Asad Malik

877 total citations
27 papers, 544 citations indexed

About

Asad Malik is a scholar working on Computer Vision and Pattern Recognition, Artificial Intelligence and Signal Processing. According to data from OpenAlex, Asad Malik has authored 27 papers receiving a total of 544 indexed citations (citations by other indexed papers that have themselves been cited), including 23 papers in Computer Vision and Pattern Recognition, 7 papers in Artificial Intelligence and 5 papers in Signal Processing. Recurrent topics in Asad Malik's work include Advanced Steganography and Watermarking Techniques (14 papers), Chaos-based Image/Signal Encryption (13 papers) and Digital Media Forensic Detection (13 papers). Asad Malik is often cited by papers focused on Advanced Steganography and Watermarking Techniques (14 papers), Chaos-based Image/Signal Encryption (13 papers) and Digital Media Forensic Detection (13 papers). Asad Malik collaborates with scholars based in China, India and Japan. Asad Malik's co-authors include Ahmad Neyaz Khan, Sani M. Abdullahi, Minoru Kuribayashi, Hongxia Wang, Hanzhou Wu, Shah Nazir, Amin Ul Haq, Jianping Li, Tanvir Ahmad and Jalaluddin Khan and has published in prestigious journals such as IEEE Access, Neurocomputing and IEEE Transactions on Circuits and Systems for Video Technology.

In The Last Decade

Asad Malik

27 papers receiving 524 citations

Peers

Asad Malik
Asad Malik
Citations per year, relative to Asad Malik Asad Malik (= 1×) peers Shihab Hamad Khaleefah

Countries citing papers authored by Asad Malik

Since Specialization
Citations

This map shows the geographic impact of Asad Malik's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Asad Malik with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Asad Malik more than expected).

Fields of papers citing papers by Asad Malik

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Asad Malik. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Asad Malik. The network helps show where Asad Malik may publish in the future.

Co-authorship network of co-authors of Asad Malik

This figure shows the co-authorship network connecting the top 25 collaborators of Asad Malik. A scholar is included among the top collaborators of Asad Malik based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Asad Malik. Asad Malik is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Malik, Asad, et al.. (2024). Enhancing robustness in video data hiding against recompression with a wide parameter range. Journal of Information Security and Applications. 83. 103796–103796. 1 indexed citations
2.
Kuribayashi, Minoru, et al.. (2023). White Box Watermarking for Convolution Layers in Fine-Tuning Model Using the Constant Weight Code. Journal of Imaging. 9(6). 117–117. 3 indexed citations
3.
Arif, Sajjad, et al.. (2023). Smart manufacturing with transfer learning under limited data: Towards Data-Driven Intelligences. Materials Today Communications. 37. 107357–107357. 3 indexed citations
4.
Chen, Shiyi, Asad Malik, Xinpeng Zhang, Guorui Feng, & Hanzhou Wu. (2023). A Fast Method for Robust Video Watermarking Based on Zernike Moments. IEEE Transactions on Circuits and Systems for Video Technology. 33(12). 7342–7353. 26 indexed citations
5.
Zhang, Mingxu, et al.. (2022). Exposing unseen GAN-generated image using unsupervised domain adaptation. Knowledge-Based Systems. 257. 109905–109905. 14 indexed citations
6.
Zhang, Chongfu, et al.. (2022). Efficient Reversible Data Hiding Based on Connected Component Construction and Prediction Error Adjustment. Mathematics. 10(15). 2804–2804. 2 indexed citations
7.
Malik, Asad, et al.. (2022). Coded DNN Watermark: Robustness against Pruning Models Using Constant Weight Code. Journal of Imaging. 8(6). 152–152. 3 indexed citations
8.
Peng, Bo, et al.. (2022). An overview of edge and object contour detection. Neurocomputing. 488. 470–493. 50 indexed citations
9.
Al‐Huda, Zaid, et al.. (2022). Weakly supervised building semantic segmentation via superpixel‐CRF with initial deep seeds guiding. IET Image Processing. 16(12). 3258–3267. 7 indexed citations
10.
Malik, Asad, Minoru Kuribayashi, Sani M. Abdullahi, & Ahmad Neyaz Khan. (2022). DeepFake Detection for Human Face Images and Videos: A Survey. IEEE Access. 10. 18757–18775. 120 indexed citations
11.
Li, Jianping, Amin Ul Haq, Shah Nazir, et al.. (2020). Partial Observer Decision Process Model for Crane-Robot Action. Scientific Programming. 2020. 1–14. 8 indexed citations
12.
Malik, Asad, Peisong He, Hongxia Wang, et al.. (2020). High-Capacity Reversible Data Hiding in Encrypted Images Using Multi-Layer Embedding. IEEE Access. 8. 148997–149010. 8 indexed citations
13.
Khan, Ahmad Neyaz, Ming Fan, Asad Malik, & Mohammed Aslam Husain. (2019). Advancements in Reversible Data Hiding in Encrypted Images Using Public Key Cryptography. 224–229. 6 indexed citations
14.
Malik, Asad, et al.. (2019). Reversible data hiding in homomorphically encrypted image using interpolation technique. Journal of Information Security and Applications. 48. 102374–102374. 22 indexed citations
15.
Khan, Ahmad Neyaz, Ming Fan, Asad Malik, & Raheel Ahmed Memon. (2019). Learning from Privacy Preserved Encrypted Data on Cloud Through Supervised and Unsupervised Machine Learning. 13 indexed citations
16.
Khan, Ahmad Neyaz, et al.. (2019). An Efficient Separable Reversible Data Hiding Using Paillier Cryptosystem for Preserving Privacy in Cloud Domain. Electronics. 8(6). 682–682. 9 indexed citations
17.
Wang, Hongxia, et al.. (2019). Adaptive Video Data Hiding through Cost Assignment and STCs. IEEE Transactions on Dependable and Secure Computing. 1–1. 30 indexed citations
18.
Khan, Ahmad Neyaz, Ming Fan, Asad Malik, & Mohammed Aslam Husain. (2019). Cryptanalyzing Merkle-Hellman Public Key Cryptosystem with Artificial Neural Networks. 1–7. 4 indexed citations
19.
Wang, Hongxia, et al.. (2018). Intra-Frame Error Concealment Scheme Using 3D Reversible Data Hiding in Mobile Cloud Environment. IEEE Access. 6. 77004–77013. 8 indexed citations
20.
Abdullahi, Sani M., Hongxia Wang, & Asad Malik. (2018). Fingerprint Image Hashing Based on Minutiae Points and Shape Context. International Journal of Digital Crime and Forensics. 10(4). 1–20. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026