default search action
Aamir Shahzad
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j25]Aamir Shahzad, Ali Altalbe:
Computing of LQR Technique for Nonlinear System Using Local Approximation. Comput. Syst. Sci. Eng. 46(1): 853-871 (2023) - 2022
- [j24]Zaineb Shah, Syed Ayaz Ali Shah, Aamir Shahzad, Ahmad Fayyaz, Shoaib Khaliq, Ali Zahir, Goh Chuan Meng:
Deep Learning-Based Forearm Subcutaneous Veins Segmentation. IEEE Access 10: 42814-42820 (2022) - [j23]Aamir Shahzad, Abdelouahed Gherbi, Kaiwen Zhang:
Enabling Fog-Blockchain Computing for Autonomous-Vehicle-Parking System: A Solution to Reinforce IoT-Cloud Platform for Future Smart Parking. Sensors 22(13): 4849 (2022) - [j22]Owais Ali, Hazrat Ali, Syed Ayaz Ali Shah, Aamir Shahzad:
Implementation of a Modified U-Net for Medical Image Segmentation on Edge Devices. IEEE Trans. Circuits Syst. II Express Briefs 69(11): 4593-4597 (2022) - [c13]Samin Sadri, Aamir Shahzad, Kaiwen Zhang:
Blockchain Traceability in Healthcare: Blood Donation Supply Chain. ICACT 2022: 1-8 - [i1]Owais Ali, Hazrat Ali, Syed Ayaz Ali Shah, Aamir Shahzad:
Implementation of a Modified U-Net for Medical Image Segmentation on Edge Devices. CoRR abs/2206.02358 (2022) - 2021
- [j21]Ayesha Saleem Khan, Aamir Shahzad, Muhammad Zubair, Abdullah Alvi, Raheem Gul:
Personalized 0D models of normal and stenosed carotid arteries. Comput. Methods Programs Biomed. 200: 105888 (2021) - [j20]Tallha Akram, Muhammad Attique Khan, Salma Gul, Aamir Shahzad, Muhammad Altaf, Syed Rameez Naqvi, Robertas Damasevicius, Rytis Maskeliunas:
A novel framework for rapid diagnosis of COVID-19 on computed tomography scans. Pattern Anal. Appl. 24(3): 951-964 (2021) - [j19]Tallha Akram, Muhammad Attique Khan, Salma Gul, Aamir Shahzad, Muhammad Altaf, Syed Rameez Naqvi, Robertas Damasevicius, Rytis Maskeliunas:
Correction to a novel framework for rapid diagnosis of COVID-19 on computed tomography scans. Pattern Anal. Appl. 24(3): 965 (2021) - [c12]Samin Sadri, Aamir Shahzad, Kaiwen Zhang:
Blockchain Traceability in Healthcare: Blood Donation Supply Chain. ICACT 2021: 119-126 - [c11]Mario Felipe Munoz, Kaiwen Zhang, Aamir Shahzad, Mustapha Ouhimmou:
LogLog: A Blockchain Solution for Tracking and Certifying Wood Volumes. IEEE ICBC 2021: 1-9 - [c10]Aamir Shahzad, Kaiwen Zhang, Abdelouahed Gherbi:
Privacy-preserving smart grid traceability using blockchain over IoT connectivity. SAC 2021: 699-706 - 2020
- [j18]Ghulam Mustafa, Aamir Shahzad, Faheem Khan, Dumitru Baleanu, Yuming Chu:
A New Computational Approach to Estimate the Subdivision Depth of n-Ary Subdivision Scheme. IEEE Access 8: 187146-187155 (2020) - [j17]Aamir Shahzad, Kaiwen Zhang, René Landry Jr., Neal N. Xiong, Young-Gab Kim:
An efficient emerging network and secured hopping scheme employed over the unsecured public channels. Int. J. Distributed Sens. Networks 16(4) (2020) - [j16]Aamir Shahzad, Kaiwen Zhang, Abdelouahed Gherbi:
Intuitive Development to Examine Collaborative IoT Supply Chain System Underlying Privacy and Security Levels and Perspective Powering through Proactive Blockchain. Sensors 20(13): 3760 (2020) - [j15]Aamir Shahzad, Faheem Khan, Abdul Ghaffar, Ghulam Mustafa, Kottakkaran Sooppy Nisar, Dumitru Baleanu:
A Novel Numerical Algorithm to Estimate the Subdivision Depth of Binary Subdivision Schemes. Symmetry 12(1): 66 (2020)
2010 – 2019
- 2019
- [j14]Syed Ayaz Ali Shah, Aamir Shahzad, Muhammad Amir Khan, Cheng-Kai Lu, Tong Boon Tang:
Unsupervised Method for Retinal Vessel Segmentation Based on Gabor Wavelet and Multiscale Line Detector. IEEE Access 7: 167221-167228 (2019) - [j13]Mahmood Ul Haq, Aamir Shahzad, Zahid Mahmood, Ayaz Ali Shah:
Boosting the Face Recognition Performance of Ensemble Based LDA for Pose, Non-uniform Illuminations, and Low-Resolution Images. KSII Trans. Internet Inf. Syst. 13(6): 3144-3164 (2019) - [j12]Adnan Anwar Awan, Muhammad Amir Khan, Aqdas Naveed Malik, Syed Ayaz Ali Shah, Aamir Shahzad, Babar Nazir, Iftikhar Ahmed Khan, Waqas Jadoon, Naveed Shahzad, Rab Nawaz Jadoon:
Quality of Service-Based Node Relocation Technique for Mobile Sensor Networks. Wirel. Commun. Mob. Comput. 2019: 5043187:1-5043187:13 (2019) - 2018
- [j11]Aamir Shahzad, Yang Sun Lee, Malrey Lee, Young-Gab Kim, Naixue Xiong:
Real-Time Cloud-Based Health Tracking and Monitoring System in Designed Boundary for Cardiology Patients. J. Sensors 2018: 3202787:1-3202787:15 (2018) - [j10]Aamir Shahzad, Jae-Young Choi, Naixue Xiong, Young-Gab Kim, Malrey Lee:
Centralized Connectivity for Multiwireless Edge Computing and Cellular Platform: A Smart Vehicle Parking System. Wirel. Commun. Mob. Comput. 2018 (2018) - 2016
- [j9]Aamir Shahzad, Malrey Lee, Changhoon Lee, Naixue Xiong, Suntae Kim, Young Keun Lee, Kangmin Kim, Seon-Mi Woo, Gisung Jeong:
The protocol design and New approach for SCADA security enhancement during sensors broadcasting system. Multim. Tools Appl. 75(22): 14641-14668 (2016) - [j8]Aamir Shahzad, Malrey Lee, Suntae Kim, Kangmin Kim, Jae-Young Choi, Younghwa Cho, Keun Kwang Lee:
Design and Development of Layered Security: Future Enhancements and Directions in Transmission. Sensors 16(1): 37 (2016) - [j7]Aamir Shahzad, Malrey Lee, Neal Naixue Xiong, Gisung Jeong, Young Keun Lee, Jae-Young Choi, Abdul Waheed Mahesar, Iftikhar Ahmad:
A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks. Sensors 16(3): 322 (2016) - [j6]Aamir Shahzad, René Landry, Malrey Lee, Naixue Xiong, Jongho Lee, Changhoon Lee:
A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols. Sensors 16(6): 821 (2016) - [c9]Aamir Shahzad, Hubert Roth:
Bilateral telecontrol of AutoMerlin mobile robot with fix communication delay. AQTR 2016: 1-6 - 2015
- [j5]Aamir Shahzad, Kalum Priyanath Udagepola, Young Keun Lee, Soojin Park, Malrey Lee:
The Sensors Connectivity within SCADA Automation Environment and New Trends for Security Development during Multicasting Routing Transmission. Int. J. Distributed Sens. Networks 11: 738687:1-738687:15 (2015) - [j4]Aamir Shahzad, Malrey Lee, Young Keun Lee, Suntae Kim, Naixue Xiong, Jae-Young Choi, Young-Hwa Cho:
Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information. Symmetry 7(3): 1176-1210 (2015) - [j3]Aamir Shahzad, Malrey Lee, Hyung Doo Kim, Seon-Mi Woo, Naixue Xiong:
New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions. Symmetry 7(4): 1945-1980 (2015) - [c8]Aamir Shahzad, Chai Meei Tyng, Naufal Mohamad Saad, Nicolas Walter, Aamir Saeed Malik, Fabrice Mériaudeau:
Subcutaneous veins depth estimation method using Monte Carlo simulations. I2MTC 2015: 376-380 - 2014
- [j2]Aamir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan:
A New Cloud based supervisory control and Data Acquisition Implementation to Enhance the Level of Security using Testbed. J. Comput. Sci. 10(4): 652-659 (2014) - [j1]Aamir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan:
The Security Survey and Anaylsis on supervisory control and Data Acquisition Communication. J. Comput. Sci. 10(10): 2006-2019 (2014) - [c7]Aamir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan:
Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption. ICUIMC 2014: 7:1-7:6 - 2013
- [c6]Shahrulniza Musa, Aamir Shahzad, Abdulaziz Aborujilah:
Simulation base implementation for placement of security services in real time environment. ICUIMC 2013: 31 - [c5]Shahrulniza Musa, Aamir Shahzad, Abdulaziz Aborujilah:
Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security. ICUIMC 2013: 32 - [c4]Mohd Nazri Ismail, Abdulaziz Aborujilah, Shahrulniza Musa, Aamir Shahzad:
Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. ICUIMC 2013: 36 - 2011
- [c3]Azeem Ahmad, Magnus Goransson, Sushma Joseph Kolla, Aamir Shahzad, Muhammad Qummer Ul Arfeen, Zaki Arshad:
Requirements Development Life Cycle with Respect to Geographically Distributed Stakeholders: The "V" Model. ITNG 2011: 1076-1077 - 2010
- [c2]Aamir Shahzad, Rong Ke Liu:
A change-in-modulation based cooperative communication scheme. ISSPA 2010: 255-258
2000 – 2009
- 2009
- [c1]Ihsan Ul Haq, Xiaojian Xu, Aamir Shahzad:
Band clustering and selection and decision fusion for target detection in hyperspectral imagery. ICASSP 2009: 1101-1104
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint