default search action
Aqeel-ur Rehman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Farman Ullah, Ziauddin, Muhammad Faheem, Muntazim Abbas Hashmi, Aqeel-ur Rehman, Rab Nawaz Bashir, Amjad Rehman Khan:
A Novel 1-Dimensional Cosine Chaotic Equation and Digital Image Encryption Technique. IEEE Access 12: 118857-118874 (2024) - 2022
- [j28]Zhiming Hu, Rab Nawaz Bashir, Aqeel ur Rehman, Salman Iqbal, Malik Muhammad Ali Shahid, Ting Xu:
Machine Learning Based Prediction of Reference Evapotranspiration (ET0) Using IoT. IEEE Access 10: 70526-70540 (2022) - [j27]Aqeel ur Rehman, Javid Shabbir, Tahir Munir, Shabbir Ahmad, Muhammad Riaz:
Violating the standard assumption underlying the process monitoring: Perfect measurements. Qual. Reliab. Eng. Int. 38(4): 2065-2109 (2022) - 2021
- [j26]Amnah Firdous, Aqeel-ur Rehman, Malik Muhammad Saad Missen:
A Gray Image Encryption Technique Using the Concept of Water Waves, Chaos and Hash Function. IEEE Access 9: 11675-11693 (2021) - [j25]Waleej Haider, Aqeel-ur Rehman, Nouman M. Durrani, Sadiq ur Rehman:
A Generic Approach for Wheat Disease Classification and Verification Using Expert Opinion for Knowledge-Based Decisions. IEEE Access 9: 31104-31129 (2021) - [j24]Hafiz Umar Iftikhar, Aqeel-ur Rehman, Olga A. Kalugina, Qasim Umer, Haris Ali Khan:
Deep Learning-Based Correct Answer Prediction for Developer Forums. IEEE Access 9: 128166-128177 (2021) - [j23]Aqeel-ur Rehman, Xiaofeng Liao, Huiwei Wang:
An innovative technique for image encryption using tri-partite graph and chaotic maps. Multim. Tools Appl. 80(14): 21979-22005 (2021) - [j22]Aqeel-ur Rehman, Aqeel Raza Syed, Iqbal Uddin Khan, Ali Akber Mustafa, Muhammad Bilal Anwer, Umer Amir Ali:
IoT-Enabled Smart Socket. Wirel. Pers. Commun. 116(2): 1151-1169 (2021) - [j21]Tabassum Waheed, Aqeel-ur Rehman, Faisal Karim, Sayeed Ghani:
QoS Enhancement of AODV Routing for MBANs. Wirel. Pers. Commun. 116(2): 1379-1406 (2021) - 2020
- [j20]Syed Ali Abbas, Aqeel-ur Rehman, Fiaz Majeed, Abdul Majid, Muhamad Sheraz Arshed Malik, Syed Zaki Hassan Kazmi, Seemab Zafar:
Performance Analysis of Classification Algorithms on Birth Dataset. IEEE Access 8: 102146-102154 (2020) - [j19]Syed Ali Abbas, Adil Aslam, Aqeel-ur Rehman, Wajid Arshad Abbasi, Saeed Arif Shah, Syed Zaki Hassan Kazmi:
K-Means and K-Medoids: Cluster Analysis on Birth Data Collected in City Muzaffarabad, Kashmir. IEEE Access 8: 151847-151855 (2020) - [j18]Aqeel-ur Rehman, Amnah Firdous, Salman Iqbal, Zahid Abbas, Malik Muhammad Ali Shahid, Huiwei Wang, Farman Ullah:
A Color Image Encryption Algorithm Based on One Time Key, Chaos Theory, and Concept of Rotor Machine. IEEE Access 8: 172275-172295 (2020) - [j17]Salman Iqbal, Miss Laiha Mat Kiah, Aqeel-ur Rehman, Zahid Abbas, Babak Daghighi:
DM-GKM: A key management scheme for dynamic group based applications. Comput. Networks 182: 107476 (2020) - [j16]Abdul Hafeez Khan, Syed Ali Abbas, Aqeel-ur Rehman:
Ontology-based transformation and verification of uml class model. Int. Arab J. Inf. Technol. 17(5): 758-768 (2020)
2010 – 2019
- 2019
- [j15]Aqeel-ur Rehman, Huiwei Wang, Malik Muhammad Ali Shahid, Salman Iqbal, Zahid Abbas, Amnah Firdous:
A Selective Cross-Substitution Technique for Encrypting Color Images Using Chaos, DNA Rules and SHA-512. IEEE Access 7: 162786-162802 (2019) - [j14]Aqeel-ur Rehman, Xiaofeng Liao:
A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2. Multim. Tools Appl. 78(2): 2105-2133 (2019) - [j13]Aqeel-ur Rehman, Di Xiao, Ayesha Kulsoom, Muntazim Abbas Hashmi, Syed Ali Abbas:
Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. Multim. Tools Appl. 78(7): 9355-9382 (2019) - [j12]Amnah Firdous, Aqeel-ur Rehman, Malik Muhammad Saad Missen:
A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2. Multim. Tools Appl. 78(17): 24809-24835 (2019) - [j11]Aqeel-ur Rehman, Sadiq ur Rehman, Haris Raheem:
Sinkhole Attacks in Wireless Sensor Networks: A Survey. Wirel. Pers. Commun. 106(4): 2291-2313 (2019) - 2018
- [j10]Abdul Hafeez Khan, Sayed Hyder Abbas Musavi, Aqeel-ur Rehman, Asadullah Shaikh:
Ontology-Based Finite Satisfiability of UML Class Model. IEEE Access 6: 3040-3050 (2018) - 2017
- [c4]Aqeel-ur Rehman, Iqbal Uddin Khan, S. M. Kashif Alam, Ahmar Murtaza:
Bio-inspired energy harvesting in WSN: a survey. ICC 2017: 145:1-145:9 - [i1]Noman Islam, Zubair Ahmed Shaikh, Aqeel-ur Rehman, Muhammad Shahab Siddiqui:
HANDY: A Hybrid Association Rules Mining Approach for Network Layer Discovery of Services for Mobile Ad hoc Network. CoRR abs/1710.02035 (2017) - 2016
- [j9]Aqeel-ur Rehman, Sadiq ur Rehman, Iqbal Uddin Khan, Muzaffar Moiz, Sarmad Hasan:
Security and Privacy Issues in IoT. Int. J. Commun. Networks Inf. Secur. 8(3) (2016) - [j8]Shahrukh Khalid, Athar Mahboob, Choudhry Fahad Azim, Aqeel-ur Rehman:
IDHOCNET: A Novel ID Centric Architecture for Ad Hoc Networks. J. Comput. Networks Commun. 2016: 6438584:1-6438584:18 (2016) - [j7]Ayesha Kulsoom, Di Xiao, Aqeel-ur Rehman, Syed Ali Abbas:
An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multim. Tools Appl. 75(1): 1-23 (2016) - [j6]Aqeel-ur Rehman, Xiaofeng Liao, Ayesha Kulsoom, Sami Ullah:
A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Multim. Tools Appl. 75(18): 11241-11266 (2016) - [c3]Ashraf Ali Waseem, Zubair Ahmed Shaikh, Aqeel-ur Rehman:
A Toolkit for Prototype Implementation of E-Governance Service System Readiness Assessment Framework. HCI (22) 2016: 259-270 - 2015
- [j5]Shahrukh Khalid, Athar Mahboob, Choudhry Fahad Azim, Aqeel-ur Rehman:
IDHOCNET-A Novel Protocol Stack and Architecture for Ad hoc Networks. Int. J. Commun. Networks Inf. Secur. 7(1) (2015) - [j4]Aqeel-ur Rehman, Xiaofeng Liao, Ayesha Kulsoom, Syed Ali Abbas:
Selective encryption for gray images based on chaos and DNA complementary rules. Multim. Tools Appl. 74(13): 4655-4677 (2015) - 2014
- [j3]Aqeel-ur Rehman, Abu Zafar Abbasi, Noman Islam, Zubair Ahmed Shaikh:
A review of wireless sensors and networks' applications in agriculture. Comput. Stand. Interfaces 36(2): 263-270 (2014) - 2013
- [j2]Noman Islam, Zubair Ahmed Shaikh, Aqeel-ur Rehman, Muhammad Shahab Siddiqui:
HANDY: a hybrid association rules mining approach for network layer discovery of services for mobile ad hoc network. Wirel. Networks 19(8): 1961-1977 (2013) - [c2]Waleej Haider, Aqeel-ur Rehman, Nouman M. Durrani:
Towards decision support model for ubiquitous agriculture. ICDIM 2013: 308-313 - 2011
- [j1]Saleem-Ullah Lar, Xiaofeng Liao, Aqeel-ur Rehman, Ma Qinglu:
Proactive Security Mechanism and Design for Firewall. J. Information Security 2(3): 122-130 (2011)
2000 – 2009
- 2008
- [c1]Aqeel-ur Rehman, Abu Zafar Abbasi, Zubair Ahmed Shaikh:
Building a Smart University Using RFID Technology. CSSE (5) 2008: 641-644
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint