Sajjad Shaukat Jamal
Orcid: 0000-0002-5852-1955
According to our database1,
Sajjad Shaukat Jamal
authored at least 69 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A novel digital contents privacy scheme based on quantum harmonic oscillator and schrodinger paradox.
Wirel. Networks, October, 2024
Privacy-Preserving Electronic Medical Record Sharing for IoT-Enabled Healthcare System Using Fully Homomorphic Encryption, IOTA, and Masked Authenticated Messaging.
IEEE Trans. Ind. Informatics, September, 2024
Region of interest-based medical image encryption technique based on chaotic S-boxes.
Expert Syst. Appl., March, 2024
Research on ECG signal reconstruction based on improved weighted nuclear norm minimization and approximate message passing algorithm.
Frontiers Neuroinformatics, 2024
Voice disorder detection using machine learning algorithms: An application in speech and language pathology.
Eng. Appl. Artif. Intell., 2024
Disease Detection in Grape Cultivation Using Strategically Placed Cameras and Machine Learning Algorithms With a Focus on Powdery Mildew and Blotches.
IEEE Access, 2024
IEEE Access, 2024
Image Encryption Based on Elliptic Curve Points and Linear Fractional Transformation.
IEEE Access, 2024
IEEE Access, 2024
A Compact 3-Stage Pipelined Hardware Accelerator for Point Multiplication of Binary Elliptic Curves Over GF(2<sup>233</sup>).
IEEE Access, 2024
FPGA Implementation of Elliptic-Curve Point Multiplication Over GF(2<sup>233</sup>) Using Booth Polynomial Multiplier for Area-Sensitive Applications.
IEEE Access, 2024
DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication.
IEEE Access, 2024
2023
ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks.
IEEE Syst. J., March, 2023
Multim. Tools Appl., February, 2023
New image encryption scheme based on Arnold map and cuckoo search optimization algorithm.
Multim. Tools Appl., February, 2023
New color image encryption technique based on three-dimensional logistic map and Grey wolf optimization based generated substitution boxes.
Multim. Tools Appl., February, 2023
Post-Quantum Lattice-Based Secure Reconciliation Enabled Key Agreement Protocol for IoT.
IEEE Internet Things J., February, 2023
Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment.
Comput. Commun., 2023
Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method.
IEEE Access, 2023
IEEE Access, 2023
2022
An efficient authentication with key agreement procedure using Mittag-Leffler-Chebyshev summation chaotic map under the multi-server architecture.
J. Supercomput., 2022
An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric.
J. Supercomput., 2022
Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network.
IEEE Trans. Ind. Informatics, 2022
A new color image encryption technique using DNA computing and Chaos-based substitution box.
Soft Comput., 2022
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.
Sensors, 2022
Remote. Sens., 2022
Multim. Tools Appl., 2022
Multim. Tools Appl., 2022
J. Inf. Secur. Appl., 2022
Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications.
Trans. Emerg. Telecommun. Technol., 2022
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.
Complex., 2022
CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique Based on Fractional Chaotic Maps.
IEEE Access, 2022
2021
Wirel. Pers. Commun., 2021
Parent-Daughter Confusion Component: A New Approach for the Construction of Nonlinear Confusion Component.
Wirel. Pers. Commun., 2021
Sci. Program., 2021
T-norms and T-conorms hesitant fuzzy Einstein aggregation operator and its application to decision making.
Soft Comput., 2021
A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.
Sensors, 2021
An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps.
Sensors, 2021
Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions.
Sensors, 2021
Secur. Commun. Networks, 2021
Feature Entropy Estimation (FEE) for Malicious IoT Traffic and Detection Using Machine Learning.
Mob. Inf. Syst., 2021
Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map.
Math. Comput. Simul., 2021
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters.
J. Syst. Archit., 2021
An efficient image encryption scheme based on double affine substitution box and chaotic system.
Integr., 2021
A Novel Megastable Oscillator with a Strange Structure of Coexisting Attractors: Design, Analysis, and FPGA Implementation.
Complex., 2021
Proposing and Dynamical Analysis of a Hyperjerk Piecewise Linear Chaotic System with Offset Boostable Variable and Hidden Attractors.
Complex., 2021
IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks.
IEEE Access, 2021
A Novel Scheme of Image Encryption Based on Elliptic Curves Isomorphism and Substitution Boxes.
IEEE Access, 2021
iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment.
IEEE Access, 2021
On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure.
IEEE Access, 2021
2020
Wirel. Pers. Commun., 2020
Symmetry, 2020
The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers.
Secur. Commun. Networks, 2020
Multim. Tools Appl., 2020
A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation.
Multidimens. Syst. Signal Process., 2020
J. Intell. Fuzzy Syst., 2020
A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map.
Entropy, 2020
A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher.
IEEE Access, 2020
2019
Wirel. Networks, 2019
Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System.
IEEE Access, 2019
2018
Wirel. Pers. Commun., 2018
To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers.
Secur. Commun. Networks, 2018
2016
Wirel. Pers. Commun., 2016