default search action
Javed Ahmed
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j13]Soonh Taj, Ali Shariq Imran, Zenun Kastrati, Sher Muhammad Daudpota, Raheel Ahmed Memon, Javed Ahmed:
IoT-based supply chain management: A systematic literature review. Internet Things 24: 100982 (2023) - 2021
- [j12]Ferhat Özgür Çatak, Javed Ahmed, Kevser Sahinbas, Zahid Hussain Khand:
Data augmentation based malware detection using convolutional neural networks. PeerJ Comput. Sci. 7: e346 (2021) - 2020
- [j11]Ali Rashid, Yunfeng Peng, Ahmad Ali, Haider Ali, Naeem Akhter, Javed Ahmed, Abdul Jalil:
Passive Autofocusing System for a Thermal Camera. IEEE Access 8: 130014-130022 (2020) - [j10]Ferhat Özgür Çatak, Ahmet Faruk Yazi, Ogerta Elezaj, Javed Ahmed:
Deep learning based Sequential model for malware analysis using Windows exe API Calls. PeerJ Comput. Sci. 6: e285 (2020) - 2019
- [j9]Javed Ahmed, Serena Villata, Guido Governatori:
Information and friend segregation for online social networks: a user study. AI Soc. 34(4): 753-766 (2019) - [j8]Zahoor Ahmed Soomro, Javed Ahmed, Mahmood Hussain Shah, Khalil Khoumbati:
Investigating identity fraud management practices in e-tail sector: a systematic review. J. Enterp. Inf. Manag. 32(2): 301-324 (2019) - 2016
- [j7]Ahmad Ali, Abdul Jalil, Jianwei Niu, Xiaoke Zhao, Saima Rathore, Javed Ahmed, Muhammad Aksam Iftikhar:
Visual object tracking - classical and contemporary approaches. Frontiers Comput. Sci. 10(1): 167-188 (2016) - [j6]Zahoor Ahmed Soomro, Mahmood Hussain Shah, Javed Ahmed:
Information security management needs more holistic approach: A literature review. Int. J. Inf. Manag. 36(2): 215-225 (2016) - [j5]Javed Ahmed, Ahmad Ali, Asifullah Khan:
Stabilized active camera tracking system. J. Real Time Image Process. 11(2): 315-334 (2016) - 2015
- [j4]Jonghwan Lee, Sung Ung Moon, Yong Seung Lee, Bahy A. Ali, Abdulaziz A. Al-Khedhairy, Daoud Ali, Javed Ahmed, Abdullah M. Al Salem, Soonhag Kim:
Quantum Dot-Based Molecular Beacon to Monitor Intracellular MicroRNAs. Sensors 15(6): 12872-12883 (2015) - [j3]Ahmad Ali, Abdul Jalil, Javed Ahmed, Muhammad Aksam Iftikhar, Mutawarra Hussain:
Correlation, Kalman filter and adaptive fast mean shift based heuristic approach for robust visual tracking. Signal Image Video Process. 9(7): 1567-1585 (2015) - 2013
- [j2]Javed Ahmed, Sadaf Abbasi, M. Zakir Shaikh:
Fast spatiotemporal MACH filter for action recognition. Mach. Vis. Appl. 24(5): 909-918 (2013) - 2008
- [j1]Javed Ahmed, M. Noman Jafri, Mubarak Shah, Muhammad Akbar:
Real-time edge-enhanced dynamic correlation and predictive open-loop car-following control for robust tracking. Mach. Vis. Appl. 19(1): 1-25 (2008)
Conference and Workshop Papers
- 2020
- [c16]Javed Ahmed, Sule Yildirim, Mariusz Nowostaki, Raghvendra Ramachandra, Ogerta Elezaj, Mohamad Abomohara:
GDPR Compliant Consent Driven Data Protection in Online Social Networks: A Blockchain-Based Approach. ICICT 2020: 307-312 - 2019
- [c15]Ogerta Elezaj, Sule Yildirim Yayilgan, Mohamed Abomhara, Prosper Kandabongee Yeng, Javed Ahmed:
Data-Driven Intrusion Detection System for Small and Medium Enterprises. CAMAD 2019: 1-7 - [c14]Ogerta Elezaj, Sule Yildirim Yayilgan, Edlira Kalemi, Linda Wendelberg, Mohamed Abomhara, Javed Ahmed:
Towards Designing a Knowledge Graph-Based Framework for Investigating and Preventing Crime on Online Social Networks. e-Democracy 2019: 181-195 - 2017
- [c13]Aasma Shahid, Alina Tayyab, Musfira Mehmood, Rida Anum, Abdul Jalil, Ahmad Ali, Haider Ali, Javed Ahmed:
Computer vision based intruder detection framework (CV-IDF). ICCCS 2017: 41-45 - [c12]Arooj Nawaz, Irsa Kanwal, Sidra Idrees, Rida Imtiaz, Abdul Jalil, Ahmad Ali, Javed Ahmed:
Fusion of color and infrared images using gradient transfer and total variation minimization. ICCCS 2017: 82-85 - [c11]Babar Sultan, Javed Ahmed, Abdul Jalil, Hamza Nazir, M. Safeer-Ul-Azeem Abbasi, Jawad Shah, Ahmad Ali, Haider Ali:
Translation and rotation invariant video stabilization for real time applications. ICSIPA 2017: 479-484 - 2016
- [c10]Javed Ahmed:
A Semantic Model for Friend Segregation in Online Social Networks. ICWE 2016: 495-500 - [c9]Ahmad Ali, Abdul Jalil, Javed Ahmed:
A new template updating method for correlation tracking. IVCNZ 2016: 1-6 - [c8]Javed Ahmed:
Privacy in Online Social Networks: An Ontological Model for Self-Presentation. KESW 2016: 56-70 - 2014
- [c7]Javed Ahmed, Guido Governatori, Leendert W. N. van der Torre, Serena Villata:
Social Interaction Based Audience Segregation for Online Social Networks. ECSI 2014: 186-197 - [c6]Javed Ahmed:
A Privacy Protection Model for Online Social Networks. SW4LAW+DC@JURIX 2014 - 2009
- [c5]Muhammad Imran Khan, Javed Ahmed, Ahmad Ali, Asif Masood:
Robust Edge-Enhanced Fragment Based Normalized Correlation Tracking in Cluttered and Occluded Imagery. FGIT-SIP 2009: 169-176 - 2008
- [c4]Mikel D. Rodriguez, Javed Ahmed, Mubarak Shah:
Action MACH a spatio-temporal Maximum Average Correlation Height filter for action recognition. CVPR 2008 - [c3]Javed Ahmed, M. Noman Jafri:
Decaying extension based phase correlation for robust object localization in full search space. EUSIPCO 2008: 1-5 - [c2]Javed Ahmed, M. Noman Jafri:
Improved Phase Correlation Matching. ICISP 2008: 128-135 - 2007
- [c1]Javed Ahmed, Mubarak Shah, Andrew Miller, Don Harper, M. Noman Jafri:
A Vision-Based System for a UGV to Handle a Road Intersection. AAAI 2007: 1077-1082
Informal and Other Publications
- 2020
- [i1]Ferhat Özgür Çatak, Javed Ahmed, Kevser Sahinbas, Zahid Hussain Khand:
Data Augmentation Based Malware Detection using Convolutional Neural Networks. CoRR abs/2010.01862 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint