Musheer Ahmad
Orcid: 0000-0002-4915-9325Affiliations:
- Jamia Millia Islamia, Department of Computer Engineering, New Delhi, India (since 2011)
- Jamia Millia Islamia, Department of Computer Engineering, New Delhi, India (PhD)
According to our database1,
Musheer Ahmad
authored at least 97 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on linkedin.com
-
on jmi.ac.in
-
on orcid.org
On csauthors.net:
Bibliography
2024
An FCN-LSTM model for neurological status detection from non-invasive multivariate sensor data.
Neural Comput. Appl., January, 2024
Efficient CNN-based disaster events classification using UAV-aided images for emergency response application.
Neural Comput. Appl., 2024
Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption.
Expert Syst. Appl., 2024
Fuzzy Logic-Based Substitution-Box for Robust Medical Image Encryption in Telemedicine.
IEEE Access, 2024
Trust-Enabled Energy Efficient Protocol for Secure Remote Sensing in Supply Chain Management.
IEEE Access, 2024
IEEE Access, 2024
LEAF-IIoT: Lightweight and Efficient Authentication Framework for the Industrial Internet of Things.
IEEE Access, 2024
2023
Determination of Critical Edges in Air Route Network Using Modified Weighted Sum Method and Grey Relational Analysis.
IEEE Trans. Intell. Transp. Syst., December, 2023
LW-DeepFakeNet: a lightweight time distributed CNN-LSTM network for real-time DeepFake video detection.
Signal Image Video Process., November, 2023
AuCFSR: Authentication and Color Face Self-Recovery Using Novel 2D Hyperchaotic System and Deep Learning Models.
Sensors, November, 2023
A novel algebraic construction of strong S-boxes over double GF(27) structures and image protection.
Comput. Appl. Math., March, 2023
Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing.
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Netw. Sci. Eng., 2023
A complex network-based approach for security and governance in the smart green city.
Expert Syst. Appl., 2023
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion.
Comput. Syst. Sci. Eng., 2023
Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity.
IEEE Access, 2023
Toward Spectrum Efficiency and Reliability for Heterogeneous Users in CR-Enabled Social Internet of Things.
IEEE Access, 2023
Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences.
IEEE Access, 2023
Deep Transfer Learning Based Parkinson's Disease Detection Using Optimized Feature Selection.
IEEE Access, 2023
2022
Color stereo image encryption and local zero-watermarking schemes using octonion Hahn moments and modified Henon map.
J. King Saud Univ. Comput. Inf. Sci., November, 2022
Wirel. Pers. Commun., 2022
A Novel 4D Hyperchaotic System Assisted Josephus Permutation for Secure Substitution-Box Generation.
J. Signal Process. Syst., 2022
RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure.
J. Supercomput., 2022
Intelligent Driver Drowsiness Detection for Traffic Safety Based on Multi CNN Deep Model and Facial Subsampling.
IEEE Trans. Intell. Transp. Syst., 2022
A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing.
Signal Process., 2022
A group theoretic construction of highly nonlinear substitution box and its applications in image encryption.
Multim. Tools Appl., 2022
J. Inf. Secur. Appl., 2022
A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map.
Inf. Sci., 2022
Inf. Sci., 2022
Expert Syst. Appl., 2022
Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things.
Expert Syst. J. Knowl. Eng., 2022
PSEBVC: Provably Secure ECC and Biometric Based Authentication Framework Using Smartphone for Vehicular Cloud Environment.
IEEE Access, 2022
A Strong Hybrid S-Box Scheme Based on Chaos, 2D Cellular Automata and Algebraic Structure.
IEEE Access, 2022
Biomedical Multimedia Encryption by Fractional-Order Meixner Polynomials Map and Quaternion Fractional-Order Meixner Moments.
IEEE Access, 2022
Multi-Objective Evolution of Strong S-Boxes Using Non-Dominated Sorting Genetic Algorithm-II and Chaos for Secure Telemedicine.
IEEE Access, 2022
2021
A secure and efficient key agreement framework for critical energy infrastructure using mobile device.
Telecommun. Syst., 2021
A novel finite rings based algebraic scheme of evolving secure S-boxes for images encryption.
Multim. Tools Appl., 2021
A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm.
Multim. Tools Appl., 2021
Security analysis and enhancements of an image cryptosystem based on hyperchaotic system.
J. King Saud Univ. Comput. Inf. Sci., 2021
Comput. Intell. Neurosci., 2021
Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications.
IEEE Access, 2021
A Novel Construction of Dynamic S-Box With High Nonlinearity Using Heuristic Evolution.
IEEE Access, 2021
Construction of Optimized Dynamic S-Boxes Based on a Cubic Modular Transform and the Sine Function.
IEEE Access, 2021
IEEE Access, 2021
An Improved WBSN Key-Agreement Protocol Based on Static Parameters and Hash Functions.
IEEE Access, 2021
Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding.
IEEE Access, 2021
IEEE Access, 2021
2020
An External Parameter Independent Novel Cost Function for Evolving Bijective Substitution-Boxes.
Symmetry, 2020
Pattern Recognit. Lett., 2020
J. Inf. Secur. Appl., 2020
Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme.
Entropy, 2020
Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation.
Complex., 2020
IEEE Access, 2020
Comparison of Pre and Post-Action of a Finite Abelian Group Over Certain Nonlinear Schemes.
IEEE Access, 2020
LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment.
IEEE Access, 2020
A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups.
IEEE Access, 2020
IEEE Access, 2020
Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications.
IEEE Access, 2020
Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures.
IEEE Access, 2020
2019
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map.
Neural Comput. Appl., 2019
A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation.
Entropy, 2019
Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System.
IEEE Access, 2019
2018
Wirel. Pers. Commun., 2018
Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos.
Symmetry, 2018
Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network.
J. Intell. Fuzzy Syst., 2018
Int. J. Rough Sets Data Anal., 2018
Int. J. Rough Sets Data Anal., 2018
Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption.
J. Electron. Test., 2018
Entropy, 2018
Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map.
Complex., 2018
IEEE Access, 2018
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
2017
Efficient Cryptographic Substitution Box Design Using Travelling Salesman Problem and Chaos.
CoRR, 2017
2016
Rotation-k Affine-Power-Affine-like Multiple Substitution-Boxes for Secure Communication.
CoRR, 2016
Proceedings of the 2016 International Conference on Advances in Computing, 2016
Proceedings of the Ninth International Conference on Contemporary Computing, 2016
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016
2015
Proceedings of the Eighth International Conference on Contemporary Computing, 2015
2014
Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys.
Int. J. Commun. Networks Distributed Syst., 2014
Security Improvement of an Image Encryption Based on mPixel-Chaotic-Shuffle and Pixel-Chaotic-Diffusion.
CoRR, 2014
An Inter-Component Pixels Permutation Based Color Image Encryption Using Hyper-chaos.
CoRR, 2014
Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation.
Proceedings of the Security in Computing and Communications, 2014
A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014
Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014
2013
J. Inf. Process. Syst., 2013
Proceedings of the Security in Computing and Communications - International Symposium, 2013
Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013, 2013
2011
Proceedings of the Contemporary Computing - 4th International Conference, 2011
Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform.
Proceedings of the High Performance Architecture and Grid Computing, 2011
Chaos-based encryption of biomedical EEG signals using random quantization technique.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011
2010
Proceedings of the Contemporary Computing - Third International Conference, 2010