Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Haseeb Ahmad is active.

Publication


Featured researches published by Haseeb Ahmad.


Neurocomputing | 2016

Clustering by fast search and find of density peaks via heat diffusion

Rashid Mehmood; Guangzhi Zhang; Rongfang Bie; Hassan Dawood; Haseeb Ahmad

Clustering by fast search and find of density peaks (CFSFDP) is a novel algorithm that efficiently discovers the centers of clusters by finding the density peaks. The accuracy of CFSFDP depends on the accurate estimation of densities for a given dataset and also on the selection of the cutoff distance (dc). Mainly, dc is used to calculate the density of each data point and to identify the border points in the clusters. CFSFDP necessitates using different methods for estimating the densities of different datasets and the estimation of dc largely depends on subjective experience. To overcome the limitations of CFSFDP, this paper presents a method for CFSFDP via heat diffusion (CFSFDP-HD). CFSFDP-HD proposes a nonparametric method for estimating the probability distribution of a given dataset. Based on heat diffusion in an infinite domain, this method accounts for both selection of the cutoff distance and boundary correction of the kernel density estimation. Experimental results on standard clustering benchmark datasets validate the robustness and effectiveness of the proposed approach over CFSFDP, AP, mean shift, and K-means methods.


soft computing | 2018

Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption

Jing Li; Xiong Li; Licheng Wang; Debiao He; Haseeb Ahmad; Xinxin Niu

Attributed-based encryption (ABE) is a promising cryptographic access control mechanism with a rich expressiveness of ABE policies. Due to the high complexities of encryption and decryption, users are burdened with large computation cost. Fortunately, outsourcing technologies can be used to reduce the computation overhead for the ABE schemes. In the recent decade, the achievements of the outsourced ciphertext-policy ABE (CP-ABE) schemes are inspiring. But, the outsourcing encryption algorithms for CP-ABE schemes are not addressed properly since the encryption exponents are dynamic. In this paper, we present an efficient outsourced CP-ABE scheme with checkability, where the number of the exponential operations in the encryption can be reduced to a constant by introducing a blinding algorithm. Meanwhile, the ciphertext size is not increased. Furthermore, to guarantee the correctness of our scheme, we provide the verification mechanism based on a collision-resistance hash function, which allows the users to efficiently check the validity of messages and outsourced computation results. Besides, the proposed scheme is secure against replayable chosen ciphertext attacks based on Green’s outsourcing security model. Intensive experiments are carried out to illustrate the efficiency of the proposed scheme.


Applicable Algebra in Engineering, Communication and Computing | 2014

All exceptional groups of lie type have minimal logarithmic signatures

Haibo Hong; Licheng Wang; Yixian Yang; Haseeb Ahmad

As a special type of factorization of finite groups, logarithmic signature (LS) is used as the main component of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like


IEEE Access | 2017

Prediction of Rising Stars in the Game of Cricket

Haseeb Ahmad; Ali Daud; Licheng Wang; Haibo Hong; Hussain Dawood; Yixian Yang


China Communications | 2016

Cost effective scheme for OLT in next generation passive optical access network based on noise free optical multi carrier

Rahat Ullah; Bo Liu; Qi Zhang; Qinghua Tian; Amjad Ali; Yousaf Khan; Feng Tian; M. Azam Zia; Haseeb Ahmad; Lijia Zhang; Xiangjun Xin

MST_1, MST_2


Finite Fields and Their Applications | 2016

Construction of DNA codes by using algebraic number theory

Haibo Hong; Licheng Wang; Haseeb Ahmad; Jing Li; Yixian Yang; Changzhong Wu


Frontiers of Computer Science in China | 2018

Primitives towards verifiable computation: a survey

Haseeb Ahmad; Licheng Wang; Haibo Hong; Jing Li; Hassan Dawood; Manzoor Ahmed; Yixian Yang

MST1,MST2 and


Cluster Computing | 2018

Ligature based Urdu Nastaleeq sentence recognition using gated bidirectional long short term memory

Ibrar Ahmad; Xiaojie Wang; Yuz hao Mao; Guang Liu; Haseeb Ahmad; Rahat Ullah


Science in China Series F: Information Sciences | 2017

Minimum length key in MST cryptosystems

Haibo Hong; Licheng Wang; Haseeb Ahmad; Yixian Yang; Zhiguo Qu

MST_3


Journal of Information Processing Systems | 2017

Identifying Influential People Based on Interaction Strength

Muhammad Azam Zia; Zhongbao Zhang; Liutong Chen; Haseeb Ahmad; Sen Su

Collaboration


Dive into the Haseeb Ahmad's collaboration.

Top Co-Authors

Avatar

Licheng Wang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Yixian Yang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Haibo Hong

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Jing Li

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Jun Shao

Zhejiang Gongshang University

View shared research outputs
Top Co-Authors

Avatar

Muhammad Azam Zia

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Muhammad Hafeez

Huazhong Agricultural University

View shared research outputs
Top Co-Authors

Avatar

Sen Su

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Zhongbao Zhang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Ibrar Ahmad

Beijing University of Posts and Telecommunications

View shared research outputs
Researchain Logo
Decentralizing Knowledge