


default search action
Toqeer Mahmood
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j23]Muhammad Haris Abid, Rehan Ashraf, Toqeer Mahmood, Cm Nadeem Faisal:
A robust technique for detection of hybrid adversarial attack in multi-modal medical imaging. Appl. Soft Comput. 193: 114842 (2026)- 2025
[j22]Tahir Farooq
, Chaudhry Muhammad Nadeem Faisal
, Javier de Andrés
, Zafar Saeed
, Sajid Anwer
, Toqeer Mahmood
:
Improving Perception of Usability Through User Interface Design Patterns to Optimize Information Architecture for Cognitive Benefits and User Satisfaction in Massive Open Online Courses. IEEE Access 13: 176259-176275 (2025)
[j21]Mohammad Ayub Latif
, Muhammad Khalid Khan
, Maaz Bin Ahmad
, Toqeer Mahmood
, Muhammad Tariq Mahmood
, Young-Bok Joo
:
Blockchain-Based Model to Predict Agile Software Estimation Using Machine Learning Techniques. IET Softw. 2025(1) (2025)- 2024
[j20]Muhammad Umar, Ibrar Hussain
, Toqeer Mahmood
, Hamid Turab Mirza, Chaudhry Muhammad Nadeem Faisal
:
Design Strategies to Minimize Mobile Usability Issues in Navigation Design Patterns. Inf. 15(11): 732 (2024)
[j19]Muhammad Haris Abid, Rehan Ashraf
, Toqeer Mahmood, Chaudhry Muhammad Nadeem Faisal
:
Optimized transfer learning based multi-modal medical image retrieval. Multim. Tools Appl. 83(15): 44069-44100 (2024)- 2023
[j18]Muhammad Saad, Maaz Bin Ahmad, Muhammad Asif, Muhammad Khalid Khan, Toqeer Mahmood, Muhammad Tariq Mahmood:
Blockchain-Enabled VANET for Smart Solid Waste Management. IEEE Access 11: 5679-5700 (2023)
[j17]Toqeer Mahmood, Saba Naseem, Rehan Ashraf
, Muhammad Asif
, Muhammad Umair
, Mohsin Shah:
Recognizing factors effecting the use of mobile banking apps through sentiment and thematic analysis on user reviews. Neural Comput. Appl. 35(27): 19885-19897 (2023)- 2022
[j16]Fahad Ashiq
, Muhammad Asif
, Maaz Bin Ahmad, Sadia Zafar, Khalid Masood, Toqeer Mahmood
, Muhammad Tariq Mahmood
, Ikhyun Lee
:
CNN-Based Object Recognition and Tracking System to Assist Visually Impaired People. IEEE Access 10: 14819-14834 (2022)
[j15]Muhammad Asif
, Maaz Bin Ahmad, Shiza Mushtaq, Khalid Masood, Toqeer Mahmood, Arfan Ali Nagra:
Long Multi-digit Number Recognition from Images Empowered by Deep Convolutional Neural Networks. Comput. J. 65(10): 2815-2827 (2022)
[j14]Mushtaq Ali
, Muhammad Zubair Asghar, Mohsin Shah, Toqeer Mahmood:
A simple and effective sub-image separation method. Multim. Tools Appl. 81(11): 14893-14910 (2022)
[j13]Mushtaq Ali
, Muhammad Zubair Asghar, Mohsin Shah, Toqeer Mahmood:
Correction to: A simple and effective sub-image separation method. Multim. Tools Appl. 81(11): 14911 (2022)- 2021
[j12]Muhammad Alyas Khan, Mushtaq Ali
, Mohsin Shah, Toqeer Mahmood, Muneer Ahmad
, N. Z. Jhanjhi
, Mohammad Arif Sobhan Bhuiyan, Emad Sami Jaha:
Machine Learning-based Detection and Classification of Walnut Fungi Diseases. Intell. Autom. Soft Comput. 30(3): 771-785 (2021)- 2020
[j11]Rehan Ashraf, Muhammad Asif Habib, Muhammad Akram, Muhammad Ahsan Latif, Muhammad Sheraz Arshad Malik, Muhammad Awais, Saadat Hanif Dar, Toqeer Mahmood, Muhammad Yasir, Zahoor Abbas:
Deep Convolution Neural Network for Big Data Medical Image Classification. IEEE Access 8: 105659-105670 (2020)
[j10]Toqeer Mahmood
, Mohsin Shah
, Junaid Rashid
, Tanzila Saba, Muhammad Wasif Nisar, Muhammad Asif
:
A passive technique for detecting copy-move forgeries by image feature matching. Multim. Tools Appl. 79(43-44): 31759-31782 (2020)
2010 – 2019
- 2019
[j9]Junaid Rashid
, Syed Muhammad Adnan Shah, Aun Irtaza, Toqeer Mahmood, Muhammad Wasif Nisar
, Muhammad Shafiq
, Akber Gardezi:
Topic Modeling Technique for Text Mining Over Biomedical Text Corpora Through Hybrid Inverse Documents Frequency and Fuzzy K-Means Clustering. IEEE Access 7: 146070-146080 (2019)
[j8]Uzma Sharif, Zahid Mehmood
, Toqeer Mahmood, Muhammad Arshad Javid, Amjad Rehman
, Tanzila Saba
:
Scene analysis and search using local features and support vector machine for effective content-based image retrieval. Artif. Intell. Rev. 52(2): 901-925 (2019)
[j7]Amjad Rehman
, Tanzila Saba, Toqeer Mahmood, Zahid Mehmood
, Mohsin Shah
, Adeel Anjum:
Data hiding technique in steganography for information security using number theory. J. Inf. Sci. 45(6) (2019)
[i1]Junaid Rashid, Toqeer Mahmood, Muhammad Wasif Nisar:
A Study on Software Metrics and its Impact on Software Quality. CoRR abs/1905.12922 (2019)- 2018
[j6]Zahid Mehmood
, Toqeer Mahmood, Muhammad Arshad Javid:
Content-based image retrieval and semantic automatic image annotation based on the weighted average of triangular histograms using support vector machine. Appl. Intell. 48(1): 166-181 (2018)
[j5]Toqeer Mahmood
, Zahid Mehmood
, Mohsin Shah
, Zakir Khan:
An efficient forensic technique for exposing region duplication forgery in digital images. Appl. Intell. 48(7): 1791-1801 (2018)
[j4]Zahid Mehmood
, Naila Gul, Muhammad Altaf
, Toqeer Mahmood, Tanzila Saba
, Amjad Rehman
, Muhammad Tariq Mahmood
:
Scene search based on the adapted triangular regions and soft clustering to improve the effectiveness of the visual-bag-of-words model. EURASIP J. Image Video Process. 2018: 48 (2018)
[j3]Toqeer Mahmood
, Zahid Mehmood
, Mohsin Shah
, Tanzila Saba
:
A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J. Vis. Commun. Image Represent. 53: 202-214 (2018)- 2016
[j2]Zakir Khan, Mohsin Shah, Muhammad Naeem, Toqeer Mahmood, Shah Khan:
Threshold-based steganography: a novel technique for improved payload and SNR. Int. Arab J. Inf. Technol. 13(4): 380-386 (2016)
[j1]Rehan Ashraf, Khalid Bashir Bajwa, Toqeer Mahmood:
Content-based Image Retrieval by Exploring Bandletized Regions through Support Vector Machines. J. Inf. Sci. Eng. 32(2): 245-269 (2016)- 2015
[c1]Mazhar Islam
, Mohsin Shah
, Zakir Khan, Toqeer Mahmood
, Muhammad Jamil Khan
:
A New Symmetric Key Encryption Algorithm Using Images as Secret Keys. FIT 2015: 1-5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-09 12:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







