-stream.
J. Vis. Commun. Image Represent., 2014

2013
An Efficient Security System for CABAC Bin-Strings of H.264/SVC.
IEEE Trans. Circuits Syst. Video Technol., 2013

2012
MIKEY for keys management of H.264 scalable video coded layers.
J. King Saud Univ. Comput. Inf. Sci., 2012

Sufficient Encryption with Codewords and Bin-strings of H.264/SVC.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Efficient selective encryption with H.264/SVC CABAC bin-strings.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012


  Loading...