Dr.  Aqeel ur Rehman
Dr. Aqeel ur Rehman
COMSATS University Islamabad, Vehari campus
Verified email at
Cited by
Cited by
An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules
A Kulsoom, D Xiao, SA Abbas
Multimedia Tools and Applications 75, 1-23, 2016
A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2
A Ur Rehman, X Liao, R Ashraf, S Ullah, H Wang
Optik 159, 348-367, 2018
Selective encryption for gray images based on chaos and DNA complementary rules
A ur Rehman, X Liao, A Kulsoom, SA Abbas
Multimedia Tools and Applications 74, 4655-4677, 2015
An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos
X Liao, MA Hahsmi, R Haider
Optik-International Journal for Light and Electron Optics 153, 117-134, 2018
A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps
X Liao, A Kulsoom, S Ullah
Multimedia Tools and Applications 75 (18), 11241-11266, 2016
K-means and k-medoids: Cluster analysis on birth data collected in city Muzaffarabad, Kashmir
SA Abbas, A Aslam, AU Rehman, WA Abbasi, S Arif, SZH Kazmi
IEEE Access 8, 151847-151855, 2020
A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2
AU Rehman, X Liao
Multimedia Tools and Applications 78 (2), 2105-2133, 2019
Cost estimation: A survey of well-known historic cost estimation techniques
SA Abbas, X Liao, AU Rehman, A Azam, MI Abdullah
Journal of Emerging Trends in Computing and Information Sciences 3 (4), 612-636, 2012
A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2
A Firdous, A ur Rehman, MM Saad Missen
Multimedia Tools and Applications 78, 24809-24835, 2019
Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules
A Ur Rehman, D Xiao, A Kulsoom, MA Hashmi, SA Abbas
Multimedia Tools and Applications 78 (7), 9355-9382, 2019
A gray image encryption technique using the concept of water waves, chaos and hash function
A Firdous, AU Rehman, MMS Missen
Ieee Access 9, 11675-11693, 2021
A color image encryption algorithm based on one time key, chaos theory, and concept of rotor machine
AU Rehman, A Firdous, S Iqbal, Z Abbas, MMA Shahid, H Wang, F Ullah
IEEE Access 8, 172275-172295, 2020
A Selective Cross-Substitution Technique for Encrypting Color Images Using Chaos, DNA Rules and SHA-512
A Rehman, H Wang, A Shahid, S Iqbal, Z Abbas, A Firdous
Machine Learning Based Prediction of Reference Evapotranspiration (ET0) Using IoT
Z Hu, RN Bashir, AU Rehman, SI Iqbal, MMA Shahid, T Xu
IEEE Access 10, 70526-70540, 2022
Performance analysis of classification algorithms on birth dataset
SA Abbas, AU Rehman, F Majeed, A Majid, MSA Malik, ZH Kazmi, S Zafar
IEEE Access 8, 102146-102154, 2020
Proactive Security Mechanism and Design for Firewall.
SU Lar, X Liao, A Rehman, MA Qinglu
J. Information Security 2 (3), 122-130, 2011
Intermittently differential privacy in smart meters via rechargeable batteries
X Liu, H Wang, G Chen, B Zhou, A ur Rehman
Electric Power Systems Research 199, 107410, 2021
An innovative technique for image encryption using tri-partite graph and chaotic maps
A Ur Rehman, X Liao, H Wang
Multimedia Tools and Applications 80 (14), 21979-22005, 2021
DM-GKM: A key management scheme for dynamic group based applications
S Iqbal, MLM Kiah, A ur Rehman, Z Abbas, B Daghighi
Computer Networks 182, 107476, 2020
Estimation of surface heat flux and surface temperature during inverse heat conduction under varying spray parameters and sample initial temperature
M Aamir, Q Liao, X Zhu, H Wang, M Zubair
The Scientific World Journal 2014, 2014
The system can't perform the operation now. Try again later.
Articles 1–20