default search action
Ahmed A. Abd El-Latif 0001
Person information
- affiliation: Menoufia University, Department of Mathematics and Computer Science, Shibin El Kom, Egypt
- affiliation: Prince Sultan University, College of Computer and Information Sciences, Saudi Arabia
- affiliation (PhD 2013): Harbin Institute of Technology (HIT), Harbin, China
Other persons with the same name
- Ahmed A. Abd El-Latif 0002 (aka: Ahmed Aref Abd El-Latif) — High Institute of Computer King Marriott, Alexandria, Egypt (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j171]Aceng Sambas, Miroslav Mahdal, Sundarapandian Vaidyanathan, Brisbane Ovilla-Martínez, Esteban Tlelo-Cuautle, Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Khaled Benkouider, Talal Bonny:
A New Hyperjerk System With a Half Line Equilibrium: Multistability, Period Doubling Reversals, Antimonotonocity, Electronic Circuit, FPGA Design, and an Application to Image Encryption. IEEE Access 12: 9177-9194 (2024) - [j170]Muhammad Tanveer, Ahmed A. Abd El-Latif, Abd Ullah Khan, Musheer Ahmad, Abdelhamied A. Ateya:
LEAF-IIoT: Lightweight and Efficient Authentication Framework for the Industrial Internet of Things. IEEE Access 12: 31771-31787 (2024) - [j169]Achraf Daoui, Mohamed Yamni, Pawel Plawiak, Osama Alfarraj, Ahmed A. Abd El-Latif:
A New Chaotic Memristor-Based Cryptosystem for Secure Bio-Signal Transmission on Low-Cost Hardware. IEEE Access 12: 78939-78958 (2024) - [j168]Mohamed Yamni, Achraf Daoui, Pawel Plawiak, Osama Alfarraj, Ahmed A. Abd El-Latif:
Novel Integer Reversible Charlier Transform for Image Reversible Data Hiding Application. IEEE Access 12: 98480-98491 (2024) - [j167]Mohamed Yamni, Achraf Daoui, Pawel Plawiak, Osama Alfarraj, Ahmed A. Abd El-Latif:
A Hardware-Accelerated Approach to Chaotic Image Encryption: LTB Map and FPGA Implementation. IEEE Access 12: 103921-103940 (2024) - [j166]Amine Sallah, El Arbi Abdellaoui Alaoui, Said Agoujil, Mudasir Ahmad Wani, Mohamed Hammad, Yassine Maleh, Ahmed A. Abd El-Latif:
Fine-Tuned Understanding: Enhancing Social Bot Detection With Transformer-Based Classification. IEEE Access 12: 118250-118269 (2024) - [j165]Mohamed Hammad, Mudasir Ahmad Wani, Kashish Ara Shakil, Hadil Shaiba, Ahmed A. Abd El-Latif:
Deep Cancelable Multibiometric Finger Vein and Fingerprint Authentication With Non-Negative Matrix Factorization. IEEE Access 12: 120638-120660 (2024) - [j164]Achraf Daoui, Mohamed Yamni, Pawel Plawiak, Fahad Alblehai, Ahmed A. Abd El-Latif:
Novel Integer Hahn Transform for Real-Time Lossless Image Authentication in IoT: A 32-Bit Microcontroller Implementation. IEEE Access 12: 131044-131064 (2024) - [j163]Reem Alkanhel, Ghada Atteia, Mohamed Amine Ouamri, Mohammed Saleh Ali Muthanna, Daljeet Singh, Ahmed A. Abd El-Latif, Ammar Muthanna:
Next-Gen Connectivity: Exploring UAV Swarm Applications in Cell-Free Massive MIMO for IIoT. IEEE Access 12: 152045-152057 (2024) - [j162]Mudasir Ahmad Wani, Mohammed Ahmed El-Affendi, Patrick Bours, Ali Shariq Imran, Amir Hussain, Ahmed A. Abd El-Latif:
CoDeS: A Deep Learning Framework for Identifying COVID-Caused Depression Symptoms. Cogn. Comput. 16(1): 305-325 (2024) - [j161]Rania A. Ahmed, M. Abdelraouf, Shaimaa Ahmed Elsaid, Mohammed Ahmed El-Affendi, Ahmed A. Abd El-Latif, A. A. Shaalan, Abdelhamied A. Ateya:
Internet of Things-Based Robust Green Smart Grid. Comput. 13(7): 169 (2024) - [j160]Juyan Li, Mingyan Yan, Jialiang Peng, Haodong Huang, Ahmed A. Abd El-Latif:
A lattice-based efficient certificateless public key encryption for big data security in clouds. Future Gener. Comput. Syst. 158: 255-266 (2024) - [j159]Suo Gao, Herbert Ho-Ching Iu, Mengjiao Wang, Donghua Jiang, Ahmed A. Abd El-Latif, Rui Wu, Xianglong Tang:
Design, Hardware Implementation, and Application in Video Encryption of the 2-D Memristive Cubic Map. IEEE Internet Things J. 11(12): 21807-21815 (2024) - [j158]Ahmed Alghamdi, Mohamed Hammad, Hassan Ugail, Asmaa Abdel-Raheem, Khan Muhammad, Hany S. Khalifa, Ahmed A. Abd El-Latif:
Detection of myocardial infarction based on novel deep transfer learning methods for urban healthcare in smart cities. Multim. Tools Appl. 83(5): 14913-14934 (2024) - [j157]Siraj Khan, Pengshuai Yin, Yuxin Guo, Muhammad Asim, Ahmed A. Abd El-Latif:
Heterogeneous transfer learning: recent developments, applications, and challenges. Multim. Tools Appl. 83(27): 69759-69795 (2024) - [j156]Sarfaraz Masood, Rafiuddin Khan, Ahmed A. Abd El-Latif, Musheer Ahmad:
An FCN-LSTM model for neurological status detection from non-invasive multivariate sensor data. Neural Comput. Appl. 36(1): 77-93 (2024) - [j155]Musabe Jean Bosco, Rutarindwa Jean Pierre, Mohammed Saleh Ali Muthanna, Kwizera Jean Pierre, Ammar Muthanna, Ahmed A. Abd El-Latif:
MGFEEN: a multi-granularity feature encoding ensemble network for remote sensing image classification. Neural Comput. Appl. 36(12): 6547-6558 (2024) - [j154]Munzir Hubiba Bashir, Musheer Ahmad, Danish Raza Rizvi, Ahmed A. Abd El-Latif:
Efficient CNN-based disaster events classification using UAV-aided images for emergency response application. Neural Comput. Appl. 36(18): 10599-10612 (2024) - [j153]Pierre Claver Bizimana, Zuping Zhang, Alphonse Houssou Hounye, Muhammad Asim, Mohamed Hammad, Ahmed A. Abd El-Latif:
Automated heart disease prediction using improved explainable learning-based technique. Neural Comput. Appl. 36(26): 16289-16318 (2024) - [j152]Mohamed Fartitchou, Ismail Lamaakal, Yassine Maleh, Khalid El Makkaoui, Zakaria El Allali, Pawel Plawiak, Fahad Alblehai, Ahmed A. Abd El-Latif:
IOTASDN: IOTA 2.0 Smart Contracts for Securing Software-Defined Networking Ecosystem. Sensors 24(17): 5716 (2024) - [j151]Pei Li, Zhijun Liu, Jialiang Peng, Lili Zhou, Tongjun Liu, Yi Wu, Ahmed A. Abd El-Latif:
Personalized Federated Learning for Goods Classification in Wireless Sensor-Assisted Smart Warehouses. IEEE Trans. Consumer Electron. 70(1): 4178-4186 (2024) - [j150]Mudasir Ahmad Wani, Mohammed Ahmed El-Affendi, Kashish Ara Shakil, Ibrahem Mohammed Abuhaimed, Anand Nayyar, Amir Hussain, Ahmed A. Abd El-Latif:
Toxic Fake News Detection and Classification for Combating COVID-19 Misinformation. IEEE Trans. Comput. Soc. Syst. 11(4): 5101-5118 (2024) - [j149]Muhammad Ejaz, Jinsong Gui, Muhammad Asim, Mohammed Ahmed El-Affendi, Carol J. Fung, Ahmed A. Abd El-Latif:
RL-Planner: Reinforcement Learning-Enabled Efficient Path Planning in Multi-UAV MEC Systems. IEEE Trans. Netw. Serv. Manag. 21(3): 3317-3329 (2024) - 2023
- [j148]Nawal Shaltout, Ahmed A. Abd El-Latif, Waleed M. El-Latif, Samir Elmougy:
Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution. IEEE Access 11: 2303-2317 (2023) - [j147]Xianhua Song, Guanglong Chen, Ahmed A. Abd El-Latif, Mudasir Ahmad Wani, Bassem Abd-El-Atty:
Quantum Geometric Transformation Based on QIRHSI Quantum Color images. IEEE Access 11: 21883-21899 (2023) - [j146]Sergey S. Vladimirov, Anastasia Vybornova, Ammar Muthanna, Andrey Koucheryavy, Ahmed A. Abd El-Latif:
Network Coding Datagram Protocol for TCP/IP Networks. IEEE Access 11: 43485-43498 (2023) - [j145]Bassem Abd-El-Atty, Mohammed Ahmed El-Affendi, Samia Allaoua Chelloug, Ahmed A. Abd El-Latif:
Double Medical Image Cryptosystem Based on Quantum Walk. IEEE Access 11: 69164-69176 (2023) - [j144]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty:
Adaptive Particle Swarm Optimization With Quantum-Inspired Quantum Walks for Robust Image Security. IEEE Access 11: 71143-71153 (2023) - [j143]Salwa M. Serag Eldin, Ahmed A. Abd El-Latif, Samia Allaoua Chelloug, Musheer Ahmad, Ahmed H. Eldeeb, Tamer Omar Mohamed Diab, Wageda Ibrahim El Sobky, Hany Nasry Zaky:
Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences. IEEE Access 11: 101694-101709 (2023) - [j142]Abd Ullah Khan, Muhammad Tanveer, Hyundong Shin, Musheer Ahmad, Ammar Muthanna, Abdukodir Khakimov, Fahad Alblehai, Ahmed A. Abd El-Latif:
Toward Spectrum Efficiency and Reliability for Heterogeneous Users in CR-Enabled Social Internet of Things. IEEE Access 11: 145706-145722 (2023) - [j141]Mohamed Abd El Aziz, Mohammed Abdulaziz Aide Al-qaness, Abdelghani Dahou, Rehab Ali Ibrahim, Ahmed A. Abd El-Latif:
Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm. Adv. Eng. Softw. 176: 103402 (2023) - [j140]Aisha Batool, Muhammad Wasif Nisar, Jamal Hussain Shah, Muhammad Attique Khan, Ahmed A. Abd El-Latif:
iELMNet: Integrating Novel Improved Extreme Learning Machine and Convolutional Neural Network Model for Traffic Sign Detection. Big Data 11(5): 323-338 (2023) - [j139]Abdul Razaq, Musheer Ahmad, Ahmed A. Abd El-Latif:
A novel algebraic construction of strong S-boxes over double GF(27) structures and image protection. Comput. Appl. Math. 42(2) (2023) - [j138]Farah Jabeen, Zia ur Rehman, Sajid Shah, Rima D. Alharthy, Saquib Jalil, Imtiaz Ali Khan, Jamshed Iqbal, Ahmed A. Abd El-Latif:
Deep learning-based prediction of inhibitors interaction with Butyrylcholinesterase for the treatment of Alzheimer's disease. Comput. Electr. Eng. 105: 108475 (2023) - [j137]Abdelhamied A. Ateya, Ammar Muthanna, Andrey Koucheryavy, Yassine Maleh, Ahmed A. Abd El-Latif:
Energy efficient offloading scheme for MEC-based augmented reality system. Clust. Comput. 26(1): 789-806 (2023) - [j136]Shrouk A. Ali, Shaimaa Ahmed Elsaid, Abdelhamied A. Ateya, Mohammed Ahmed El-Affendi, Ahmed A. Abd El-Latif:
Enabling Technologies for Next-Generation Smart Cities: A Comprehensive Review and Research Directions. Future Internet 15(12): 398 (2023) - [j135]Sundarapandian Vaidyanathan, Irene M. Moroz, Aceng Sambas, Bassem Abd-El-Atty, Ahmed A. Abd El-Latif:
Cryptographic applications of a new hyperchaotic system with a hidden attractor. Int. J. Comput. Appl. Technol. 72(4): 249-261 (2023) - [j134]Fan Yang, Jie Huang, Arpit Bhardwaj, Amir Hussain, Ahmed A. Abd El-Latif, Keping Yu:
Adaptive Modulation Based on Nondata-Aided Error Vector Magnitude for Smart Systems in Smart Cities. IEEE Internet Things J. 10(21): 18672-18685 (2023) - [j133]Shilpa Choudhary, S. Sugumaran, Akram Belazi, Ahmed A. Abd El-Latif:
Linearly decreasing inertia weight PSO and improved weight factor-based clustering algorithm for wireless sensor networks. J. Ambient Intell. Humaniz. Comput. 14(6): 6661-6679 (2023) - [j132]Mehdhar S. A. M. Al-gaashani, Fengjun Shang, Ahmed A. Abd El-Latif:
Ensemble Learning of Lightweight Deep Convolutional Neural Networks for Crop Disease Image Detection. J. Circuits Syst. Comput. 32(5): 2350086:1-2350086:25 (2023) - [j131]B. B. Gupta, Varun Prajapati, Nadia Nedjah, Pandi Vijayakumar, Ahmed A. Abd El-Latif, Xiaojun Chang:
Machine learning and smart card based two-factor authentication scheme for preserving anonymity in telecare medical information system (TMIS). Neural Comput. Appl. 35(7): 5055-5080 (2023) - [j130]Bassem Abd-El-Atty, Ahmed A. Abd El-Latif:
Applicable image cryptosystem using bit-level permutation, particle swarm optimisation, and quantum walks. Neural Comput. Appl. 35(25): 18325-18341 (2023) - [j129]Mengmeng Li, Xianhua Song, Ahmed A. Abd El-Latif:
EQIRHSI: enhanced quantum image representation using entanglement state encoding in the HSI color model. Quantum Inf. Process. 22(9): 334 (2023) - [j128]Mohamed Hammad, Pawel Plawiak, Mohammed Ahmed El-Affendi, Ahmed A. Abd El-Latif, Asmaa A. Abdel Latif:
Enhanced Deep Learning Approach for Accurate Eczema and Psoriasis Skin Detection. Sensors 23(16): 7295 (2023) - [j127]Manar Osama, Abdelhamied A. Ateya, Mohammed Sharaf Sayed, Mohamed Hammad, Pawel Plawiak, Ahmed A. Abd El-Latif, Rania A. Elsayed:
Internet of Medical Things and Healthcare 4.0: Trends, Requirements, Challenges, and Research Directions. Sensors 23(17): 7435 (2023) - [j126]Mohamed Yamni, Achraf Daoui, Pawel Plawiak, Haokun Mao, Osama Alfarraj, Ahmed A. Abd El-Latif:
A Novel 3D Reversible Data Hiding Scheme Based on Integer-Reversible Krawtchouk Transform for IoMT. Sensors 23(18): 7914 (2023) - [j125]Achraf Daoui, Mohamed Yamni, Torki Altameem, Musheer Ahmad, Mohamed Hammad, Pawel Plawiak, Ryszard Tadeusiewicz, Ahmed A. Abd El-Latif:
AuCFSR: Authentication and Color Face Self-Recovery Using Novel 2D Hyperchaotic System and Deep Learning Models. Sensors 23(21): 8957 (2023) - [j124]Umar Masud, Mohd. Sadiq, Sarfaraz Masood, Musheer Ahmad, Ahmed A. Abd El-Latif:
LW-DeepFakeNet: a lightweight time distributed CNN-LSTM network for real-time DeepFake video detection. Signal Image Video Process. 17(8): 4029-4037 (2023) - [j123]Yao Jia, Chen Cui, Ahmed A. Abd El-Latif:
Robust Image Hashing Using Histogram Reconstruction for Improving Content Preservation Resistance and Discrimination. Symmetry 15(5): 1088 (2023) - [j122]Ahmed Sedik, Ahmed A. Abd El-Latif, Mohammed Ahmed El-Affendi, Hala Mostafa:
A Cancelable Biometric System Based on Deep Style Transfer and Symmetry Check for Double-Phase User Authentication. Symmetry 15(7): 1426 (2023) - [j121]Ali I. Siam, Mohammed Ahmed El-Affendi, Atef Abou Elazm, Ghada M. El Banby, Nirmeen A. El-Bahnasawy, Fathi E. Abd El-Samie, Ahmed A. Abd El-Latif:
Portable and Real-Time IoT-Based Healthcare Monitoring System for Daily Medical Applications. IEEE Trans. Comput. Soc. Syst. 10(4): 1629-1641 (2023) - [j120]Mudasir Ahmad Wani, Mohammed Ahmed El-Affendi, Kashish Ara Shakil, Ali Shariq Imran, Ahmed A. Abd El-Latif:
Depression Screening in Humans With AI and Deep Learning Techniques. IEEE Trans. Comput. Soc. Syst. 10(4): 2074-2089 (2023) - [j119]Muhammad Asim, Mohammed Ahmed El-Affendi, Ahmed A. Abd El-Latif:
Multi-IRS and Multi-UAV-Assisted MEC System for 5G/6G Networks: Efficient Joint Trajectory Optimization and Passive Beamforming Framework. IEEE Trans. Intell. Transp. Syst. 24(4): 4553-4564 (2023) - [j118]Abuzar B. M. Adam, Mohammed Saleh Ali Muthanna, Ammar Muthanna, Tu N. Nguyen, Ahmed A. Abd El-Latif:
Toward Smart Traffic Management With 3D Placement Optimization in UAV-Assisted NOMA IIoT Networks. IEEE Trans. Intell. Transp. Syst. 24(12): 15448-15458 (2023) - [j117]Amreen Ahmad, Tanvir Ahmad, Musheer Ahmad, Ammar Muthanna, Brij B. Gupta, Ahmed A. Abd El-Latif:
Determination of Critical Edges in Air Route Network Using Modified Weighted Sum Method and Grey Relational Analysis. IEEE Trans. Intell. Transp. Syst. 24(12): 15578-15589 (2023) - [j116]Muhammad Tanveer, Abd Ullah Khan, Musheer Ahmad, Tu N. Nguyen, Ahmed A. Abd El-Latif:
Resource-Efficient Authenticated Data Sharing Mechanism for Smart Wearable Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2525-2536 (2023) - [j115]Muhammad Tanveer, Abd Ullah Khan, Tu N. Nguyen, Musheer Ahmad, Ahmed A. Abd El-Latif:
Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing. IEEE Trans. Netw. Sci. Eng. 10(5): 3058-3070 (2023) - [j114]Muhammad Asim, Junhong Chen, Ammar Muthanna, Liu Wenyin, Siraj Khan, Ahmed A. Abd El-Latif:
A novel simulated annealing trajectory optimization algorithm in an autonomous UAVs-empowered MFC system for medical internet of things devices. Wirel. Networks 29(7): 3163-3176 (2023) - 2022
- [j113]Vinod Kumar, Ammar Mohammed Ali Al-Tameemi, Adesh Kumari, Musheer Ahmad, Mayadah Waheed Falah, Ahmed A. Abd El-Latif:
PSEBVC: Provably Secure ECC and Biometric Based Authentication Framework Using Smartphone for Vehicular Cloud Environment. IEEE Access 10: 84776-84789 (2022) - [j112]Khaled Benkouider, Sundarapandian Vaidyanathan, Aceng Sambas, Esteban Tlelo-Cuautle, Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Ciro Fabian Bermudez-Marquez, Ibrahim Mohammed Sulaiman, Aliyu Muhammed Awwal, Poom Kumam:
A New 5-D Multistable Hyperchaotic System With Three Positive Lyapunov Exponents: Bifurcation Analysis, Circuit Design, FPGA Realization and Image Encryption. IEEE Access 10: 90111-90132 (2022) - [j111]Achraf Daoui, Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri, Hassan Qjidaa, Musheer Ahmad, Ahmed A. Abd El-Latif:
Biomedical Multimedia Encryption by Fractional-Order Meixner Polynomials Map and Quaternion Fractional-Order Meixner Moments. IEEE Access 10: 102599-102617 (2022) - [j110]Amirul Haque, Tabarak Ali Abdulhussein, Musheer Ahmad, Mayadah Waheed Falah, Ahmed A. Abd El-Latif:
A Strong Hybrid S-Box Scheme Based on Chaos, 2D Cellular Automata and Algebraic Structure. IEEE Access 10: 116167-116181 (2022) - [j109]Xin Nie, Jialiang Peng, Yi Wu, Brij B. Gupta, Ahmed A. Abd El-Latif:
Real-Time Traffic Speed Estimation for Smart Cities with Spatial Temporal Data: A Gated Graph Attention Network Approach. Big Data Res. 28: 100313 (2022) - [j108]Mohamed Hammad, Ahmed A. Abd El-Latif, Amir Hussain, Fathi E. Abd El-Samie, Brij B. Gupta, Hassan Ugail, Ahmed Sedik:
Deep Learning Models for Arrhythmia Detection in IoT Healthcare Applications. Comput. Electr. Eng. 100: 108011 (2022) - [j107]Mohamed Abd Elaziz, Salima Ouadfel, Ahmed A. Abd El-Latif, Rehab Ali Ibrahim:
Feature Selection Based on Modified Bio-inspired Atomic Orbital Search Using Arithmetic Optimization and Opposite-Based Learning. Cogn. Comput. 14(6): 2274-2295 (2022) - [j106]Mohammed Saleh Ali Muthanna, Ammar Muthanna, Ahsan Rafiq, Mohammad Hammoudeh, Reem Alkanhel, Stephen Lynch, Ahmed A. Abd El-Latif:
Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks. Comput. Commun. 183: 33-50 (2022) - [j105]Mohammed Saleh Ali Muthanna, Ammar Muthanna, Tu N. Nguyen, Abdullah S. Alshahrani, Ahmed A. Abd El-Latif:
Towards optimal positioning and energy-efficient UAV path scheduling in IoT applications. Comput. Commun. 191: 145-160 (2022) - [j104]Jingya Wang, Xianhua Song, Ahmed A. Abd El-Latif:
Efficient Entropic Security with Joint Compression and Encryption Approach Based on Compressed Sensing with Multiple Chaotic Systems. Entropy 24(7): 885 (2022) - [j103]Jiameng Yao, Yaxing Wang, Qiong Li, Haokun Mao, Ahmed A. Abd El-Latif, Nan Chen:
An Efficient Routing Protocol for Quantum Key Distribution Networks. Entropy 24(7): 911 (2022) - [j102]Mehdhar S. A. M. Al-gaashani, Fengjun Shang, Mohammed Saleh Ali Muthanna, Mashael Khayyat, Ahmed A. Abd El-Latif:
Tomato leaf disease classification by exploiting transfer learning and feature concatenation. IET Image Process. 16(3): 913-925 (2022) - [j101]Diganta Sengupta, Ahmed A. Abd El-Latif, Debashis De, Keivan Navi, Nader Bagherzadeh:
Reversible quantum communication & systems. IET Quantum Commun. 3(1): 1-4 (2022) - [j100]Mahdi Karami, Balamurali Ramakrishnan, Ibrahim Ismael Hamad, Ahmed A. Abd El-Latif, Viet-Thanh Pham:
Investigation of the Simplest Megastable Chaotic Oscillator with Spatially Triangular Wave Damping. Int. J. Bifurc. Chaos 32(7): 2230016:1-2230016:25 (2022) - [j99]Minrui Xu, Jialiang Peng, Brij B. Gupta, Jiawen Kang, Zehui Xiong, Zhenni Li, Ahmed A. Abd El-Latif:
Multiagent Federated Reinforcement Learning for Secure Incentive Mechanism in Intelligent Cyber-Physical Systems. IEEE Internet Things J. 9(22): 22095-22108 (2022) - [j98]Akram Belazi, Sofiane Kharbech, Md Nazish Aslam, Muhammad Talha, Wei Xiang, Abdullah M. Iliyasu, Ahmed A. Abd El-Latif:
Improved Sine-Tangent chaotic map with application in medical images encryption. J. Inf. Secur. Appl. 66: 103131 (2022) - [j97]Muhammad Tanveer, Musheer Ahmad, Hany S. Khalifa, Ahmed Alkhayyat, Ahmed A. Abd El-Latif:
A new anonymous authentication framework for secure smart grids applications. J. Inf. Secur. Appl. 71: 103336 (2022) - [j96]Achraf Daoui, Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri, Hassan Qjidaa, Musheer Ahmad, Ahmed A. Abd El-Latif:
Color stereo image encryption and local zero-watermarking schemes using octonion Hahn moments and modified Henon map. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 8927-8954 (2022) - [j95]Mohamed Hammad, Monagi H. Alkinani, Brij B. Gupta, Ahmed A. Abd El-Latif:
Myocardial infarction detection based on deep neural network on imbalanced data. Multim. Syst. 28(4): 1373-1385 (2022) - [j94]Ahmed Sedik, Mohamed Hammad, Fathi E. Abd El-Samie, Brij B. Gupta, Ahmed A. Abd El-Latif:
Efficient deep learning approach for augmented detection of Coronavirus disease. Neural Comput. Appl. 34(14): 11423-11440 (2022) - [j93]Guanglong Chen, Xianhua Song, Salvador E. Venegas-Andraca, Ahmed A. Abd El-Latif:
QIRHSI: novel quantum image representation based on HSI color space model. Quantum Inf. Process. 21(1): 5 (2022) - [j92]Li Li, Ahmed A. Abd El-Latif, Sajad Jafari, Karthikeyan Rajagopal, Fahimeh Nazarimehr, Bassem Abd-El-Atty:
Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold. Sensors 22(1): 334 (2022) - [j91]Aridegbe A. Ipaye, Zhigang Chen, Muhammad Asim, Samia Allaoua Chelloug, Lin Guo, Ali M. A. Ibrahim, Ahmed A. Abd El-Latif:
Location and Time Aware Multitask Allocation in Mobile Crowd-Sensing Based on Genetic Algorithm. Sensors 22(8): 3013 (2022) - [j90]Abdukodir Khakimov, Ibrahim A. Elgendy, Ammar Muthanna, Evgeny Mokrov, Konstantin E. Samouylov, Yassine Maleh, Ahmed A. Abd El-Latif:
Flexible architecture for deployment of edge computing applications. Simul. Model. Pract. Theory 114: 102402 (2022) - [j89]Muhammad Asim, Wali Khan Mashwani, Ahmed A. Abd El-Latif:
Energy and task completion time minimization algorithm for UAVs-empowered MEC SYSTEM. Sustain. Comput. Informatics Syst. 35: 100698 (2022) - [j88]Dhinakaran Veeman, Ahmad Alanezi, Hayder Natiq, Sajad Jafari, Ahmed A. Abd El-Latif:
A Chaotic Quadratic Oscillator with Only Squared Terms: Multistability, Impulsive Control, and Circuit Design. Symmetry 14(2): 259 (2022) - [j87]Nestor Tsafack, Akram Belazi, Bassem Abd-El-Atty, Md Nazish Aslam, Christos K. Volos, Jean De Dieu Nkapkop, Ahmed A. Abd El-Latif:
A New 4D Hyperchaotic System with Dynamics Analysis, Synchronization, and Application to Image Encryption. Symmetry 14(2): 424 (2022) - [j86]Sundas Iftikhar, Muhammad Asim, Zuping Zhang, Ahmed A. Abd El-Latif:
Advance generalization technique through 3D CNN to overcome the false positives pedestrian in autonomous vehicles. Telecommun. Syst. 80(4): 545-557 (2022) - [j85]Muhammad Asim, Ahmed A. Abd El-Latif, Mohammed Ahmed El-Affendi, Wali Khan Mashwani:
Energy Consumption and Sustainable Services in Intelligent Reflecting Surface and Unmanned Aerial Vehicles-Assisted MEC System for Large-Scale Internet of Things Devices. IEEE Trans. Green Commun. Netw. 6(3): 1396-1407 (2022) - [j84]Ibrahim Attiya, Mohamed Abd Elaziz, Laith Abualigah, Tu N. Nguyen, Ahmed A. Abd El-Latif:
An Improved Hybrid Swarm Intelligence for Scheduling IoT Application Tasks in the Cloud. IEEE Trans. Ind. Informatics 18(9): 6264-6272 (2022) - [j83]Ahmed A. Abd El-Latif, Yassine Maleh, Marinella Petrocchi, Valentina Casola:
Guest Editorial: Advanced Computing and Blockchain Applications for Critical Industrial IoT. IEEE Trans. Ind. Informatics 18(11): 8282-8286 (2022) - [j82]Muneeb Ahmed, Sarfaraz Masood, Musheer Ahmad, Ahmed A. Abd El-Latif:
