Muath AlShaikh

Orcid: 0000-0001-5550-7659

According to our database1, Muath AlShaikh authored at least 27 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Robust and Recovery Watermarking Approach Based on SVD and OTP Encryption.
J. Signal Process. Syst., July, 2024

Intrusion Detection Using an Improved Cuckoo Search Optimization Algorithm.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2024

Using Supervised Learning to Detect Command and Control Attacks in IoT.
Int. J. Cloud Appl. Comput., 2024

A Blind Digital Watermarking Approach Using Palmprint-Embedded Local Binary Patterns and Arnold Cat Map Transformations.
Proceedings of the 6th International Conference on Pattern Analysis and Intelligent Systems, 2024

2023
A Novel Reduced Reference Image Quality Assessment Based on Formal Concept Analysis.
Comput. J., July, 2023

A novel tamper detection watermarking approach for improving image integrity.
Multim. Tools Appl., March, 2023

A P2P multi-path routing algorithm based on Skyline operator for data aggregation in IoMT environments.
PeerJ Comput. Sci., 2023

Robust watermarking based on modified Pigeon algorithm in DCT domain.
Multim. Tools Appl., 2023

Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key.
J. Inf. Sci. Eng., 2023

Data Trading and Monetization: Challenges and Open Research Directions.
Proceedings of the 7th International Conference on Future Networks and Distributed Systems, 2023

An Adaptive Image Watermarking based on Bellman-Ford Algorithm.
Proceedings of the 7th International Conference on Future Networks and Distributed Systems, 2023

2022
Proof of Chance: A Lightweight Consensus Algorithm for the Internet of Things.
IEEE Trans. Ind. Informatics, 2022

2021
Semi-Decentralized Model for Drone Collaboration on Secure Measurement of Positions.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021

A Novel Delegated Proof of Work Consensus Protocol.
Proceedings of the 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP), 2021

Asymmetric Image Encryption Based on Twin Message Fusion.
Proceedings of the 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP), 2021

The impact of digital transformation on the work of the Algerian local administration during the Corona-Covid 19 Pandemic.
Proceedings of the 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP), 2021

2020
Edge-based lightweight selective encryption scheme for digital medical images.
Multim. Tools Appl., 2020

A flexible encryption technique for the internet of things environment.
Ad Hoc Networks, 2020

2019
An Intelligent Cloud Data Protection Technique Based on Multi Agent System Using Advanced Cryptographic Algorithms.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

2018
An adaptive and efficient fully homomorphic encryption technique.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

A distributed security protocol designed for the context of internet of things.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

2017
Efficient and robust encryption and watermarking technique based on a new chaotic map approach.
Multim. Tools Appl., 2017

2016
Generating optimal informed and adaptive watermark image based on zero-suppressed binary decision diagrams for medical images.
Int. J. Electron. Secur. Digit. Forensics, 2016

Data Authenticity and Integrity in Wireless Sensor Networks Based on a Watermarking Approach.
Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, 2016

2015
Robust watermarking scheme and tamper detection based on threshold versus intensity.
J. Innov. Digit. Ecosyst., 2015

A novel robust informed watermarking approach and tamper detection based on weber differential excitation descriptor.
Proceedings of the 2015 International Symposium on Intelligent Signal Processing and Communication Systems, 2015


  Loading...