default search action
Majid Khan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j69]Sadiqa Arshad, Majid Khan:
Construction of nonlinear component based on bent Boolean functions. Comput. Appl. Math. 43(1): 46 (2024) - [j68]Nabilah Abughazalah, Mian Muhammad Akhtar Hayat, Majid Khan:
An intelligent selection of lightweight multivalued cryptographic boolean function based on Multi-criteria decision making. Multim. Tools Appl. 83(13): 39389-39410 (2024) - [j67]Nabilah Abughazalah, Lal Said, Majid Khan:
Construction of optimum multivalued cryptographic Boolean function using artificial bee colony optimization and multi-criterion decision-making. Soft Comput. 28(6): 5213-5223 (2024) - [j66]Sadiqa Arshad, Majid Khan, Rashid Ali:
A Hybrid Technique for Generation of Highly Nonlinear Component Based on Elliptic Curves and Algebraic Group Structure. Wirel. Pers. Commun. 138(4): 2353-2370 (2024) - 2023
- [j65]Majid Khan, Saba Naz, Yashir Khan, Muneeb Zafar, Maqbool Khan, Giovanni Pau:
Utilizing Machine Learning Models to Predict Student Performance From LMS Activity Logs. IEEE Access 11: 86953-86962 (2023) - [j64]Nabilah Abughazalah, Asim Latif, Hafiz Muhammad Waseem, Majid Khan, Ammar S. Alanazi, Iqtadar Hussain:
Construction of multivalued cryptographic boolean function using recurrent neural network and its application in image encryption scheme. Artif. Intell. Rev. 56(6): 5403-5443 (2023) - [j63]Majid Khan, Nazar Khan, Ferdous M. O. Tawfiq, Jong-Suk Ro:
Coefficient Inequalities for q-Convex Functions with Respect to q-Analogue of the Exponential Function. Axioms 12(12): 1130 (2023) - [j62]Nabilah Abughazalah, Majid Khan, Naveed Yaqoob, Noor Munir, Iqtadar Hussain:
A new authentication scheme based on monogenic semigroup. J. Intell. Fuzzy Syst. 44(2): 1661-1671 (2023) - [j61]Majid Khan, Syeda Iram Batool, Noor Munir, Fahad Sameer Alshammari:
Construction of small confusion component based on logarithmic permutation for hybrid information hiding scheme. J. Intell. Fuzzy Syst. 45(6): 12365-12379 (2023) - [j60]Lal Said, Ammar S. Alanazi, Majid Khan:
A novel dual-layer security scheme based on 3-cell cellular neural network encryption and data hiding scheme for color images. Multim. Tools Appl. 82(4): 6127-6145 (2023) - [j59]Lal Said Khan, Majid Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal:
A novel combination of information confidentiality and data hiding mechanism. Multim. Tools Appl. 82(5): 6917-6941 (2023) - [j58]Hamza Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal, Iqtadar Hussain, Majid Khan:
New color image encryption technique based on three-dimensional logistic map and Grey wolf optimization based generated substitution boxes. Multim. Tools Appl. 82(5): 6943-6964 (2023) - [j57]Hamza Khan, Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Majid Khan, Iqtadar Hussain:
New image encryption scheme based on Arnold map and cuckoo search optimization algorithm. Multim. Tools Appl. 82(5): 7419-7441 (2023) - [j56]Nazish Iqbal, Majid Khan, Khurram Khurshid, Iqtadar Hussain:
An efficient hybrid encryption model based on deep convolutional neural networks, deoxyribonucleic acid computing and chaotic system. Multim. Tools Appl. 82(9): 13881-13903 (2023) - [j55]Amna Zafar, Ammar S. Alanazi, Majid Khan, Iqtadar Hussain:
New image confidentiality mechanism based on Arneodos chaotic dynamical system and quadratic congruential generator. Multim. Tools Appl. 82(11): 17263-17281 (2023) - [j54]Ammar S. Alanazi, Noor Munir, Majid Khan, Iqtadar Hussain:
A novel design of audio signals encryption with substitution permutation network based on the Genesio-Tesi chaotic system. Multim. Tools Appl. 82(17): 26577-26593 (2023) - [j53]Muhammad Aslam, Majid Khan, Zahid Rasheed, Syed Masroor Anwar, Saddam Akber Abbasi:
An improved adaptive EWMA control chart for monitoring time between events with application in health sector. Qual. Reliab. Eng. Int. 39(4): 1396-1412 (2023) - [i1]Muhammad Ishaq, Laila Iftikhar, Majid Khan, Asfandyar Khan, Arshad Khan:
Machine Learning Based Missing Values Imputation in Categorical Datasets. CoRR abs/2306.06338 (2023) - 2022
- [j52]Hafiz Muhammad Waseem, Wai-Kong Lee, Seong Oun Hwang, Majid Khan, Asim Latif:
Discrete Logarithmic Factorial Problem and Einstein Crystal Model Based Public-Key Cryptosystem for Digital Content Confidentiality. IEEE Access 10: 102119-102134 (2022) - [j51]Sobia Ahsan Halim, Muhammad Waqas, Ayesha Asim, Majid Khan, Ajmal Khan, Ahmed Al-Harrasi:
Discovering novel inhibitors of P2Y12 receptor using structure-based virtual screening, molecular dynamics simulation and MMPBSA approaches. Comput. Biol. Medicine 147: 105743 (2022) - [j50]Nabilah Abughazalah, Majid Khan, Syeda Iram Batool:
Nonlinearity of nonbalanced and nearly bent boolean functions based on Galois ring. J. Intell. Fuzzy Syst. 43(3): 3051-3065 (2022) - [j49]Noor Munir, Majid Khan, Abd Al Karim Haj Ismail, Iqtadar Hussain:
Cryptanalysis and Improvement of Novel Image Encryption Technique Using Hybrid Method of Discrete Dynamical Chaotic Maps and Brownian Motion. Multim. Tools Appl. 81(5): 6571-6584 (2022) - [j48]Ahmed Elmoasry, Lal Said Khan, Majid Khan, Iqtadar Hussain:
A dual layer security scheme for medical images using Hessenberg and singular value decompositions. Multim. Tools Appl. 81(10): 14001-14022 (2022) - [j47]Ahmed Elmoasry, Lal Said Khan, Majid Khan, Iqtadar Hussain:
Correction to: A dual layer security scheme for medical images using Hessenberg and singular value decompositions. Multim. Tools Appl. 81(10): 14023 (2022) - [j46]Majid Khan, Lal Said Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal, Iqtadar Hussain:
Image encryption scheme for multi-focus images for visual sensors network. Multim. Tools Appl. 81(12): 16353-16370 (2022) - [j45]Lal Said Khan, Majid Khan, Sajjad Shaukat Jamal, Muhammad Amin:
An Efficient Digital Confidentiality Scheme Based on Commutative Chaotic Polynomial. Multim. Tools Appl. 81(23): 33591-33611 (2022) - [j44]Majid Khan, Muhammad Aslam, Syed Masroor Anwar, Babar Zaman:
A robust hybrid exponentially weighted moving average chart for monitoring time between events. Qual. Reliab. Eng. Int. 38(2): 895-923 (2022) - [j43]Muhammad Aslam, Majid Khan, Syed Masroor Anwar, Babar Zaman:
A homogeneously weighted moving average control chart for monitoring time between events. Qual. Reliab. Eng. Int. 38(2): 1013-1044 (2022) - 2021
- [j42]Ammar S. Alanazi, Noor Munir, Majid Khan, Muhammad Asif, Iqtadar Hussain:
Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes. IEEE Access 9: 93795-93802 (2021) - [j41]Noor Munir, Majid Khan, Mohammad Mazyad Hazzazi, Amer Aljaedi, Abd Al Karim Haj Ismail, Adel R. Alharbi, Iqtadar Hussain:
Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps. IEEE Access 9: 105678-105685 (2021) - [j40]Noor Munir, Majid Khan, Tariq Shah, Ammar S. Alanazi, Iqtadar Hussain:
Cryptanalysis of nonlinear confusion component based encryption algorithm. Integr. 79: 41-47 (2021) - [j39]Majid Khan, Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Khawaja Muhammad Ali, Iqtadar Hussain, Muhammad Asif:
An efficient image encryption scheme based on double affine substitution box and chaotic system. Integr. 81: 108-122 (2021) - [j38]Nabilah Abughazalah, Majid Khan, Noor Munir, Amna Zafar:
Optimum criterion for lightweight nonlinear confusion component with multi-criteria decision making. J. Intell. Fuzzy Syst. 40(6): 12399-12410 (2021) - [j37]Majid Khan, Abd Al Karim Haj Ismail, Iqra Ishaque, Iqtadar Hussain:
New combination of simple additive and entropy weighting criteria for the selection of best substitution box. J. Intell. Fuzzy Syst. 41(1): 2325-2338 (2021) - [j36]Noor Munir, Majid Khan, Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Iqtadar Hussain:
Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map. Math. Comput. Simul. 190: 826-836 (2021) - [j35]Abdullah Alghafis, Noor Munir, Majid Khan:
An encryption scheme based on chaotic Rabinovich-Fabrikant system and S8 confusion component. Multim. Tools Appl. 80(5): 7967-7985 (2021) - [j34]Syed Zeeshan Abbas, Haroon Ibrahim, Majid Khan:
A hybrid chaotic blowfish encryption for high-resolution satellite imagery. Multim. Tools Appl. 80(17): 26069-26091 (2021) - [j33]Syeda Iram Batool, Irfan Younas, Majid Khan, Naveed Yaqoob:
A new technique for the construction of confusion component based on inverse LA-semigroups and its application in steganography. Multim. Tools Appl. 80(19): 28857-28877 (2021) - [j32]Sadiqa Arshad, Majid Khan:
New extension of data encryption standard over 128-bit key for digital images. Neural Comput. Appl. 33(20): 13845-13858 (2021) - [j31]Majid Khan, Sajjad Shaukat Jamal:
Lightweight Chaos-Based Nonlinear Component of Block Ciphers. Wirel. Pers. Commun. 120(4): 3017-3034 (2021) - [j30]Faiza Firdousi, Majid Khan, Sajjad Shaukat Jamal, Naeem Faraz:
Parent-Daughter Confusion Component: A New Approach for the Construction of Nonlinear Confusion Component. Wirel. Pers. Commun. 120(4): 3095-3115 (2021) - [c2]Justin D. Opfermann, Benjamin D. Killeen, Christopher R. Bailey, Majid Khan, Ali Uneri, Kensei Suzuki, Mehran Armand, Ferdinand Hui, Axel Krieger, Mathias Unberath:
Feasibility of a Cannula-Mounted Piezo Robot for Image-Guided Vertebral Augmentation: Toward a Low Cost, Semi-Autonomous Approach. BIBE 2021: 1-8 - 2020
- [j29]Hafiz Muhammad Waseem, Abdullah Alghafis, Majid Khan:
An Efficient Public Key Cryptosystem Based on Dihedral Group and Quantum Spin States. IEEE Access 8: 71821-71832 (2020) - [j28]Abdullah Alghafis, Faiza Firdousi, Majid Khan, Syeda Iram Batool, Muhammad Amin:
An efficient image encryption scheme based on chaotic and Deoxyribonucleic acid sequencing. Math. Comput. Simul. 177: 441-466 (2020) - [j27]Umer Aziz Waqas, Majid Khan, Syeda Iram Batool:
A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multim. Tools Appl. 79(9-10): 6891-6914 (2020) - [j26]Sundas Tariq, Majid Khan, Abdullah Alghafis, Muhammad Amin:
A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation. Multim. Tools Appl. 79(31-32): 23507-23529 (2020) - [j25]Majid Khan, Sajjad Shaukat Jamal, Umer Aziz Waqas:
A novel combination of information hiding and confidentiality scheme. Multim. Tools Appl. 79(41-42): 30983-31005 (2020) - [j24]Majid Khan, Fawad Masood, Abdullah Alghafis:
Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system. Neural Comput. Appl. 32(15): 11837-11857 (2020) - [j23]Majid Khan, Muhammad Gulistan, Mumtaz Ali, Wathek Chammam:
The Generalized Neutrosophic Cubic Aggregation Operators and Their Application to Multi-Expert Decision-Making Method. Symmetry 12(4): 496 (2020) - [j22]Tariq Shah, Asif Ali, Majid Khan, Ghazanfar Farooq Siddiqui, Antonio Aparecido de Andrade:
Galois Ring $GR\left( {2^{3} , 8} \right)$ Dependent 24 ˟ 24 S-Box Design: An RGB Image Encryption Application. Wirel. Pers. Commun. 113(2): 1201-1224 (2020)
2010 – 2019
- 2019
- [j21]Fakhri Alam Khan, Majid Khan, Muhammad Asif, Afsheen Khalid, Inam Ul Haq:
Hybrid and Multi-Hop Advanced Zonal-Stable Election Protocol for Wireless Sensor Networks. IEEE Access 7: 25334-25346 (2019) - [j20]Muhammad Ishaq, Asfandyar Khan, Majid Khan, Muhammad Imran:
Current Trends and Ongoing Progress in the Computational Alignment of Biological Sequences. IEEE Access 7: 68380-68391 (2019) - [j19]Majid Khan, Fawad Masood:
A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multim. Tools Appl. 78(18): 26203-26222 (2019) - [j18]Khawaja Muhammad Ali, Majid Khan:
A new construction of confusion component of block ciphers. Multim. Tools Appl. 78(22): 32585-32604 (2019) - [j17]Majid Khan, Muhammad Gulistan, Naveed Yaqoob, Madad Khan, Florentin Smarandache:
Neutrosophic Cubic Einstein Geometric Aggregation Operators with Application to Multi-Criteria Decision Making Method. Symmetry 11(2): 247 (2019) - [j16]Majid Khan, Noor Munir:
A Novel Image Encryption Technique Based on Generalized Advanced Encryption Standard Based on Field of Any Characteristic. Wirel. Pers. Commun. 109(2): 849-867 (2019) - 2018
- [j15]Irfan Younas, Majid Khan:
A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System. Entropy 20(12): 913 (2018) - [j14]Hafiz Muhammad Waseem, Majid Khan, Tariq Shah:
Image privacy scheme using quantum spinning and rotation. J. Electronic Imaging 27(06): 063022 (2018) - [j13]Majid Khan, Muhammad Gulistan, Naveed Yaqoob, Muhammad Shabir:
Neutrosophic cubic (α, β)-ideals in semigroups with application. J. Intell. Fuzzy Syst. 35(2): 2469-2483 (2018) - 2017
- [j12]Majid Khan, Tariq Shah, Syeda Iram Batool:
A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multim. Tools Appl. 76(22): 24027-24062 (2017) - 2016
- [j11]Majid Khan, Tariq Shah, Syeda Iram Batool:
A new implementation of chaotic S-boxes in CAPTCHA. Signal Image Video Process. 10(2): 293-300 (2016) - 2015
- [j10]Majid Khan, Tariq Shah:
A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J. Intell. Fuzzy Syst. 28(4): 1509-1517 (2015) - [j9]Majid Khan, Tariq Shah:
An efficient construction of substitution box with fractional chaotic system. Signal Image Video Process. 9(6): 1335-1338 (2015) - 2013
- [j8]Majid Khan, Muhammad Asif Gondal, Syeda Iram Batool:
A new modified Laplace decomposition method for higher order boundary value problems. Comput. Math. Organ. Theory 19(4): 446-459 (2013) - [j7]Ahmed Salah, Majid Khan, Muhammad Asif Gondal:
A novel solution procedure for fuzzy fractional heat equations by homotopy analysis transform method. Neural Comput. Appl. 23(2): 269-271 (2013) - [j6]Muhammad Asif Gondal, Ahmed Salah, Majid Khan, Syeda Iram Batool:
A novel analytical solution of a fractional diffusion problem by homotopy analysis transform method. Neural Comput. Appl. 23(6): 1643-1647 (2013) - [c1]Md. Iftekhar Tanveer, A. S. M. Iftekhar Anam, Mohammed Yeasin, Majid Khan:
Do you see what I see?: designing a sensory substitution device to access non-verbal modes of communication. ASSETS 2013: 10:1-10:8 - 2012
- [j5]Majid Khan, Muhammad Asif Gondal:
A reliable treatment of Abel's second kind singular integral equations. Appl. Math. Lett. 25(11): 1666-1670 (2012) - [j4]Majid Khan, Muhammad Asif Gondal, Iqtadar Hussain, S. Karimi Vanani:
A new comparative study between homotopy analysis transform method and homotopy perturbation transform method on a semi infinite domain. Math. Comput. Model. 55(3-4): 1143-1150 (2012) - [j3]Majid Khan, Muhammad Asif Gondal, Sunil Kumar:
A new analytical solution procedure for nonlinear integral equations. Math. Comput. Model. 55(7-8): 1892-1897 (2012) - 2011
- [j2]Majid Khan, Mazhar Hussain:
Application of Laplace decomposition method on semi-infinite domain. Numer. Algorithms 56(2): 211-218 (2011)
2000 – 2009
- 2009
- [j1]Sudharma Haridasan, Majid Khan:
Impact and use of e-resources by social scientists in National Social Science Documentation Centre (NASSDOC), India. Electron. Libr. 27(1): 117-133 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint