Ahmad Neyaz Khan

ORCID: 0000-0002-2783-4190
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Advanced Steganography and Watermarking Techniques
  • Photovoltaic System Optimization Techniques
  • Solar Radiation and Photovoltaics
  • Advanced DC-DC Converters
  • Advanced Battery Technologies Research
  • Energy Load and Power Forecasting
  • Multilevel Inverters and Converters
  • Advanced Malware Detection Techniques
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Optimal Power Flow Distribution
  • Fractal and DNA sequence analysis
  • solar cell performance optimization
  • Data Stream Mining Techniques
  • Global and Cross-Cultural Management
  • Advanced Neural Network Applications
  • Bioinformatics and Genomic Networks
  • Wireless Body Area Networks
  • Face recognition and analysis
  • Semiconductor materials and interfaces
  • Network Security and Intrusion Detection
  • Smart Agriculture and AI
  • Advanced Graph Neural Networks

Koneru Lakshmaiah Education Foundation
2024

Aligarh Muslim University
2012-2024

Integral University
2021-2023

University of Electronic Science and Technology of China
2017-2021

ORCID
2020

Gwangju Institute of Science and Technology
2007

Techniques for creating and manipulating multimedia information have progressed to the point where they can now ensure a high degree of realism. DeepFake is generative deep learning algorithm that creates or modifies face features in superrealistic form, which it difficult distinguish between real fake features. This technology has greatly advanced promotes wide range applications TV channels, video game industries, cinema, such as improving visual effects movies, well variety criminal...

10.1109/access.2022.3151186 article EN cc-by IEEE Access 2022-01-01

Attributed networks are prevalent in the current information infrastructure, where node attributes enhance knowledge discovery. Anomaly detection attributed is gaining attention for its potential uses cybersecurity, finance, and healthcare. Recognizing complicated relationship between network topology crucial embedding anomaly detection. Nevertheless, there few approaches available to directly represent these two perspectives of property topology. Approaches utilizing reconstruction error...

10.1109/access.2024.3398555 article EN cc-by-nc-nd IEEE Access 2024-01-01

Integration of blockchain and Internet Things (IoT) to build a secure, trusted robust communication technology is currently great interest for research communities industries. But challenge identify the appropriate position in current settings IoT with minimal consequences. In this article we propose blockchain-based DualFog-IoT architecture three configuration filter incoming requests at access level, namely: Real Time, Non-Real Delay Tolerant Blockchain applications. The segregate Fog...

10.1109/access.2019.2952472 article EN cc-by IEEE Access 2019-01-01

A significant aspect of today's digital information is attributed networks, which combine multiple node attributes with the basic network topology in order to extract knowledge. Anomaly Detection on networks has recently drawn attention from researchers and widely used a number high-impact areas. The majority current approaches focus shallow learning methods such as community analysis, ego or selection subspace method. These have sparsity data nonlinearity problems, they do not even capture...

10.1109/access.2022.3201332 article EN cc-by IEEE Access 2022-01-01

Phishing activity is undertaken by the hackers to compromise computer networks and financial system. A compromised system or network provides data processing resources world of cybercrime. Cybercrimes are projected cost $6 trillion 2021, in this context phishing expected continue being a growing challenge. Statistics around growth over last decade support theory as numbers enjoy almost an exponential period. Recent reports on complexity show that fight against URL means building more...

10.1109/icaic53980.2022.9897036 article EN 2022-05-24

With the advent of new technologies and ever increasing use Cloud in nearly every sphere our day to life, data owner using cloud is still less confident. This lack trust obvious as entrusts with a third party which stores, manages processes data. Whatever be level security, there always some loop hole for misusers. Various machine learning techniques have been learn from available analysis results accordingly benefits. Homomorphic secure multi-party computation (SMC) or homomorphic...

10.1109/icomet.2019.8673524 article EN 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET) 2019-01-01

Brain cancer is a life-threatening disease and hampers the normal operation of human body. For correct diagnosis methodical treatment planning, it essential to detect brain tumor in initial stages development. This study proposes an intelligent diagnostic method for early detection tumor. In developed method, deep features magnetic resonance imaging (MRI) scans are used as input support vector machine (SVM). first step proposed Grab cut applied segmenting region, then segmented images fed...

10.1109/iccwamtip51612.2020.9317509 article EN 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) 2020-12-18

Reversible data hiding in encrypted image (RDHEI) is advantageous to scenarios where complete recovery of the original cover and additional are required. In some existing RDHEI schemes, pre-processing step involved an overhead for resource-constrained devices on sender’s side. this paper, efficient separable reversible scheme over a homomorphically that assures privacy preservation contents cloud environment proposed. This proposed comprises three stakeholders: content-owner, hider,...

10.3390/electronics8060682 article EN Electronics 2019-06-17

Electrical energy demand has risen over the world which results in developmentof smart grid. Smart grid identified areas that requiresimprovement. Because of focus on cost-effective operation as well asenvironmental concerns electrical power system, complexity ofthe optimization function increased. In this study, a new energy-saving dispatch model is developed, takes into account renewable energysources dynamic generation-load interaction.Moreover, active response idea employed for...

10.13052/dgaej2156-3306.37414 article EN Distributed Generation & Alternative Energy Journal 2022-05-06

Reversible Data Hiding in Encrypted Images (RDH-EI) has gained much popularity the field of signal processing and cloud computing. In this study, we propose a high-capacity RDH-EI scheme using multi-layer embedding. It ensures that after extraction embedded additional data from marked encrypted image, original image is recovered completely. Broadly, method comprises three parties: content owner, hider/ receiver. beginning, by owner encryption based on chaotic behaviour PWL-memristor sent to...

10.1109/access.2020.3015882 article EN cc-by IEEE Access 2020-01-01

The effective farming means lossless which is a desired need of current scenario, since the cost increasing continuously. Weeds are big problem in agriculture because it major part agricultural losses. Nowadays, herbicides sprayed uniformly throughout field to control weed. This method not only expensive but also have bad impacts on environment and human health. Therefore, an automatic system needed for spot spray. Improvement drone technology leads availability high payload that suitable...

10.1109/caps52117.2021.9730682 article EN 2021-12-10

Abstract Most of the power electronic converters based on devices such as Silicon Controlled Rectifiers (SCRs) have been broadly utilized in home, business, and modern use recent years. Despite their many benefits, these major issues pulling harmonic current reactive part from supply, well having a highly nonlinear characteristic. The harmonics produced by supplied elements cause voltage distortion at common coupling point, which is causing problems for functioning number sensitive...

10.1088/2631-8695/acdc04 article EN cc-by-nc-nd Engineering Research Express 2023-06-01

With the evolving needs of cloud-based information exchange, challenge a reliable and secure communication channel has also been center attention recently. Although cryptography traditional tool for communication; yet it carries possibility attacks aimed to gain access sensitive information. As an alternative, use reversible data hiding (RDH) technique proposed. RDH scheme involves concealment in cover image, both which are retrieved lossless manner at receiver end. Over insecure cloud...

10.1109/icct46177.2019.8969030 article EN 2019-09-01

Analyzing any cryptographic algorithm is in general a herculean task but smart use of Artificial Intelligence(A.I.) can deliver some positive results. Various attempts regarding cryptanalysis till now have been focused on either exploiting mathematical loop hole the or way out implementation algorithm. Work has done field using Neural Networks and other pattern recognition techniques to identify type used. In this paper, we attempt cryptanalyze Merkle-Hellman Knapsack Public Key Cryptosystem...

10.1109/i2ct45611.2019.9033917 article EN 2022 IEEE 7th International conference for Convergence in Technology (I2CT) 2019-03-01

In most image enhancement tasks, contrast is a pre-step for the later processing stages. this paper, we propose new technique adaptive of compressed images in discrete cosine transform (DCT) domain. The algorithm, at same time, uses human visual system (HVS) as guide avoiding unpleasant block artifacts that often appear Hock boundaries result DCT An activity measure determines level can withstand without creating any blocking and simultaneously enhancing contrast. Since process done during...

10.1109/icee.2007.4287332 article EN International Conference on Electrical Engineering 2007-04-01

In contemporary times, heart diseases have emerged as the leading cause of untimely deaths. To tackle this alarming situation, engineers developed a range medical devices for diagnosing and scrutinizing various diseases. Numerous patients suffer from problems that pose critical threats to their lives, thereby necessitating continuous monitoring via traditional systems such Electrocardiography (ECG). However, technique is available only in hospitals, making it prohibitively expensive...

10.56536/jicet.v4i2.113 article EN Journal of Innovative Computing and Emerging Technologies 2024-10-03
Coming Soon ...