Seguir
Mamoona Asghar (SMIEEE)
Mamoona Asghar (SMIEEE)
Otros nombresMamoona Naveed Asghar, M.N. Asghar
Assistant Professor, Uni of Galway, Ireland | Marie Sklodowska Curie Alumna
Dirección de correo verificada de universityofgalway.ie - Página principal
Título
Citado por
Citado por
Año
A survey of modern deep learning based object detection models
SSA Zaidi, MS Ansari, A Aslam, N Kanwal, M Asghar, B Lee
Digital Signal Processing 126, 103514, 2022
6872022
Data driven approach for eye disease classification with machine learning
S Malik, N Kanwal, MN Asghar, MAA Sadiq, I Karamat, M Fleury
Applied Sciences 9 (14), 2789, 2019
632019
An efficient security system for CABAC bin-strings of H. 264/SVC
MN Asghar, M Ghanbari
IEEE transactions on circuits and systems for video technology 23 (3), 425-437, 2012
622012
Visual surveillance within the EU general data protection regulation: A technology perspective
MN Asghar, N Kanwal, B Lee, M Fleury, M Herbst, Y Qiao
IEEE Access 7, 111709-111726, 2019
522019
Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering
A Shifa, MS Afgan, MN Asghar, M Fleury, I Memon, S Abdullah, ...
IEEE Access 6, 16189-16206, 2018
352018
Lightweight deep learning model for detection of copy-move image forgery with post-processed attacks
MN Abbas, MS Ansari, MN Asghar, N Kanwal, T O'Neill, B Lee
2021 IEEE 19th World symposium on applied machine intelligence and …, 2021
342021
Limitation of silicon based computation and future prospects
S Hassan, M Asghar
2010 Second International Conference on Communication Software and Networks …, 2010
342010
Skin detection and lightweight encryption for privacy protection in real-time surveillance applications
A Shifa, MB Imtiaz, MN Asghar, M Fleury
Image and Vision Computing 94, 103859, 2020
312020
Multimedia security perspectives in IoT
A Shifa, MN Asghar, M Fleury
2016 sixth international conference on innovative computing technology …, 2016
312016
Confidentiality of a selectively encrypted H. 264 coded video bit-stream
MN Asghar, M Ghanbari, M Fleury, MJ Reed
Journal of Visual Communication and Image Representation 25 (2), 487-498, 2014
282014
MuLViS: Multi-level encryption based security system for surveillance videos
A Shifa, MN Asghar, M Fleury, N Kanwal, MS Ansari, B Lee, M Herbst, ...
IEEE Access 8, 177131-177155, 2020
272020
Lightweight cipher for H. 264 videos in the Internet of multimedia things with encryption space ratio diagnostics
A Shifa, MN Asghar, S Noor, N Gohar, M Fleury
Sensors 19 (5), 1228, 2019
262019
Sufficient encryption based on entropy coding syntax elements of H. 264/SVC
MN Asghar, M Ghanbari, M Fleury, MJ Reed
Multimedia Tools and Applications 74, 10215-10241, 2015
232015
Learning-based improved seeded region growing algorithm for brain tumor identification: Improved seeded region growing algorithm for brain tumor identification
IS Bajwa, MN Asghar, MA Naeem
Proceedings of the Pakistan Academy of Sciences: A. Physical and …, 2017
212017
Fuzzy-logic threat classification for multi-level selective encryption over real-time video streams
A Shifa, M Naveed Asghar, A Ahmed, M Fleury
Journal of Ambient Intelligence and Humanized Computing 11, 5369-5397, 2020
202020
Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes
MN Asghar, R Kousar, H Majid, M Fleury
Journal of Visual Communication and Image Representation 45, 122-136, 2017
202017
An energy-aware, highly available, and fault-tolerant method for reliable IoT systems
M Bukhsh, S Abdullah, A Rahman, MN Asghar, H Arshad, A Alabdulatif
IEEE Access 9, 145363-145381, 2021
172021
An energy-efficient message scheduling algorithm with joint routing mechanism at network layer in internet of things environment
S Abdullah, MN Asghar, M Ashraf, N Abbas
Wireless Personal Communications 111, 1821-1835, 2020
162020
SecureCam: Selective Detection and Encryption enabled Application for Dynamic Camera Surveillance Videos
I Aribilola, MN Asghar, N Kanwal, M Fleury, B Lee
IEEE Transactions on Consumer Electronics, 2022
152022
Sufficient encryption with codewords and bin-strings of H. 264/SVC
MN Asghar, M Ghanbari, MJ Reed
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
152012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20