


default search action
Mamoona Naveed Asghar
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
 [j32]Muhammad Sher Afgan [j32]Muhammad Sher Afgan , Bin Liu, Mamoona Naveed Asghar , Bin Liu, Mamoona Naveed Asghar , Wajahat Khalid , Wajahat Khalid , Kai Zou, Dianmo Sheng: , Kai Zou, Dianmo Sheng:
 FaceExpr: Personalized facial expression generation via attention-focused U-Net feature fusion in diffusion models. Inf. Fusion 125: 103431 (2026)
- 2025
 [j31]Rana Zeeshan [j31]Rana Zeeshan , John Bogue , John Bogue , Mamoona Naveed Asghar , Mamoona Naveed Asghar : :
 Relative Applicability of Diverse Automatic Speech Recognition Platforms for Transcription of Psychiatric Treatment Sessions. IEEE Access 13: 117343-117354 (2025)
 [j30]Ifeoluwapo Aribilola [j30]Ifeoluwapo Aribilola , Saeed Hamood Alsamhi, John G. Breslin , Saeed Hamood Alsamhi, John G. Breslin , Mamoona Naveed Asghar , Mamoona Naveed Asghar : :
 SuPOR: A lightweight stream cipher for confidentiality and attack-resilient visual data security in IoT. Int. J. Crit. Infrastructure Prot. 50: 100786 (2025)
 [c12]Teerath Kumar, Susan Leavy [c12]Teerath Kumar, Susan Leavy , Patrick Eustace, Edward Curry, Mamoona Naveed Asghar: , Patrick Eustace, Edward Curry, Mamoona Naveed Asghar:
 A Review of Deep Packet Inspection for Network Security: From Traditional Techniques to Machine Learning Integration. ARES (Workshops 4) 2025: 185-202
 [c11]Ifeoluwapo Aribilola [c11]Ifeoluwapo Aribilola , Matteo Catena , Matteo Catena , Mamoona Naveed Asghar , Mamoona Naveed Asghar , John G. Breslin , John G. Breslin , Renaud Delbru , Renaud Delbru : :
 Building Realistic Ground Truth Datasets of Personal Identification Information for Entity Matching. ARES (Workshops 4) 2025: 203-218
- 2024
 [j29]Ifeoluwapo Aribilola [j29]Ifeoluwapo Aribilola , Brian Lee, Mamoona Naveed Asghar , Brian Lee, Mamoona Naveed Asghar : :
 Möbius Transformation and Permutation Based S-Box to Enhance IoT Multimedia Security. IEEE Access 12: 140792-140808 (2024)
 [j28]Muhammad Jehanzaib Yousuf [j28]Muhammad Jehanzaib Yousuf , Brian Lee, Mamoona Naveed Asghar , Brian Lee, Mamoona Naveed Asghar , Mohammad Samar Ansari, Nadia Kanwal , Mohammad Samar Ansari, Nadia Kanwal : :
 Unlocking Trust: Advancing Activity Recognition in Video Imagery. IEEE Access 12: 176799-176817 (2024)
 [j27]Ifeoluwapo Aribilola [j27]Ifeoluwapo Aribilola , Brian Lee, Mamoona Naveed Asghar , Brian Lee, Mamoona Naveed Asghar : :
 Pixel tampering detection in encrypted surveillance videos on resource-constrained devices. Internet Things 25: 101058 (2024)
 [c10]Amna Shifa [c10]Amna Shifa , Rónán Kennedy , Rónán Kennedy , Mamoona Naveed Asghar , Mamoona Naveed Asghar : :
 GDPR-compliant Video Search and Retrieval System for Surveillance Data. ARES 2024: 163:1-163:6
 [i5]Mugheez Asif, Abdul Manan, Abdul Moiz ur Rehman, Mamoona Naveed Asghar, Muhammad Umair: [i5]Mugheez Asif, Abdul Manan, Abdul Moiz ur Rehman, Mamoona Naveed Asghar, Muhammad Umair:
 AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent. CoRR abs/2408.04281 (2024)
- 2023
 [j26]Mehwish Tahir [j26]Mehwish Tahir , Yuansong Qiao , Yuansong Qiao , Nadia Kanwal , Nadia Kanwal , Brian Lee, Mamoona Naveed Asghar , Brian Lee, Mamoona Naveed Asghar : :
 Real-Time Event-Driven Road Traffic Monitoring System Using CCTV Video Analytics. IEEE Access 11: 139097-139111 (2023)
 [j25]Mehwish Tahir [j25]Mehwish Tahir , Yuansong Qiao , Yuansong Qiao , Nadia Kanwal , Nadia Kanwal , Brian Lee , Brian Lee , Mamoona Naveed Asghar , Mamoona Naveed Asghar : :
 Privacy Preserved Video Summarization of Road Traffic Events for IoT Smart Cities. Cryptogr. 7(1): 7 (2023)
 [j24]Ifeoluwapo Aribilola [j24]Ifeoluwapo Aribilola , Mamoona Naveed Asghar , Mamoona Naveed Asghar , Nadia Kanwal , Nadia Kanwal , Martin Fleury , Martin Fleury , Brian Lee: , Brian Lee:
 SecureCam: Selective Detection and Encryption Enabled Application for Dynamic Camera Surveillance Videos. IEEE Trans. Consumer Electron. 69(2): 156-169 (2023)
 [j23]Saima Abdullah [j23]Saima Abdullah , Mamoona Naveed Asghar , Mamoona Naveed Asghar , Martin Fleury, Zaigham Mushtaq: , Martin Fleury, Zaigham Mushtaq:
 Network-Coding-Enabled and QoS-Aware Message Delivery for Wireless Sensor Networks. Wirel. Pers. Commun. 132(1): 329-359 (2023)
 [c9]Mehwish Tahir, Yuansong Qiao, Nadia Kanwal, Brian Lee, Mamoona Naveed Asghar [c9]Mehwish Tahir, Yuansong Qiao, Nadia Kanwal, Brian Lee, Mamoona Naveed Asghar : :
 VidSearch: Privacy-by-Design Video Search and Retrieval System for Large-Scale CCTV Data. ICMLA 2023: 2182-2187
- 2022
 [j22]Syed Sahil Abbas Zaidi [j22]Syed Sahil Abbas Zaidi , Mohammad Samar Ansari , Mohammad Samar Ansari , Asra Aslam , Asra Aslam , Nadia Kanwal, Mamoona Naveed Asghar , Nadia Kanwal, Mamoona Naveed Asghar , Brian Lee: , Brian Lee:
 A survey of modern deep learning based object detection models. Digit. Signal Process. 126: 103514 (2022)
 [j21]Syeda Maria Gillani [j21]Syeda Maria Gillani , Mamoona Naveed Asghar , Mamoona Naveed Asghar , Amna Shifa , Amna Shifa , Saima Abdullah , Saima Abdullah , Nadia Kanwal , Nadia Kanwal , Martin Fleury , Martin Fleury : :
 VQProtect: Lightweight Visual Quality Protection for Error-Prone Selectively Encrypted Video Streaming. Entropy 24(6): 755 (2022)
 [i4]Ifeoluwapo Aribilola, Mamoona Naveed Asghar, Brian Lee: [i4]Ifeoluwapo Aribilola, Mamoona Naveed Asghar, Brian Lee:
 DEMIS: A Threat Model for Selectively Encrypted Visual Surveillance Data. CoRR abs/2210.14622 (2022)
- 2021
 [j20]Sidra Rafique [j20]Sidra Rafique , Nadia Kanwal , Nadia Kanwal , Irfan Karamat, Mamoona Naveed Asghar , Irfan Karamat, Mamoona Naveed Asghar , Martin Fleury , Martin Fleury : :
 Towards Estimation of Emotions From Eye Pupillometry With Low-Cost Devices. IEEE Access 9: 5354-5370 (2021)
 [j19]Muhammad Bukhsh [j19]Muhammad Bukhsh , Saima Abdullah , Saima Abdullah , Abdul Rahman, Mamoona Naveed Asghar , Abdul Rahman, Mamoona Naveed Asghar , Humaira Arshad , Humaira Arshad , Abdulatif Alabdulatif , Abdulatif Alabdulatif : :
