Skip to main content

and
  1. No Access

    Article

    User-selectable interaction and privacy features in mobile app recommendation (MAR)

    The research in the mobile app recommendation system (MARS) is steadily increasing due to the involvement of big data and social information. Few existing systems explore the possibility of social interaction ...

    Saira Beg, Adeel Anjum, Mansoor Ahmed in Multimedia Tools and Applications (2024)

  2. Article

    Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger

    Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Jeon in Cluster Computing (2023)

  3. No Access

    Article

    Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger

    With the growth in Vehicular Ad Hoc Network (VANET) technology, many vehicular devices are communicating with each other and with the edge nodes, generating a massive amount of data. One of the biggest challen...

    Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Jeon in Cluster Computing (2023)

  4. Article

    A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing

    With the emergence of COVID-19, smart healthcare, the Internet of Medical Things, and big data-driven medical applications have become even more important. The biomedical data produced is highly confidential a...

    Syed Atif Moqurrab, Noshina Tariq, Adeel Anjum in Wireless Personal Communications (2022)

  5. No Access

    Article

    Thermal image encryption based on laser diode feedback and 2D logistic chaotic map

    Importance of thermal images in an electric power station, nuclear plants, for extraction of petroleum products, biological and medical is not unseen. Based on that, security of thermal images is very importan...

    Saira Beg, Faisal Baig, Yousaf Hameed, Adeel Anjum in Multimedia Tools and Applications (2022)

  6. No Access

    Article

    Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities

    Electronic health records (EHRs) are increasingly employed to maintain, store and share varied types of patient data. The data can also be utilized for various research purposes, such as clinical trials or epi...

    Tehsin Kanwal, Adeel Anjum, Abid Khan in Cluster Computing (2021)

  7. No Access

    Article

    OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment

    Access control is used to prevent data from access of unauthorized users. Over the years, several access control models have been proposed to meet requirements of various applications and domains. Role-based a...

    Sidra Aslam, Mansoor Ahmed, Imran Ahmed, Abid Khan in Multimedia Tools and Applications (2020)

  8. No Access

    Article

    S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain

    The strength of cryptography encryption is strongly depended upon the substitution box (S-box), hence highly non-linear S-box is appreciated in cryptography. In this work, we proposed a scheme to select the op...

    Saira Beg, Naveed Ahmad, Adeel Anjum, Mansoor Ahmad in Multimedia Tools and Applications (2020)

  9. No Access

    Article

    A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks

    Data provenance is becoming extremely important these days for distributed environment, due to the ease in sharing and modifying data stored (e.g. cloud storage systems). However, the protection of provenance ...

    Idrees Ahmed, Abid Khan, Adeel Anjum in International Journal of Parallel Programm… (2020)

  10. No Access

    Article

    An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues

    Digital videos have become an important aspect of our lives lately, from a personal memorable to surveillance videos which can be presented in a court as an evidence now, this video evidence can be very import...

    Muhammad Aizad Fayyaz, Adeel Anjum, Sheikh Ziauddin in Multimedia Tools and Applications (2020)

  11. No Access

    Article

    Autonomic workload performance tuning in large-scale data repositories

    The workload in large-scale data repositories involves concurrent users and contains homogenous and heterogeneous data. The large volume of data, dynamic behavior and versatility of large-scale data repositori...

    Basit Raza, Asma Sher, Sana Afzal, Ahmad Kamran Malik in Knowledge and Information Systems (2019)

  12. No Access

    Article

    XM-tree: data driven computational model by using metric extended nodes with non-overlap** in high-dimensional metric spaces

    Finding similar objects based on a query and a distance, remains a fundamental problem for many applications. The general problem of many similarity measures is to focus the search on as few elements as possib...

    Zineddine Kouahla, Adeel Anjum in Computational and Mathematical Organizatio… (2019)

  13. No Access

    Article

    Anonymous and formally verified dual signature based online e-voting protocol

    The traditional paper-based voting is severely criticized after having found evidence of rigging in elections, leading to the uncertainty in the fairness of the election process. Traditional voting systems hav...

    Malik Najmus Saqib, Junaid Kiani, Basit Shahzad, Adeel Anjum in Cluster Computing (2019)

  14. No Access

    Article

    An efficient approach for publishing microdata for multiple sensitive attributes

    The publication of microdata is pivotal for medical research purposes, data analysis and data mining. These published data contain a substantial amount of sensitive information, for example, a hospital may pu...

    Adeel Anjum, Naveed Ahmad, Saif U. R. Malik, Samiya Zubair in The Journal of Supercomputing (2018)

  15. Chapter and Conference Paper

    A Parallel Implementation of GHB Tree

    Searching in a dataset remains a fundamental problem for many applications. The general purpose of many similarity measures is to focus the search on as few elements as possible to find the answer. The current...

    Zineddine Kouahla, Adeel Anjum in Computational Intelligence and Its Applications (2018)

  16. No Access

    Article

    Formal modeling and verification of security controls for multimedia systems in the cloud

    Organizations deploy the Security Information and Event Management (SIEM) systems for centralized management of security alerts for securing their multimedia content. The SIEM system not only preserves events ...

    Masoom Alam, Saif-ur-Rehman Malik, Qaisar Javed in Multimedia Tools and Applications (2017)

  17. No Access

    Chapter and Conference Paper

    m-Skin Doctor: A Mobile Enabled System for Early Melanoma Skin Cancer Detection Using Support Vector Machine

    Early detection of skin cancer is very important as it is one of the dangerous form of cancer spreading vigorously among humans. With the advancement of mobile technology; mobile enabled skin cancer detection ...

    Muhammad Aleem Taufiq, Nazia Hameed, Adeel Anjum, Fozia Hameed in eHealth 360° (2017)