default search action
Tohari Ahmad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Swardiantara Silalahi, Tohari Ahmad, Hudan Studiawan, Eirini Anthi, Lowri Williams:
Severity-Oriented Multiclass Drone Flight Logs Anomaly Detection. IEEE Access 12: 64252-64266 (2024) - [j24]Jean De La Croix Ntivuguruzwa, Tohari Ahmad, Fengling Han:
Comprehensive survey on image steganalysis using deep learning. Array 22: 100353 (2024) - [j23]Muhammad Aidiel Rachman Putra, Tohari Ahmad, Dandy Pramana Hostiadi:
B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows. J. Big Data 11(1): 49 (2024) - [j22]Daffa Tristan Firdaus, Jean De La Croix Ntivuguruzwa, Tohari Ahmad:
AudioSecure: An open-source code to secure data using interpolation and multi-layering techniques within audio covers. Softw. Impacts 22: 100707 (2024) - [j21]Jean De La Croix Ntivuguruzwa, Tohari Ahmad:
FuzConvSteganalysis: Steganalysis via fuzzy logic and convolutional neural network. SoftwareX 26: 101713 (2024) - [c32]Jean De La Croix Ntivuguruzwa, Muhammad Aidiel Rachman Putra, Tohari Ahmad:
Toward the Confidential Data Location in Spatial Domain Images via a Genetic-based Pooling in a Convolutional Neural Network. ICCAE 2024: 283-288 - [c31]Abdulati K. S. Jahbel, Tohari Ahmad, Jean De La Croix Ntivuguruzwa:
Reduced Difference Expansion based on Cover Image Bisection for a Quality Stego Image. ICTAS 2024: 51-56 - [c30]Alfa Fakhrur Rizal Zaini, Jean De La Croix Ntivuguruzwa, Tohari Ahmad:
A Steganographic Approach Based on Pixel Blocks Differencing to Enhance the Quality of the Stego Image. ICTAS 2024: 63-68 - [c29]Taufiq Odhi Dwi Putra, Royyana Muslim Ijtihadie, Tohari Ahmad:
Load Characterization of AI Applications using DQoES Scheduler for Serving Multiple Requests. ISDFS 2024: 1-6 - [c28]Iwan Handovo Putro, Tohari Ahmad:
Feature Selection Using Pearson Correlation with Lasso Regression for Intrusion Detection System. ISDFS 2024: 1-6 - 2023
- [j20]Swardiantara Silalahi, Tohari Ahmad, Hudan Studiawan:
Transformer-Based Named Entity Recognition on Drone Flight Logs to Support Forensic Investigation. IEEE Access 11: 3257-3274 (2023) - [j19]Jean De La Croix Ntivuguruzwa, Tohari Ahmad, Fengling Han:
Enhancing Secret Data Detection Using Convolutional Neural Networks With Fuzzy Edge Detection. IEEE Access 11: 131001-131016 (2023) - [j18]Chaidir Chalaf Islamy, Tohari Ahmad, Royyana Muslim Ijtihadie:
Reversible data hiding based on histogram and prediction error for sharing secret data. Cybersecur. 6(1): 12 (2023) - [j17]Jean De La Croix Ntivuguruzwa, Tohari Ahmad:
A convolutional neural network to detect possible hidden data in spatial domain images. Cybersecur. 6(1): 23 (2023) - [j16]Yoga Samudra, Tohari Ahmad:
Segmentation embedding method with modified interpolation for increasing the capacity of adaptable and reversible audio data hiding. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101636 (2023) - [j15]Swardiantara Silalahi, Tohari Ahmad, Hudan Studiawan:
DFLER: Drone Flight Log Entity Recognizer to support forensic investigation on drone device. Softw. Impacts 15: 100457 (2023) - [c27]Muhammad Aidiel Rachman Putra, Tohari Ahmad, Dandy Pramana Hostiadi:
Dimensional Feature Reduction for Detecting Botnet Activities. ICACT 2023: 43-48 - [c26]Moh. Muzayyin Amrulloh, Tohari Ahmad, Jean De La Croix Ntivuguruzwa:
Analysis of the smoothing and payload distribution method on reversible audio steganography. ICCCNT 2023: 1-5 - [c25]Pramudya Tiandana Wisnu Gautama, Tohari Ahmad:
RISET: Secure Eye-Tracking Password Authentication with Random Image Sequence. ICCCNT 2023: 1-6 - [c24]Lendy Pradhana Hartono, Tohari Ahmad:
An Enhanced Approach For Botnet Intrusion Detection System Based on Machine-Learning Model. ICCCNT 2023: 1-5 - [c23]Arino Jenynof, Tohari Ahmad:
Image to Image Steganography using U-Net Architecture with MobileNet Convolutional Neural Network. ICCCNT 2023: 1-7 - [c22]Taufiq Odhi Dwi Putra, Tohari Ahmad:
Botnet Attacks Detection using Image Processing Approach: Sequential Neural Network and Feature Selection. ICCCNT 2023: 1-6 - [c21]Jean De La Croix Ntivuguruzwa, Tohari Ahmad:
Toward Hidden Data Detection via Local Features Optimization in Spatial Domain Images. ICTAS 2023: 1-6 - [c20]Aulia Teaku Nururrahmah, Tohari Ahmad:
CHI2CV : Feature Selection using Chi-Square with Cross-Validation for Intrusion Detection System. ISDFS 2023: 1-6 - [c19]Muhammad Aidiel Rachman Putra, Tohari Ahmad, Dandy Pramana Hostiadi:
Botnet Dataset Overview Using Statistical Approach Based on Time Gap Activity Analysis. ISDFS 2023: 1-6 - [c18]Swardiantara Silalahi, Tohari Ahmad, Hudan Studiawan:
Transformer-based Sentiment Analysis for Anomaly Detection on Drone Forensic Timeline. ISDFS 2023: 1-6 - [c17]Ingororano Théophile, Jean De La Croix Ntivuguruzwa, Tohari Ahmad:
Fuzzy Logic-based Steganographic Scheme for high Payload Capacity with high Imperceptibility. ISDFS 2023: 1-6 - 2022
- [j14]Tohari Ahmad, Alek Nur Fatman:
Improving the performance of histogram-based data hiding method in the video environment. J. King Saud Univ. Comput. Inf. Sci. 34(4): 1362-1372 (2022) - [j13]Dandy Pramana Hostiadi, Tohari Ahmad:
Hybrid model for bot group activity detection using similarity and correlation approaches based on network traffic flows analysis. J. King Saud Univ. Comput. Inf. Sci. 34(7): 4219-4232 (2022) - [j12]Muhammad Aidiel Rachman Putra, Dandy Pramana Hostiadi, Tohari Ahmad:
Simultaneous Botnet Dataset Generator: A simulation tool for generating a botnet dataset with simultaneous attack characteristic. Softw. Impacts 14: 100441 (2022) - [j11]Hudan Studiawan, Tohari Ahmad, Bagus Jati Santoso, Ary Mazharuddin Shiddiqi, Baskoro Adi Pratomo:
DroneTimeline: Forensic timeline analysis for drones. SoftwareX 20: 101255 (2022) - [c16]Arda Surya Editya, Tohari Ahmad, Hudan Studiawan:
Direction Estimation of Drone Collision Using Optical Flow for Forensic Investigation. ISDFS 2022: 1-6 - 2021
- [j10]Achmad Akbar Megantara, Tohari Ahmad:
A hybrid machine learning method for increasing the performance of network intrusion detection systems. J. Big Data 8(1): 142 (2021) - [c15]Lucas Susanto, Tohari Ahmad:
Performance Analysis of the New Filtering Algorithm with Kalman on Indoor Positioning System. HIS 2021: 253-261 - [c14]Yoga Samudra, Tohari Ahmad:
Improved Interpolation-Based Reversible Audio Data Hiding Using Sample Dispersion and Value Shifting. HIS 2021: 647-656 - 2020
- [j9]Dandy Pramana Hostiadi, Waskitho Wibisono, Tohari Ahmad:
B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis. KSII Trans. Internet Inf. Syst. 14(10): 4176-4197 (2020) - [j8]Tohari Ahmad, Yoga Samudra:
Reversible data hiding with segmented secrets and smoothed samples in various audio genres. J. Big Data 7(1): 1-19 (2020) - [c13]Tohari Ahmad, Herdito Ibnu Dewangkoro, Waskitho Wibisono, Royyana Muslim Ijtihadie:
Protecting Data by Improving the Performance of Controlling Expansion Method. ACeS 2020: 577-587 - [c12]Yuni Yamasari, Naim Rochmawati, Anita Qoiriah, Dwi F. Suyatno, Tohari Ahmad:
Reducing the Error Mapping of the Students' Performance Using Feature Selection. SoCPaR 2020: 176-185 - [c11]Hudan Studiawan, Rahmat Nazali Salimi, Tohari Ahmad:
Forensic Analysis of Copy-Move Attack with Robust Duplication Detection. SoCPaR 2020: 404-413 - [c10]Dandy Pramana Hostiadi, Tohari Ahmad, Waskitho Wibisono:
A New Approach to Detecting Bot Attack Activity Scenario. SoCPaR 2020: 823-835
2010 – 2019
- 2019
- [j7]Pascal Maniriho, Tohari Ahmad:
Digital Image Information Hiding Methods for Protecting Transmitted Data: A Survey. J. Commun. 14(1): 9-16 (2019) - [j6]Pascal Maniriho, Tohari Ahmad:
Information hiding scheme for digital images using difference expansion and modulus function. J. King Saud Univ. Comput. Inf. Sci. 31(3): 335-347 (2019) - [c9]Ahmad Juniar Ilham, Putu Harum Bawa, Tohari Ahmad:
Protecting Secret Data using RDE and Fuzzy Logic to Specify the Embedding Level. ICSIPA 2019: 254-258 - 2018
- [j5]Hendro E. Prabowo, Tohari Ahmad:
Adaptive Pixel Value Grouping for Protecting Secret Data in Public Computer Networks. J. Commun. 13(6): 325-332 (2018) - 2017
- [c8]Tohari Ahmad, Burhanudin Rasyid:
SCFT: Sector-based cancelable fingeprint template. APSIPA 2017: 156-160 - [c7]Waskitho Wibisono, M. Divi Jaya Nuryanto, Royyana M. Ijtihadie, Tohari Ahmad, Radityo Anggoro:
A Mobile Crowdsensing Framework for Integrating Smartphone and IoT Devices to Cloud Computing Services. MobiQuitous 2017: 482-487 - 2016
- [j4]Mohammed Hatem Ali Al-Hooti, Supeno Djanali, Tohari Ahmad:
Audio Data Hiding Based on Sample Value Modification Using Modulus Function. J. Inf. Process. Syst. 12(3): 525-537 (2016) - [c6]Tohari Ahmad, Diksy M. Firmansyah, Dwi S. Angreni:
Difference Expansion-Based Data Hiding Method by Changing Expansion Media. SCDM 2016: 414-423 - 2015
- [c5]Tohari Ahmad, Doni S. Pambudi, Tsuyoshi Usagawa:
Improving the performance of projection-based cancelable fingerprint template method. SoCPaR 2015: 84-88 - 2014
- [j3]Tohari Ahmad, Muhammad Holil:
Increasing the Performance of Difference Expansion-based Steganography when Securing Medical Data. Smart Comput. Rev. 4(4): 307-322 (2014) - [c4]Tohari Ahmad, Hudan Studiawan, Hafidh Sholihuddin Ahmad, Royyana M. Ijtihadie, Waskitho Wibisono:
Shared secret-based steganography for protecting medical data. IC3INA 2014: 87-92 - 2013
- [c3]Waskitho Wibisono, Dedy Nur Arifin, Baskoro Adi Pratomo, Tohari Ahmad, Royyana M. Ijtihadie:
Falls Detection and Notification System Using Tri-axial Accelerometer and Gyroscope Sensors of a Smartphone. TAAI 2013: 382-385 - 2011
- [j2]Tohari Ahmad, Jiankun Hu, Song Wang:
Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recognit. 44(10-11): 2555-2564 (2011) - [j1]Kai Xi, Tohari Ahmad, Fengling Han, Jiankun Hu:
A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Secur. Commun. Networks 4(5): 487-499 (2011) - 2010
- [c2]Tohari Ahmad, Jiankun Hu:
Generating cancelable biometrie templates using a projection line. ICARCV 2010: 7-12
2000 – 2009
- 2009
- [c1]Tohari Ahmad, Jiankun Hu, Song Han:
An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography. NSS 2009: 474-479
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint