Haseeb Ahmad
Beijing University of Posts and Telecommunications
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Haseeb Ahmad.
Neurocomputing | 2016
Rashid Mehmood; Guangzhi Zhang; Rongfang Bie; Hassan Dawood; Haseeb Ahmad
Clustering by fast search and find of density peaks (CFSFDP) is a novel algorithm that efficiently discovers the centers of clusters by finding the density peaks. The accuracy of CFSFDP depends on the accurate estimation of densities for a given dataset and also on the selection of the cutoff distance (dc). Mainly, dc is used to calculate the density of each data point and to identify the border points in the clusters. CFSFDP necessitates using different methods for estimating the densities of different datasets and the estimation of dc largely depends on subjective experience. To overcome the limitations of CFSFDP, this paper presents a method for CFSFDP via heat diffusion (CFSFDP-HD). CFSFDP-HD proposes a nonparametric method for estimating the probability distribution of a given dataset. Based on heat diffusion in an infinite domain, this method accounts for both selection of the cutoff distance and boundary correction of the kernel density estimation. Experimental results on standard clustering benchmark datasets validate the robustness and effectiveness of the proposed approach over CFSFDP, AP, mean shift, and K-means methods.
soft computing | 2018
Jing Li; Xiong Li; Licheng Wang; Debiao He; Haseeb Ahmad; Xinxin Niu
Attributed-based encryption (ABE) is a promising cryptographic access control mechanism with a rich expressiveness of ABE policies. Due to the high complexities of encryption and decryption, users are burdened with large computation cost. Fortunately, outsourcing technologies can be used to reduce the computation overhead for the ABE schemes. In the recent decade, the achievements of the outsourced ciphertext-policy ABE (CP-ABE) schemes are inspiring. But, the outsourcing encryption algorithms for CP-ABE schemes are not addressed properly since the encryption exponents are dynamic. In this paper, we present an efficient outsourced CP-ABE scheme with checkability, where the number of the exponential operations in the encryption can be reduced to a constant by introducing a blinding algorithm. Meanwhile, the ciphertext size is not increased. Furthermore, to guarantee the correctness of our scheme, we provide the verification mechanism based on a collision-resistance hash function, which allows the users to efficiently check the validity of messages and outsourced computation results. Besides, the proposed scheme is secure against replayable chosen ciphertext attacks based on Green’s outsourcing security model. Intensive experiments are carried out to illustrate the efficiency of the proposed scheme.
Applicable Algebra in Engineering, Communication and Computing | 2014
Haibo Hong; Licheng Wang; Yixian Yang; Haseeb Ahmad
As a special type of factorization of finite groups, logarithmic signature (LS) is used as the main component of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like
IEEE Access | 2017
Haseeb Ahmad; Ali Daud; Licheng Wang; Haibo Hong; Hussain Dawood; Yixian Yang
China Communications | 2016
Rahat Ullah; Bo Liu; Qi Zhang; Qinghua Tian; Amjad Ali; Yousaf Khan; Feng Tian; M. Azam Zia; Haseeb Ahmad; Lijia Zhang; Xiangjun Xin
MST_1, MST_2
Finite Fields and Their Applications | 2016
Haibo Hong; Licheng Wang; Haseeb Ahmad; Jing Li; Yixian Yang; Changzhong Wu
Frontiers of Computer Science in China | 2018
Haseeb Ahmad; Licheng Wang; Haibo Hong; Jing Li; Hassan Dawood; Manzoor Ahmed; Yixian Yang
MST1,MST2 and
Cluster Computing | 2018
Ibrar Ahmad; Xiaojie Wang; Yuz hao Mao; Guang Liu; Haseeb Ahmad; Rahat Ullah
Science in China Series F: Information Sciences | 2017
Haibo Hong; Licheng Wang; Haseeb Ahmad; Yixian Yang; Zhiguo Qu
MST_3
Journal of Information Processing Systems | 2017
Muhammad Azam Zia; Zhongbao Zhang; Liutong Chen; Haseeb Ahmad; Sen Su