Intelligent Driver Drowsiness Detection for Traffic Safety Based on Multi CNN Deep Model and Facial Subsampling. IEEE Trans. Intell. Transp. Syst. 23(10): 19743-19752 (2022) - [j81]K. Shankar, Eswaran Perumal, Mohamed Elhoseny, Fatma Taher, B. B. Gupta, Ahmed A. Abd El-Latif:
Synergic Deep Learning for Smart Health Diagnosis of COVID-19 for Connected Living and Smart Cities. ACM Trans. Internet Techn. 22(3): 61:1-61:14 (2022) - [j80]Ahmed Alkhayyat, Musheer Ahmad, Nestor Tsafack, Muhammad Tanveer, Donghua Jiang, Ahmed A. Abd El-Latif:
A Novel 4D Hyperchaotic System Assisted Josephus Permutation for Secure Substitution-Box Generation. J. Signal Process. Syst. 94(3): 315-328 (2022) - [j79]Xiangyun Tang, Liehuang Zhu, Meng Shen, Jialiang Peng, Jiawen Kang, Dusit Niyato, Ahmed A. Abd El-Latif:
Secure and Trusted Collaborative Learning Based on Blockchain for Artificial Intelligence of Things. IEEE Wirel. Commun. 29(3): 14-22 (2022) - [e1]Nadia Nedjah, Ahmed A. Abd El-Latif, Brij B. Gupta, Luiza de Macedo Mourelle:
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities. Studies in Computational Intelligence 1030, Springer 2022, ISBN 978-3-030-96736-9 [contents] - 2021
- [j78]Amjad Hussain Zahid, Abdullah M. Iliyasu, Musheer Ahmad, Mian Muhammad Umar Shaban, Muhammad Junaid Arshad, Hussam S. Alhadawi, Ahmed A. Abd El-Latif:
A Novel Construction of Dynamic S-Box With High Nonlinearity Using Heuristic Evolution. IEEE Access 9: 67797-67812 (2021) - [j77]Sundarapandian Vaidyanathan, Aceng Sambas, Bassem Abd-El-Atty, Ahmed A. Abd El-Latif, Esteban Tlelo-Cuautle, Omar Guillén-Fernández, Mustafa Mamat, Mohamad Afendee Mohamed, Murat Alçin, Murat Tuna, Ihsan Pehlivan, Ismail Koyuncu, Mohd Asrul Hery Ibrahim:
A 5-D Multi-Stable Hyperchaotic Two-Disk Dynamo System With No Equilibrium Point: Circuit Design, FPGA Realization and Applications to TRNGs and Image Encryption. IEEE Access 9: 81352-81369 (2021) - [j76]Ahmed Sedik, Lo'ai Tawalbeh, Mohamed Hammad, Ahmed A. Abd El-Latif, Ghada M. El Banby, Ashraf A. M. Khalaf, Fathi E. Abd El-Samie, Abdullah M. Iliyasu:
Deep Learning Modalities for Biometric Alteration Detection in 5G Networks-Based Secure Smart Cities. IEEE Access 9: 94780-94788 (2021) - [j75]Sundarapandian Vaidyanathan, Aceng Sambas, Esteban Tlelo-Cuautle, Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Omar Guillén-Fernández, Khaled Benkouider, Mohamad Afendee Mohamed, Mustafa Mamat, Mohd Asrul Hery Ibrahim:
A New 4-D Multi-Stable Hyperchaotic System With No Balance Point: Bifurcation Analysis, Circuit Simulation, FPGA Realization and Image Cryptosystem. IEEE Access 9: 144555-144573 (2021) - [j74]Ahmed A. Abd El-Latif, Lo'ai Tawalbeh, Yassine Maleh, Gökay Saldamli:
Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity. Big Data 9(2): 146-147 (2021) - [j73]Ahmed A. Abd El-Latif, Lo'ai Tawalbeh, Yassine Maleh, Gökay Saldamli:
Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity: Deadline for Manuscript Submission: September 15, 2021. Big Data 9(3): 149-150 (2021) - [j72]Ahmed A. Abd El-Latif, Lo'ai Tawalbeh, Yassine Maleh, Gökay Saldamli:
Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity: Deadline for Manuscript Submission: September 15, 2021. Big Data 9(4): 322-323 (2021) - [j71]Wafaa Adnan Alsaggaf, Irfan Mehmood, Enas Fawai Khairullah, Samar M. Alkhuraiji, Maha Farouk S. Sabir, Ahmed S. Alghamdi, Ahmed A. Abd El-Latif:
A Smart Surveillance System for Uncooperative Gait Recognition Using Cycle Consistent Generative Adversarial Networks (CCGANs). Comput. Intell. Neurosci. 2021: 3110416:1-3110416:12 (2021) - [j70]Ishleen Kaur, M. N. Doja, Tanvir Ahmad, Musheer Ahmad, Amir Hussain, Ahmed Nadeem, Ahmed A. Abd El-Latif:
An Integrated Approach for Cancer Survival Prediction Using Data Mining Techniques. Comput. Intell. Neurosci. 2021: 6342226:1-6342226:14 (2021) - [j69]Bassem Abd-El-Atty, Abdullah M. Iliyasu, Ahmed A. Abd El-Latif:
A Multi-Image Cryptosystem Using Quantum Walks and Chebyshev Map. Complex. 2021: 9424469:1-9424469:16 (2021) - [j68]Sundarapandian Vaidyanathan, Irene M. Moroz, Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Aceng Sambas:
A new multistable jerk system with Hopf bifurcations, its electronic circuit simulation and an application to image encryption. Int. J. Comput. Appl. Technol. 67(1): 29-46 (2021) - [j67]Weizhe Zhang, Ibrahim A. Elgendy, Mohamed Hammad, Abdullah M. Iliyasu, Xiaojiang Du, Mohsen Guizani, Ahmed A. Abd El-Latif:
Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud Computing Systems. IEEE Internet Things J. 8(10): 8119-8132 (2021) - [j66]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Irfan Mehmood, Khan Muhammad, Salvador E. Venegas-Andraca, Jialiang Peng:
Quantum-Inspired Blockchain-Based Cybersecurity: Securing Smart Edge Utilities in IoT-Based Smart Cities. Inf. Process. Manag. 58(4): 102549 (2021) - [j65]Mohamed Hammad, Kandala N. V. P. S. Rajesh, Amira Abdelatey, Moloud Abdar, Mariam Zomorodi Moghadam, Ru San Tan, U. Rajendra Acharya, Joanna Plawiak, Ryszard Tadeusiewicz, Vladimir Makarenkov, Nizal Sarrafzadegan, Abbas Khosravi, Saeid Nahavandi, Ahmed A. Abd El-Latif, Pawel Plawiak:
Automated detection of shockable ECG signals: A review. Inf. Sci. 571: 580-604 (2021) - [j64]Nestor Tsafack, Abdullah M. Iliyasu, Jean De Dieu Nkapkop, Zeric Tabekoueng Njitacke, Jacques Kengne, Bassem Abd-El-Atty, Akram Belazi, Ahmed A. Abd El-Latif:
A memristive RLC oscillator dynamics applied to image encryption. J. Inf. Secur. Appl. 61: 102944 (2021) - [j63]H. Aparna, B. Bhumijaa, R. Santhiyadevi, K. Vaishanavi, M. Sathanarayanan, Amirtharajan Rengarajan, Padmapriya Praveenkumar, Ahmed A. Abd El-Latif:
Double layered Fridrich structure to conserve medical data privacy using quantum cryptosystem. J. Inf. Secur. Appl. 63: 102972 (2021) - [j62]Gia Nhu Nguyen, Nin Ho Le Viet, Mohamed Elhoseny, K. Shankar, B. B. Gupta, Ahmed A. Abd El-Latif:
Secure blockchain enabled Cyber-physical systems in healthcare using deep belief network with ResNet model. J. Parallel Distributed Comput. 153: 150-160 (2021) - [j61]Khizar Abbas, Lo'ai Ali Tawalbeh, Ahsan Rafiq, Ammar Muthanna, Ibrahim A. Elgendy, Ahmed A. Abd El-Latif:
Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities. Secur. Commun. Networks 2021: 5597679:1-5597679:13 (2021) - [j60]Ahmad Alanezi, Bassem Abd-El-Atty, Hoshang Kolivand, Ahmed A. Abd El-Latif, Basma Abd El-Rahiem, Syam Sankar, Hany S. Khalifa:
Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment. Secur. Commun. Networks 2021: 6615512:1-6615512:17 (2021) - [j59]Amir Chaaf, Mohammed Saleh Ali Muthanna, Ammar Muthanna, Soha Alhelaly, Ibrahim A. Elgendy, Abdullah M. Iliyasu, Ahmed A. Abd El-Latif:
Energy-Efficient Relay-Based Void Hole Prevention and Repair in Clustered Multi-AUV Underwater Wireless Sensor Network. Secur. Commun. Networks 2021: 9969605:1-9969605:20 (2021) - [j58]Jialiang Peng, Bian Yang, Brij B. Gupta, Ahmed A. Abd El-Latif:
A biometric cryptosystem scheme based on random projection and neural network. Soft Comput. 25(11): 7657-7670 (2021) - [j57]Jialiang Peng, Bian Yang, Brij B. Gupta, Ahmed A. Abd El-Latif:
Correction to: A biometric cryptosystem scheme based on random projection and neural network. Soft Comput. 25(11): 7671 (2021) - [j56]Jingya Wang, Xianhua Song, Huiqiang Wang, Ahmed A. Abd El-Latif:
Applicable Image Security Based on New Hyperchaotic System. Symmetry 13(12): 2290 (2021) - [j55]Akber Ali Khan, Vinod Kumar, Musheer Ahmad, Brij B. Gupta, Musheer Ahmad, Ahmed A. Abd El-Latif:
A secure and efficient key agreement framework for critical energy infrastructure using mobile device. Telecommun. Syst. 78(4): 539-557 (2021) - [j54]Manjit Kaur, Dilbag Singh, Vijay Kumar, Brij B. Gupta, Ahmed A. Abd El-Latif:
Secure and Energy Efficient-Based E-Health Care Framework for Green Internet of Things. IEEE Trans. Green Commun. Netw. 5(3): 1223-1231 (2021) - [j53]Mohamed Hammad, Abdullah M. Iliyasu, Abdulhamit Subasi, Edmond S. L. Ho, Ahmed A. Abd El-Latif:
A Multitier Deep Learning Model for Arrhythmia Detection. IEEE Trans. Instrum. Meas. 70: 1-9 (2021) - [j52]Alexander Paramonov, Jialiang Peng, Dmitry Kashkarov, Ammar Muthanna, Ibrahim A. Elgendy, Andrey Koucheryavy, Yassine Maleh, Ahmed A. Abd El-Latif:
Study and Analysis of Multiconnectivity for Ultrareliable and Low-Latency Features in Networks and V2X Communications. Wirel. Commun. Mob. Comput. 2021: 1718099:1-1718099:10 (2021) - [j51]Ibrahim A. Elgendy, Weizhe Zhang, Hui He, Brij B. Gupta, Ahmed A. Abd El-Latif:
Joint computation offloading and task caching for multi-user and multi-task MEC systems: reinforcement learning-based algorithms. Wirel. Networks 27(3): 2023-2038 (2021) - [c20]Arfin Shagufta, Mohammad Tarique Hesham, Sarfaraz Masood, Ahmed A. Abd El-Latif:
A Vision Transformer Model for Violence Detection from Real-Time Videos. ICFNDS 2021: 834-840 - 2020
- [j50]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Haitham Elwahsh, Md. Jalil Piran, Ali Kashif Bashir, Oh-Young Song, Wojciech Mazurczyk:
Providing End-to-End Security Using Quantum Walks in IoT Networks. IEEE Access 8: 92687-92696 (2020) - [j49]Eman M. Abou-Nassar, Abdullah M. Iliyasu, Passent Mohammed El-Kafrawy, Oh-Young Song, Ali Kashif Bashir, Ahmed A. Abd El-Latif:
DITrust Chain: Towards Blockchain-Based Trust Models for Sustainable Healthcare IoT Systems. IEEE Access 8: 111223-111238 (2020) - [j48]Aceng Sambas, Sundarapandian Vaidyanathan, Esteban Tlelo-Cuautle, Bassem Abd-El-Atty, Ahmed A. Abd El-Latif, Omar Guillén-Fernández, Sukono, Yuyun Hidayat, Gugun Gundara:
A 3-D Multi-Stable System With a Peanut-Shaped Equilibrium Curve: Circuit Design, FPGA Realization, and an Application to Image Encryption. IEEE Access 8: 137116-137132 (2020) - [j47]Nestor Tsafack, Syam Sankar, Bassem Abd-El-Atty, Jacques Kengne, K. C. Jithin, Akram Belazi, Irfan Mehmood, Ali Kashif Bashir, Oh-Young Song, Ahmed A. Abd El-Latif:
A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things. IEEE Access 8: 137731-137744 (2020) - [j46]Yi Wu, Yi Liu, Syed Hassan Ahmed, Jialiang Peng, Ahmed A. Abd El-Latif:
Dominant Data Set Selection Algorithms for Electricity Consumption Time-Series Data Analysis Based on Affine Transformation. IEEE Internet Things J. 7(5): 4347-4360 (2020) - [j45]Nestor Tsafack, Jacques Kengne, Bassem Abd-El-Atty, Abdullah M. Iliyasu, Kaoru Hirota, Ahmed A. Abd El-Latif:
Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf. Sci. 515: 191-217 (2020) - [j44]Nestor Tsafack, Jean De Dieu Nkapkop, Jacques Kengne, Joseph Yves Effa, Abdullah M. Iliyasu, Ahmed A. Abd El-Latif:
A Multidimensional Hyperjerk Oscillator: Dynamics Analysis, Analogue and Embedded Systems Implementation, and Its Application as a Cryptosystem. Sensors 20(1): 83 (2020) - [j43]Bassem Abd-El-Atty, Abdullah M. Iliyasu, Haya Alaskar, Ahmed A. Abd El-Latif:
A Robust Quasi-Quantum Walks-based Steganography Protocol for Secure Transmission of Images on Cloud-based E-healthcare Platforms. Sensors 20(11): 3108 (2020) - [j42]Alejandro Freyre-Echevarría, Ahmad Alanezi, Ismel Martínez-Díaz, Musheer Ahmad, Ahmed A. Abd El-Latif, Hoshang Kolivand, Abdul Razaq:
An External Parameter Independent Novel Cost Function for Evolving Bijective Substitution-Boxes. Symmetry 12(11): 1896 (2020) - [j41]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Wojciech Mazurczyk, Carol J. Fung, Salvador E. Venegas-Andraca:
Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario. IEEE Trans. Netw. Serv. Manag. 17(1): 118-131 (2020) - [j40]Yi Liu, Jialiang Peng, Jiawen Kang, Abdullah M. Iliyasu, Dusit Niyato, Ahmed A. Abd El-Latif:
A Secure Federated Learning Framework for 5G Networks. IEEE Wirel. Commun. 27(4): 24-31 (2020) - [i1]Yi Liu, Jialiang Peng, Jiawen Kang, Abdullah M. Iliyasu, Dusit Niyato, Ahmed A. Abd El-Latif:
A Secure Federated Learning Framework for 5G Networks. CoRR abs/2005.05752 (2020)
2010 – 2019
- 2019
- [j39]Li Li, M. Shamim Hossain, Ahmed A. Abd El-Latif, Mohammed F. Alhamid:
Distortion less secret image sharing scheme for Internet of Things system. Clust. Comput. 22(Suppl 1): 2293-2307 (2019) - [j38]Ahmed A. Abd El-Latif, M. Shamim Hossain, Ning Wang:
Score level multibiometrics fusion approach for healthcare. Clust. Comput. 22(Suppl 1): 2425-2436 (2019) - [j37]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk:
Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Future Gener. Comput. Syst. 100: 893-906 (2019) - [j36]Bassem Abd-El-Atty, Ahmed A. Abd El-Latif, Salvador E. Venegas-Andraca:
An encryption protocol for NEQR images based on one-particle quantum walks on a circle. Quantum Inf. Process. 18(9): 272 (2019) - [c19]Bassem Abd-El-Atty, Mohamed Amin, Ahmed A. Abd El-Latif, Hassan Ugail, Irfan Mehmood:
An Efficient Cryptosystem based on the Logistic-Chebyshev Map. SKIMA 2019: 1-6 - 2018
- [j35]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Muhammad Talha:
Robust Encryption of Quantum Medical Images. IEEE Access 6: 1073-1081 (2018) - [j34]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, M. Shamim Hossain, Samir Elmougy, Ahmed Ghoneim:
Secure Quantum Steganography Protocol for Fog Cloud Internet of Things. IEEE Access 6: 10332-10340 (2018) - [j33]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, M. Shamim Hossain, Md. Abdur Rahman, Atif Alamri, Brij B. Gupta:
Efficient Quantum Information Hiding for Remote Medical Image Sharing. IEEE Access 6: 21075-21083 (2018) - [j32]Ramadan Gad, Muhammad Talha, Ahmed A. Abd El-Latif, Mohamed Zorkany, Ayman El-Sayed, Nawal A. El-Fishawy, Ghulam Muhammad:
Iris Recognition Using Multi-Algorithmic Approaches for Cognitive Internet of things (CIoT) Framework. Future Gener. Comput. Syst. 89: 178-191 (2018) - 2017
- [c18]Li Li, Bassem Abd-El-Atty, Ahmed A. Abd El-Latif, Ahmed Ghoneim:
Quantum color image encryption based on multiple discrete chaotic systems. FedCSIS 2017: 555-559 - [c17]Jialiang Peng, Ahmed A. Abd El-Latif, Akram Belazi, Zbigniew Kotulski:
Efficient chaotic nonlinear component for secure cryptosystems. ICUFN 2017: 989-993 - 2016
- [j31]Xianhua Song, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Response to the Letter to the Editor from Y.G. Yang et al. regarding "Dynamic watermarking scheme for quantum images based on Hadamard transform" by Xianhua Song et al., Multimedia Systems, doi: 10.1007/s00530-014-0355-3. Multim. Syst. 22(2): 273-274 (2016) - [j30]Oussama Benrhouma, Houcemeddine Hermassi, Ahmed A. Abd El-Latif, Safya Belghith:
Chaotic watermark for blind forgery detection in images. Multim. Tools Appl. 75(14): 8695-8718 (2016) - [j29]Akram Belazi, Ahmed A. Abd El-Latif, Safya Belghith:
A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 128: 155-170 (2016) - [c16]Bassem Abd-El-Atty, Ahmed A. Abd El-Latif, Mohamed Amin:
New Quantum Image Steganography Scheme with Hadamard Transformation. AISI 2016: 342-352 - [c15]Mohamed H. Beheri, Mohamed Amin, Xianhua Song, Ahmed A. Abd El-Latif:
Quantum image encryption based on scrambling-diffusion (SD) approach. ICFSP 2016: 43-47 - 2015
- [j28]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Finger multibiometric cryptosystem based on score-level fusion. Int. J. Comput. Appl. Technol. 51(2): 120-130 (2015) - [j27]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. Multim. Tools Appl. 74(9): 3231-3252 (2015) - [j26]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics. Multim. Tools Appl. 74(13): 4469-4486 (2015) - [j25]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Random grids-based visual secret sharing with improved visual quality via error diffusion. Multim. Tools Appl. 74(21): 9279-9296 (2015) - [j24]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
New approaches for efficient information hiding-based secret image sharing schemes. Signal Image Video Process. 9(3): 499-510 (2015) - [j23]Oussama Benrhouma, Houcemeddine Hermassi, Ahmed A. Abd El-Latif, Safya Belghith:
Cryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domain. Signal Image Video Process. 9(6): 1281-1286 (2015) - [j22]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Threshold visual secret sharing with comprehensive properties based on random grids. Signal Image Video Process. 9(7): 1659-1668 (2015) - [j21]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng, Xuehu Yan, Xiamu Niu:
A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system. Signal Image Video Process. 9(Supplement-1): 99-109 (2015) - [j20]Rabei Bechikh, Houcemeddine Hermassi, Ahmed A. Abd El-Latif, Rhouma Rhouma, Safya Belghith:
Breaking an image encryption scheme based on a spatiotemporal chaotic system. Signal Process. Image Commun. 39: 151-158 (2015) - [c14]Akram Belazi, Ahmed A. Abd El-Latif, Rhouma Rhouma, Safya Belghith:
Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. IWCMC 2015: 606-610 - [c13]Nehal A. Mohamed, Mostafa A. El-Azeim, Alaa Zaghloul, Ahmed A. Abd El-Latif:
Image encryption scheme for secure digital images based on 3D cat map and Turing machine. SoCPaR 2015: 230-234 - 2014
- [j19]Huiyun Jing, Xin He, Qi Han, Ahmed A. Abd El-Latif, Xiamu Niu:
Saliency detection based on integrated features. Neurocomputing 129: 114-121 (2014) - [j18]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Finger multibiometric cryptosystems: fusion strategy and template security. J. Electronic Imaging 23(2): 023001 (2014) - [j17]Xianhua Song, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Dynamic watermarking scheme for quantum images based on Hadamard transform. Multim. Syst. 20(4): 379-388 (2014) - [j16]Ahmed A. Abd El-Latif, Li Li, Xiamu Niu:
A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multim. Tools Appl. 70(3): 1559-1584 (2014) - [j15]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Tiejun Zhang, Xiamu Niu:
Toward accurate localization and high recognition performance for noisy iris images. Multim. Tools Appl. 71(3): 1411-1430 (2014) - [j14]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng, Xiamu Niu:
An enhanced thermal face recognition method based on multiscale complex fusion for Gabor coefficients. Multim. Tools Appl. 72(3): 2339-2358 (2014) - [j13]Xianhua Song, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Quantum image encryption based on restricted geometric and color transformations. Quantum Inf. Process. 13(8): 1765-1787 (2014) - [j12]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Jianzhi Sang, Xiamu Niu:
A Novel Perceptual Secret Sharing Scheme. Trans. Data Hiding Multim. Secur. 9: 68-90 (2014) - [c12]Alaa Zaghloul, Tiejun Zhang, Mohamed Amin, Ahmed A. Abd El-Latif:
Color encryption scheme based on adapted quantum logistic map. ICDIP 2014: 915922 - 2013
- [j11]Xuefeng Bai, Tiejun Zhang, Chuanjun Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
A Fully Automatic Player Detection Method Based on One-Class SVM. IEICE Trans. Inf. Syst. 96-D(2): 387-391 (2013) - [j10]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Ning Wang, Xiamu Niu:
Finger Vein Recognition with Gabor Wavelets and Local Binary Patterns. IEICE Trans. Inf. Syst. 96-D(8): 1886-1889 (2013) - [j9]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng, Xiamu Niu:
Two-directional two-dimensional modified Fisher principal component analysis: an efficient approach for thermal face verification. J. Electronic Imaging 22(2): 023013 (2013) - [j8]Xuehu Yan, Shen Wang, Li Li, Ahmed A. Abd El-Latif, Zhiqiang Wei, Xiamu Niu:
A New Assessment Measure of Shadow Image Quality Based on Error Diffusion Techniques. J. Inf. Hiding Multim. Signal Process. 4(2): 119-127 (2013) - [j7]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Jianzhi Sang, Xiamu Niu:
Corrigendum to "T. Chen, K. Tsao, Threshold visual secret sharing by random grids" [J. Syst. Softw. 84(2011) 1197-1208]. J. Syst. Softw. 86(5): 1462-1463 (2013) - [j6]Xianhua Song, Shen Wang, Shuai Liu, Ahmed A. Abd El-Latif, Xiamu Niu:
A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf. Process. 12(12): 3689-3706 (2013) - [j5]Ahmed A. Abd El-Latif, Li Li, Ning Wang, Qi Han, Xiamu Niu:
A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process. 93(11): 2986-3000 (2013) - [c11]Ahmed A. Abd El-Latif, Ning Wang, Jialiang Peng, Qiong Li, Xiamu Niu:
A new encryption scheme for color images based on quantum chaotic system in transform domain. ICDIP 2013: 88781S - [c10]Jialiang Peng, Qiong Li, Ning Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
An effective preprocessing method for finger vein recognition. ICDIP 2013: 887808 - [c9]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Xuehu Yan, Xiamu Niu:
A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face Images. ISBAST 2013: 217-223 - 2012
- [j4]Zhenfeng Shi, Liyang Yu, Ahmed A. Abd El-Latif, Xiamu Niu:
Skeleton Modulated Topological Perception Map for Rapid Viewpoint Selection. IEICE Trans. Inf. Syst. 95-D(10): 2585-2588 (2012) - [j3]Li Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Signal Process. 92(4): 1069-1078 (2012) - [j2]Li Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Corrigendum to "Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images" [Signal Process. 92(2012) 1069-1078]. Signal Process. 92(9): 2339-2340 (2012) - [c8]Ahmed A. Abd El-Latif, Li Li, Ning Wang, Qiong Li, Xiamu Niu:
A new image encryption based on chaotic systems and singular value decomposition. ICDIP 2012: 83343F - [c7]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif:
An accurate iris location method for low quality iris images. ICDIP 2012: 833411 - [c6]Li Li, Ahmed A. Abd El-Latif:
A novel secret image sharing scheme based on chaotic system. ICDIP 2012: 833412 - [c5]Tiejun Zhang, Ahmed A. Abd El-Latif, Ning Wang, Qiong Li, Xiamu Niu:
A new image segmentation method via fusing NCut eigenvectors maps. ICDIP 2012: 833430 - [c4]Jialiang Peng, Ning Wang, Ahmed A. Abd El-Latif, Qiong Li, Xiamu Niu:
Finger-vein Verification Using Gabor Filter and SIFT Feature Matching. IIH-MSP 2012: 45-48 - 2011
- [c3]Ahmed A. Abd El-Latif, Xiamu Niu, Ning Wang:
Chaotic Image Encryption Using Bézier Curve in DCT Domain Scrambling. DEIS 2011: 30-41 - [c2]Ning Wang, Qiong Li, Qi Han, Ahmed A. Abd El-Latif, Xiamu Niu:
A Novel Multi-division Template Protection (MDTP) Scheme for Iris Recognition Based on Fuzzy Vault. IIH-MSP 2011: 101-104 - [c1]Ahmed A. Abd El-Latif, Li Li, Ning Wang, Xiamu Niu:
Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems. IIH-MSP 2011: 369-373 - 2010
- [j1]Mohamed Amin, Ahmed A. Abd El-Latif:
Efficient modified RC5 based on chaos adapted to image encryption. J. Electronic Imaging 19(1): 013012 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint