Yasmine Abouelseoud

Orcid: 0000-0002-8888-7309

According to our database1, Yasmine Abouelseoud authored at least 25 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Robust watermark based on Schur decomposition and dynamic weighting factors.
Vis. Comput., May, 2024

Enhanced DV-Hop using shuffled shepherd algorithm for localizing sensor nodes in 3-D space.
Wirel. Networks, January, 2024

2023
A Gaussian random walk salp swarm algorithm for optimal dynamic charging of electric vehicles.
Appl. Soft Comput., November, 2023

A mixed integer linear programming framework for improving cortical vision prosthesis designs.
Biomed. Signal Process. Control., 2023

2022
New Encryption Algorithm for Secure Image Transmission Through Open Network.
Wirel. Pers. Commun., 2022

Efficient spam and phishing emails filtering based on deep learning.
Comput. Networks, 2022

2021
Improved DV-Hop based on Squirrel search algorithm for localization in wireless sensor networks.
Wirel. Networks, 2021

Hierarchical Distributed Framework for Optimal Dynamic Load Management of Electric Vehicles With Vehicle-to-Grid Technology.
IEEE Access, 2021

2020
Privacy preserving search index for image databases based on SURF and order preserving encryption.
IET Image Process., 2020

New video encryption schemes based on chaotic maps.
IET Image Process., 2020

On the use of time division multiplexing to improve electrical brain stimulation focality.
Biomed. Signal Process. Control., 2020

Using Padé Approximant Method to Solve the Mathematical Model of Tumor-Immune Interactions.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

2019
ArMTFr: a new permutation-based image encryption scheme.
Int. J. Electron. Secur. Digit. Forensics, 2019

An optimized general target channel sequence for prioritized cognitive radio networks.
Comput. Networks, 2019

Effect of chosen features on performance of privacy preserving image retrieval systems.
Comput. Electr. Eng., 2019

Optimal Placement and Settings of FACTS Devices for Reactive Power Compensation Using a Firefly Algorithm.
Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe, 2019

2017
Two-Phase Image Encryption Scheme Based on FFCT and Fractals.
Secur. Commun. Networks, 2017

2016
An Optimized Hybrid Approach for Spectrum Handoff in Cognitive Radio Networks With Non-Identical Channels.
IEEE Trans. Commun., 2016

An efficient load flow algorithm for radial distribution networks.
Proceedings of the 28th International Conference on Microelectronics, 2016

2015
A secure geographical routing protocol for highly-dynamic aeronautical networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2011
A new proxy signcryption scheme using warrants.
Int. J. Intell. Eng. Informatics, 2011

2008
A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights.
IACR Cryptol. ePrint Arch., 2008

A New Blind Identity-Based Signature Scheme with Message Recovery.
IACR Cryptol. ePrint Arch., 2008

A New Blind Identity-Based Signature Scheme.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

A scalable trace and revoke scheme with security enhancements.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008


  Loading...