Neural networks learning improvement using the K-means clustering algorithm to detect network intrusions KM Faraoun, A Boukelif INFOCOMP Journal of Computer Science 5 (3), 28-36, 2006 | 166 | 2006 |
An efficient and secure chaotic cipher algorithm for image content preservation S Amina, FK Mohamed Communications in Nonlinear Science and Numerical Simulation 60, 12-32, 2018 | 107 | 2018 |
A parallel block-based encryption schema for digital images using reversible cellular automata FK Mohamed Engineering Science and Technology, an International Journal 17 (2), 85-94, 2014 | 105 | 2014 |
An image encryption scheme combining chaos-memory cellular automata and weighted histogram A Souyah, KM Faraoun Nonlinear Dynamics 86 (1), 639-653, 2016 | 96 | 2016 |
Genetic programming approach for multi-category pattern classification applied to network intrusions detection KM Faraoun, A Boukelif International Journal of Computational Intelligence and Applications 6 (01 …, 2006 | 88 | 2006 |
Chaos-Based Key Stream Generator Based on Multiple Maps Combinations and its Application to Images Encryption. K Faraoun Int. Arab J. Inf. Technol. 7 (3), 231-240, 2010 | 56 | 2010 |
Fast and efficient randomized encryption scheme for digital images based on quadtree decomposition and reversible memory cellular automata A Souyah, KM Faraoun Nonlinear Dynamics 84 (2), 715-732, 2016 | 47 | 2016 |
Fast encryption of RGB color digital images using a tweakable cellular automaton based schema FK Mohamed Optics & Laser Technology 64, 145-155, 2014 | 42 | 2014 |
Speeding up fractal image compression by genetic algorithms FK Mohamed, B Aoued Multidimensional Systems and Signal Processing 16, 217-236, 2005 | 36 | 2005 |
Data dimensionality reduction based on genetic selection of feature subsets KM Faraoun, A Rabhi EEDIS UDL University-SBA, 2007 | 31 | 2007 |
Feature-based color correction of multiview video for coding and rendering enhancement SA Fezza, MC Larabi, KM Faraoun IEEE Transactions on Circuits and Systems for Video Technology 24 (9), 1486-1498, 2014 | 30 | 2014 |
Stereoscopic image quality metric based on local entropy and binocular just noticeable difference SA Fezza, MC Larabi, KM Faraoun 2014 IEEE International Conference on Image Processing (ICIP), 2002-2006, 2014 | 26 | 2014 |
Design of a new efficient and secure multi-secret images sharing scheme KM Faraoun Multimedia Tools and Applications 76 (5), 6247-6261, 2017 | 23 | 2017 |
A genetic strategy to design cellular automata based block ciphers KM Faraoun Expert Systems with Applications 41 (17), 7958-7967, 2014 | 22 | 2014 |
Robust and reversible image watermarking scheme using combined DCT-DWT-SVD transforms S Bekkouch, KM Faraoun Journal of Information Processing Systems 11 (3), 406-420, 2015 | 21 | 2015 |
Lightweight anonymous and mutual authentication scheme for wireless body area networks A Attir, F Naït-Abdesselam, KM Faraoun Computer Networks 224, 109625, 2023 | 18 | 2023 |
RST robust watermarking schema based on image normalization and DCT decomposition FK Mohamed, R Abbes Malaysian Journal of Computer Science 20 (1), 2007 | 18 | 2007 |
Building secure and fast cryptographic hash functions using programmable cellular automata AE Belfedhal, KM Faraoun Journal of computing and information technology 23 (4), 317-328, 2015 | 15 | 2015 |
Link quality and MAC-overhead aware predictive preemptive multipath routing protocol for mobile ad hoc networks MA Cherif, MK Feraoun, SB Hacene International Journal of Communication Networks and Information Security 5 …, 2013 | 13 | 2013 |
Artificial Immune Systems for text-dependent speaker recognition KM Faraoun, A Boukelif INFOCOMP Journal of Computer Science 5 (4), 19-26, 2006 | 13 | 2006 |