Author of the publication

Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm.

, , , , and . ICFNDS, page 1:1-1:6. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Simulation to Digital Twins, the Case of Internet of Things Research and Tools., , , , , , and . ICFNDS, page 657-666. ACM, (2022)A Secure Clock Synchronization Scheme in WSNs Adapted for IoT-based Applications., , , , and . ICFNDS, page 674-681. ACM, (2023)Using Transformers to Classify Arabic Dialects on Social Networks., , , , and . PAIS, page 1-7. IEEE, (2024)A Dynamic and Distributed Key Management Scheme for Wireless Sensor Networks., , , , , and . ICC 2016, page 70:1-70:6. ACM, (2016)A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem., , , , , , and . ICFNDS, page 1:1-1:6. ACM, (2020)Semi-Decentralized Model for Drone Collaboration on Secure Measurement of Positions., , , , , and . ICFNDS, page 64-69. ACM, (2021)Reinforcement Learning Approach for IoT Security using CyberBattleSim: A Simulation-based Study., , and . PAIS, page 1-7. IEEE, (2024)DoTRo: A New Dominating Tree Routing Algorithm for Efficient and Fault-Tolerant Leader Election in WSNs and IoT Networks., , , , , and . MSPN, volume 11005 of Lecture Notes in Computer Science, page 42-53. Springer, (2018)Asymmetric Image Encryption Based on Twin Message Fusion., , , , and . AI-CSP, page 1-5. IEEE, (2021)A Novel Delegated Proof of Work Consensus Protocol., , , , , , and . AI-CSP, page 1-7. IEEE, (2021)