default search action
Osama Hosam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c10]Yang Yang, Kai Jin, Wei Liang, Yaqin Liu, Yuhui Li, Osama Hosam:
A Review of Blockchain-based Privacy Computing Research. CSCloud/EdgeCom 2023: 241-246 - [c9]Osama Hosam, Rasha Abou Samra, Ahmed Ghonim, Khaled Shaalan:
Utilizing Machine Learning to Develop Cloud-Based Apprenticeship Programs Aligned with Labor Market Demands. CSCloud/EdgeCom 2023: 446-451 - 2022
- [j10]Jianqiang Hu, Wei Liang, Osama Hosam, Meng-Yen Hsieh, Xin Su:
5GSS: a framework for 5G-secure-smart healthcare monitoring. Connect. Sci. 34(1): 139-161 (2022) - [j9]Osama Hosam:
An earthquake query system based on hidden Markov models. Int. J. Embed. Syst. 15(2): 149-157 (2022) - [c8]Canwei Liu, Tingqin He, Hangyu Zhu, Yanlu Li, Songyou Xie, Osama Hosam:
A Survey of Recommender Systems Based on Hypergraph Neural Networks. SmartCom 2022: 95-106 - 2020
- [j8]Bin Liu, Lijun Xiao, Jing Long, Mingdong Tang, Osama Hosam:
Secure Digital Certificate-Based Data Access Control Scheme in Blockchain. IEEE Access 8: 91751-91760 (2020) - [j7]Quanzhi Lei, Lijun Xiao, Osama Hosam, Haibo Luo:
A novel watermarking algorithm based on characteristics model of local fragmentary images. Int. J. Embed. Syst. 12(1): 11-21 (2020) - [j6]Munwar Ali, Low Tang Jung, Osama Hosam, Asif Ali Wagan, Rehan Ali Shah, Mashael Khayyat:
A new text-based w-distance metric to find the perfect match between words. J. Intell. Fuzzy Syst. 38(3): 2661-2672 (2020)
2010 – 2019
- 2019
- [j5]Osama Hosam, Muhammad Hammad Ahmad:
Hybrid design for cloud data security using combination of AES, ECC and LSB steganography. Int. J. Comput. Sci. Eng. 19(2): 153-161 (2019) - [j4]Wei Zhu, Osama Hosam, Xiaodong Zheng:
A secure hierarchical community detection algorithm. Int. J. Comput. Sci. Eng. 19(2): 242-250 (2019) - [c7]Maha F. Hany, Bayumy A. B. Youssef, Saad M. Darwish, Osama Hosam:
Intelligent Watermarking System Based on Soft Computing. AISI 2019: 24-34 - [c6]Yingyue Chen, Lijun Xiao, Osama Hosam:
A Performance Evaluation Method of Coal-Fired Boiler Based on Neural Network. SmartCom 2019: 277-285 - 2018
- [c5]Osama Hosam:
Hiding Bitcoins in Steganographic Fractals. ISSPIT 2018: 512-519 - 2016
- [j3]Wei Liang, Yong Xie, Xuhui Chen, Osama Hosam, Xiaoyan Chen:
A two-step MF signal acquisition method for wireless underground sensor networks. Comput. Sci. Inf. Syst. 13(2): 623-638 (2016) - [j2]Osama Hosam, Nadhir Ben Halima:
Adaptive block-based pixel value differencing steganography. Secur. Commun. Networks 9(18): 5036-5050 (2016) - 2015
- [c4]Osama Hosam:
Colored texture classification with support vector machine and wavelet multiresolution analysis. ISSPIT 2015: 309-313 - 2012
- [c3]Osama Hosam, Walaa M. Sheta, Bayumy B. A. Youssef, M. A. Abdou:
Public watermarking scheme for 3D laser scanned archeological models. ISCC 2012: 382-389 - [c2]Osama Hosam:
Motion compensation for video codec based on disparity estimation. ISCC 2012: 559-565 - 2010
- [j1]Osama Hosam, Lincong Yang, Wei Liang, Xingming Sun:
Watermarking 3D Triangular Mesh with High Visual Quality. J. Digit. Content Technol. its Appl. 4(4): 107-116 (2010)
2000 – 2009
- 2009
- [c1]Osama Hosam, Xingming Sun:
Three-Dimensional Reconstruction Using Enhanced Shape from Stereo Technique. ACIS-ICIS 2009: 627-632
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint