Selective encryption for gray images based on chaos and DNA complementary rules A ur Rehman, X Liao, A Kulsoom, SA Abbas Multimedia Tools and Applications 74, 4655-4677, 2015 | 126 | 2015 |
An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules A Kulsoom, D Xiao, SA Abbas Multimedia Tools and Applications 75, 1-23, 2016 | 125 | 2016 |
An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos X Liao, MA Hahsmi, R Haider Optik-International Journal for Light and Electron Optics 153, 117-134, 2018 | 99 | 2018 |
A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2 A ur Rehman, X Liao, R Ashraf, S Ullah, H Wang Optik 159, 348-367, 2018 | 98 | 2018 |
A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps X Liao, A Kulsoom, S Ullah Multimedia Tools and Applications 75 (18), 11241-11266, 2016 | 53 | 2016 |
A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2 AU Rehman, X Liao Multimedia Tools and Applications 78 (2), 2105-2133, 2019 | 45 | 2019 |
Cost estimation: A survey of well-known historic cost estimation techniques SA Abbas, X Liao, AU Rehman, A Azam, MI Abdullah Journal of Emerging Trends in Computing and Information Sciences 3 (4), 612-636, 2012 | 39 | 2012 |
K-means and k-medoids: Cluster analysis on birth data collected in city Muzaffarabad, Kashmir SA Abbas, A Aslam, AU Rehman, WA Abbasi, S Arif, SZH Kazmi IEEE Access 8, 151847-151855, 2020 | 30 | 2020 |
A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2 A Firdous, A ur Rehman, MM Saad Missen Multimedia Tools and Applications 78, 24809-24835, 2019 | 29 | 2019 |
Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules A Ur Rehman, D Xiao, A Kulsoom, MA Hashmi, SA Abbas Multimedia Tools and Applications 78, 9355-9382, 2019 | 29 | 2019 |
A Selective Cross-Substitution Technique for Encrypting Color Images Using Chaos, DNA Rules and SHA-512 A Rehman, H Wang, A Shahid, S Iqbal, Z Abbas, A Firdous IEEE ACCESS 7, 2019 | 23 | 2019 |
A gray image encryption technique using the concept of water waves, chaos and hash function A Firdous, AU Rehman, MMS Missen Ieee Access 9, 11675-11693, 2021 | 21 | 2021 |
A color image encryption algorithm based on one time key, chaos theory, and concept of rotor machine AU Rehman, A Firdous, S Iqbal, Z Abbas, MMA Shahid, H Wang, F Ullah IEEE Access 8, 172275-172295, 2020 | 15 | 2020 |
Proactive Security Mechanism and Design for Firewall. SU Lar, X Liao, A Rehman, M Qinglu J. Information Security 2 (3), 122-130, 2011 | 9 | 2011 |
Performance analysis of classification algorithms on birth dataset SA Abbas, AU Rehman, F Majeed, A Majid, MSA Malik, ZH Kazmi, S Zafar IEEE Access 8, 102146-102154, 2020 | 8 | 2020 |
DM-GKM: A key management scheme for dynamic group based applications S Iqbal, MLM Kiah, A ur Rehman, Z Abbas, B Daghighi Computer Networks 182, 107476, 2020 | 6 | 2020 |
Intermittently differential privacy in smart meters via rechargeable batteries X Liu, H Wang, G Chen, B Zhou, A ur Rehman Electric Power Systems Research 199, 107410, 2021 | 4 | 2021 |
An innovative technique for image encryption using tri-partite graph and chaotic maps A Ur Rehman, X Liao, H Wang Multimedia Tools and Applications 80, 21979-22005, 2021 | 4 | 2021 |
Estimation of surface heat flux and surface temperature during inverse heat conduction under varying spray parameters and sample initial temperature M Aamir, Q Liao, X Zhu, H Wang, M Zubair The Scientific World Journal 2014, 2014 | 4 | 2014 |
Deep Learning-Based Correct Answer Prediction for Developer Forums HU Iftikhar, AU Rehman, OA Kalugina, Q Umer, HA Khan IEEE Access 9, 128166-128177, 2021 | 2 | 2021 |