default search action
Asad Malik
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Asad Waqar Malik (aka: Asad W. Malik, Asad Malik 0001) — National University of Sciences and Technology (NUST), School of Electrical Engineering and Computer Science (SEECS), Islamabad, Pakistan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Yanli Chen, Asad Malik, Hongxia Wang, Ben He, Yonghui Zhou, Hanzhou Wu:
Enhancing robustness in video data hiding against recompression with a wide parameter range. J. Inf. Secur. Appl. 83: 103796 (2024) - [c6]Asad Malik, Ayan Roy, Sanjay Madria:
Trusted Digital Twin Network for Intelligent Vehicles. NOMS 2024: 1-5 - [i8]Aquib Iqbal, Abid Hasan Zim, Md Asaduzzaman Tonmoy, Limengnan Zhou, Asad Malik, Minoru Kuribayashi:
EAViT: External Attention Vision Transformer for Audio Classification. CoRR abs/2408.13201 (2024) - [i7]Abid Hasan Zim, Aquib Iqbal, Asad Malik, Zhicheng Dong, Hanzhou Wu:
TCNFormer: Temporal Convolutional Network Former for Short-Term Wind Speed Forecasting. CoRR abs/2408.15737 (2024) - [i6]Abid Hasan Zim, Aquib Iqbal, Zaid Al-Huda, Asad Malik, Minoru Kuribayashi:
EfficientCrackNet: A Lightweight Model for Crack Segmentation. CoRR abs/2409.18099 (2024) - 2023
- [j19]Minoru Kuribayashi, Tatsuya Yasui, Asad Malik:
White Box Watermarking for Convolution Layers in Fine-Tuning Model Using the Constant Weight Code. J. Imaging 9(6): 117 (2023) - [j18]Shiyi Chen, Asad Malik, Xinpeng Zhang, Guorui Feng, Hanzhou Wu:
A Fast Method for Robust Video Watermarking Based on Zernike Moments. IEEE Trans. Circuits Syst. Video Technol. 33(12): 7342-7353 (2023) - 2022
- [j17]Asad Malik, Minoru Kuribayashi, Sani M. Abdullahi, Ahmad Neyaz Khan:
DeepFake Detection for Human Face Images and Videos: A Survey. IEEE Access 10: 18757-18775 (2022) - [j16]Khaled Moghalles, Heng-Chao Li, Zaid Al-Huda, Ali Raza, Asad Malik:
Weakly supervised building semantic segmentation via superpixel-CRF with initial deep seeds guiding. IET Image Process. 16(12): 3258-3267 (2022) - [j15]Daipeng Yang, Bo Peng, Zaid Al-Huda, Asad Malik, Donghai Zhai:
An overview of edge and object contour detection. Neurocomputing 488: 470-493 (2022) - [j14]Tatsuya Yasui, Takuro Tanaka, Asad Malik, Minoru Kuribayashi:
Coded DNN Watermark: Robustness against Pruning Models Using Constant Weight Code. J. Imaging 8(6): 152 (2022) - [j13]Mingxu Zhang, Hongxia Wang, Peisong He, Asad Malik, Hanqing Liu:
Exposing unseen GAN-generated image using unsupervised domain adaptation. Knowl. Based Syst. 257: 109905 (2022) - [c5]Mingxu Zhang, Hongxia Wang, Peisong He, Asad Malik, Hanqing Liu:
Improving GAN-Generated Image Detection Generalization Using Unsupervised Domain Adaptation. ICME 2022: 1-6 - [c4]Sani Mohammed Abdullahi, Shuifa Sun, Asad Malik, Otabek Khudayberdiev, Riskhan Basheer:
Spoofed Fingerprint Image Detection Using Local Phase Patch Segment Extraction and a Lightweight Network. IFIP Int. Conf. Digital Forensics 2022: 85-105 - [i5]Aeyan Ashraf, Asad Malik, Zahid Khan:
POSTER: Diagnosis of COVID-19 through Transfer Learning Techniques on CT Scans: A Comparison of Deep Learning Models. CoRR abs/2203.09348 (2022) - [i4]Abid Hasan Zim, Aeyan Ashraf, Aquib Iqbal, Asad Malik, Minoru Kuribayashi:
A Vision Transformer-Based Approach to Bearing Fault Classification via Vibration Signals. CoRR abs/2208.07070 (2022) - [i3]Asad Malik, Aeyan Ashraf, Hanzhou Wu, Minoru Kuribayashi:
Reversible Data Hiding in Encrypted Text Using Paillier Cryptosystem. CoRR abs/2209.11802 (2022) - 2021
- [j12]Yanli Chen, Hongxia Wang, Hanzhou Wu, Zhiqiang Wu, Tao Li, Asad Malik:
Adaptive Video Data Hiding through Cost Assignment and STCs. IEEE Trans. Dependable Secur. Comput. 18(3): 1320-1335 (2021) - [i2]Minoru Kuribayashi, Tatsuya Yasui, Asad Malik, Nobuo Funabiki:
Immunization of Pruning Attack in DNN Watermarking Using Constant Weight Code. CoRR abs/2107.02961 (2021) - 2020
- [j11]Asad Malik, Peisong He, Hongxia Wang, Ahmad Neyaz Khan, Saied Pirasteh, Sani M. Abdullahi:
High-Capacity Reversible Data Hiding in Encrypted Images Using Multi-Layer Embedding. IEEE Access 8: 148997-149010 (2020) - [j10]Asad Malik, Hongxia Wang, Yanli Chen, Ahmad Neyaz Khan:
A reversible data hiding in encrypted image based on prediction-error estimation and location map. Multim. Tools Appl. 79(17-18): 11591-11614 (2020) - [j9]Asad Malik, Hong-Xia Wang, Yanli Chen, Ahmad Neyaz Khan:
Correction to: A reversible data hiding in encrypted image based on prediction-error estimation and location map. Multim. Tools Appl. 79(17-18): 11615 (2020) - [j8]Asif Khan, Jian Ping Li, Amin Ul Haq, Shah Nazir, Naeem Ahmad, Naushad Varish, Asad Malik, Sarosh H. Patel:
Partial Observer Decision Process Model for Crane-Robot Action. Sci. Program. 2020: 6349342:1-6349342:14 (2020) - [j7]Ian Daly, Duncan Williams, Asad Malik, James Weaver, Alexis Kirke, Faustina Hwang, Eduardo Reck Miranda, Slawomir J. Nasuto:
Personalised, Multi-Modal, Affective State Detection for Hybrid Brain-Computer Music Interfacing. IEEE Trans. Affect. Comput. 11(1): 111-124 (2020)
2010 – 2019
- 2019
- [j6]Amin Ul Haq, Jian-Ping Li, Muhammad Hammad Memon, Jalaluddin Khan, Asad Malik, Tanvir Ahmad, Amjad Ali, Shah Nazir, Ijaz Ahad, Mohammad Shahid:
Feature Selection Based on L1-Norm Support Vector Machine and Effective Recognition System for Parkinson's Disease Using Voice Recordings. IEEE Access 7: 37718-37734 (2019) - [j5]Asad Malik, Hongxia Wang, Hanzhou Wu, Sani M. Abdullahi:
Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image. Int. J. Digit. Crime Forensics 11(1): 46-61 (2019) - [j4]Asad Malik, Hongxia Wang, Tailong Chen, Tianlong Yang, Ahmad Neyaz Khan, Hanzhou Wu, Yanli Chen, Yi Hu:
Reversible data hiding in homomorphically encrypted image using interpolation technique. J. Inf. Secur. Appl. 48 (2019) - [c3]Asad Malik, Hongxia Wang, Ahmad Neyaz Khan, Yanli Chen, Yi Chen:
A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted Images. IWDW 2019: 213-220 - 2018
- [j3]Yanli Chen, Hongxia Wang, Yi Hu, Asad Malik:
Intra-Frame Error Concealment Scheme Using 3D Reversible Data Hiding in Mobile Cloud Environment. IEEE Access 6: 77004-77013 (2018) - [j2]Sani M. Abdullahi, Hongxia Wang, Asad Malik:
Fingerprint Image Hashing Based on Minutiae Points and Shape Context. Int. J. Digit. Crime Forensics 10(4): 1-20 (2018) - [i1]Yanli Chen, Hongxia Wang, Hanzhou Wu, Yi Chen, Asad Malik:
Intra-Frame Error Concealment Scheme using 3D Reversible Data Hiding in Mobile Cloud Environment. CoRR abs/1804.00935 (2018) - 2015
- [j1]Duncan Williams, Alexis Kirke, Eduardo Reck Miranda, Ian Daly, James Hallowell, James Weaver, Asad Malik, Etienne B. Roesch, Faustina Hwang, Slawomir J. Nasuto:
Investigating Perceived Emotional Correlates of Rhythmic Density in Algorithmic Music Composition. ACM Trans. Appl. Percept. 12(3): 8:1-8:21 (2015) - [c2]Ian Daly, Asad Malik, James Weaver, Faustina Hwang, Slawomir J. Nasuto, Duncan Williams, Alexis Kirke, Eduardo Reck Miranda:
Identifying music-induced emotions from EEG for use in brain-computer music interfacing. ACII 2015: 923-929 - 2014
- [c1]Ian Daly, James Hallowell, Faustina Hwang, Alexis Kirke, Asad Malik, Etienne B. Roesch, James Weaver, Duncan Williams, Eduardo Reck Miranda, Slawomir J. Nasuto:
Changes in music tempo entrain movement related brain activity. EMBC 2014: 4595-4598
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint