Sajjad Shaukat Jamal

Orcid: 0000-0002-5852-1955

According to our database1, Sajjad Shaukat Jamal authored at least 69 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A novel digital contents privacy scheme based on quantum harmonic oscillator and schrodinger paradox.
Wirel. Networks, October, 2024

Privacy-Preserving Electronic Medical Record Sharing for IoT-Enabled Healthcare System Using Fully Homomorphic Encryption, IOTA, and Masked Authenticated Messaging.
IEEE Trans. Ind. Informatics, September, 2024

Region of interest-based medical image encryption technique based on chaotic S-boxes.
Expert Syst. Appl., March, 2024

Research on ECG signal reconstruction based on improved weighted nuclear norm minimization and approximate message passing algorithm.
Frontiers Neuroinformatics, 2024

Voice disorder detection using machine learning algorithms: An application in speech and language pathology.
Eng. Appl. Artif. Intell., 2024

Disease Detection in Grape Cultivation Using Strategically Placed Cameras and Machine Learning Algorithms With a Focus on Powdery Mildew and Blotches.
IEEE Access, 2024

Blockchain-Enabled Secure Data Collection Scheme for Fog-Based WBAN.
IEEE Access, 2024

Image Encryption Based on Elliptic Curve Points and Linear Fractional Transformation.
IEEE Access, 2024

Unif-NTT: A Unified Hardware Design of Forward and Inverse NTT for PQC Algorithms.
IEEE Access, 2024

A Compact 3-Stage Pipelined Hardware Accelerator for Point Multiplication of Binary Elliptic Curves Over GF(2<sup>233</sup>).
IEEE Access, 2024

FPGA Implementation of Elliptic-Curve Point Multiplication Over GF(2<sup>233</sup>) Using Booth Polynomial Multiplier for Area-Sensitive Applications.
IEEE Access, 2024

DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication.
IEEE Access, 2024

Evaluating Ascon Hardware on 7-Series FPGA Devices.
IEEE Access, 2024

2023
ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks.
IEEE Syst. J., March, 2023

A novel combination of information confidentiality and data hiding mechanism.
Multim. Tools Appl., February, 2023

New image encryption scheme based on Arnold map and cuckoo search optimization algorithm.
Multim. Tools Appl., February, 2023

New color image encryption technique based on three-dimensional logistic map and Grey wolf optimization based generated substitution boxes.
Multim. Tools Appl., February, 2023

Post-Quantum Lattice-Based Secure Reconciliation Enabled Key Agreement Protocol for IoT.
IEEE Internet Things J., February, 2023

Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment.
Comput. Commun., 2023

Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method.
IEEE Access, 2023

Construction and Optimization of Dynamic S-Boxes Based on Gaussian Distribution.
IEEE Access, 2023

2022
An efficient authentication with key agreement procedure using Mittag-Leffler-Chebyshev summation chaotic map under the multi-server architecture.
J. Supercomput., 2022

An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric.
J. Supercomput., 2022

Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network.
IEEE Trans. Ind. Informatics, 2022

A new color image encryption technique using DNA computing and Chaos-based substitution box.
Soft Comput., 2022

HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.
Sensors, 2022

AES Based White Box Cryptography in Digital Signature Verification.
Sensors, 2022

Classification of Skin Cancer Lesions Using Explainable Deep Learning.
Sensors, 2022

Machine Learning and Applied Cryptography.
Secur. Commun. Networks, 2022

Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform.
Remote. Sens., 2022

An Efficient Digital Confidentiality Scheme Based on Commutative Chaotic Polynomial.
Multim. Tools Appl., 2022

Image encryption scheme for multi-focus images for visual sensors network.
Multim. Tools Appl., 2022

Cryptographically strong S-P boxes and their application in steganography.
J. Inf. Secur. Appl., 2022

Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications.
Trans. Emerg. Telecommun. Technol., 2022

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.
Complex., 2022

CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique Based on Fractional Chaotic Maps.
IEEE Access, 2022

2021
Lightweight Chaos-Based Nonlinear Component of Block Ciphers.
Wirel. Pers. Commun., 2021

Parent-Daughter Confusion Component: A New Approach for the Construction of Nonlinear Confusion Component.
Wirel. Pers. Commun., 2021

Computer Vision for Human-Computer Interaction Using Noninvasive Technology.
Sci. Program., 2021

T-norms and T-conorms hesitant fuzzy Einstein aggregation operator and its application to decision making.
Soft Comput., 2021

A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.
Sensors, 2021

An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps.
Sensors, 2021

Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions.
Sensors, 2021

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT.
Sensors, 2021

Survey on Reversible Watermarking Techniques of Echocardiography.
Secur. Commun. Networks, 2021

Feature Entropy Estimation (FEE) for Malicious IoT Traffic and Detection Using Machine Learning.
Mob. Inf. Syst., 2021

Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map.
Math. Comput. Simul., 2021

Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters.
J. Syst. Archit., 2021

An efficient image encryption scheme based on double affine substitution box and chaotic system.
Integr., 2021

A Novel Megastable Oscillator with a Strange Structure of Coexisting Attractors: Design, Analysis, and FPGA Implementation.
Complex., 2021

Proposing and Dynamical Analysis of a Hyperjerk Piecewise Linear Chaotic System with Offset Boostable Variable and Hidden Attractors.
Complex., 2021

A New Circumscribed Self-Excited Spherical Strange Attractor.
Complex., 2021

IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks.
IEEE Access, 2021

A Novel Scheme of Image Encryption Based on Elliptic Curves Isomorphism and Substitution Boxes.
IEEE Access, 2021

iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment.
IEEE Access, 2021

On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure.
IEEE Access, 2021

2020
An Improved Chaotic Cryptosystem for Image Encryption and Digital Watermarking.
Wirel. Pers. Commun., 2020

A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping.
Symmetry, 2020

The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers.
Secur. Commun. Networks, 2020

A novel combination of information hiding and confidentiality scheme.
Multim. Tools Appl., 2020

A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation.
Multidimens. Syst. Signal Process., 2020

Multi-criteria group decision making with Pythagorean fuzzy soft topology.
J. Intell. Fuzzy Syst., 2020

A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map.
Entropy, 2020

A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher.
IEEE Access, 2020

2019
A new technique of frequency domain watermarking based on a local ring.
Wirel. Networks, 2019

Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System.
IEEE Access, 2019

2018
A Novel Algebraic Technique for the Construction of Strong Substitution Box.
Wirel. Pers. Commun., 2018

To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers.
Secur. Commun. Networks, 2018

2016
A Watermarking Technique with Chaotic Fractional S-Box Transformation.
Wirel. Pers. Commun., 2016


  Loading...