default search action
Abdurrahim Toktas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Abdurrahim Toktas, Ugur Erkan, Suo Gao, Chanil Pak:
A robust bit-level image encryption based on Bessel map. Appl. Math. Comput. 462: 128340 (2024) - [j20]Omer Kocak, Ugur Erkan, Abdurrahim Toktas, Suo Gao:
PSO-based image encryption scheme using modular integrated logistic exponential map. Expert Syst. Appl. 237(Part A): 121452 (2024) - [j19]Rui Wu, Suo Gao, Herbert Ho-Ching Iu, Shuang Zhou, Ugur Erkan, Abdurrahim Toktas, Xianglong Tang:
Securing Dual-Channel Audio Communication With a 2-D Infinite Collapse and Logistic Map. IEEE Internet Things J. 11(6): 10214-10223 (2024) - [j18]Suo Gao, Herbert Ho-Ching Iu, Ugur Erkan, Cemaleddin Simsek, Jun Mou, Abdurrahim Toktas, Rui Wu, Xianglong Tang:
Design, Dynamical Analysis, and Hardware Implementation of a Novel Memcapacitive Hyperchaotic Logistic Map. IEEE Internet Things J. 11(18): 30368-30375 (2024) - [j17]Enver Akbacak, Abdurrahim Toktas, Ugur Erkan, Suo Gao:
MLMQ-IR: Multi-label multi-query image retrieval based on the variance of Hamming distance. Knowl. Based Syst. 283: 111193 (2024) - [j16]Qiang Lai, Hui Zhang, Deniz Ustun, Ugur Erkan, Abdurrahim Toktas:
Index-based simultaneous permutation-diffusion in image encryption using two-dimensional price map. Multim. Tools Appl. 83(10): 28827-28847 (2024) - [j15]Deniz Ustun, Ugur Erkan, Abdurrahim Toktas, Qiang Lai, Liang Yang:
2D hyperchaotic Styblinski-Tang map for image encryption and its hardware implementation. Multim. Tools Appl. 83(12): 34759-34772 (2024) - [j14]Abdurrahim Toktas, Ugur Erkan, Deniz Ustun, Qiang Lai:
Multiobjective Design of 2D Hyperchaotic System Using Leader Pareto Grey Wolf Optimizer. IEEE Trans. Syst. Man Cybern. Syst. 54(9): 5237-5247 (2024) - 2023
- [j13]Qiang Lai, Genwen Hu, Ugur Erkan, Abdurrahim Toktas:
High-efficiency medical image encryption method based on 2D Logistic-Gaussian hyperchaotic map. Appl. Math. Comput. 442: 127738 (2023) - [j12]Qiang Lai, Genwen Hu, Ugur Erkan, Abdurrahim Toktas:
A novel pixel-split image encryption scheme based on 2D Salomon map. Expert Syst. Appl. 213(Part): 118845 (2023) - [j11]Ugur Erkan, Abdurrahim Toktas, Qiang Lai:
2D hyperchaotic system based on Schaffer function for image encryption. Expert Syst. Appl. 213(Part): 119076 (2023) - [j10]Ugur Erkan, Abdurrahim Toktas, Deniz Ustun:
Hyperparameter optimization of deep CNN classifier for plant species identification using artificial bee colony algorithm. J. Ambient Intell. Humaniz. Comput. 14(7): 8827-8838 (2023) - [j9]Abdurrahim Toktas, Ugur Erkan, Deniz Ustun, Xingyuan Wang:
Parameter optimization of chaotic system using Pareto-based triple objective artificial bee colony algorithm. Neural Comput. Appl. 35(18): 13207-13223 (2023) - 2022
- [j8]Deniz Ustun, Abdurrahim Toktas, Ugur Erkan, Ali Akdagli:
Modified artificial bee colony algorithm with differential evolution to enhance precision and convergence performance. Expert Syst. Appl. 198: 116930 (2022) - [j7]Ugur Erkan, Abdurrahim Toktas, Feyza Toktas, Fayadh Alenezi:
2D eπ-map for image encryption. Inf. Sci. 589: 770-789 (2022) - [j6]Ugur Erkan, Abdurrahim Toktas, Serdar Enginoglu, Enver Akbacak, Dang N. H. Thanh:
An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN. Multim. Tools Appl. 81(5): 7365-7391 (2022) - [j5]Abdurrahim Toktas, Ugur Erkan:
2D fully chaotic map for image encryption constructed through a quadruple-objective optimization via artificial bee colony algorithm. Neural Comput. Appl. 34(6): 4295-4319 (2022) - 2021
- [j4]Abdurrahim Toktas, Ugur Erkan, Feyza Toktas, Zeki Yetgin:
Chaotic Map Optimization for Image Encryption Using Triple Objective Differential Evolution Algorithm. IEEE Access 9: 127814-127832 (2021) - [c2]Ugur Erkan, Abdurrahim Toktas, Feyza Toktas:
A Novel Euler Chaotic Map for Image Encryption. INISTA 2021: 1-6 - 2020
- [j3]Abdurrahim Toktas, Deniz Ustun, Nursev Erdogan:
Pioneer Pareto artificial bee colony algorithm for three-dimensional objective space optimization of composite-based layered radar absorber. Appl. Soft Comput. 96: 106696 (2020) - [j2]Deniz Ustun, Abdurrahim Toktas:
Translational Motion Compensation for ISAR Images Through a Multicriteria Decision Using Surrogate-Based Optimization. IEEE Trans. Geosci. Remote. Sens. 58(6): 4365-4374 (2020) - [i1]Ugur Erkan, Abdurrahim Toktas, Serdar Enginoglu, Enver Karabacak, Dang N. H. Thanh:
An Image Encryption Scheme Based on Chaotic Logarithmic Map and Key Generation using Deep CNN. CoRR abs/2012.14156 (2020)
2010 – 2019
- 2019
- [j1]Enes Yigit, Kadir Sabanci, Abdurrahim Toktas, Ahmet Kayabasi:
A study on visual features of leaves in plant identification using artificial intelligence techniques. Comput. Electron. Agric. 156: 369-377 (2019) - 2015
- [c1]Enes Yigit, Hakan Isiker, Abdurrahim Toktas, Saibun Tjuatja:
CS-based radar measurement of silos level. IGARSS 2015: 3746-3749
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint