default search action
Charlie Obimbo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Abeer Y. Al-Hyari, Charlie Obimbo, Mua'ad Abu-Faraj, Ismail Al-Taharwa:
Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture. IEEE Access 12: 4825-4844 (2024) - 2023
- [j5]Mua'ad Abu-Faraj, Abeer Y. Al-Hyari, Charlie Obimbo, Khaled Aldebei, Ismail Al-Taharwa, Ziad A. Alqadi, Orabe Almanaseer:
Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps. Cryptogr. 7(2): 20 (2023) - 2022
- [j4]Ming Li, Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo:
Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization. IEEE Internet Things J. 9(9): 7009-7024 (2022) - 2020
- [i1]Ming Li, Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo:
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain. IACR Cryptol. ePrint Arch. 2020: 11 (2020)
2010 – 2019
- 2019
- [c27]Jamileh Yousefi, Andrew Hamilton-Wright, Charlie Obimbo:
A Synergistic Approach to Enhance the Accuracy-interpretability Trade-off of the NECLASS Classifier for Skewed Data Distribution. IJCCI 2019: 325-334 - 2018
- [j3]Jasmin Kaur, Rozita A. Dara, Charlie Obimbo, Fei Song, Karen Menard:
A comprehensive keyword analysis of online privacy policies. Inf. Secur. J. A Glob. Perspect. 27(5-6): 260-275 (2018) - [c26]A. N. K. Zaman, Charlie Obimbo, Rozita A. Dara:
Information Disclosure, Security, and Data Quality. IEA/AIE 2018: 768-779 - 2017
- [c25]A. N. K. Zaman, Charlie Obimbo, Rozita A. Dara:
An Improved Data Sanitization Algorithm for Privacy Preserving Medical Data Publishing. Canadian AI 2017: 64-70 - [c24]A. N. K. Zaman, Charlie Obimbo, Rozita A. Dara:
An improved differential privacy algorithm to protect re-identification of data. IHTC 2017: 133-138 - 2016
- [c23]A. N. K. Zaman, Charlie Obimbo, Rozita A. Dara:
A Novel Differential Privacy Approach that Enhances Classification Accuracy. C3S2E 2016: 79-84 - 2013
- [c22]Charlie Obimbo, Andrew Halligan, Patrick De Freitas:
CaptchAll: An Improvement on the Modern Text-based CAPTCHA. Complex Adaptive Systems 2013: 496-501 - 2012
- [c21]Charlie Obimbo, Matthew Jones:
Applying Variable Coe_cient functions to Self-Organizing Feature Maps for Network Intrusion Detection on the 1999 KDD Cup Dataset. CSER 2012: 333-337 - 2011
- [j2]Charlie Obimbo, Benjamin Ferriman:
Vulnerabilities of LDAP As An Authentication Service. J. Information Security 2(4): 151-157 (2011) - [c20]Ryan Wilson, Charlie Obimbo:
Self-organizing feature maps for User-to-Root and Remote-to-Local network intrusion detection on the KDD Cup 1999 dataset. WorldCIS 2011: 42-47 - [c19]Eddie Yee-Tak Ma, Charlie Obimbo:
An evolutionary computation attack on one-round TEA. Complex Adaptive Systems 2011: 171-176 - [c18]Charlie Obimbo, Haochen Zhou, Ryan Wilson:
Multiple SOFMs Working Cooperatively In a Vote-based Ranking System For Network Intrusion Detection. Complex Adaptive Systems 2011: 219-224
2000 – 2009
- 2009
- [c17]Ming Xu, Gary Gréwal, Shawki Areibi, Charlie Obimbo, Dilip K. Banerji:
Near-linear wirelength estimation for FPGA placement. CCECE 2009: 1198-1203 - [c16]Charlie Obimbo:
An Intrusion Detection System for Mobile Ad-Hoc Networks. Security and Management 2009: 285-290 - [c15]Charlie Obimbo:
A Watermark Generation Algorithm Using The Mersenne Twister. IPCV 2009: 331-336 - 2008
- [c14]Charlie Obimbo:
An Adaptive Coding Algorithm for Secret Transmission of Information. Security and Management 2008: 663-668 - [c13]Charlie Obimbo:
Approximating the Vertex Cover Problem by Selection of Nodes of Maximum Degrees for use in Wireless Sensor Networks. FCS 2008: 256-259 - [c12]Charlie Obimbo, Yasser Ebrahim:
Using the HC for Shape Representation and Description. IPCV 2008: 793-799 - 2007
- [j1]Charlie Obimbo, Behzad Salami:
A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. J. Supercomput. 39(2): 113-130 (2007) - 2006
- [c11]Charlie Obimbo, Jingbo Ni:
A grey-level image watermarking method based on block DCT and statistic correlation adjustment. Communication, Network, and Information Security 2006: 22-27 - [c10]Behzad Salami, Charlie Obimbo:
A multi-bitwatermark generation algorithm with properties of error correction. Communication, Network, and Information Security 2006: 44-49 - [c9]Charlie Obimbo, Liliana M. Arboleda C., Yunfeng Chen:
A Watchdog Enhancement to IDS in MANET. Wireless and Optical Communications 2006 - 2005
- [c8]Charlie Obimbo:
A Parallel Algorithm For Determining The Inverse Of A Matrix For Use In Block Cipher Encryption And Decryption. CSC 2005: 164-172 - [c7]Charlie Obimbo, Nhi Tonnu:
A System That Can Enhance E-Business In The Developing World. CSREA EEE 2005: 68-74 - [c6]Anthony Koso, Andrew Turi, Charlie Obimbo:
Embedding Digital Signatures in MP3s. IMSA 2005: 271-274 - [c5]Ming Xu, Behzad Salami, Charlie Obimbo:
How to Protect Personal Information against Keyloggers. IMSA 2005: 275-280 - 2004
- [c4]Charlie Obimbo, Rohit Makhijani:
An Online Linking System for Researchers. International Conference on Internet Computing 2004: 455-458 - [c3]Gary William Grewal, Ming Xu, Charlie Obimbo:
An Approximate Solution for Steiner Trees in Multicast Routing. IC-AI 2004: 707-711 - [c2]Charlie Obimbo, Stephen Doxsee:
The Threat of a Deterministic Polynomial Time Algorithm for Primality Testing in Applied Cryptography. MSV/AMCS 2004: 423-426 - 2003
- [c1]Gary William Grewal, Mike O'Cleirigh, Charlie Obimbo:
Hierarchical Genetic Algorithms Applied to Datapath Synthesis. IC-AI 2003: 994-1002
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint