|A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends|
F Zafar, A Khan, SUR Malik, M Ahmed, A Anjum, MI Khan, N Javed, ...
Computers & Security 65, 29-49, 2017
|Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes|
F Zafar, A Khan, S Suhail, I Ahmed, K Hameed, HM Khan, F Jabeen, ...
Journal of network and computer applications 94, 50-68, 2017
|Cloud‐based decision support system for the detection and classification of malignant cells in breast cancer using breast cytology images|
T Saba, SU Khan, N Islam, N Abbas, A Rehman, N Javaid, A Anjum
Microscopy research and technique 82 (6), 775-785, 2019
|An ensemble classification of exudates in color fundus images using an evolutionary algorithm based optimal features selection|
H Ullah, T Saba, N Islam, N Abbas, A Rehman, Z Mehmood, A Anjum
Microscopy research and technique 82 (4), 361-372, 2019
|Feature enhancement framework for brain tumor segmentation and classification|
B Tahir, S Iqbal, M Usman Ghani Khan, T Saba, Z Mehmood, A Anjum, ...
Microscopy research and technique 82 (6), 803-811, 2019
|Plasmodium life cycle stage classification based quantification of malaria parasitaemia in thin blood smears|
N Abbas, T Saba, A Rehman, Z Mehmood, H Kolivand, M Uddin, A Anjum
Microscopy research and technique 82 (3), 283-295, 2019
|m-Skin Doctor: a mobile enabled system for early melanoma skin cancer detection using support vector machine|
MA Taufiq, N Hameed, A Anjum, F Hameed
eHealth 360°, 468-475, 2017
|N-sanitization: A semantic privacy-preserving framework for unstructured medical datasets|
C Iwendi, SA Moqurrab, A Anjum, S Khan, S Mohan, G Srivastava
Computer Communications 161, 160-171, 2020
|An efficient privacy mechanism for electronic health records|
A Anjum, KKR Choo, A Khan, A Haroon, S Khan, SU Khan, N Ahmad, ...
computers & security 72, 196-211, 2018
|Improved generalization for secure data publishing|
S Yaseen, SMA Abbas, A Anjum, T Saba, A Khan, SUR Malik, N Ahmad, ...
IEEE Access 6, 27156-27165, 2018
|Data hiding technique in steganography for information security using number theory|
A Rehman, T Saba, T Mahmood, Z Mehmood, M Shah, A Anjum
Journal of information science 45 (6), 767-778, 2019
|Decision support system for risk assessment and management strategies in distributed software development|
A Aslam, N Ahmad, T Saba, AS Almazyad, A Rehman, A Anjum, A Khan
IEEE Access 5, 20349-20373, 2017
|An efficient approach for publishing microdata for multiple sensitive attributes|
A Anjum, N Ahmad, SUR Malik, S Zubair, B Shahzad
The Journal of Supercomputing 74 (10), 5127-5155, 2018
|Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities|
T Kanwal, A Anjum, A Khan
Cluster Computing 24 (1), 293-317, 2021
|Calculating completeness of agile scope in scaled agile development|
S Amjad, N Ahmad, T Saba, A Anjum, U Manzoor, MA Balubaid, ...
IEEE Access 6, 5822-5847, 2017
|τ-safety: A privacy model for sequential publication with arbitrary updates|
A Anjum, G Raschia, M Gelgon, A Khan, N Ahmad, M Ahmed, S Suhail, ...
computers & security 66, 20-39, 2017
|Performance prediction and adaptation for database management system workload using Case-Based Reasoning approach|
B Raza, YJ Kumar, AK Malik, A Anjum, M Faheem
Information Systems 76, 46-58, 2018
|Application of Data Warehouse in Real Life: State-of-the-art Survey from User Preferences’ Perspective|
MB Shahid, U Sheikh, B Raza, AK Munam Ali Shah, A Anjum, Q Javaid
International Journal of Advanced Computer Science and Applications - See …, 2016
|Anonymizing sequential releases under arbitrary updates|
A Anjum, G Raschia
Proceedings of the Joint EDBT/ICDT 2013 Workshops, 145-154, 2013
|θ-Sensitive k-Anonymity: An Anonymization Model for IoT based Electronic Health Records|
R Khan, X Tao, A Anjum, T Kanwal, SUR Malik, A Khan, WU Rehman, ...
Electronics 9 (5), 716, 2020