


default search action
Jamil Ahmad 0003
Person information
- affiliation: United Arab Emirates University, Al Ain City, UAE
Other persons with the same name
- Jamil Ahmad — disambiguation page
- Jamil Ahmad 0001
— Higher Education Commission (HEC), Islamabad, Pakistan (and 2 more) - Jamil Ahmad 0002
— University of Malakand, Department of Computer Science and Information Technology, Dir, Pakistan (and 1 more) - Jamil Ahmad 0004
— Italian Institute of Technology, Genoa, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j37]Jamil Ahmad
, Wail Gueaieb, Abdulmotaleb El Saddik, Giulia De Masi, Fakhri Karray:
Leveraging model explainability and fine-grained cutmix augmentation for robust detection of apricot diseases in UAV images. Expert Syst. Appl. 296: 128946 (2026)
[j36]Jamil Ahmad
, Mustaqeem Khan, Wail Guiaeab
, Abdulmotaleb Elsaddik
, Giulia De Masi
, Fakhri Karray
:
AG-CLIP: Attribute-Guided CLIP for Zero-Shot Fine-Grained Recognition. IEEE Open J. Comput. Soc. 7: 365-375 (2026)- 2025
[j35]Mustaqeem Khan
, Jamil Ahmad
, Wail Gueaieb
, Giulia De Masi, Fakhri Karray
, Abdulmotaleb El Saddik
:
Joint Multi-Scale Multimodal Transformer for Emotion Using Consumer Devices. IEEE Trans. Consumer Electron. 71(1): 1092-1101 (2025)
[j34]Abdulmotaleb El Saddik
, Jamil Ahmad
, Mustaqeem
, Saad Abouzahir
, Wail Gueaieb
:
Unleashing Creativity in the Metaverse: Generative AI and Multimodal Content. ACM Trans. Multim. Comput. Commun. Appl. 21(7): 186:1-186:43 (2025)
[i11]Muzammal Shafique, Nasir Rahim
, Jamil Ahmad, Mohammad Siadat, Khalid Malik, Ghaus M. Malik:
FocusSDF: Boundary-Aware Learning for Medical Image Segmentation via Signed Distance Supervision. CoRR abs/2511.11864 (2025)- 2024
[j33]Jamil Ahmad
, Wail Gueaieb, Abdulmotaleb El Saddik, Giulia De Masi, Fakhri Karray:
Yield estimation and health assessment of temperate fruits: A modular framework. Eng. Appl. Artif. Intell. 136: 108871 (2024)
[c5]Mustaqeem Khan, Jamil Ahmad, Abdulmotaleb El Saddik, Wail Gueaieb, Giulia De Masi, Fakhri Karray:
Drone-HAT: Hybrid Attention Transformer for Complex Action Recognition in Drone Surveillance Videos. CVPR Workshops 2024: 4713-4722
[c4]Jamil Ahmad
, Wail Gueaieb, Abdulmotaleb El Saddik, Giulia De Masi, Fakhri Karray:
Enabling Consumer UAVs for Precision Agriculture Applications: A Case Study of Yield Estimation. ICCE 2024: 1-6
[c3]Mustaqeem Khan, Jamil Ahmad
, Abdulmotaleb El Saddik, Wail Gueaieb:
Skin-Former: Mobile-Friendly Transformer for Skin Lesion Diagnosis. ICCE 2024: 1-6
[c2]Jamil Ahmad, Wail Gueaieb, Abdulmotaleb El Saddik, Giulia De Masi, Fakhri Karray:
Knowledge-Infused Learning for Fine-Grained Plant Disease Recognition. ICIP 2024: 395-401- 2023
[j32]Muhammad Irfan, Khalid Mahmood Malik, Jamil Ahmad
, Ghaus M. Malik:
StrokeNet: An automated approach for segmentation and rupture risk prediction of intracranial aneurysm. Comput. Medical Imaging Graph. 108: 102271 (2023)- 2022
[j31]Mansoor Nasir
, Khan Muhammad
, Amin Ullah
, Jamil Ahmad
, Sung Wook Baik, Muhammad Sajjad:
Enabling automation and edge intelligence over resource constraint IoT devices for smart home. Neurocomputing 491: 494-506 (2022)
[j30]Muhammad Wasim
, Imran Ahmed
, Jamil Ahmad
, Muhammad Nawaz, Eatedal Alabdulkreem, Yazeed Ghadi
:
A video summarization framework based on activity attention modeling using deep features for smart campus surveillance system. PeerJ Comput. Sci. 8: e911 (2022)- 2021
[j29]Muhammad Wasim
, Imran Ahmed
, Jamil Ahmad
, Mohammad Mehedi Hassan
:
A Novel Deep Learning Based Automated Academic Activities Recognition in Cyber-Physical Systems. IEEE Access 9: 63718-63728 (2021)
[j28]Zanobya N. Khan
, Jamil Ahmad
:
Attention induced multi-head convolutional neural network for human activity recognition. Appl. Soft Comput. 110: 107671 (2021)- 2020
[j27]Yasir Shahzad, Huma Javed, Haleem Farman
, Jamil Ahmad
, Bilal Jan, Muhammad Zubair:
Internet of Energy: Opportunities, applications, architectures and challenges in smart industries. Comput. Electr. Eng. 86: 106739 (2020)
[j26]Jamil Ahmad
, Bilal Jan, Haleem Farman
, Wakeel Ahmad, Atta Ullah:
Disease Detection in Plum Using Convolutional Neural Network under True Field Conditions. Sensors 20(19): 5569 (2020)
2010 – 2019
- 2019
[j25]Jamil Ahmad
, Khan Muhammad
, Syed Inayat Ali Shah, Arun Kumar Sangaiah
, Sung Wook Baik:
Partially shaded sketch-based image search in real mobile device environments via sketch-oriented compact neural codes. J. Real Time Image Process. 16(1): 227-240 (2019)
[j24]Abdul Malik Badshah, Nasir Rahim
, Noor Ullah, Jamil Ahmad
, Khan Muhammad
, Mi Young Lee, Soon-il Kwon
, Sung Wook Baik
:
Deep features-based speech emotion recognition for smart affective services. Multim. Tools Appl. 78(5): 5571-5589 (2019)
[j23]Khan Muhammad
, Jamil Ahmad
, Zhihan Lv
, Paolo Bellavista
, Po Yang
, Sung Wook Baik
:
Efficient Deep CNN-Based Fire Detection and Localization in Video Surveillance Applications. IEEE Trans. Syst. Man Cybern. Syst. 49(7): 1419-1434 (2019)- 2018
[j22]Amin Ullah
, Jamil Ahmad
, Khan Muhammad
, Muhammad Sajjad
, Sung Wook Baik
:
Action Recognition in Video Sequences using Deep Bi-Directional LSTM With CNN Features. IEEE Access 6: 1155-1166 (2018)
[j21]Khan Muhammad
, Jamil Ahmad
, Irfan Mehmood
, Seungmin Rho
, Sung Wook Baik:
Convolutional Neural Networks Based Fire Detection in Surveillance Videos. IEEE Access 6: 18174-18183 (2018)
[j20]Jamil Ahmad
, Khan Muhammad
, Imran Ahmed
, Wakeel Ahmad, Melvyn L. Smith
, Lyndon N. Smith
, Deepak Kumar Jain, Haoxiang Wang, Irfan Mehmood
:
Visual features based boosted classification of weeds for real-time selective herbicide sprayer systems. Comput. Ind. 98: 23-33 (2018)
[j19]Nasir Rahim
, Jamil Ahmad
, Khan Muhammad
, Arun Kumar Sangaiah
, Sung Wook Baik:
Privacy-preserving image retrieval for mobile devices with deep features on the cloud. Comput. Commun. 127: 75-85 (2018)
[j18]Jamil Ahmad
, Khan Muhammad
, Sambit Bakshi
, Sung Wook Baik
:
Object-oriented convolutional features for fine-grained image retrieval in large surveillance datasets. Future Gener. Comput. Syst. 81: 314-330 (2018)
[j17]Khan Muhammad
, Jamil Ahmad
, Sung Wook Baik:
Early fire detection using convolutional neural networks during surveillance for effective disaster management. Neurocomputing 288: 30-42 (2018)
[j16]Jamil Ahmad
, Khan Muhammad
, Sung Wook Baik
:
Medical Image Retrieval with Compact Binary Codes Generated in Frequency Domain Using Highly Reactive Convolutional Features. J. Medical Syst. 42(1): 24:1-24:19 (2018)
[j15]Muhammad Sajjad, Amin Ullah
, Jamil Ahmad
, Naveed Abbas
, Seungmin Rho, Sung Wook Baik
:
Integrating salient colors with rotational invariant texture features for image representation in retrieval systems. Multim. Tools Appl. 77(4): 4769-4789 (2018)
[j14]Jamil Ahmad
, Muhammad Sajjad, Seungmin Rho, Soon-il Kwon
, Mi Young Lee, Sung Wook Baik
:
Determining speaker attributes from stress-affected speech in emergency situations with hybrid SVM-DNN architecture. Multim. Tools Appl. 77(4): 4883-4907 (2018)
[j13]Jamil Ahmad
, Khan Muhammad
, Jaime Lloret
, Sung Wook Baik
:
Efficient Conversion of Deep Features to Compact Binary Codes Using Fourier Decomposition for Multimedia Big Data. IEEE Trans. Ind. Informatics 14(7): 3205-3215 (2018)
[j12]Khan Muhammad
, Rafik Hamza
, Jamil Ahmad
, Jaime Lloret
, Haoxiang Wang, Sung Wook Baik
:
Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption. IEEE Trans. Ind. Informatics 14(8): 3679-3689 (2018)- 2017
[j11]Jamil Ahmad
, Irfan Mehmood
, Seungmin Rho, Naveen K. Chilamkurti, Sung Wook Baik
:
Embedded deep vision in smart cameras for multi-view objects representation and retrieval. Comput. Electr. Eng. 61: 297-311 (2017)
[j10]Jamil Ahmad
, Khan Muhammad
, Mi Young Lee, Sung Wook Baik
:
Endoscopic Image Classification and Retrieval using Clustered Convolutional Features. J. Medical Syst. 41(12): 196:1-196:12 (2017)
[j9]Jamil Ahmad
, Muhammad Sajjad, Irfan Mehmood
, Seungmin Rho, Sung Wook Baik
:
Saliency-weighted graphs for efficient visual content description and their applications in real-time image retrieval systems. J. Real Time Image Process. 13(3): 431-447 (2017)
[j8]Jamil Ahmad
, Irfan Mehmood
, Sung Wook Baik
:
Efficient object-based surveillance image search using spatial pooling of convolutional features. J. Vis. Commun. Image Represent. 45: 62-76 (2017)
[j7]Jamil Ahmad
, Muhammad Sajjad, Zahoor Jan, Irfan Mehmood
, Seungmin Rho, Sung Wook Baik
:
Analysis of interaction trace maps for active authentication on smart devices. Multim. Tools Appl. 76(3): 4069-4087 (2017)
[j6]Khan Muhammad
, Jamil Ahmad
, Naeem Ur Rehman, Zahoor Jan, Muhammad Sajjad:
CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multim. Tools Appl. 76(6): 8597-8626 (2017)
[j5]Khan Muhammad
, Jamil Ahmad
, Seungmin Rho, Sung Wook Baik
:
Image steganography for authenticity of visual contents in social networks. Multim. Tools Appl. 76(18): 18985-19004 (2017)- 2016
[j4]Jamil Ahmad, Khan Muhammad, Zahoor Jan:
Exploiting angular profiles signature for shape-based image classification and retrieval. Int. J. Appl. Pattern Recognit. 3(3): 276-292 (2016)
[j3]Haleem Farman
, Huma Javed
, Jamil Ahmad
, Bilal Jan, Muhammad Zeeshan
:
Grid-Based Hybrid Network Deployment Approach for Energy Efficient Wireless Sensor Networks. J. Sensors 2016: 2326917:1-2326917:14 (2016)
[j2]Jamil Ahmad
, Muhammad Sajjad, Seungmin Rho, Sung Wook Baik
:
Multi-scale local structure patterns histogram for describing visual contents in social image retrieval systems. Multim. Tools Appl. 75(20): 12669-12692 (2016)
[i10]Khan Muhammad, Jamil Ahmad, Haleem Farman, Zahoor Jan:
A New Image Steganographic Technique using Pattern based Bits Shuffling and Magic LSB for Grayscale Images. CoRR abs/1601.01386 (2016)
[i9]Jamil Ahmad, Mustansar Fiaz
, Soon-il Kwon, Maleerat Sodanil, Bay Vo, Sung Wook Baik:
Gender Identification using MFCC for Telephone Applications - A Comparative Study. CoRR abs/1601.01577 (2016)
[i8]Zanobya N. Khan, Rashid Jalal Qureshi, Jamil Ahmad:
On Feature based Delaunay Triangulation for Palmprint Recognition. CoRR abs/1602.01927 (2016)
[i7]Abdul Malik Badshah, Jamil Ahmad, Mi Young Lee, Sung Wook Baik:
Divide-and-Conquer based Ensemble to Spot Emotions in Speech using MFCC and Random Forest. CoRR abs/1610.01382 (2016)- 2015
[j1]Khan Muhammad
, Jamil Ahmad
, Haleem Farman
, Zahoor Jan, Muhammad Sajjad, Sung Wook Baik
:
A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. KSII Trans. Internet Inf. Syst. 9(5): 1938-1962 (2015)
[c1]Jamil Ahmad
, Muhammad Sajjad, Irfan Mehmood
, Sung Wook Baik
:
SSH: Salient Structures Histogram for Content Based Image Retrieval. NBiS 2015: 212-217
[i6]Jamil Ahmad, Muhammad Sajjad, Irfan Mehmood, Seungmin Rho, Sung Wook Baik:
Describing Colors, Textures and Shapes for Content Based Image Retrieval - A Survey. CoRR abs/1502.07041 (2015)
[i5]Khan Muhammad, Jamil Ahmad, Naeem Ur Rehman, Zahoor Jan, Rashid Jalal Qureshi:
A Secure Cyclic Steganographic Technique for Color Images using Randomization. CoRR abs/1502.07808 (2015)
[i4]Khan Muhammad, Jamil Ahmad, Haleem Farman, Muhammad Zubair:
A Novel Image Steganographic Approach for Hiding Text in Color Images using HSI Color Model. CoRR abs/1503.00388 (2015)
[i3]Khan Muhammad, Zahoor Jan, Jamil Ahmad, Zahid Khan:
An Adaptive Secret Key-directed Cryptographic Scheme for Secure Transmission in Wireless Sensor Networks. CoRR abs/1510.00226 (2015)
[i2]Khan Muhammad, Jamil Ahmad, Muhammad Sajjad, Muhammad Zubair:
Secure Image Steganography using Cryptography and Image Transposition. CoRR abs/1510.04413 (2015)- 2014
[i1]Jamil Ahmad, Zahoor Jan, Zia Ud Din, Shoaib Muhammad Khan:
A Fusion of Labeled-Grid Shape Descriptors with Weighted Ranking Algorithm for Shapes Recognition. CoRR abs/1406.3949 (2014)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-26 23:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







