| An energy-efficient mobility-based cluster head selection for lifetime enhancement of wireless sensor networks S Umbreen, D Shehzad, N Shafi, B Khan, U Habib Ieee Access 8, 207779-207793, 2020 | 86 | 2020 |
| BHCNet: neural network-based brain hemorrhage classification using head CT scan MF Mushtaq, M Shahroz, AM Aseere, H Shah, R Majeed, D Shehzad, ... Ieee Access 9, 113901-113916, 2021 | 57 | 2021 |
| Securing internet of drones with identity-based proxy signcryption MA Khan, H Shah, SU Rehman, N Kumar, R Ghazali, D Shehzad, I Ullah IEEE Access 9, 89133-89142, 2021 | 57 | 2021 |
| Enhancing localization efficiency and accuracy in wireless sensor networks M Fawad, MZ Khan, K Ullah, H Alasmary, D Shehzad, B Khan Sensors 23 (5), 2796, 2023 | 47 | 2023 |
| Traditional and hybrid access control models: A detailed survey MU Aftab, A Hamza, A Oluwasanmi, X Nie, MS Sarfraz, D Shehzad, Z Qin, ... Security and Communication Networks 2022 (1), 1560885, 2022 | 32 | 2022 |
| Threshold-based Steganography: A Novel Technique for Improved Payload and SNR. Z Khan, M Shah, M Naeem, T Mahmood, S Khan, N Ul Amin, D Shahzad International Arab Journal of Information Technology (IAJIT) 13 (4), 2016 | 29 | 2016 |
| Novel secure hybrid image steganography technique based on pattern matching A Hamza, D Shehzad, MS Sarfraz, U Habib, N Shafi KSII transactions on internet and information systems (TIIS) 15 (3), 1051-1077, 2021 | 25 | 2021 |
| LSB image steganography based on blocks matrix determinant method D Shehzad, T Dag KSII Transactions on Internet and Information Systems (TIIS) 13 (7), 3778-3793, 2019 | 18 | 2019 |
| A novel image steganography technique based on similarity of bits pairs D Shehzad, T Dag 2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC), 99-104, 2017 | 16 | 2017 |
| Analysis of cybersecurity measures for detection, prevention, and misbehaviour of social systems A Imtiaz, D Shehzad, F Nasim, M Afzaal, M Rehman, A Imran 2023 Tenth International Conference on Social Networks Analysis, Management …, 2023 | 15 | 2023 |
| Novel application software for the semi-automated analysis of infrared meibography images D Shehzad, S Gorcuyeva, T Dag, B Bozkurt Cornea 38 (11), 1456-1464, 2019 | 15 | 2019 |
| A novel hybrid encryption scheme to ensure Hadoop based cloud data security D Shehzad, Z Khan, H Dag, Z Bozkus International Journal of Computer Science and Information Security 14 (4), 2016 | 15 | 2016 |
| Blockchain technology the future of cybersecurity A Imtiaz, D Shehzad, H Akbar, M Afzaal, M Zubair, F Nasim 2023 24th International Arab Conference on Information Technology (ACIT), 1-5, 2023 | 13 | 2023 |
| Blockchains and triple-entry accounting for B2B business models MI Sarwar, K Nisar, I Khan, D Shehzad Ledger 8, 2023 | 12 | 2023 |
| Fully automated skull stripping from brain magnetic resonance images using mask RCNN-based deep learning neural networks H Azam, H Tariq, D Shehzad, S Akbar, H Shah, ZA Khan Brain Sciences 13 (9), 1255, 2023 | 11 | 2023 |
| Optimizing NEURON brain simulator with remote memory access on distributed memory systems D Shehzad, Z Bozkus 2015 International Conference on Emerging Technologies (ICET), 1-5, 2015 | 9 | 2015 |
| LSB steganography using bits complementation M Shah | 8 | 2014 |
| Performance improvement of threshold based audio steganography using parallel computation M Shoaib, Z Khan, D Shehzad, T Dag, AI Umar, NU Amin International Journal of Advanced Computer Science and Applications 7 (10), 2016 | 6 | 2016 |
| Threats and Mitigation Strategies for Electroencephalography‐Based Person Authentication Z Unnisa, A Tariq, IU Din, D Shehzad, MA Serhani, AN Belkacem, ... International Journal of Telemedicine and Applications 2025 (1), 3946740, 2025 | 5 | 2025 |
| The Rise of Cloud Computing: Data Protection J Hassan, D Shehzad, U Habib, MU Aftab, M Ahmad, R Kuleev, ... Privacy, and Open Research Challenges-A Systematic Literature Review (SLR …, 2022 | 5 | 2022 |