Follow
Jan Sher Khan
Title
Cited by
Cited by
Year
Chaos based efficient selective image encryption
JS Khan, J Ahmad
Multidimensional Systems and Signal Processing 30, 943-961, 2019
2082019
A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices
J Ahmad, MA Khan, SO Hwang, JS Khan
Neural Computing and Applications, 1-15, 2016
922016
An efficient image encryption scheme based on: Henon map, skew tent map and S-Box
J Khan, J Ahmad, SO Hwang
2015 6th International Conference on Modeling, Simulation, and Applied …, 2015
822015
A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation
J Ahmad, MA Khan, F Ahmed, JS Khan
Neural Computing and Applications 30, 3847-3857, 2018
802018
DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption
JS Khan, W Boulila, J Ahmad, S Rubaiee, AU Rehman, R Alroobaea, ...
IEEE Access 8, 159732-159744, 2020
752020
A new image encryption scheme based on dynamic s-boxes and chaotic maps
AU Rehman, JS Khan, J Ahmad, SO Hwang
3D Research 7, 1-8, 2016
622016
A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S 8 permutation
FA Khan, J Ahmed, JS Khan, J Ahmad, MA Khan
Journal of Intelligent & Fuzzy Systems 33 (6), 3753-3765, 2017
612017
Chaos and compressive sensing based novel image encryption scheme
JS Khan, SK Kayhan
Journal of Information Security and Applications 58, 102711, 2021
532021
DNA key based visual chaotic image encryption
JS Khan, J Ahmad, SS Ahmed, HA Siddiqa, SF Abbasi, SK Kayhan
Journal of Intelligent & Fuzzy Systems 37 (2), 2549-2561, 2019
472019
Visual meaningful encryption scheme using intertwinning logistic map
SF Abbasi, J Ahmad, JS Khan, MA Khan, SA Sheikh
Intelligent Computing: Proceedings of the 2018 Computing Conference, Volume …, 2019
442019
Td-ercs map-based confusion and diffusion of autocorrelated data
JS Khan, J Ahmad, MA Khan
Nonlinear Dynamics 87, 93-107, 2017
412017
A new chaos-based secure image encryption scheme using multiple substitution boxes
JS Khan, A ur Rehman, J Ahmad, Z Habib
2015 Conference on Information Assurance and Cyber Security (CIACS), 16-21, 2015
332015
Intrusion detection using machine learning techniques: an experimental comparison
KA Tait, JS Khan, F Alqahtani, AA Shah, FA Khan, MU Rehman, W Boulila, ...
2021 International Congress of Advanced Technology and Engineering (ICOTEN …, 2021
312021
A novel substitution box for encryption based on Lorenz equations
FA Khan, J Ahmed, JS Khan, J Ahmad, MA Khan
2017 International Conference on Circuits, System and Simulation (ICCSS), 32-36, 2017
302017
An Improved Image Encryption Scheme Based on a Non-Linear Chaotic Algorithm and Substitution Boxes
JS Khan, MA Khan, J Ahmad, SO Hwang, W Ahmed
Informatica 28 (4), 629-649, 2017
262017
Network Intrusion Detection Leveraging Machine Learning and Feature Selection
A Ali, S Shaukat, M Tayyab, MA Khan, JS Khan, J Ahmad
2020 IEEE 17th International Conference on Smart Communities: Improving …, 2020
232020
DNA Sequence Based Medical Image Encryption Scheme
JS Khan, J Ahmad, SF Abbasi, SK Kayhan
2018 10th Computer Science and Electronic Engineering (CEEC), 24-29, 2018
232018
A new technique for designing 8× 8 substitution box for image encryption applications
FA Khan, J Ahmed, JS Khan, J Ahmad, MA Khan, SO Hwang
2017 9th Computer Science and Electronic Engineering (CEEC), 7-12, 2017
212017
Secure speech communication algorithm via DCT and TD-ERCS chaotic map
Z Habib, JS Khan, J Ahmad, MA Khan, FA Khan
2017 4th International Conference on Electrical and Electronic Engineering …, 2017
212017
A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map
F Masood, W Boulila, A Alsaeedi, JS Khan, J Ahmad, MA Khan, ...
Multimedia Tools and Applications 81 (21), 30931-30959, 2022
202022
The system can't perform the operation now. Try again later.
Articles 1–20