Skip to main content

and
  1. No Access

    Article

    Percutaneous Biliary Interventions via the Modified Hutson Loop in Patients with Biliary-Enteric Anastomoses: A Retrospective Study

    This study aimed to present the institutional experience and algorithm for performing biliary interventions in liver transplant patients using the modified Hutson loop access (MHLA) and the impact of percutane...

    Ali Husnain, Asad Malik, Juan Caicedo in CardioVascular and Interventional Radiology (2024)

  2. No Access

    Article

    Percutaneous Biliary Neo-anastomosis or Neo-duct Creation Using Radiofrequency Wires

    This study aims to report a minimally invasive, percutaneous technique to cross complete biliary occlusions using a radiofrequency wire to create a biliary-enteric neo-anastomosis or biliary neo-duct.

    Christa Robins, Nicholas **ao, Riad Salem in CardioVascular and Interventional Radiology (2022)

  3. No Access

    Chapter and Conference Paper

    Spoofed Fingerprint Image Detection Using Local Phase Patch Segment Extraction and a Lightweight Network

    Fingerprint spoofing is one of the most successful attacks on fingerprint biometric systems. It involves the presentation of a fake fingerprint to a biometric sensor, which recognizes it as the original templa...

    Sani Mohammed Abdullahi, Shuifa Sun, Asad Malik in Advances in Digital Forensics XVIII (2022)

  4. No Access

    Article

    Improved Electrical Properties Displayed by Mg2+-Substituted Cobalt Ferrite Nano Particles, Prepared Via Co-precipitation Route

    In this reported study, magnesium-substituted cobalt ferrite nanoparticles (Co1−xMgxFe2O4, x = 0.0, 0.20, 0.35, 0.50) have been investigated. The samples were prepared via a wet chemical co-precipitation route an...

    Muhammad Zarrar Khan, Iftikhar Hussain Gul in Journal of Superconductivity and Novel Mag… (2020)

  5. Article

    Correction to: A reversible data hiding in encrypted image based on prediction-error estimation and location map

    In the original publication, figure 2 has some incorrect notations and Table 1 has inappropriate alignment. The original article has been corrected.

    Asad Malik, Hong-**a Wang, Yanli Chen in Multimedia Tools and Applications (2020)

  6. No Access

    Article

    A reversible data hiding in encrypted image based on prediction-error estimation and location map

    In recent decades, visual privacy of digital data has gained much attention from the researchers, especially in cloud-based services. The efficacy of Reversible Data Hiding in Encrypted Images (RDHEI) cannot b...

    Asad Malik, Hong-**a Wang, Yanli Chen in Multimedia Tools and Applications (2020)

  7. No Access

    Chapter and Conference Paper

    A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted Images

    In this paper, we have presented a novel lossless data hiding scheme in a homomorphically encrypted image. After applying the homomorphic encryption function to the original image by the content owner, the da...

    Asad Malik, Hongxia Wang, Ahmad Neyaz Khan in Digital Forensics and Watermarking (2020)

  8. Article

    Open Access

    An EEG study of detection without localisation in change blindness

    Previous studies of change blindness have suggested a distinction between detection and localisation of changes in a visual scene. Using a simple paradigm with an array of coloured squares, the present study a...

    Catriona L. Scrivener, Asad Malik, Jade Marsh in Experimental Brain Research (2019)

  9. No Access

    Chapter and Conference Paper

    Vision-Based Inceptive Integration for Robotic Control

    Robots are used frequently nowadays to reduce the human effort due to its efficient capability and performance. However, interaction with human-friendly environment is needed to integrate the robot accurately....

    Asif Khan, Jian-** Li, Asad Malik, M. Yusuf Khan in Soft Computing and Signal Processing (2019)