Adeel Anjum

ORCID: 0000-0001-5083-0019
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Privacy, Security, and Data Protection
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • Vehicular Ad Hoc Networks (VANETs)
  • Access Control and Trust
  • Data Quality and Management
  • IoT and Edge/Fog Computing
  • Internet Traffic Analysis and Secure E-voting
  • Data Management and Algorithms
  • Advanced Steganography and Watermarking Techniques
  • Cloud Computing and Resource Management
  • Mobile Crowdsensing and Crowdsourcing
  • Data Mining Algorithms and Applications
  • Scientific Computing and Data Management
  • AI in cancer detection
  • Software Engineering Research
  • Digital Media Forensic Detection
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Parallel Computing and Optimization Techniques
  • User Authentication and Security Systems
  • Chaos-based Image/Signal Encryption
  • Real-Time Systems Scheduling

Quaid-i-Azam University
2022-2025

University of Agriculture Faisalabad
2024

Southern University of Science and Technology
2020-2024

Shenyang Aerospace University
2024

University of Glasgow
2024

University of Science and Technology of China
2024

Middle East Technical University
2024

University of Faisalabad
2024

COMSATS University Islamabad
2014-2022

University of Sargodha
2021

Abstract Automatic medical image analysis is one of the key tasks being used by community for disease diagnosis and treatment planning. Statistical methods are major algorithms consist few steps including preprocessing, feature extraction, segmentation, classification. Performance such statistical an important factor their successful adaptation. The results these depend on quality images fed to processing pipeline: better images, higher results. Preprocessing pipeline phase that attempts...

10.1002/jemt.23224 article EN Microscopy Research and Technique 2019-02-15

Drones are increasingly utilized for a variety of purposes, spanning military to civilian applications. The rise in drone usage underscores privacy and security challenges concerning flight boundaries, data collection public private domains, storage dissemination. Such issues highlight the drones' capability communicate securely store over potentially insecure channels. Recognizing these gaps research, this paper introduces an efficient secure surveillance model Internet (IoD). Our ensures...

10.1016/j.iot.2024.101066 article EN cc-by-nc Internet of Things 2024-01-14

The advancement of computer- and internet-based technologies has transformed the nature services in healthcare by using mobile devices conjunction with cloud computing. classical phenomenon patient-doctor diagnostics is extended to a more robust advanced concept E-health, where remote online/offline treatment can be performed. In this article, we propose framework which incorporates cloud-based decision support system for detection classification malignant cells breast cancer, while cytology...

10.1002/jemt.23222 article EN Microscopy Research and Technique 2019-01-29

A cloud computing environment provides a cost-effective way for the end user to store and access private data over remote storage using some Internet connection. The has anywhere at any time. However, do not remain secure all Since are accessible only by interference of third party, it is prone breach authentication integrity data. Moreover, allows simultaneous users retrieve their online different connections, which leads exposure, leakage, loss user’s sensitive in locations. Many...

10.3390/electronics10212673 article EN Electronics 2021-10-31

The privacy preservation has received considerable attention from organizations as the growing population is apprehensive regarding personal data being preserved.There are several and security issues in existing systems, such identity location disclosure, availability, authenticity. Smart parking systems utilize third-party recommender to offer customized space recommendations its users based on user’s past experience. However, indiscriminately sharing a with third party recommendation...

10.1109/access.2022.3175829 article EN cc-by IEEE Access 2022-01-01

In data publishing, privacy and utility are essential for owners users respectively, which cannot coexist well.This incompatibility puts the researchers under an obligation to find newer reliable preserving tradeoff-techniques.Data providers like many public private organizations (e.g.hospitals banks) publish microdata of individuals various research purposes.Publishing may compromise individuals.To prevent individuals, must be published after removing personal identifiers name social...

10.1109/access.2018.2828398 article EN cc-by-nc-nd IEEE Access 2018-01-01

Abstract Visual inspection for the quantification of malaria parasitaemiain (MP) and classification life cycle stage are hard time taking. Even though, automated techniques MP their reported in literature. However, either imperfect or cannot deal with special issues such as anemia hemoglobinopathies due to clumps red blood cells (RBCs). The focus current work is examine thin smear microscopic images stained Giemsa by digital image processing techniques, grading on independent factors (RBCs...

10.1002/jemt.23170 article EN Microscopy Research and Technique 2018-12-21

Abstract Atomic recognition of the Exudates (EXs), major symbol diabetic retinopathy is essential for automated retinal images analysis. In this article, we proposed a novel machine learning technique early detection and classification EXs in color fundus images. The challenge observed selection optimal features to reduce computational time space complexity provide high degree accuracy. To address these challenges, article an evolutionary algorithm based solution feature selection, which...

10.1002/jemt.23178 article EN Microscopy Research and Technique 2019-01-24

Data publication and sharing are critical components of assessing network infrastructures in the Internet Things for quality-of-service enhancement. Especially, advancement communication technology (e.g., 5G/6G) enables improvement current bottlenecks Industrial Things. Recent approaches remove raw data their source to achieve a privacy guarantee. However, already anonymized; these still reveal victim's extra information using linkage attacks. When updated combined or noise is introduced as...

10.1109/tii.2022.3179536 article EN IEEE Transactions on Industrial Informatics 2022-06-01

Abstract Every individual in our technologically evolved world needs proper data security. The procedure of exchanging medical information is increasingly concerned with privacy. Many techniques have been offered for preserving These use approaches such as ‐anonymity, ‐diversity, and others. However, solutions are vulnerable to attribute disclosure, homogeneity, background knowledge risks due their syntactic nature. In this work, we describe a safe secure architecture semantic approach...

10.1111/exsy.13131 article EN Expert Systems 2022-08-24

In the current era, due to widespread availability of Internet, it is extremely easy for people communicate and share multimedia contents with each other. However, at same time, secure transfer personal copyrighted material has become a critical issue. Consequently, means data are most urgent need time. Steganography science art protecting secret from an unauthorised access. The steganographic approaches conceal into cover file type audio, video, text and/or image. actual challenge in...

10.1177/0165551518816303 article EN Journal of Information Science 2018-12-06

Risk management in distributed software development (DSD) is a well-researched area, providing different methods for assessing risks and suggesting control strategies. However, some of these are narrow scope, only considering few risks, too complex to be used practice whereas others provide many rules guidelines which often implicit. Moreover, the knowledge related DSD scattered over publications make it difficult find relevant information practice. This research aims develop an automated...

10.1109/access.2017.2757605 article EN cc-by-nc-nd IEEE Access 2017-01-01

The growing use of electronic health records in the medical domain results generating a large amount data that is stored form clinical notes. These notes are enriched with entities like disease, treatment, tests, drugs, genes, and proteins. extraction from challenging task as written natural language. has many useful applications such analysis, privacy, decision support systems, disease analysis. Although various machine learning deep models developed to extract notes, developing an accurate...

10.1109/jbhi.2021.3099755 article EN IEEE Journal of Biomedical and Health Informatics 2021-07-26
Coming Soon ...