Abid Mehmood

1.4k total citations
32 papers, 773 citations indexed

About

Abid Mehmood is a scholar working on Computer Vision and Pattern Recognition, Artificial Intelligence and Information Systems. According to data from OpenAlex, Abid Mehmood has authored 32 papers receiving a total of 773 indexed citations (citations by other indexed papers that have themselves been cited), including 18 papers in Computer Vision and Pattern Recognition, 13 papers in Artificial Intelligence and 9 papers in Information Systems. Recurrent topics in Abid Mehmood's work include Chaos-based Image/Signal Encryption (13 papers), Advanced Steganography and Watermarking Techniques (11 papers) and Advanced Malware Detection Techniques (6 papers). Abid Mehmood is often cited by papers focused on Chaos-based Image/Signal Encryption (13 papers), Advanced Steganography and Watermarking Techniques (11 papers) and Advanced Malware Detection Techniques (6 papers). Abid Mehmood collaborates with scholars based in United Arab Emirates, Pakistan and Australia. Abid Mehmood's co-authors include Arslan Shafique, Mourad Elhadef, Iynkaran Natgunanathan, Yong Xiang, Moatsum Alawida, Guang Hua, Song Guo, Oludare Isaac Abiodun, Belkacem Chikhaoui and Abdul Nasir Khan and has published in prestigious journals such as PLoS ONE, IEEE Access and IEEE Internet of Things Journal.

In The Last Decade

Abid Mehmood

29 papers receiving 728 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Abid Mehmood United Arab Emirates 13 331 223 219 173 117 32 773
Abbas Acar United States 11 667 2.0× 327 1.5× 161 0.7× 253 1.5× 160 1.4× 26 1.0k
Pei Li China 15 344 1.0× 182 0.8× 119 0.5× 179 1.0× 58 0.5× 64 823
Kaidi Xu United States 12 602 1.8× 102 0.5× 215 1.0× 110 0.6× 84 0.7× 44 947
John Wernsing United States 8 781 2.4× 223 1.0× 216 1.0× 252 1.5× 89 0.8× 13 1.1k
Jialong Zhang China 14 395 1.2× 271 1.2× 331 1.5× 574 3.3× 146 1.2× 46 1.1k
Jian Lou China 16 309 0.9× 85 0.4× 189 0.9× 55 0.3× 152 1.3× 88 703
Stacey Truex United States 13 1.4k 4.2× 158 0.7× 112 0.5× 125 0.7× 64 0.5× 19 1.5k
Lianhai Wang China 18 394 1.2× 465 2.1× 117 0.5× 427 2.5× 217 1.9× 107 1.1k

Countries citing papers authored by Abid Mehmood

Since Specialization
Citations

This map shows the geographic impact of Abid Mehmood's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Abid Mehmood with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Abid Mehmood more than expected).

Fields of papers citing papers by Abid Mehmood

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Abid Mehmood. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Abid Mehmood. The network helps show where Abid Mehmood may publish in the future.

Co-authorship network of co-authors of Abid Mehmood

This figure shows the co-authorship network connecting the top 25 collaborators of Abid Mehmood. A scholar is included among the top collaborators of Abid Mehmood based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Abid Mehmood. Abid Mehmood is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Mehmood, Abid, Abdul Nasir Khan, Iynkaran Natgunanathan, et al.. (2025). Enhanced lightweight and compromised-resilient image encryption for resource constrained environments. PLoS ONE. 20(3). e0320046–e0320046.
3.
Shafique, Arslan, Abid Mehmood, Moatsum Alawida, & Abdul Nasir Khan. (2025). Enhancing privacy in data transmission between IoT devices: A robust encryption and embedding framework for secure and meaningful image communication. Journal of Information Security and Applications. 93. 104112–104112.
4.
Shafique, Arslan, Abid Mehmood, Moatsum Alawida, Abdul Nasir Khan, & Junaid Shuja. (2025). Lightweight image encryption scheme for IoT environment and machine learning-driven robust S-box selection. Telecommunication Systems. 88(1). 2 indexed citations
5.
Khan, Abdul Nasir, Abid Mehmood, Muhammad Nasir Mumtaz Bhutta, Iftikhar Ahmed Khan, & Atta ur Rehman Khan. (2024). An efficient and compromise-resilient image encryption scheme for resource-constrained environments. PLoS ONE. 19(4). e0297534–e0297534. 6 indexed citations
6.
Shafique, Arslan, Abid Mehmood, Moatsum Alawida, Mourad Elhadef, & Mujeeb Ur Rehman. (2024). A fusion of machine learning and cryptography for fast data encryption through the encoding of high and moderate plaintext information blocks. Multimedia Tools and Applications. 84(8). 5349–5375. 8 indexed citations
8.
Arshad, Humaira, et al.. (2024). Enhancing Smishing Detection: A Deep Learning Approach for Improved Accuracy and Reduced False Positives. IEEE Access. 12. 137176–137193. 6 indexed citations
9.
Mehmood, Abid, Arslan Shafique, Neeraj Kumar, & Muhammad Nasir Mumtaz Bhutta. (2024). Data security in the Industrial Internet of Things (IIoT) through a triple-image encryption framework leveraging 3-D NEAT, 1DCJ, and 4DHCFO techniques. Computers & Electrical Engineering. 118. 109354–109354. 6 indexed citations
10.
Alawida, Moatsum, Bayan Abu Shawar, Oludare Isaac Abiodun, et al.. (2024). Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness. Information. 15(1). 27–27. 18 indexed citations
11.
12.
Shafique, Arslan, et al.. (2023). Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method. IEEE Access. 11. 44559–44577. 3 indexed citations
13.
Khan, Muhammad Usman Ghani, Abid Mehmood, Mourad Elhadef, & Shehzad Ashraf Chaudhry. (2023). Fake News Classification: Past, Current, and Future. Computers, materials & continua/Computers, materials & continua (Print). 77(2). 2225–2249. 1 indexed citations
14.
Saeed, Muhammad Haris, et al.. (2023). Sentiment Analysis for COVID-19 Vaccine Popularity. KSII Transactions on Internet and Information Systems. 17(5). 1 indexed citations
15.
Mehmood, Abid, Arslan Shafique, Shehzad Ashraf Chaudhry, et al.. (2023). A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption. Journal of Information Security and Applications. 78. 103590–103590. 10 indexed citations
16.
Khan, Muhammad Usman Ghani, Mourad Elhadef, & Abid Mehmood. (2022). Intelligent Urban Cities: Optimal Path Selection Based on Ad Hoc Network. IEEE Access. 11. 19259–19268. 3 indexed citations
17.
Shafique, Arslan, et al.. (2022). A lightweight noise-tolerant encryption scheme for secure communication: An unmanned aerial vehicle application. PLoS ONE. 17(9). e0273661–e0273661. 15 indexed citations
18.
Shafique, Arslan, Abid Mehmood, & Mourad Elhadef. (2021). Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles. IEEE Access. 9. 46927–46948. 61 indexed citations
19.
Shafique, Arslan, Abid Mehmood, & Mourad Elhadef. (2021). Detecting Signal Spoofing Attack in UAVs Using Machine Learning Models. IEEE Access. 9. 93803–93815. 90 indexed citations
20.
Natgunanathan, Iynkaran, Abid Mehmood, Yong Xiang, et al.. (2017). An overview of protection of privacy in multibiometrics. Multimedia Tools and Applications. 77(6). 6753–6773. 6 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026