Software defect prediction using ensemble learning on selected features IH Laradji, M Alshayeb, L Ghouti Information and Software Technology 58, 388-402, 2015 | 463 | 2015 |
Digital image watermarking using balanced multiwavelets L Ghouti, A Bouridane, MK Ibrahim, S Boussakta IEEE transactions on signal processing 54 (4), 1519-1536, 2006 | 301 | 2006 |
A Fully-Automated Deep Learning Pipeline for Cervical Cancer Classification Z Alyafei, L Ghouti Expert Systems With Applications 2019 (September 2019), 112951, 2019 | 175 | 2019 |
Mobility prediction in mobile ad hoc networks using extreme learning machines L Ghouti, TR Sheltami, KS Alutaibi Procedia Computer Science 19, 305-312, 2013 | 118 | 2013 |
Protecting fingerprint data using watermarking K Zebbiche, L Ghouti, F Khelifi, A Bouridane First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06), 451-456, 2006 | 92 | 2006 |
Utilizing extension character ‘Kashida’with pointed letters for Arabic text digital watermarking A Gutub, L Ghouti, A Amin, T Al-Kharobi, MK Ibrahim | 63 | 2007 |
Robust perceptual color image hashing using quaternion singular value decomposition L Ghouti 2014 IEEE International Conference on Acoustics, Speech and Signal …, 2014 | 47 | 2014 |
Mobility prediction in mobile ad hoc networks using neural learning machines L Ghouti Simulation Modelling Practice and Theory 66, 104-121, 2016 | 45 | 2016 |
Software smell detection techniques: A systematic literature review A AbuHassan, M Alshayeb, L Ghouti Journal of Software: Evolution and Process 33 (3), e2320, 2021 | 43 | 2021 |
Malware Classification Using Compact Image Features and Multiclass Support Vector Machines L Ghouti, M Imam IET Information Security 2020 (January), 1-12, 2020 | 38 | 2020 |
VLSI design IP protection: solutions, new challenges, and opportunities L Yuan, G Qu, L Ghouti, A Bouridane First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06), 469-476, 2006 | 37 | 2006 |
Exploring ChatGPT capabilities and limitations: A critical review of the nlp game changer A Koubaa, W Boulila, L Ghouti, A Alzahem, S Latif Preprints, 2023 | 36 | 2023 |
Utilizing diacritic marks for Arabic text steganography A Gutub, L Ghouti, Y Elarian, S Awaideh, A Alvi Kuwait Journal of Science & Engineering (KJSE) 37 (1), 89-109, 2010 | 36 | 2010 |
Method of performing cipher block chaining using elliptic polynomial cryptography L Ghouti, MK Ibrahim, AA Gutub US Patent 8,189,775, 2012 | 34 | 2012 |
Efficient prediction of software fault proneness modules using support vector machines and probabilistic neural networks HA Al-Jamimi, L Ghouti 2011 Malaysian Conference in Software Engineering, 251-256, 2011 | 34 | 2011 |
Method of generating a password protocol using elliptic polynomial cryptography L Ghouti, MK Ibrahim, AA Gutub US Patent 8,332,651, 2012 | 33 | 2012 |
Perceptual hashing of color images using hypercomplex representations IH Laradji, L Ghouti, EH Khiari 2013 IEEE International Conference on Image Processing, 4402-4406, 2013 | 31 | 2013 |
Hash functions using elliptic curve cryptography L Ghouti, MK Ibrahim, AJ Al-Najjar US Patent 8,184,803, 2012 | 24 | 2012 |
High-order spectra-based deconvolution of ultrasonic NDT signals for defect identification A Yamani, M Bettayeb, L Ghouti Ultrasonics 35 (7), 525-531, 1997 | 22 | 1997 |
Exploring ChatGPT Capabilities and Limitations: A Survey A Koubaa, W Boulila, L Ghouti, A Alzahem, S Latif IEEE Access, 2023 | 20 | 2023 |