Khan Muhammad
Khan Muhammad
Sejong University, Seoul, South Korea
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Action recognition in video sequences using deep bi-directional LSTM with CNN features
A Ullah, J Ahmad, K Muhammad, M Sajjad, SW Baik
IEEE Access 6, 1155-1166, 2017
1862017
A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image
K Muhammad, M Sajjad, I Mehmood, S Rho, SW Baik
Multimedia Tools and Applications 75 (22), 14867-14893, 2016
1362016
Hash based encryption for keyframes of diagnostic hysteroscopy
R Hamza, K Muhammad, N Arunkumar, G Ramírez-González
IEEE Access 6, 60160-60170, 2017
1272017
A hybrid model of internet of things and cloud computing to manage big data in health services applications
M Elhoseny, A Abdelaziz, AS Salama, AM Riad, K Muhammad, ...
Future generation computer systems 86, 1383-1394, 2018
1232018
Image based fruit category classification by 13-layer deep convolutional neural network and data augmentation
YD Zhang, Z Dong, X Chen, W Jia, S Du, K Muhammad, SH Wang
Multimedia Tools and Applications 78 (3), 3613-3632, 2019
1142019
Convolutional neural networks based fire detection in surveillance videos
K Muhammad, J Ahmad, I Mehmood, S Rho, SW Baik
IEEE Access 6, 18174-18183, 2018
1142018
Secure surveillance framework for IoT systems using probabilistic image encryption
K Muhammad, R Hamza, J Ahmad, J Lloret, H Wang, SW Baik
IEEE Transactions on Industrial Informatics 14 (8), 3679-3689, 2018
1132018
The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems
A Darwish, AE Hassanien, M Elhoseny, AK Sangaiah, K Muhammad
Journal of Ambient Intelligence and Humanized Computing 10 (10), 4151-4166, 2019
1102019
Early fire detection using convolutional neural networks during surveillance for effective disaster management
K Muhammad, J Ahmad, SW Baik
Neurocomputing 288, 30-42, 2018
1072018
Secure and robust fragile watermarking scheme for medical images
A Shehab, M Elhoseny, K Muhammad, AK Sangaiah, P Yang, H Huang, ...
IEEE Access 6, 10269-10278, 2018
1002018
Efficient deep CNN-based fire detection and localization in video surveillance applications
K Muhammad, J Ahmad, Z Lv, P Bellavista, P Yang, SW Baik
IEEE Transactions on Systems, Man, and Cybernetics: Systems 49 (7), 1419-1434, 2018
782018
Image steganography using uncorrelated color space and its application for security of visual contents in online social networks
K Muhammad, M Sajjad, I Mehmood, S Rho, SW Baik
Future Generation Computer Systems 86, 951-960, 2018
702018
CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
K Muhammad, J Ahmad, NU Rehman, Z Jan, M Sajjad
Multimedia Tools and Applications 76 (6), 8597-8626, 2017
672017
A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption.
K Muhammad, J Ahmad, H Farman, Z Jan, M Sajjad, SW Baik
TIIS 9 (5), 1938-1962, 2015
652015
Multi-grade brain tumor classification using deep CNN with extensive data augmentation
M Sajjad, S Khan, K Muhammad, W Wu, A Ullah, SW Baik
Journal of computational science 30, 174-182, 2019
632019
Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy
K Muhammad, M Sajjad, SW Baik
Journal of medical systems 40 (5), 114, 2016
632016
Twelve-layer deep convolutional neural network with stochastic pooling for tea category classification on GPU platform
YD Zhang, K Muhammad, C Tang
Multimedia Tools and Applications 77 (17), 22821-22839, 2018
612018
Leukocytes classification and segmentation in microscopic blood smear: a resource-aware healthcare service in smart cities
M Sajjad, S Khan, Z Jan, K Muhammad, H Moon, JT Kwak, S Rho, ...
IEEE Access 5, 3475-3489, 2016
612016
Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities
M Sajjad, M Nasir, K Muhammad, S Khan, Z Jan, AK Sangaiah, ...
Future Generation Computer Systems 108, 995-1007, 2020
572020
Grey wolf optimization based clustering algorithm for vehicular ad-hoc networks
M Fahad, F Aadil, S Khan, PA Shah, K Muhammad, J Lloret, H Wang, ...
Computers & Electrical Engineering 70, 853-870, 2018
522018
The system can't perform the operation now. Try again later.
Articles 1–20