Shahidan M. Abdullah

1.2k total citations · 1 hit paper
24 papers, 835 citations indexed

About

Shahidan M. Abdullah is a scholar working on Computer Vision and Pattern Recognition, Computer Networks and Communications and Artificial Intelligence. According to data from OpenAlex, Shahidan M. Abdullah has authored 24 papers receiving a total of 835 indexed citations (citations by other indexed papers that have themselves been cited), including 15 papers in Computer Vision and Pattern Recognition, 7 papers in Computer Networks and Communications and 5 papers in Artificial Intelligence. Recurrent topics in Shahidan M. Abdullah's work include Advanced Steganography and Watermarking Techniques (10 papers), Digital Media Forensic Detection (9 papers) and Chaos-based Image/Signal Encryption (7 papers). Shahidan M. Abdullah is often cited by papers focused on Advanced Steganography and Watermarking Techniques (10 papers), Digital Media Forensic Detection (9 papers) and Chaos-based Image/Signal Encryption (7 papers). Shahidan M. Abdullah collaborates with scholars based in Malaysia, Jordan and United States. Shahidan M. Abdullah's co-authors include Mazdak Zamani, Sasan Karamizadeh, Azizah Abdul Manaf, Mohammad Rajabi, Saiful Adli Ismail, Azizah Bt Abdul Manaf, Akram M. Zeki, Siti Zaiton Mohd Hashim, Saman Shojae Chaeikar and Parham Nooralishahi and has published in prestigious journals such as Multimedia Tools and Applications, Journal of Computer Networks and Communications and International Journal of Digital Content Technology and its Applications.

In The Last Decade

Shahidan M. Abdullah

24 papers receiving 750 citations

Hit Papers

An Overview of Principal Component Analysis 2013 2026 2017 2021 2013 100 200 300

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Shahidan M. Abdullah Malaysia 12 250 188 137 122 87 24 835
Nasir Ahmad Pakistan 13 246 1.0× 322 1.7× 123 0.9× 72 0.6× 109 1.3× 60 1.1k
Samina Khalid Pakistan 11 236 0.9× 390 2.1× 89 0.6× 104 0.9× 110 1.3× 27 1.1k
Shamila Nasreen Pakistan 6 161 0.6× 377 2.0× 92 0.7× 93 0.8× 92 1.1× 7 877
Bhushankumar Nemade India 10 163 0.7× 195 1.0× 67 0.5× 55 0.5× 91 1.0× 27 808
En Fan China 11 236 0.9× 271 1.4× 70 0.5× 149 1.2× 62 0.7× 44 974
Maria Presa Reyes United States 7 256 1.0× 426 2.3× 79 0.6× 117 1.0× 84 1.0× 7 1.0k
Renato Cordeiro de Amorim United Kingdom 14 222 0.9× 416 2.2× 109 0.8× 57 0.5× 102 1.2× 37 888
Jiachen Liu China 13 262 1.0× 491 2.6× 84 0.6× 79 0.6× 83 1.0× 37 908
Sunil Aryal Australia 19 259 1.0× 481 2.6× 79 0.6× 114 0.9× 49 0.6× 66 1.1k
Rupesh Gupta India 20 233 0.9× 245 1.3× 54 0.4× 72 0.6× 65 0.7× 210 1.3k

Countries citing papers authored by Shahidan M. Abdullah

Since Specialization
Citations

This map shows the geographic impact of Shahidan M. Abdullah's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Shahidan M. Abdullah with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Shahidan M. Abdullah more than expected).

Fields of papers citing papers by Shahidan M. Abdullah

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Shahidan M. Abdullah. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Shahidan M. Abdullah. The network helps show where Shahidan M. Abdullah may publish in the future.

Co-authorship network of co-authors of Shahidan M. Abdullah

This figure shows the co-authorship network connecting the top 25 collaborators of Shahidan M. Abdullah. A scholar is included among the top collaborators of Shahidan M. Abdullah based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Shahidan M. Abdullah. Shahidan M. Abdullah is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Abdullah, Shahidan M., et al.. (2019). Review of Recent Detection Methods for HTTP DDoS Attack. Journal of Computer Networks and Communications. 2019. 1–10. 75 indexed citations
2.
Karamizadeh, Sasan & Shahidan M. Abdullah. (2018). Race classification using gaussian-based weight K-nn algorithm for face recognition. Journal of Engineering Research. 6(2). 103–121. 2 indexed citations
3.
Karamizadeh, Sasan, et al.. (2017). Taxonomy of Filtering Based Illumination Normalization for Face Recognition. Journal of Telecommunication Electronic and Computer Engineering (JTEC). 9. 135–139. 1 indexed citations
4.
Karamizadeh, Sasan, et al.. (2017). Threshold based skin color classification. Journal of Telecommunication Electronic and Computer Engineering (JTEC). 9. 131–134. 2 indexed citations
5.
Abdullah, Shahidan M., et al.. (2016). A robust scheme to defend against disassociation and deauthentication DoS attacks in WLAN networks. Journal of Theoretical and Applied Information Technology. 93(2). 312–322. 1 indexed citations
6.
Karamizadeh, Sasan, et al.. (2015). Filtering Based Illumination Normalization Techniques for Face Recognition. TELKOMNIKA Indonesian Journal of Electrical Engineering. 13(2). 5 indexed citations
7.
Abdullah, Shahidan M., et al.. (2015). An overview of objectionable image detection. 396–400. 2 indexed citations
8.
Abdullah, Shahidan M., et al.. (2015). A robust video watermarking technique for the tamper detection of surveillance systems. Multimedia Tools and Applications. 75(18). 10855–10885. 36 indexed citations
9.
Karamizadeh, Sasan, et al.. (2014). Advantage and drawback of support vector machine functionality. 63–65. 148 indexed citations
10.
Zamani, Mazdak, et al.. (2013). A Taxonomy of SQL Injection Attacks. 269–273. 25 indexed citations
11.
Zamani, Mazdak, et al.. (2013). A survey for prevention of black hole attacks in wireless mobile adhoc networks using IDS agents. 4 indexed citations
12.
Zamani, Mazdak, et al.. (2013). A secure model for prevention of black hole attack in wireless mobile ad hoc networks. 2 indexed citations
13.
Zamani, Mazdak, et al.. (2013). A survey for prevention of black hole attacks in wireless mobile adhoc networks using cryptographic techniques. 3 indexed citations
14.
Karamizadeh, Sasan, et al.. (2013). An Overview of Principal Component Analysis. Journal of Signal and Information Processing. 4(3). 173–175. 376 indexed citations breakdown →
15.
Zamani, Mazdak, Azizah Bt Abdul Manaf, Shahidan M. Abdullah, & Saman Shojae Chaeikar. (2012). Correlation between PSNR and bit per sample rate in audio steganography. International Conference on Signal Processing. 163–168. 15 indexed citations
16.
Zamani, Mazdak, Azizah Bt Abdul Manaf, & Shahidan M. Abdullah. (2012). Correlation between PSNR and size ratio in audio steganography. International Conference on Signal Processing. 82–87. 7 indexed citations
17.
Zeki, Akram M., et al.. (2011). Comparative study of different steganographic techniques. 48–52. 3 indexed citations
18.
Abdullah, Shahidan M., Azizah Abdul Manaf, & Mazdak Zamani. (2010). Recursive Reversible Image Watermarking Using Enhancement of Difference Expansion Techniques. 11 indexed citations
19.
Zamani, Mazdak, et al.. (2009). Genetic Algorithm as an Approach to Resolve the Problems of Substitution Techniques of Audio Steganography.. 170–175. 15 indexed citations
20.
Zamani, Mazdak, et al.. (2009). A Genetic-Algorithm-Based Approach For Audio Steganography. Zenodo (CERN European Organization for Nuclear Research). 3(6). 1562–1565. 39 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026