default search action
Asif Masood
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Muhammad Qasim, Muhammad Waleed, Tai-Won Um, Peyman Pahlevani, Jens Myrup Pedersen, Asif Masood:
Diving Deep With BotLab-DS1: A Novel Ground Truth-Empowered Botnet Dataset. IEEE Access 12: 28898-28910 (2024) - [j17]Sadia Hussain, Shahzaib Tahir, Asif Masood, Hasan Tahir:
Blockchain-Enabled Secure Communication Framework for Enhancing Trust and Access Control in the Internet of Vehicles (IoV). IEEE Access 12: 110992-111006 (2024) - [j16]Aqsa Rashid, Asif Masood, Atta ur Rehman Khan:
ACS-IoT: Smart Contract and Blockchain Assisted Framework for Access Control Systems in IoT Enterprise Environment. Wirel. Pers. Commun. 136(3): 1331-1352 (2024) - 2023
- [j15]Aqsa Rashid, Asif Masood, Atta ur Rehman Khan:
Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs. Clust. Comput. 26(1): 237-254 (2023) - 2022
- [c20]Muhammad Saeed Javed, Syeda Fizza Hamdani, Asif Masood, Muhammad Imran:
Development of A Robust Privacy Enhancing Data-Sharing Framework for Healthcare System Based on Decentralized Control. ANZCC 2022: 224-229 - 2021
- [j14]Aqsa Rashid, Asif Masood, Atta ur Rehman Khan:
RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations. Clust. Comput. 24(4): 3551-3571 (2021) - [j13]Aqsa Rashid, Asif Masood, Haider Abbas:
Cryptographic Framework for Role Control Remedy: A Secure Role Engineering mechanism for Single Authority Organizations. Future Gener. Comput. Syst. 117: 245-258 (2021) - [j12]Faisal Janjua, Asif Masood, Haider Abbas, Imran Rashid, Malik Muhammad Zaki Murtaza Khan:
Textual analysis of traitor-based dataset through semi supervised machine learning. Future Gener. Comput. Syst. 125: 652-660 (2021) - [j11]Aqsa Rashid, Asif Masood, Haider Abbas, Yin Zhang:
Blockchain-Based Public Key Infrastructure: A Transparent Digital Certification Mechanism for Secure Communication. IEEE Netw. 35(5): 220-225 (2021) - 2020
- [c19]Faisal Janjua, Asif Masood, Haider Abbas, Imran Rashid:
Handling Insider Threat Through Supervised Machine Learning Techniques. EUSPN/ICTH 2020: 64-71
2010 – 2019
- 2019
- [c18]Haider Abbas, Farrukh Aslam Khan, Kashif Kifayat, Asif Masood, Imran Rashid, Fawad Khan:
Security Safety and Trust Management (SSTM' 19). WETICE 2019: 196-197 - 2017
- [c17]Haider Abbas, Eugenio Orlandi, Farrukh Aslam Khan, Oliver Popov, Asif Masood:
Security, Safety and Trust Management (SSTM '17). WETICE 2017: 242-243 - 2015
- [j10]Samabia Tehsin, Asif Masood, Sumaira Kausar, Yunous Javed:
A Caption Text Detection Method from Images/Videos for Efficient Indexing and Retrieval of Multimedia Data. Int. J. Pattern Recognit. Artif. Intell. 29(1): 1555003:1-1555003:23 (2015) - [c16]Raashid Hussain, Haris Ahmad Khan, Imran Siddiqi, Khurram Khurshid, Asif Masood:
Keyword Based Information Retrieval System for Urdu Document Images. SITIS 2015: 27-33 - 2011
- [c15]Asif Masood, Sundas Bukhari:
Growing B-spline Model for Efficient Approximation of Complex Curves. IV 2011: 507-512 - 2010
- [j9]Huma Naeem, Asif Masood:
An optimal dynamic threat evaluation and weapon scheduling technique. Knowl. Based Syst. 23(4): 337-342 (2010) - [c14]Fahad Ahmed, Asif Masood, Firdous Kausar:
An Efficient Multi Recipient Signcryption Scheme Offering Non Repudiation. CIT 2010: 1577-1581 - [c13]Asif Masood, Sidra Ejaz:
An Efficient Algorithm for Robust Curve Fitting Using Cubic Bezier Curves. ICIC (2) 2010: 255-262 - [c12]Asif Masood, Wajeeha Kanwal:
Efficient Representation of Zooming Information in Videos Using Multi Resolution Mosaics. ICIC (2) 2010: 294-300
2000 – 2009
- 2009
- [j8]Asif Masood, Muhammad Sarfraz:
Capturing outlines of 2D objects with Bézier cubic approximation. Image Vis. Comput. 27(6): 704-712 (2009) - [j7]Adil Masood Siddiqui, Asif Masood, Muhammad Saleem:
A locally constrained radial basis function for registration and warping of images. Pattern Recognit. Lett. 30(4): 377-390 (2009) - [c11]Muhammad Imran Khan, Javed Ahmed, Ahmad Ali, Asif Masood:
Robust Edge-Enhanced Fragment Based Normalized Correlation Tracking in Cluttered and Occluded Imagery. FGIT-SIP 2009: 169-176 - [c10]Huma Naeem, Asif Masood, Mukhtar Hussain, Shoab A. Khan:
A Semi-Automated Dynamic Approach to Threat Evaluation and Optimal Defensive Resource Allocation. ICIC (1) 2009: 8-17 - [c9]Rabia Malik, Asif Masood:
Fingerprint Enhancement and Reconstruction. ICIC (2) 2009: 660-669 - [c8]Huma Naeem, Asif Masood:
An Optimal Dynamic Threat Evaluation and Weapon Scheduling Technique. SGAI Conf. 2009: 437-450 - [i2]Huma Naeem, Asif Masood, Mukhtar Hussain, Shoab A. Khan:
A Novel Two-Stage Dynamic Decision Support based Optimal Threat Evaluation and Defensive Resource Scheduling Algorithm for Multi Air-borne threats. CoRR abs/0906.5038 (2009) - [i1]Huma Naeem, Asif Masood, Mukhtar Hussain, Shoab A. Khan:
A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques. CoRR abs/0907.0067 (2009) - 2008
- [j6]Asif Masood, Muhammad Sarfraz:
An efficient technique for capturing 2D objects. Comput. Graph. 32(1): 93-104 (2008) - [j5]Asif Masood:
Dominant point detection by reverse polygonization of digital curves. Image Vis. Comput. 26(5): 702-715 (2008) - [j4]Asif Masood:
Optimized polygonal approximation by dominant point deletion. Pattern Recognit. 41(1): 227-239 (2008) - 2007
- [j3]Asif Masood, Muhammad Sarfraz:
Corner detection by sliding rectangles along planar curves. Comput. Graph. 31(3): 440-448 (2007) - [j2]Muhammad Sarfraz, Asif Masood:
Capturing outlines of planar images using Bézier cubics. Comput. Graph. 31(5): 719-729 (2007) - [j1]Asif Masood, Shaiq A. Haq:
A novel approach to polygonal approximation of digital curves. J. Vis. Commun. Image Represent. 18(3): 264-274 (2007) - [c7]Asif Masood, Adil Masood Siddiqui, Muhammad Saleem:
A Radial Basis Function for Registration of Local Features in Images. PSIVT 2007: 651-663 - 2006
- [c6]Asif Masood, Muhammad Sarfraz:
A Novel Corner Detector Approach using Sliding Rectangles. AICCSA 2006: 621-626 - [c5]Asif Masood, Shaiq A. Haq:
Role of Corner Detection in Capturing Shape Outlines. JCIS 2006 - 2005
- [c4]Asif Masood, Shaiq A. Haq:
Object Coding for Real Time Image Processing Applications. ICAPR (2) 2005: 550-559 - [c3]Asif Masood, Muhammad Sarfraz, Shaiq A. Haq:
Curve Approximation with Quadratic B-Splines. IV 2005: 419-424 - 2004
- [c2]Muhammad Sarfraz, Asif Masood, Muhammed Rafiq Asim:
A New Approach to Corner Detection. ICCVG 2004: 528-533 - [c1]Muhammad Sarfraz, Muhammed Rafiq Asim, Asif Masood:
Piecewise Polygonal Approximation of Digital Curves. IV 2004: 991-996
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint