Select Publications

Journal articles

Sarfaraz A; Chakrabortty RK; Essam DL, 2023, 'AccessChain: An access control framework to protect data access in blockchain enabled supply chain', Future Generation Computer Systems, 148, pp. 380 - 394, http://dx.doi.org/10.1016/j.future.2023.06.009

Sarfaraz A; Chakrabortty RK; Essam DL, 2023, 'Reputation based proof of cooperation: an efficient and scalable consensus algorithm for supply chain applications', Journal of Ambient Intelligence and Humanized Computing, 14, pp. 7795 - 7811, http://dx.doi.org/10.1007/s12652-023-04592-y

Sarfaraz A; Chakrabortty RK; Essam DL, 2022, 'The implications of blockchain-coordinated information sharing within a supply chain: A simulation study', Blockchain Research and Applications, pp. 100110 - 100110, http://dx.doi.org/10.1016/j.bcra.2022.100110

Sarfaraz A; Chakrabortty R; Essam D, 2020, 'A Tree Structure-based Improved Blockchain Framework for a Secure Online Bidding System', Computers and Security, 102, http://dx.doi.org/10.1016/j.cose.2020.102147

Fayyaz MA; Anjum A; Ziauddin S; Khan A; Sarfaraz A, 2020, 'An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues', Multimedia Tools and Applications, 79, pp. 5767 - 5788, http://dx.doi.org/10.1007/s11042-019-08236-2

Khan A; Sarfaraz A, 2019, 'FFT-ETM based distortion less and high payload image steganography', Multimedia Tools and Applications, 78, pp. 25999 - 26022, http://dx.doi.org/10.1007/s11042-019-7664-7

Noor R; Khan A; Sarfaraz A, 2019, 'High Performance and Energy Efficient Image Watermarking for Video Using a Mobile Device', Wireless Personal Communications, 104, pp. 1535 - 1551, http://dx.doi.org/10.1007/s11277-018-6097-3

Noor R; Khan A; Sarfaraz A; Mehmood Z; Cheema AM, 2019, 'Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption', Soft Computing, 23, pp. 9821 - 9829, http://dx.doi.org/10.1007/s00500-019-03838-2

Khan A; Sarfaraz A, 2019, 'Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method', Soft Computing, 23, pp. 8045 - 8056, http://dx.doi.org/10.1007/s00500-018-3441-1

Khan A; Sarfaraz A, 2019, 'RNN-LSTM-GRU based language transformation', Soft Computing, 23, pp. 13007 - 13024, http://dx.doi.org/10.1007/s00500-019-04281-z

Khan A; Sarfaraz A, 2018, 'Practical Guidelines for Securing Wireless Local Area Networks (WLANs)', International Journal of Security and Its Applications, 12, pp. 19 - 28, http://dx.doi.org/10.14257/ijsia.2018.12.3.03

Sarfaraz A; Khan A, 2018, 'Feature Selection Based Correlation Attack on HTTPS Secure Searching', Wireless Personal Communications, 103, pp. 2995 - 3008, http://dx.doi.org/10.1007/s11277-018-5989-6

Sarfaraz A; Shaban M, 2015, 'Real-Time Volume Rendering of FCC Datasets Using Box-Splines on the Mobile Platforms', British Journal of Mathematics & Computer Science, 11, pp. 1 - 15, http://dx.doi.org/10.9734/bjmcs/2015/19044

김민호 ; Aaliya Sarfaraz ; 김현준 , 2013, 'Efficient GPU Isosurface Ray-casting of BCC Datasets', Journal of the Korea Computer Graphics Society, 19, pp. 19 - 27, http://dx.doi.org/10.15701/kcgs.2013.19.2.19


Back to profile page