default search action
Sajjad Shaukat Jamal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j65]Adel R. Alharbi, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal, Amer Aljaedi, Abdullah Aljuhni, Dalal J. Alanazi:
DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication. IEEE Access 12: 17823-17835 (2024) - [j64]Subramani Jegadeesan, Maria Azees, Arun Sekar Rajasekaran, Amer Aljaedi, Zaid Bassfar, Sajjad Shaukat Jamal:
Blockchain-Enabled Secure Data Collection Scheme for Fog-Based WBAN. IEEE Access 12: 38287-38297 (2024) - [j63]Sajjad Shaukat Jamal, Zaid Bassfar, Ouafae Lahlou, Amer Aljaedi, Mohammad Mazyad Hazzazi:
Image Encryption Based on Elliptic Curve Points and Linear Fractional Transformation. IEEE Access 12: 53335-53347 (2024) - [j62]Amer Aljaedi, Furqan Aziz Qureshi, Mohammad Mazyad Hazzazi, Malik Imran, Zaid Bassfar, Sajjad Shaukat Jamal:
FPGA Implementation of Elliptic-Curve Point Multiplication Over GF(2233) Using Booth Polynomial Multiplier for Area-Sensitive Applications. IEEE Access 12: 72847-72859 (2024) - [j61]Ali Yahya Hummdi, Amer Aljaedi, Zaid Bassfar, Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Mujeeb Ur Rehman:
Unif-NTT: A Unified Hardware Design of Forward and Inverse NTT for PQC Algorithms. IEEE Access 12: 94793-94804 (2024) - [j60]Kashif Hesham Khan, Amer Aljaedi, Muhammad Shakeel Ishtiaq, Hassan Imam, Zaid Bassfar, Sajjad Shaukat Jamal:
Disease Detection in Grape Cultivation Using Strategically Placed Cameras and Machine Learning Algorithms With a Focus on Powdery Mildew and Blotches. IEEE Access 12: 139505-139523 (2024) - [j59]Mujeeb Ur Rehman, Arslan Shafique, Qurat-ul-Ain Aini, Sajjad Shaukat Jamal, Youcef Gheraibia, Aminu Bello Usman:
Voice disorder detection using machine learning algorithms: An application in speech and language pathology. Eng. Appl. Artif. Intell. 133: 108047 (2024) - [j58]Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Muhammad Fahad Khan, Zaid Bassfar, Amer Aljaedi, Zain Ul Islam:
Region of interest-based medical image encryption technique based on chaotic S-boxes. Expert Syst. Appl. 238(Part E): 122030 (2024) - [j57]Sivaranjani Reddi, Patruni Muralidhara Rao, Saraswathi Pedada, Srinivas Jangirala, Ashok Kumar Das, Sajjad Shaukat Jamal, Youngho Park:
Privacy-Preserving Electronic Medical Record Sharing for IoT-Enabled Healthcare System Using Fully Homomorphic Encryption, IOTA, and Masked Authenticated Messaging. IEEE Trans. Ind. Informatics 20(9): 10802-10813 (2024) - 2023
- [j56]Adel R. Alharbi, Sajjad Shaukat Jamal, Muhammad Fahad Khan, Muhammad Asif Gondal, Aaqif Afzaal Abbasi:
Construction and Optimization of Dynamic S-Boxes Based on Gaussian Distribution. IEEE Access 11: 35818-35829 (2023) - [j55]Arslan Shafique, Mujeeb Ur Rehman, Kashif Hesham Khan, Sajjad Shaukat Jamal, Abid Mehmood, Shehzad Ashraf Chaudhry:
Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method. IEEE Access 11: 44559-44577 (2023) - [j54]Ankush Mitra, Basudeb Bera, Ashok Kumar Das, Sajjad Shaukat Jamal, Ilsun You:
Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment. Comput. Commun. 197: 173-185 (2023) - [j53]Dharminder Dharminder, Challa Bhageeratha Reddy, Ashok Kumar Das, Youngho Park, Sajjad Shaukat Jamal:
Post-Quantum Lattice-Based Secure Reconciliation Enabled Key Agreement Protocol for IoT. IEEE Internet Things J. 10(3): 2680-2692 (2023) - [j52]Lal Said Khan, Majid Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal:
A novel combination of information confidentiality and data hiding mechanism. Multim. Tools Appl. 82(5): 6917-6941 (2023) - [j51]Hamza Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal, Iqtadar Hussain, Majid Khan:
New color image encryption technique based on three-dimensional logistic map and Grey wolf optimization based generated substitution boxes. Multim. Tools Appl. 82(5): 6943-6964 (2023) - [j50]Hamza Khan, Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Majid Khan, Iqtadar Hussain:
New image encryption scheme based on Arnold map and cuckoo search optimization algorithm. Multim. Tools Appl. 82(5): 7419-7441 (2023) - [j49]Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, Ashok Kumar Das, Sajjad Shaukat Jamal:
ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks. IEEE Syst. J. 17(1): 234-245 (2023) - 2022
- [j48]Chandrashekhar Meshram, Agbotiname Lucky Imoize, Sajjad Shaukat Jamal, Adel R. Alharbi, Sarita Gajbhiye Meshram, Iqtadar Hussain:
CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique Based on Fractional Chaotic Maps. IEEE Access 10: 39853-39863 (2022) - [j47]Adel R. Alharbi, Jawad Ahmad, Arshad Ali, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis, William J. Buchanan:
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complex. 2022: 7047282:1-7047282:15 (2022) - [j46]Dharminder Dharminder, Uddeshaya Kumar, Ashok Kumar Das, Basudeb Bera, Debasis Giri, Sajjad Shaukat Jamal, Joel J. P. C. Rodrigues:
Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications. Trans. Emerg. Telecommun. Technol. 33(9) (2022) - [j45]Dawood Shah, Tariq Shah, Yasir Naseer, Sajjad Shaukat Jamal, Sadam Hussain:
Cryptographically strong S-P boxes and their application in steganography. J. Inf. Secur. Appl. 67: 103174 (2022) - [j44]Majid Khan, Lal Said Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal, Iqtadar Hussain:
Image encryption scheme for multi-focus images for visual sensors network. Multim. Tools Appl. 81(12): 16353-16370 (2022) - [j43]Lal Said Khan, Majid Khan, Sajjad Shaukat Jamal, Muhammad Amin:
An Efficient Digital Confidentiality Scheme Based on Commutative Chaotic Polynomial. Multim. Tools Appl. 81(23): 33591-33611 (2022) - [j42]Mariam H. Abd, Ghaida A. Al-Suhail, Fadhil R. Tahir, Ahmed M. Ali Ali, Hamza A. Abbood, Kia Dashtipour, Sajjad Shaukat Jamal, Jawad Ahmad:
Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform. Remote. Sens. 14(9): 1984 (2022) - [j41]Amir Anees, Iqtadar Hussain, Umar Mujahid Khokhar, Fawad Ahmed, Sajjad Shaukat Jamal:
Machine Learning and Applied Cryptography. Secur. Commun. Networks 2022: 9797604:1-9797604:3 (2022) - [j40]Safi Ullah, Muazzam Ali Khan, Jawad Ahmad, Sajjad Shaukat Jamal, Zil E. Huma, Muhammad Tahir Hassan, Nikolaos Pitropakis, Arshad Ali, William J. Buchanan:
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles. Sensors 22(4): 1340 (2022) - [j39]Muhammad Zia Ur Rehman, Fawad Ahmed, Suliman A. Alsuhibany, Sajjad Shaukat Jamal, Muhammad Zulfiqar Ali, Jawad Ahmad:
Classification of Skin Cancer Lesions Using Explainable Deep Learning. Sensors 22(18): 6915 (2022) - [j38]Piyush Kumar Shukla, Amer Aljaedi, Piyush Kumar Pareek, Adel R. Alharbi, Sajjad Shaukat Jamal:
AES Based White Box Cryptography in Digital Signature Verification. Sensors 22(23): 9444 (2022) - [j37]Fawad Masood, Junaid Masood, Lejun Zhang, Sajjad Shaukat Jamal, Wadii Boulila, Sadaqat ur Rehman, Fadia Ali Khan, Jawad Ahmad:
A new color image encryption technique using DNA computing and Chaos-based substitution box. Soft Comput. 26(16): 7461-7477 (2022) - [j36]Shahid Latif, Zil E. Huma, Sajjad Shaukat Jamal, Fawad Ahmed, Jawad Ahmad, Adnan Zahid, Kia Dashtipour, Muhammad Umar Aftab, Muhammad Ahmad, Qammer Hussain Abbasi:
Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network. IEEE Trans. Ind. Informatics 18(9): 6435-6444 (2022) - [j35]Chandrashekhar Meshram, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Sajjad Shaukat Jamal, Agbotiname Lucky Imoize:
An efficient authentication with key agreement procedure using Mittag-Leffler-Chebyshev summation chaotic map under the multi-server architecture. J. Supercomput. 78(4): 4938-4959 (2022) - [j34]Chandrashekhar Meshram, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Agbotiname Lucky Imoize, Sajjad Shaukat Jamal, Sharad Kumar Barve:
An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric. J. Supercomput. 78(10): 12792-12814 (2022) - 2021
- [j33]Ashok Kumar Das, Basudeb Bera, Mohammad Wazid, Sajjad Shaukat Jamal, Youngho Park:
On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure. IEEE Access 9: 71856-71867 (2021) - [j32]Ijaz Khalid, Sajjad Shaukat Jamal, Tariq Shah, Dawood Shah, Mohammad Mazyad Hazzazi:
A Novel Scheme of Image Encryption Based on Elliptic Curves Isomorphism and Substitution Boxes. IEEE Access 9: 77798-77810 (2021) - [j31]Ashok Kumar Das, Basudeb Bera, Mohammad Wazid, Sajjad Shaukat Jamal, Youngho Park:
iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment. IEEE Access 9: 87024-87048 (2021) - [j30]Chandrashekhar Meshram, Agbotiname Lucky Imoize, Azeddine Elhassouny, Amer Aljaedi, Adel R. Alharbi, Sajjad Shaukat Jamal:
IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks. IEEE Access 9: 131336-131347 (2021) - [j29]Kui Zhang, M. D. Vijayakumar, Sajjad Shaukat Jamal, Hayder Natiq, Karthikeyan Rajagopal, Sajad Jafari, Iqtadar Hussain:
A Novel Megastable Oscillator with a Strange Structure of Coexisting Attractors: Design, Analysis, and FPGA Implementation. Complex. 2021: 2594965:1-2594965:11 (2021) - [j28]Ramesh Ramamoorthy, Sajjad Shaukat Jamal, Iqtadar Hussain, Mahtab Mehrabbeik, Sajad Jafari, Karthikeyan Rajagopal:
A New Circumscribed Self-Excited Spherical Strange Attractor. Complex. 2021: 8068737:1-8068737:8 (2021) - [j27]M. D. Vijayakumar, Sajjad Shaukat Jamal, Ahmed M. Ali Ali, Karthikeyan Rajagopal, Sajad Jafari, Iqtadar Hussain:
Proposing and Dynamical Analysis of a Hyperjerk Piecewise Linear Chaotic System with Offset Boostable Variable and Hidden Attractors. Complex. 2021: 9037271:1-9037271:11 (2021) - [j26]Majid Khan, Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Khawaja Muhammad Ali, Iqtadar Hussain, Muhammad Asif:
An efficient image encryption scheme based on double affine substitution box and chaotic system. Integr. 81: 108-122 (2021) - [j25]Anup Kumar Maurya, Ashok Kumar Das, Sajjad Shaukat Jamal, Debasis Giri:
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters. J. Syst. Archit. 120: 102296 (2021) - [j24]Noor Munir, Majid Khan, Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Iqtadar Hussain:
Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map. Math. Comput. Simul. 190: 826-836 (2021) - [j23]Tarun Dhar Diwan, Siddartha Choubey, H. S. Hota, S. B. Goyal, Sajjad Shaukat Jamal, Piyush Kumar Shukla, Basant Tiwari:
Feature Entropy Estimation (FEE) for Malicious IoT Traffic and Detection Using Machine Learning. Mob. Inf. Syst. 2021: 8091363:1-8091363:13 (2021) - [j22]Rabiya Ghafoor, Danish Saleem, Sajjad Shaukat Jamal, Muhammad Ishtiaq, Sadaf Ejaz, Arif Jamal Malik, Muhammad Fahad Khan:
Survey on Reversible Watermarking Techniques of Echocardiography. Secur. Commun. Networks 2021: 8820082:1-8820082:19 (2021) - [j21]Muhammad Almas Khan, Muazzam Ali Khan, Sana Ullah Jan, Jawad Ahmad, Sajjad Shaukat Jamal, Awais Aziz Shah, Nikolaos Pitropakis, William J. Buchanan:
A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors 21(21): 7016 (2021) - [j20]Chandrashekhar Meshram, Agbotiname Lucky Imoize, Amer Aljaedi, Adel R. Alharbi, Sajjad Shaukat Jamal, Sharad Kumar Barve:
An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps. Sensors 21(21): 7039 (2021) - [j19]Chandrashekhar Meshram, Agbotiname Lucky Imoize, Amer Aljaedi, Adel R. Alharbi, Sajjad Shaukat Jamal, Sharad Kumar Barve:
A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments. Sensors 21(21): 7227 (2021) - [j18]Shahid Latif, Maha Driss, Wadii Boulila, Zil E. Huma, Sajjad Shaukat Jamal, Zeba Idrees, Jawad Ahmad:
Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions. Sensors 21(22): 7518 (2021) - [j17]Aliya Fahmi, Fazli Amin, Muhammad Aslam, Naveed Yaqoob, Sajjad Shaukat Jamal:
T-norms and T-conorms hesitant fuzzy Einstein aggregation operator and its application to decision making. Soft Comput. 25(1): 47-71 (2021) - [j16]Janarthanan Ramadoss, J. Venkatesh, Shubham Joshi, Piyush Kumar Shukla, Sajjad Shaukat Jamal, Majid Altuwairiqi, Basant Tiwari:
Computer Vision for Human-Computer Interaction Using Noninvasive Technology. Sci. Program. 2021: 3902030:1-3902030:15 (2021) - [j15]Majid Khan, Sajjad Shaukat Jamal:
Lightweight Chaos-Based Nonlinear Component of Block Ciphers. Wirel. Pers. Commun. 120(4): 3017-3034 (2021) - [j14]Faiza Firdousi, Majid Khan, Sajjad Shaukat Jamal, Naeem Faraz:
Parent-Daughter Confusion Component: A New Approach for the Construction of Nonlinear Confusion Component. Wirel. Pers. Commun. 120(4): 3095-3115 (2021) - 2020
- [j13]Sadam Hussain, Sajjad Shaukat Jamal, Tariq Shah, Iqtadar Hussain:
A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher. IEEE Access 8: 123492-123506 (2020) - [j12]Fawad Masood, Jawad Ahmad, Syed Aziz Shah, Sajjad Shaukat Jamal, Iqtadar Hussain:
A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map. Entropy 22(3): 274 (2020) - [j11]Muhammad Riaz, Khalid Naeem, Muhammad Aslam, Deeba Afzal, Fuad Ali Ahmed Almahdi, Sajjad Shaukat Jamal:
Multi-criteria group decision making with Pythagorean fuzzy soft topology. J. Intell. Fuzzy Syst. 39(5): 6703-6720 (2020) - [j10]Dawood Shah, Tariq Shah, Sajjad Shaukat Jamal:
A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation. Multidimens. Syst. Signal Process. 31(3): 885-905 (2020) - [j9]Majid Khan, Sajjad Shaukat Jamal, Umer Aziz Waqas:
A novel combination of information hiding and confidentiality scheme. Multim. Tools Appl. 79(41-42): 30983-31005 (2020) - [j8]Sajjad Shaukat Jamal, Dawood Shah, Abdulaziz Deajim, Tariq Shah:
The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers. Secur. Commun. Networks 2020: 8883884:1-8883884:14 (2020) - [j7]Jawad Ahmad, Fawad Masood, Syed Aziz Shah, Sajjad Shaukat Jamal, Iqtadar Hussain:
A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping. Symmetry 12(3): 350 (2020) - [j6]Attaullah, Tariq Shah, Sajjad Shaukat Jamal:
An Improved Chaotic Cryptosystem for Image Encryption and Digital Watermarking. Wirel. Pers. Commun. 110(3): 1429-1442 (2020)
2010 – 2019
- 2019
- [j5]Sajjad Shaukat Jamal, Amir Anees, Musheer Ahmad, Muhammad Fahad Khan, Iqtadar Hussain:
Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System. IEEE Access 7: 173273-173285 (2019) - [j4]Sajjad Shaukat Jamal, Tariq Shah, Shabieh Farwa, Muhammad Usman Khan:
A new technique of frequency domain watermarking based on a local ring. Wirel. Networks 25(4): 1491-1503 (2019) - 2018
- [j3]Shahid Mahmood, Shabieh Farwa, Muhammad Rafiq, Syed Muhammad Jawwad Riaz, Tariq Shah, Sajjad Shaukat Jamal:
To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers. Secur. Commun. Networks 2018: 5823230:1-5823230:8 (2018) - [j2]Attaullah, Sajjad Shaukat Jamal, Tariq Shah:
A Novel Algebraic Technique for the Construction of Strong Substitution Box. Wirel. Pers. Commun. 99(1): 213-226 (2018) - 2016
- [j1]Sajjad Shaukat Jamal, Muhammad Usman Khan, Tariq Shah:
A Watermarking Technique with Chaotic Fractional S-Box Transformation. Wirel. Pers. Commun. 90(4): 2033-2049 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint