Jamil Ahmad
Jamil Ahmad
PhD (Computer Science), Islamia College Peshawar, Pakistan
Verified email at icp.edu.pk - Homepage
TitleCited byYear
Action recognition in video sequences using deep bi-directional LSTM with CNN features
A Ullah, J Ahmad, K Muhammad, M Sajjad, SW Baik
IEEE Access 6, 1155-1166, 2017
992017
Convolutional neural networks based fire detection in surveillance videos
K Muhammad, J Ahmad, I Mehmood, S Rho, SW Baik
IEEE Access 6, 18174-18183, 2018
712018
Secure surveillance framework for IoT systems using probabilistic image encryption
K Muhammad, R Hamza, J Ahmad, J Lloret, H Wang, SW Baik
IEEE Transactions on Industrial Informatics 14 (8), 3679-3689, 2018
682018
Early fire detection using convolutional neural networks during surveillance for effective disaster management
K Muhammad, J Ahmad, SW Baik
Neurocomputing 288, 30-42, 2018
632018
Speech emotion recognition from spectrograms with deep convolutional neural network
AM Badshah, J Ahmad, N Rahim, SW Baik
2017 international conference on platform technology and service (PlatCon), 1-5, 2017
632017
A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption
K Muhammad, J Ahmad, ZJ Haleem Farman, M Sajjad, SW Baik
KSII Transactions on Internet and Information Systems 9 (5), 1938-1962, 2015
622015
CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
K Muhammad, J Ahmad, NU Rehman, Z Jan, M Sajjad
Multimedia Tools and Applications 76 (6), 8597-8626, 2017
562017
Efficient deep CNN-based fire detection and localization in video surveillance applications
K Muhammad, J Ahmad, Z Lv, P Bellavista, P Yang, SW Baik
IEEE Transactions on Systems, Man, and Cybernetics: Systems 49 (7), 1419-1434, 2018
462018
Saliency-weighted graphs for efficient visual content description and their applications in real-time image retrieval systems
J Ahmad, M Sajjad, I Mehmood, S Rho, SW Baik
Journal of Real-Time Image Processing, 1-17, 2015
362015
A novel image steganographic approach for hiding text in color images using HSI color model
K Muhammad, J Ahmad, H Farman, M Zubair
arXiv preprint arXiv:1503.00388, 2015
322015
Image steganography for authenticity of visual contents in social networks
K Muhammad, J Ahmad, S Rho, SW Baik
Multimedia Tools and Applications 76 (18), 18985-19004, 2017
302017
A Secure Cyclic Steganographic Technique for Color Images using Randomization
K Muhammad, J Ahmad, NU Rehman, Z Jan, RJ Qureshi
Technical Journal UET Taxila 19 (3), 57-64, 2014
302014
Visual saliency models for summarization of diagnostic hysteroscopy videos in healthcare systems
K Muhammad, J Ahmad, M Sajjad, SW Baik
SpringerPlus 5 (1), 1495, 2016
282016
Secure Image Steganography using Cryptography and Image Transposition
K Muhammad, J Ahmad, M Sajjad, M Zubair
NED University Journal of Research 12 (4), 81-91, 2015
242015
Multi-scale local structure patterns histogram for describing visual contents in social image retrieval systems
J Ahmad, M Sajjad, S Rho, SW Baik
Multimedia Tools and Applications 75 (20), 12669-12692, 2016
232016
Medical image retrieval with compact binary codes generated in frequency domain using highly reactive convolutional features
J Ahmad, K Muhammad, SW Baik
Journal of medical systems 42 (2), 24, 2018
182018
Gender identification using mfcc for telephone applications-a comparative study
J Ahmad, M Fiaz, S Kwon, M Sodanil, B Vo, SW Baik
arXiv preprint arXiv:1601.01577, 2016
162016
Deep features-based speech emotion recognition for smart affective services
AM Badshah, N Rahim, N Ullah, J Ahmad, K Muhammad, MY Lee, ...
Multimedia Tools and Applications 78 (5), 5571-5589, 2019
152019
Object-oriented convolutional features for fine-grained image retrieval in large surveillance datasets
J Ahmad, K Muhammad, S Bakshi, SW Baik
Future Generation Computer Systems 81, 314-330, 2018
152018
Analytical network process based optimum cluster head selection in wireless sensor network
H Farman, H Javed, B Jan, J Ahmad, S Ali, FN Khalil, M Khan
PloS one 12 (7), e0180848, 2017
152017
The system can't perform the operation now. Try again later.
Articles 1–20