Musheer Ahmad

Orcid: 0000-0002-4915-9325

Affiliations:
  • Jamia Millia Islamia, Department of Computer Engineering, New Delhi, India (since 2011)
  • Jamia Millia Islamia, Department of Computer Engineering, New Delhi, India (PhD)


According to our database1, Musheer Ahmad authored at least 97 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An FCN-LSTM model for neurological status detection from non-invasive multivariate sensor data.
Neural Comput. Appl., January, 2024

Efficient CNN-based disaster events classification using UAV-aided images for emergency response application.
Neural Comput. Appl., 2024

Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption.
Expert Syst. Appl., 2024

Fuzzy Logic-Based Substitution-Box for Robust Medical Image Encryption in Telemedicine.
IEEE Access, 2024

Trust-Enabled Energy Efficient Protocol for Secure Remote Sensing in Supply Chain Management.
IEEE Access, 2024

RAP-MEC: Robust Authentication Protocol for the Mobile Edge Computing Services.
IEEE Access, 2024

LEAF-IIoT: Lightweight and Efficient Authentication Framework for the Industrial Internet of Things.
IEEE Access, 2024

2023
Determination of Critical Edges in Air Route Network Using Modified Weighted Sum Method and Grey Relational Analysis.
IEEE Trans. Intell. Transp. Syst., December, 2023

LW-DeepFakeNet: a lightweight time distributed CNN-LSTM network for real-time DeepFake video detection.
Signal Image Video Process., November, 2023

AuCFSR: Authentication and Color Face Self-Recovery Using Novel 2D Hyperchaotic System and Deep Learning Models.
Sensors, November, 2023

A novel algebraic construction of strong S-boxes over double GF(27) structures and image protection.
Comput. Appl. Math., March, 2023

Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing.
IEEE Trans. Netw. Sci. Eng., 2023

Resource-Efficient Authenticated Data Sharing Mechanism for Smart Wearable Systems.
IEEE Trans. Netw. Sci. Eng., 2023

A complex network-based approach for security and governance in the smart green city.
Expert Syst. Appl., 2023

Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion.
Comput. Syst. Sci. Eng., 2023

Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity.
IEEE Access, 2023

Toward Spectrum Efficiency and Reliability for Heterogeneous Users in CR-Enabled Social Internet of Things.
IEEE Access, 2023

Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences.
IEEE Access, 2023

Deep Transfer Learning Based Parkinson's Disease Detection Using Optimized Feature Selection.
IEEE Access, 2023

2022
Color stereo image encryption and local zero-watermarking schemes using octonion Hahn moments and modified Henon map.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

A Group Theoretic Construction of Large Number of AES-Like Substitution-Boxes.
Wirel. Pers. Commun., 2022

A Novel 4D Hyperchaotic System Assisted Josephus Permutation for Secure Substitution-Box Generation.
J. Signal Process. Syst., 2022

RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure.
J. Supercomput., 2022

Intelligent Driver Drowsiness Detection for Traffic Safety Based on Multi CNN Deep Model and Facial Subsampling.
IEEE Trans. Intell. Transp. Syst., 2022

A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing.
Signal Process., 2022

A group theoretic construction of highly nonlinear substitution box and its applications in image encryption.
Multim. Tools Appl., 2022

A new anonymous authentication framework for secure smart grids applications.
J. Inf. Secur. Appl., 2022

A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map.
Inf. Sci., 2022

An image encryption algorithm based on new generalized fusion fractal structure.
Inf. Sci., 2022

Attention based CNN model for fire detection and localization in real-world images.
Expert Syst. Appl., 2022

Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things.
Expert Syst. J. Knowl. Eng., 2022

PSEBVC: Provably Secure ECC and Biometric Based Authentication Framework Using Smartphone for Vehicular Cloud Environment.
IEEE Access, 2022

A Strong Hybrid S-Box Scheme Based on Chaos, 2D Cellular Automata and Algebraic Structure.
IEEE Access, 2022

Biomedical Multimedia Encryption by Fractional-Order Meixner Polynomials Map and Quaternion Fractional-Order Meixner Moments.
IEEE Access, 2022

Multi-Objective Evolution of Strong S-Boxes Using Non-Dominated Sorting Genetic Algorithm-II and Chaos for Secure Telemedicine.
IEEE Access, 2022

2021
A secure and efficient key agreement framework for critical energy infrastructure using mobile device.
Telecommun. Syst., 2021

A novel finite rings based algebraic scheme of evolving secure S-boxes for images encryption.
Multim. Tools Appl., 2021

A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm.
Multim. Tools Appl., 2021

Security analysis and enhancements of an image cryptosystem based on hyperchaotic system.
J. King Saud Univ. Comput. Inf. Sci., 2021

An Integrated Approach for Cancer Survival Prediction Using Data Mining Techniques.
Comput. Intell. Neurosci., 2021

Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications.
IEEE Access, 2021

A Novel Construction of Dynamic S-Box With High Nonlinearity Using Heuristic Evolution.
IEEE Access, 2021

Construction of Optimized Dynamic S-Boxes Based on a Cubic Modular Transform and the Sine Function.
IEEE Access, 2021

ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids.
IEEE Access, 2021

An Improved WBSN Key-Agreement Protocol Based on Static Parameters and Hash Functions.
IEEE Access, 2021

Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding.
IEEE Access, 2021

Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System.
IEEE Access, 2021

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence.
IEEE Access, 2021

2020
An External Parameter Independent Novel Cost Function for Evolving Bijective Substitution-Boxes.
Symmetry, 2020

Detecting distraction of drivers using Convolutional Neural Network.
Pattern Recognit. Lett., 2020

Globalized firefly algorithm and chaos for designing substitution box.
J. Inf. Secur. Appl., 2020

Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme.
Entropy, 2020

Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation.
Complex., 2020

A Novel Modular Approach Based Substitution-Box Design for Image Encryption.
IEEE Access, 2020

Comparison of Pre and Post-Action of a Finite Abelian Group Over Certain Nonlinear Schemes.
IEEE Access, 2020

LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment.
IEEE Access, 2020

A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups.
IEEE Access, 2020

A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata.
IEEE Access, 2020

Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications.
IEEE Access, 2020

Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures.
IEEE Access, 2020

2019
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map.
Neural Comput. Appl., 2019

A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation.
Entropy, 2019

Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System.
IEEE Access, 2019

2018
ABC Optimization Based Construction of Strong Substitution-Boxes.
Wirel. Pers. Commun., 2018

Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos.
Symmetry, 2018

Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network.
J. Intell. Fuzzy Syst., 2018

Cryptanalysis and Improvement of a Digital Watermarking Scheme Using Chaotic Map.
Int. J. Rough Sets Data Anal., 2018

Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption.
Int. J. Rough Sets Data Anal., 2018

Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption.
J. Electron. Test., 2018

A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes.
Entropy, 2018

Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map.
Complex., 2018

A New 1D Chaotic Map and $\beta$ -Hill Climbing for Generating Substitution-Boxes.
IEEE Access, 2018

A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

2017
Chaotic Dynamic S Boxes Based Substitution Approach for Digital Images.
CoRR, 2017

Efficient Cryptographic Substitution Box Design Using Travelling Salesman Problem and Chaos.
CoRR, 2017

2016
Rotation-k Affine-Power-Affine-like Multiple Substitution-Boxes for Secure Communication.
CoRR, 2016

Chaotic hash function based plain-image dependent block ciphering technique.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Breaking an image encryption scheme based on chaotic synchronization phenomenon.
Proceedings of the Ninth International Conference on Contemporary Computing, 2016

On the Security of Chaos-Based Watermarking Scheme for Secure Communication.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

2015
Designing chaos based strong substitution box.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015

2014
Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys.
Int. J. Commun. Networks Distributed Syst., 2014

Fisher-Yates Chaotic Shuffling Based Image Encryption.
CoRR, 2014

Sustaining IT PMOs during Cycles of Global Recession.
CoRR, 2014

Security Improvement of an Image Encryption Based on mPixel-Chaotic-Shuffle and Pixel-Chaotic-Diffusion.
CoRR, 2014

Chaos Based Mixed Keystream Generation for Voice Data Encryption.
CoRR, 2014

An Inter-Component Pixels Permutation Based Color Image Encryption Using Hyper-chaos.
CoRR, 2014

Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation.
Proceedings of the Security in Computing and Communications, 2014

A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

A Chaotic Substitution Based Image Encryption Using APA-transformation.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

2013
Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption.
J. Inf. Process. Syst., 2013

A Chaos Based Method for Efficient Cryptographic S-box Design.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

A Bio-Chaotic Block Cryptosystem for Privacy Protection of Multimedia Data.
Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013, 2013

2011
Cryptanalysis of Chaos Based Secure Satellite Imagery Cryptosystem.
Proceedings of the Contemporary Computing - 4th International Conference, 2011

Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform.
Proceedings of the High Performance Architecture and Grid Computing, 2011

Chaos-based encryption of biomedical EEG signals using random quantization technique.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

2010
A Multi-Level Blocks Scrambling Based Chaotic Image Cipher.
Proceedings of the Contemporary Computing - Third International Conference, 2010


  Loading...