 An Energy-Aware, Highly Available, and Fault-Tolerant Method for Reliable IoT Systems. IEEE Access 9: 145363-145381 (2021)
 [j18]Neelam Gohar, Sidra Niaz, Mamoona Naveed Asghar [j18]Neelam Gohar, Sidra Niaz, Mamoona Naveed Asghar , Salma Noor: , Salma Noor:
 Analysis of Iterative Process for Nauru Voting System. Intell. Autom. Soft Comput. 28(1): 241-259 (2021)
 [c8]Mehwish Tahir, Mamoona Naveed Asghar [c8]Mehwish Tahir, Mamoona Naveed Asghar , Nadia Kanwal, Brian Lee, Yuansong Qiao: , Nadia Kanwal, Brian Lee, Yuansong Qiao:
 Joint Crypto-Blockchain Scheme for Trust-Enabled CCTV Videos Sharing. Blockchain 2021: 1-6
 [c7]Mamoona Naveed Asghar, Mohammad Samar Ansari, Nadia Kanwal, Brian Lee, Marco Herbst, Yuansong Qiao: [c7]Mamoona Naveed Asghar, Mohammad Samar Ansari, Nadia Kanwal, Brian Lee, Marco Herbst, Yuansong Qiao:
 Deep Learning based Effective Identification of EU-GDPR Compliant Privacy Safeguards in Surveillance Videos. DASC/PiCom/CBDCom/CyberSciTech 2021: 819-824
 [c6]P. Zamorski, Mamoona Naveed Asghar [c6]P. Zamorski, Mamoona Naveed Asghar , L. Cooke, S. Daly, J. Francis, Nadia Kanwal, Mohammad Samar Ansari, Enda Fallon , L. Cooke, S. Daly, J. Francis, Nadia Kanwal, Mohammad Samar Ansari, Enda Fallon : :
 Deep Learning based Customer Count/Flow Monitoring System for Social Distancing. DASC/PiCom/CBDCom/CyberSciTech 2021: 831-836
 [c5]Iram Arshad [c5]Iram Arshad , Mamoona Naveed Asghar , Mamoona Naveed Asghar , Yuansong Qiao , Yuansong Qiao , Brian Lee, Yuhang Ye: , Brian Lee, Yuhang Ye:
 Pixdoor: A Pixel-space Backdoor Attack on Deep Learning Models. EUSIPCO 2021: 681-685
 [c4]Mohammad Sarim, Mohammad Samar Ansari, Nadia Kanwal, Mamoona Naveed Asghar [c4]Mohammad Sarim, Mohammad Samar Ansari, Nadia Kanwal, Mamoona Naveed Asghar : :
 Improved Privacy-Ensuring Data-Fusion and Service Recommendation for Users in Smart Cities. ISC2 2021: 1-7
 [i3]Syed Sahil Abbas Zaidi, Mohammad Samar Ansari, Asra Aslam, Nadia Kanwal, Mamoona Naveed Asghar, Brian Lee: [i3]Syed Sahil Abbas Zaidi, Mohammad Samar Ansari, Asra Aslam, Nadia Kanwal, Mamoona Naveed Asghar, Brian Lee:
 A Survey of Modern Deep Learning based Object Detection Models. CoRR abs/2104.11892 (2021)
- 2020
 [j17]Nadia Kanwal [j17]Nadia Kanwal , Mamoona Naveed Asghar , Mamoona Naveed Asghar , Mohammad Samar Ansari , Mohammad Samar Ansari , Martin Fleury , Martin Fleury , Brian Lee , Brian Lee , Marco Herbst, Yuansong Qiao , Marco Herbst, Yuansong Qiao : :
 Preserving Chain-of-Evidence in Surveillance Videos for Authentication and Trust-Enabled Sharing. IEEE Access 8: 153413-153424 (2020)
 [j16]Amna Shifa [j16]Amna Shifa , Mamoona Naveed Asghar , Mamoona Naveed Asghar , Martin Fleury , Martin Fleury , Nadia Kanwal , Nadia Kanwal , Mohammad Samar Ansari , Mohammad Samar Ansari , Brian Lee , Brian Lee , Marco Herbst, Yuansong Qiao , Marco Herbst, Yuansong Qiao : :
 MuLViS: Multi-Level Encryption Based Security System for Surveillance Videos. IEEE Access 8: 177131-177155 (2020)
 [j15]Rizwan Ali Shah [j15]Rizwan Ali Shah , Mamoona Naveed Asghar , Mamoona Naveed Asghar , Saima Abdullah , Saima Abdullah , Nadia Kanwal , Nadia Kanwal , Martin Fleury , Martin Fleury : :
 SLEPX: An Efficient Lightweight Cipher for Visual Protection of Scalable HEVC Extension. IEEE Access 8: 187784-187807 (2020)
 [j14]Amna Shifa [j14]Amna Shifa , Muhammad Babar Imtiaz , Muhammad Babar Imtiaz , Mamoona Naveed Asghar , Mamoona Naveed Asghar , Martin Fleury: , Martin Fleury:
 Skin detection and lightweight encryption for privacy protection in real-time surveillance applications. Image Vis. Comput. 94: 103859 (2020)
 [j13]Amna Shifa [j13]Amna Shifa , Mamoona Naveed Asghar , Mamoona Naveed Asghar , Adeel Ahmed , Adeel Ahmed , Martin Fleury: , Martin Fleury:
 Fuzzy-logic threat classification for multi-level selective encryption over real-time video streams. J. Ambient Intell. Humaniz. Comput. 11(11): 5369-5397 (2020)
 [j12]Saima Abdullah [j12]Saima Abdullah , Mamoona Naveed Asghar , Mamoona Naveed Asghar , Mashavia Ashraf, Naila Abbas: , Mashavia Ashraf, Naila Abbas:
 An Energy-Efficient Message Scheduling Algorithm with Joint Routing Mechanism at Network Layer in Internet of Things Environment. Wirel. Pers. Commun. 111(3): 1821-1835 (2020)
 [c3]Nadia Kanwal, Mamoona Naveed Asghar, Mohammad Samar Ansari, Brian Lee [c3]Nadia Kanwal, Mamoona Naveed Asghar, Mohammad Samar Ansari, Brian Lee , Martin Fleury, Marco Herbst, Yuansong Qiao: , Martin Fleury, Marco Herbst, Yuansong Qiao:
 Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing. DASC/PiCom/CBDCom/CyberSciTech 2020: 257-264
2010 – 2019
- 2019
 [j11]Mamoona Naveed Asghar [j11]Mamoona Naveed Asghar , Nadia Kanwal , Nadia Kanwal , Brian Lee , Brian Lee , Martin Fleury, Marco Herbst, Yuansong Qiao , Martin Fleury, Marco Herbst, Yuansong Qiao : :
 Visual Surveillance Within the EU General Data Protection Regulation: A Technology Perspective. IEEE Access 7: 111709-111726 (2019)
 [j10]Rizwan Ali Shah [j10]Rizwan Ali Shah , Mamoona Naveed Asghar , Mamoona Naveed Asghar , Saima Abdullah , Saima Abdullah , Martin Fleury , Martin Fleury , Neelam Gohar: , Neelam Gohar:
 Effectiveness of crypto-transcoding for H.264/AVC and HEVC video bit-streams. Multim. Tools Appl. 78(15): 21455-21484 (2019)
 [j9]Amna Shifa [j9]Amna Shifa , Mamoona Naveed Asghar , Mamoona Naveed Asghar , Salma Noor, Neelam Gohar , Salma Noor, Neelam Gohar , Martin Fleury: , Martin Fleury:
 Lightweight Cipher for H.264 Videos in the Internet of Multimedia Things with Encryption Space Ratio Diagnostics. Sensors 19(5): 1228 (2019)
 [i2]Amna Shifa, Mamoona Naveed Asghar, Naila Batool, Martin Fleury: [i2]Amna Shifa, Mamoona Naveed Asghar, Naila Batool, Martin Fleury:
 Efficient Lightweight Encryption Algorithm for Smart Video Applications. CoRR abs/1901.08344 (2019)
 [i1]Rizwan Ali Shah, Mamoona Naveed Asghar, Saima Abdullah, Martin Fleury, Neelam Gohar: [i1]Rizwan Ali Shah, Mamoona Naveed Asghar, Saima Abdullah, Martin Fleury, Neelam Gohar:
 Effectiveness of Crypto-Transcoding for H.264/AVC and HEVC Video Bit-streams. CoRR abs/1902.06990 (2019)
- 2018
 [j8]Amna Shifa [j8]Amna Shifa , Muhammad S. Afgan , Muhammad S. Afgan , Mamoona Naveed Asghar , Mamoona Naveed Asghar , Martin Fleury, Imran Memon, Saima Abdullah , Martin Fleury, Imran Memon, Saima Abdullah , Nadia Rasheed , Nadia Rasheed : :
 Joint Crypto-Stego Scheme for Enhanced Image Protection With Nearest-Centroid Clustering. IEEE Access 6: 16189-16206 (2018)
 [j7]Nadia Rasheed [j7]Nadia Rasheed , Shamsudin H. M. Amin, Umbrin Sultana, Abdul Rauf Bhatti , Shamsudin H. M. Amin, Umbrin Sultana, Abdul Rauf Bhatti , Mamoona Naveed Asghar , Mamoona Naveed Asghar : :
 Extension of grounding mechanism for abstract words: computational methods insights. Artif. Intell. Rev. 50(3): 467-494 (2018)
- 2017
 [j6]Mamoona Naveed Asghar [j6]Mamoona Naveed Asghar , Rukhsana Kousar, Hooriya Majid, Martin Fleury: , Rukhsana Kousar, Hooriya Majid, Martin Fleury:
 Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes. J. Vis. Commun. Image Represent. 45: 122-136 (2017)
 [j5]Mamoona Naveed Asghar [j5]Mamoona Naveed Asghar , Martin Fleury , Martin Fleury , Sohail Makki: , Sohail Makki:
 Interoperable conditional access with video selective encryption for portable devices. Multim. Tools Appl. 76(11): 13139-13152 (2017)
- 2015
 [j4]Mamoona Naveed Asghar [j4]Mamoona Naveed Asghar , Mohammed Ghanbari , Mohammed Ghanbari , Martin Fleury, Martin J. Reed: , Martin Fleury, Martin J. Reed:
 Sufficient encryption based on entropy coding syntax elements of H.264/SVC. Multim. Tools Appl. 74(23): 10215-10241 (2015)
- 2014
 [j3]Mamoona Naveed Asghar [j3]Mamoona Naveed Asghar , Mohammed Ghanbari , Mohammed Ghanbari , Martin Fleury, Martin J. Reed: , Martin Fleury, Martin J. Reed:
 Confidentiality of a selectively encrypted H.264 coded video bit-stream. J. Vis. Commun. Image Represent. 25(2): 487-498 (2014)
- 2013
 [j2]Mamoona Naveed Asghar [j2]Mamoona Naveed Asghar , Mohammad Ghanbari , Mohammad Ghanbari : :
 An Efficient Security System for CABAC Bin-Strings of H.264/SVC. IEEE Trans. Circuits Syst. Video Technol. 23(3): 425-437 (2013)
- 2012
 [j1]Mamoona Naveed Asghar, Mohammad Ghanbari: [j1]Mamoona Naveed Asghar, Mohammad Ghanbari:
 MIKEY for keys management of H.264 scalable video coded layers. J. King Saud Univ. Comput. Inf. Sci. 24(2): 107-116 (2012)
 [c2]Mamoona Naveed Asghar [c2]Mamoona Naveed Asghar , Mohammed Ghanbari , Mohammed Ghanbari , Martin Fleury, Martin J. Reed: , Martin Fleury, Martin J. Reed:
 Efficient selective encryption with H.264/SVC CABAC bin-strings. ICIP 2012: 2645-2648
 [c1]Mamoona Naveed Asghar [c1]Mamoona Naveed Asghar , Mohammad Ghanbari , Mohammad Ghanbari , Martin J. Reed: , Martin J. Reed:
 Sufficient Encryption with Codewords and Bin-strings of H.264/SVC. TrustCom 2012: 443-450
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-28 22:57 CET by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID







