default search action
Mamoona Naveed Asghar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j27]Ifeoluwapo Aribilola, Brian Lee, Mamoona Naveed Asghar:
Möbius Transformation and Permutation Based S-Box to Enhance IoT Multimedia Security. IEEE Access 12: 140792-140808 (2024) - [j26]Ifeoluwapo Aribilola, Brian Lee, Mamoona Naveed Asghar:
Pixel tampering detection in encrypted surveillance videos on resource-constrained devices. Internet Things 25: 101058 (2024) - 2023
- [j25]Mehwish Tahir, Yuansong Qiao, Nadia Kanwal, Brian Lee, Mamoona Naveed Asghar:
Real-Time Event-Driven Road Traffic Monitoring System Using CCTV Video Analytics. IEEE Access 11: 139097-139111 (2023) - [j24]Mehwish Tahir, Yuansong Qiao, Nadia Kanwal, Brian Lee, Mamoona Naveed Asghar:
Privacy Preserved Video Summarization of Road Traffic Events for IoT Smart Cities. Cryptogr. 7(1): 7 (2023) - [j23]Ifeoluwapo Aribilola, Mamoona Naveed Asghar, Nadia Kanwal, Martin Fleury, Brian Lee:
SecureCam: Selective Detection and Encryption Enabled Application for Dynamic Camera Surveillance Videos. IEEE Trans. Consumer Electron. 69(2): 156-169 (2023) - [j22]Saima Abdullah, Mamoona Naveed Asghar, Martin Fleury, Zaigham Mushtaq:
Network-Coding-Enabled and QoS-Aware Message Delivery for Wireless Sensor Networks. Wirel. Pers. Commun. 132(1): 329-359 (2023) - 2022
- [j21]Syed Sahil Abbas Zaidi, Mohammad Samar Ansari, Asra Aslam, Nadia Kanwal, Mamoona Naveed Asghar, Brian Lee:
A survey of modern deep learning based object detection models. Digit. Signal Process. 126: 103514 (2022) - [j20]Syeda Maria Gillani, Mamoona Naveed Asghar, Amna Shifa, Saima Abdullah, Nadia Kanwal, Martin Fleury:
VQProtect: Lightweight Visual Quality Protection for Error-Prone Selectively Encrypted Video Streaming. Entropy 24(6): 755 (2022) - 2021
- [j19]Sidra Rafique, Nadia Kanwal, Irfan Karamat, Mamoona Naveed Asghar, Martin Fleury:
Towards Estimation of Emotions From Eye Pupillometry With Low-Cost Devices. IEEE Access 9: 5354-5370 (2021) - [j18]Muhammad Bukhsh, Saima Abdullah, Abdul Rahman, Mamoona Naveed Asghar, Humaira Arshad, Abdulatif Alabdulatif:
An Energy-Aware, Highly Available, and Fault-Tolerant Method for Reliable IoT Systems. IEEE Access 9: 145363-145381 (2021) - 2020
- [j17]Nadia Kanwal, Mamoona Naveed Asghar, Mohammad Samar Ansari, Martin Fleury, Brian Lee, Marco Herbst, Yuansong Qiao:
Preserving Chain-of-Evidence in Surveillance Videos for Authentication and Trust-Enabled Sharing. IEEE Access 8: 153413-153424 (2020) - [j16]Amna Shifa, Mamoona Naveed Asghar, Martin Fleury, Nadia Kanwal, Mohammad Samar Ansari, Brian Lee, Marco Herbst, Yuansong Qiao:
MuLViS: Multi-Level Encryption Based Security System for Surveillance Videos. IEEE Access 8: 177131-177155 (2020) - [j15]Rizwan Ali Shah, Mamoona Naveed Asghar, Saima Abdullah, Nadia Kanwal, Martin Fleury:
SLEPX: An Efficient Lightweight Cipher for Visual Protection of Scalable HEVC Extension. IEEE Access 8: 187784-187807 (2020) - [j14]Amna Shifa, Muhammad Babar Imtiaz, Mamoona Naveed Asghar, Martin Fleury:
Skin detection and lightweight encryption for privacy protection in real-time surveillance applications. Image Vis. Comput. 94: 103859 (2020) - [j13]Amna Shifa, Mamoona Naveed Asghar, Adeel Ahmed, Martin Fleury:
Fuzzy-logic threat classification for multi-level selective encryption over real-time video streams. J. Ambient Intell. Humaniz. Comput. 11(11): 5369-5397 (2020) - [j12]Saima Abdullah, Mamoona Naveed Asghar, Mashavia Ashraf, Naila Abbas:
An Energy-Efficient Message Scheduling Algorithm with Joint Routing Mechanism at Network Layer in Internet of Things Environment. Wirel. Pers. Commun. 111(3): 1821-1835 (2020) - 2019
- [j11]Mamoona Naveed Asghar, Nadia Kanwal, Brian Lee, Martin Fleury, Marco Herbst, Yuansong Qiao:
Visual Surveillance Within the EU General Data Protection Regulation: A Technology Perspective. IEEE Access 7: 111709-111726 (2019) - [j10]Rizwan Ali Shah, Mamoona Naveed Asghar, Saima Abdullah, Martin Fleury, Neelam Gohar:
Effectiveness of crypto-transcoding for H.264/AVC and HEVC video bit-streams. Multim. Tools Appl. 78(15): 21455-21484 (2019) - [j9]Amna Shifa, Mamoona Naveed Asghar, Salma Noor, Neelam Gohar, Martin Fleury:
Lightweight Cipher for H.264 Videos in the Internet of Multimedia Things with Encryption Space Ratio Diagnostics. Sensors 19(5): 1228 (2019) - 2018
- [j8]Amna Shifa, Muhammad S. Afgan, Mamoona Naveed Asghar, Martin Fleury, Imran Memon, Saima Abdullah, Nadia Rasheed:
Joint Crypto-Stego Scheme for Enhanced Image Protection With Nearest-Centroid Clustering. IEEE Access 6: 16189-16206 (2018) - [j7]Nadia Rasheed, Shamsudin H. M. Amin, Umbrin Sultana, Abdul Rauf Bhatti, Mamoona Naveed Asghar:
Extension of grounding mechanism for abstract words: computational methods insights. Artif. Intell. Rev. 50(3): 467-494 (2018) - 2017
- [j6]Mamoona Naveed Asghar, Rukhsana Kousar, Hooriya Majid, Martin Fleury:
Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes. J. Vis. Commun. Image Represent. 45: 122-136 (2017) - [j5]Mamoona Naveed Asghar, Martin Fleury, Sohail Makki:
Interoperable conditional access with video selective encryption for portable devices. Multim. Tools Appl. 76(11): 13139-13152 (2017) - 2015
- [j4]Mamoona Naveed Asghar, Mohammed Ghanbari, Martin Fleury, Martin J. Reed:
Sufficient encryption based on entropy coding syntax elements of H.264/SVC. Multim. Tools Appl. 74(23): 10215-10241 (2015) - 2014
- [j3]Mamoona Naveed Asghar, Mohammed Ghanbari, Martin Fleury, Martin J. Reed:
Confidentiality of a selectively encrypted H.264 coded video bit-stream. J. Vis. Commun. Image Represent. 25(2): 487-498 (2014) - 2013
- [j2]Mamoona Naveed Asghar, Mohammad Ghanbari:
An Efficient Security System for CABAC Bin-Strings of H.264/SVC. IEEE Trans. Circuits Syst. Video Technol. 23(3): 425-437 (2013) - 2012
- [j1]Mamoona Naveed Asghar, Mohammad Ghanbari:
MIKEY for keys management of H.264 scalable video coded layers. J. King Saud Univ. Comput. Inf. Sci. 24(2): 107-116 (2012)
Conference and Workshop Papers
- 2024
- [c10]Amna Shifa, Rónán Kennedy, Mamoona Naveed Asghar:
GDPR-compliant Video Search and Retrieval System for Surveillance Data. ARES 2024: 163:1-163:6 - 2023
- [c9]Mehwish Tahir, Yuansong Qiao, Nadia Kanwal, Brian Lee, Mamoona Naveed Asghar:
VidSearch: Privacy-by-Design Video Search and Retrieval System for Large-Scale CCTV Data. ICMLA 2023: 2182-2187 - 2021
- [c8]Mehwish Tahir, Mamoona Naveed Asghar, Nadia Kanwal, Brian Lee, Yuansong Qiao:
Joint Crypto-Blockchain Scheme for Trust-Enabled CCTV Videos Sharing. Blockchain 2021: 1-6 - [c7]Mamoona Naveed Asghar, Mohammad Samar Ansari, Nadia Kanwal, Brian Lee, Marco Herbst, Yuansong Qiao:
Deep Learning based Effective Identification of EU-GDPR Compliant Privacy Safeguards in Surveillance Videos. DASC/PiCom/CBDCom/CyberSciTech 2021: 819-824 - [c6]P. Zamorski, Mamoona Naveed Asghar, L. Cooke, S. Daly, J. Francis, Nadia Kanwal, Mohammad Samar Ansari, Enda Fallon:
Deep Learning based Customer Count/Flow Monitoring System for Social Distancing. DASC/PiCom/CBDCom/CyberSciTech 2021: 831-836 - [c5]Iram Arshad, Mamoona Naveed Asghar, Yuansong Qiao, Brian Lee, Yuhang Ye:
Pixdoor: A Pixel-space Backdoor Attack on Deep Learning Models. EUSIPCO 2021: 681-685 - [c4]Mohammad Sarim, Mohammad Samar Ansari, Nadia Kanwal, Mamoona Naveed Asghar:
Improved Privacy-Ensuring Data-Fusion and Service Recommendation for Users in Smart Cities. ISC2 2021: 1-7 - 2020
- [c3]Nadia Kanwal, Mamoona Naveed Asghar, Mohammad Samar Ansari, Brian Lee, Martin Fleury, Marco Herbst, Yuansong Qiao:
Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing. DASC/PiCom/CBDCom/CyberSciTech 2020: 257-264 - 2012
- [c2]Mamoona Naveed Asghar, Mohammed Ghanbari, Martin Fleury, Martin J. Reed:
Efficient selective encryption with H.264/SVC CABAC bin-strings. ICIP 2012: 2645-2648 - [c1]Mamoona Naveed Asghar, Mohammad Ghanbari, Martin J. Reed:
Sufficient Encryption with Codewords and Bin-strings of H.264/SVC. TrustCom 2012: 443-450
Informal and Other Publications
- 2024
- [i5]Mugheez Asif, Abdul Manan, Abdul Moiz ur Rehman, Mamoona Naveed Asghar, Muhammad Umair:
AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent. CoRR abs/2408.04281 (2024) - 2022
- [i4]Ifeoluwapo Aribilola, Mamoona Naveed Asghar, Brian Lee:
DEMIS: A Threat Model for Selectively Encrypted Visual Surveillance Data. CoRR abs/2210.14622 (2022) - 2021
- [i3]Syed Sahil Abbas Zaidi, Mohammad Samar Ansari, Asra Aslam, Nadia Kanwal, Mamoona Naveed Asghar, Brian Lee:
A Survey of Modern Deep Learning based Object Detection Models. CoRR abs/2104.11892 (2021) - 2019
- [i2]Amna Shifa, Mamoona Naveed Asghar, Naila Batool, Martin Fleury:
Efficient Lightweight Encryption Algorithm for Smart Video Applications. CoRR abs/1901.08344 (2019) - [i1]Rizwan Ali Shah, Mamoona Naveed Asghar, Saima Abdullah, Martin Fleury, Neelam Gohar:
Effectiveness of Crypto-Transcoding for H.264/AVC and HEVC Video Bit-streams. CoRR abs/1902.06990 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint