Suivre
Dr.  Aqeel ur Rehman
Dr. Aqeel ur Rehman
COMSATS University Islamabad, Vehari campus
Adresse e-mail validée de cuivehari.edu.pk
Titre
Citée par
Citée par
Année
An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules
A Kulsoom, D Xiao, SA Abbas
Multimedia Tools and Applications 75, 1-23, 2016
1502016
A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2
A Ur Rehman, X Liao, R Ashraf, S Ullah, H Wang
Optik 159, 348-367, 2018
1442018
Selective encryption for gray images based on chaos and DNA complementary rules
A ur Rehman, X Liao, A Kulsoom, SA Abbas
Multimedia Tools and Applications 74, 4655-4677, 2015
1412015
An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos
X Liao, MA Hahsmi, R Haider
Optik-International Journal for Light and Electron Optics 153, 117-134, 2018
1212018
K-means and k-medoids: Cluster analysis on birth data collected in city Muzaffarabad, Kashmir
SA Abbas, A Aslam, AU Rehman, WA Abbasi, S Arif, SZH Kazmi
IEEE Access 8, 151847-151855, 2020
622020
A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps
X Liao, A Kulsoom, S Ullah
Multimedia Tools and Applications 75 (18), 11241-11266, 2016
622016
A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2
AU Rehman, X Liao
Multimedia Tools and Applications 78 (2), 2105-2133, 2019
532019
Cost estimation: A survey of well-known historic cost estimation techniques
SA Abbas, X Liao, AU Rehman, A Azam, MI Abdullah
Journal of Emerging Trends in Computing and Information Sciences 3 (4), 612-636, 2012
442012
A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2
A Firdous, A ur Rehman, MM Saad Missen
Multimedia Tools and Applications 78, 24809-24835, 2019
402019
Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules
A Ur Rehman, D Xiao, A Kulsoom, MA Hashmi, SA Abbas
Multimedia Tools and Applications 78 (7), 9355-9382, 2019
382019
A gray image encryption technique using the concept of water waves, chaos and hash function
A Firdous, AU Rehman, MMS Missen
Ieee Access 9, 11675-11693, 2021
372021
A color image encryption algorithm based on one time key, chaos theory, and concept of rotor machine
AU Rehman, A Firdous, S Iqbal, Z Abbas, MMA Shahid, H Wang, F Ullah
IEEE Access 8, 172275-172295, 2020
332020
A Selective Cross-Substitution Technique for Encrypting Color Images Using Chaos, DNA Rules and SHA-512
A Rehman, H Wang, A Shahid, S Iqbal, Z Abbas, A Firdous
IEEE ACCESS 7, 2019
262019
Machine Learning Based Prediction of Reference Evapotranspiration (ET0) Using IoT
Z Hu, RN Bashir, AU Rehman, SI Iqbal, MMA Shahid, T Xu
IEEE Access 10, 70526-70540, 2022
182022
Performance analysis of classification algorithms on birth dataset
SA Abbas, AU Rehman, F Majeed, A Majid, MSA Malik, ZH Kazmi, S Zafar
IEEE Access 8, 102146-102154, 2020
152020
Proactive Security Mechanism and Design for Firewall.
SU Lar, X Liao, A Rehman, MA Qinglu
J. Information Security 2 (3), 122-130, 2011
122011
Intermittently differential privacy in smart meters via rechargeable batteries
X Liu, H Wang, G Chen, B Zhou, A ur Rehman
Electric Power Systems Research 199, 107410, 2021
92021
An innovative technique for image encryption using tri-partite graph and chaotic maps
A Ur Rehman, X Liao, H Wang
Multimedia Tools and Applications 80 (14), 21979-22005, 2021
82021
DM-GKM: A key management scheme for dynamic group based applications
S Iqbal, MLM Kiah, A ur Rehman, Z Abbas, B Daghighi
Computer Networks 182, 107476, 2020
72020
Estimation of surface heat flux and surface temperature during inverse heat conduction under varying spray parameters and sample initial temperature
M Aamir, Q Liao, X Zhu, H Wang, M Zubair
The Scientific World Journal 2014, 2014
52014
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20