default search action
Mohsin Shah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Toqeer Mahmood, Saba Naseem, Rehan Ashraf, Muhammad Asif, Muhammad Umair, Mohsin Shah:
Recognizing factors effecting the use of mobile banking apps through sentiment and thematic analysis on user reviews. Neural Comput. Appl. 35(27): 19885-19897 (2023) - 2022
- [j13]Mushtaq Ali, Muhammad Zubair Asghar, Mohsin Shah, Toqeer Mahmood:
A simple and effective sub-image separation method. Multim. Tools Appl. 81(11): 14893-14910 (2022) - [j12]Mushtaq Ali, Muhammad Zubair Asghar, Mohsin Shah, Toqeer Mahmood:
Correction to: A simple and effective sub-image separation method. Multim. Tools Appl. 81(11): 14911 (2022) - [j11]Griffin M. Weber, Chuan Hong, Zongqi Xia, Nicolas Paris, Miguel Pedrera-Jiménez, Ashley C. Pfaff, Emily R. Pfaff, Danielle Pillion, Sara Pizzimenti, Hans-Ulrich Prokosch, Robson A. Prudente, Andrea Prunotto, Víctor Quirós-González, Maryna Raskin, Siegbert Rieg, Gustavo Roig-Domínguez, Pablo Rojo, Paula Rubio-Mayo, Paolo Sacchi, Carlos Sáez, Elisa Salamanca, Malarkodi Jebathilagam Samayamuthu, L. Nelson Sanchez-Pinto, Arnaud Sandrin, Nandhini Santhanam, Janaina C. C. Santos, Fernando J. Sanz Vidorreta, Maria Savino, Jürgen Schüttler, Luigia Scudeller, Neil J. Sebire, Pablo Serrano-Balazote, Patricia Serre, Arnaud Serret-Larmande, Mohsin Shah, Zahra Shakeri Hossein Abad, Domenick Silvio, Piotr Sliz, Jiyeon Son, Charles Sonday, Andrew M. South, Francesca Sperotto, Zachary H. Strasser, Bryce W. Q. Tan, Suzana E. Tanni, Deanne M. Taylor, Ana I. Terriza-Torres, Patric Tippmann, Emma M. S. Toh, Yi-Ju Tseng, Andrew K. Vallejos, Gaël Varoquaux, Margaret E. Vella, Guillaume Verdy, Jill-Jênn Vie, Michele Vitacca, Kavishwar B. Wagholikar, Lemuel R. Waitman, Demian Wassermann, Martin Wolkewitz, Scott Wong, Xin Xiong, Ye Ye, Nadir Yehya, William Yuan, Alberto Zambelli, Harrison G. Zhang, Daniela Zöller, Valentina Zuccaro, Chiara Zucco:
International comparisons of laboratory values from the 4CE collaborative to predict COVID-19 mortality. npj Digit. Medicine 5 (2022) - [j10]Asfandyar Khan, Arif Iqbal Umar, Syed Hamad Shirazi, Waqar Ishaq, Mohsin Shah, Muhammad Assam, Abdullah Mohamed:
QoS-Aware Cost Minimization Strategy for AMI Applications in Smart Grid Using Cloud Computing. Sensors 22(13): 4969 (2022) - [j9]Xiaojuan Dong, Weiming Zhang, Mohsin Shah, Bei Wang, Nenghai Yu:
Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud. IEEE Trans. Serv. Comput. 15(3): 1678-1692 (2022) - 2020
- [j8]Toqeer Mahmood, Mohsin Shah, Junaid Rashid, Tanzila Saba, Muhammad Wasif Nisar, Muhammad Asif:
A passive technique for detecting copy-move forgeries by image feature matching. Multim. Tools Appl. 79(43-44): 31759-31782 (2020)
2010 – 2019
- 2019
- [j7]Mohsin Shah, Weiming Zhang, Honggang Hu, Xiaojuan Dong, Nenghai Yu:
Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem. IET Image Process. 13(10): 1705-1713 (2019) - [j6]Amjad Rehman, Tanzila Saba, Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, Adeel Anjum:
Data hiding technique in steganography for information security using number theory. J. Inf. Sci. 45(6) (2019) - [j5]Mohsin Shah, Weiming Zhang, Honggang Hu, Nenghai Yu:
Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations. ACM Trans. Multim. Comput. Commun. Appl. 15(3): 76:1-76:21 (2019) - [i1]Xiaojuan Dong, Weiming Zhang, Mohsin Shah, Bei Wang, Nenghai Yu:
A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret. CoRR abs/1912.09034 (2019) - 2018
- [j4]Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, Zakir Khan:
An efficient forensic technique for exposing region duplication forgery in digital images. Appl. Intell. 48(7): 1791-1801 (2018) - [j3]Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, Tanzila Saba:
A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J. Vis. Commun. Image Represent. 53: 202-214 (2018) - 2016
- [j2]Zakir Khan, Mohsin Shah, Muhammad Naeem, Toqeer Mahmood, Shah Khan:
Threshold-based steganography: a novel technique for improved payload and SNR. Int. Arab J. Inf. Technol. 13(4): 380-386 (2016) - 2015
- [c1]Mazhar Islam, Mohsin Shah, Zakir Khan, Toqeer Mahmood, Muhammad Jamil Khan:
A New Symmetric Key Encryption Algorithm Using Images as Secret Keys. FIT 2015: 1-5 - 2014
- [j1]Chandrashekhar T. Sreeramareddy, Mahbubur Rahman, H. N. Harsha Kumar, Mohsin Shah, Ahmed Hossain, Md Sayem, Juan M. Moreira, Jef Van den Ende:
Intuitive weights of harm for therapeutic decision making in smear-negative pulmonary Tuberculosis: an interview study of physicians in India, Pakistan and Bangladesh. BMC Medical Informatics Decis. Mak. 14: 67 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint