default search action
Zahoor Jan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Noreen Fayyaz Khan, Sareer Ul Amin, Zahoor Jan, Changhui Yan:
Detection of Violent Scenes in Cartoon Movies Using a Deep Learning Approach. IEEE Access 12: 154080-154091 (2024) - [j23]Faisal Alharbi, Shabana Habib, Waleed Albattah, Zahoor Jan, Meshari D. Alanazi, Muhammad Islam:
Effective Video Summarization Using Channel Attention-Assisted Encoder-Decoder Framework. Symmetry 16(6): 680 (2024) - 2023
- [j22]Muhammad Shabir, Zahoor Jan, Naveed Islam, Inayat Khan, Gauhar Ali, Mohammed Ahmed El-Affendi:
TILPDeep: A Lightweight Deep Learning Technique for Handwritten Transformed Invariant Pashto Text Recognition. IEEE Access 11: 23393-23406 (2023) - [j21]Israr Ur Rehman, Waqar Ali, Zahoor Jan, Zulfiqar Ali, Hui Xu, Jie Shao:
CAML: Contextual augmented meta-learning for cold-start recommendation. Neurocomputing 533: 178-190 (2023) - [j20]Muhammad Shabir, Naveed Islam, Zahoor Jan, Inayat Khan:
Transformation Invariant Pashto Handwritten Text Classification and Prediction. J. Circuits Syst. Comput. 32(2): 2350020:1-2350020:25 (2023) - [j19]Israr Ur Rehman, Muhammad Shehzad Hanif, Zulfiqar Ali, Zahoor Jan, Cobbinah Bernard Mawuli, Waqar Ali:
Empowering neural collaborative filtering with contextual features for multimedia recommendation. Multim. Syst. 29(4): 2375-2388 (2023) - [c12]Israr Ur Rehman, Zulfiqar Ali, Zahoor Jan, Muhammad Rashid, Ali Abbas, Nadeem Tariq:
Deep learning empowered classification of augmented cultural heritage images. VIPERC 2023 - 2022
- [j18]Khalid Haseeb, Zahoor Jan, Fahad Ahmed Al-Zahrani, Gwanggil Jeon:
A Secure Mobile Wireless Sensor Networks based Protocol for Smart Data Gathering with Cloud. Comput. Electr. Eng. 97: 107584 (2022) - [j17]Sana Ullah Khan, Naveed Islam, Zahoor Jan, Khalid Haseeb, Syed Inayat Ali Shah, Muhammad Hanif:
A machine learning-based approach for the segmentation and classification of malignant cells in breast cytology images using gray level co-occurrence matrix (GLCM) and support vector machine (SVM). Neural Comput. Appl. 34(11): 8365-8372 (2022) - [c11]Israr Ur Rehman, Zulfiqar Ali, Zahoor Jan, Muhammad Rashid, Waqar Ali:
Empirical performance analysis of classification methods on cultural heritage database. VIPERC 2022 - 2021
- [j16]Muhammad Shabir, Naveed Islam, Zahoor Jan, Inayat Khan, Taj Rahman, Asim Zeb, Shafiq Ahmad, Abdelaty Edrees Abdelgawad, Mali Abdollahian:
Real-Time Pashto Handwritten Character Recognition Using Salient Geometric and Spectral Features. IEEE Access 9: 160238-160248 (2021) - 2020
- [j15]Khalid Haseeb, Khaled Mohamad Almustafa, Zahoor Jan, Tanzila Saba, Usman Tariq:
Secure and Energy-Aware Heuristic Routing Protocol for Wireless Sensor Network. IEEE Access 8: 163962-163974 (2020) - [j14]Khalid Haseeb, Ikram Ud Din, Ahmad Almogren, Zahoor Jan, Naveed Abbas, Muhammad Adnan:
DDR-ESC: A Distributed and Data Reliability Model for Mobile Edge-Based Sensor-Cloud. IEEE Access 8: 185752-185760 (2020) - [j13]Muhammad Sajjad, Mansoor Nasir, Khan Muhammad, Siraj Khan, Zahoor Jan, Arun Kumar Sangaiah, Mohamed Elhoseny, Sung Wook Baik:
Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities. Future Gener. Comput. Syst. 108: 995-1007 (2020)
2010 – 2019
- 2019
- [j12]Sana Ullah Khan, Naveed Islam, Zahoor Jan, Ikram Ud Din, Atif Khan, Yasir Faheem:
An e-Health care services framework for the detection and classification of breast cancer in breast cytology images as an IoMT application. Future Gener. Comput. Syst. 98: 286-296 (2019) - [j11]Sana Ullah Khan, Naveed Islam, Zahoor Jan, Ikram Ud Din, Joel J. P. C. Rodrigues:
A novel deep learning based framework for the detection and classification of breast cancer using transfer learning. Pattern Recognit. Lett. 125: 1-6 (2019) - [c10]Zahoor Jan, Inayat Ullah, Faryal Tahir, Naveed Islam, Babar Shah:
Novel Robust Digital Watermarking in Mid-Rank Co-efficient Based on DWT and RT Transform. WorldCIST (2) 2019: 295-302 - 2018
- [j10]Muhammad Nazir, Zahoor Jan, Muhammad Sajjad:
Facial expression recognition using histogram of oriented gradients based transformed features. Clust. Comput. 21(1): 539-548 (2018) - [j9]Muhammad Sajjad, Adnan Shah, Zahoor Jan, Syed Inayat Ali Shah, Sung Wook Baik, Irfan Mehmood:
Facial appearance and texture feature-based robust facial expression recognition framework for sentiment knowledge discovery. Clust. Comput. 21(1): 549-567 (2018) - [j8]Zahoor Jan, Arshad Khan, Muhammad Sajjad, Khan Muhammad, Seungmin Rho, Irfan Mehmood:
A review on automated diagnosis of malaria parasite in microscopic blood smears images. Multim. Tools Appl. 77(8): 9801-9826 (2018) - [c9]Sana Ullah Khan, Naveed Islam, Zahoor Jan, Hameed Ullah Shah, Aziz Ud Din:
Automated Counting of Cells in Breast Cytology Images Using Level Set Method. HPCC/SmartCity/DSS 2018: 1578-1584 - 2017
- [j7]Muhammad Sajjad, Siraj Khan, Zahoor Jan, Khan Muhammad, Hyeonjoon Moon, Jin Tae Kwak, Seungmin Rho, Sung Wook Baik, Irfan Mehmood:
Leukocytes Classification and Segmentation in Microscopic Blood Smear: A Resource-Aware Healthcare Service in Smart Cities. IEEE Access 5: 3475-3489 (2017) - [j6]Muhammad Nazir, Zahoor Jan, Muhammad Sajjad:
Facial expression recognition using weber discrete wavelet transform. J. Intell. Fuzzy Syst. 33(1): 479-489 (2017) - [j5]Muhammad Sajjad, Khan Muhammad, Sung Wook Baik, Seungmin Rho, Zahoor Jan, Sang-Soo Yeo, Irfan Mehmood:
Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multim. Tools Appl. 76(3): 3519-3536 (2017) - [j4]Jamil Ahmad, Muhammad Sajjad, Zahoor Jan, Irfan Mehmood, Seungmin Rho, Sung Wook Baik:
Analysis of interaction trace maps for active authentication on smart devices. Multim. Tools Appl. 76(3): 4069-4087 (2017) - [j3]Khan Muhammad, Jamil Ahmad, Naeem Ur Rehman, Zahoor Jan, Muhammad Sajjad:
CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multim. Tools Appl. 76(6): 8597-8626 (2017) - 2016
- [j2]Jamil Ahmad, Khan Muhammad, Zahoor Jan:
Exploiting angular profiles signature for shape-based image classification and retrieval. Int. J. Appl. Pattern Recognit. 3(3): 276-292 (2016) - [c8]Muhammad Sajjad, Siraj Khan, Muhammad Shoaib, Hazrat Ali, Zahoor Jan, Khan Muhammad, Irfan Mehmood:
Computer Aided System for Leukocytes Classification and Segmentation in Blood Smear Images. FIT 2016: 99-104 - [i5]Khan Muhammad, Jamil Ahmad, Haleem Farman, Zahoor Jan:
A New Image Steganographic Technique using Pattern based Bits Shuffling and Magic LSB for Grayscale Images. CoRR abs/1601.01386 (2016) - 2015
- [j1]Khan Muhammad, Jamil Ahmad, Haleem Farman, Zahoor Jan, Muhammad Sajjad, Sung Wook Baik:
A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. KSII Trans. Internet Inf. Syst. 9(5): 1938-1962 (2015) - [c7]Zahoor Jan, Muhammad Rafiq, Hayat Muhammad, Noor Zada:
Detection of Tuberculosis Bacteria in Sputum Slide Image Using Morphological Features. BDAS 2015: 408-414 - [c6]Zahoor Jan, Hayat Muhammad, Muhammad Rafiq, Noor Zada:
An Automated System for Offline Signature Verification and Identification Using Delaunay Triangulation. WorldCIST (1) 2015: 653-663 - [i4]Khan Muhammad, Jamil Ahmad, Naeem Ur Rehman, Zahoor Jan, Rashid Jalal Qureshi:
A Secure Cyclic Steganographic Technique for Color Images using Randomization. CoRR abs/1502.07808 (2015) - [i3]Khan Muhammad, Zahoor Jan, Jamil Ahmad, Zahid Khan:
An Adaptive Secret Key-directed Cryptographic Scheme for Secure Transmission in Wireless Sensor Networks. CoRR abs/1510.00226 (2015) - 2014
- [i2]Jamil Ahmad, Zahoor Jan, Zia Ud Din, Shoaib Muhammad Khan:
A Fusion of Labeled-Grid Shape Descriptors with Weighted Ranking Algorithm for Shapes Recognition. CoRR abs/1406.3949 (2014) - 2010
- [c5]Fouzia Jabeen, Zahoor Jan, M. Arfan Jaffar, Anwar M. Mirza:
Energy Based Coefficient Selection for Digital Watermarking in Wavelet Domain. ICICA (2) 2010: 260-267
2000 – 2009
- 2009
- [c4]Muhammad A. Khan, Zahoor Jan, Muhammad Ishtiaq, M. Asif Khan, Anwar M. Mirza:
Selection of Accurate and Robust Classification Model for Binary Classification Problems. FGIT-SIP 2009: 161-168 - [c3]Muhammad Ishtiaq, M. Arfan Jaffar, Muhammad A. Khan, Zahoor Jan, Anwar M. Mirza:
Robust and Imperceptible Watermarking of Video Streams for Low Power Devices. FGIT-SIP 2009: 177-184 - [c2]Muhammad A. Khan, Zahoor Jan, Anwar M. Mirza:
Performance Analysis of Classifier Fusion Model with Minimum Feature Subset and Rotation of the Dataset. FSKD (1) 2009: 251-255 - [i1]Shariq Bashir, Zahoor Jan, Abdul Rauf Baig:
Fast Algorithms for Mining Interesting Frequent Itemsets without Minimum Support. CoRR abs/0904.3319 (2009) - 2008
- [c1]Zahoor Jan, Muhammad Abrar, Shariq Bashir, Anwar M. Mirza:
Seasonal to Inter-annual Climate Prediction Using Data Mining KNN Technique. IMTIC 2008: 40-51
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint