Neural networks learning improvement using the K-means clustering algorithm to detect network intrusions KM Faraoun, A Boukelif INFOCOMP Journal of Computer Science 5 (3), 28-36, 2006 | 128 | 2006 |
A parallel block-based encryption schema for digital images using reversible cellular automata FK Mohamed Engineering Science and Technology, an International Journal 17 (2), 85-94, 2014 | 104 | 2014 |
An image encryption scheme combining chaos-memory cellular automata and weighted histogram A Souyah, KM Faraoun Nonlinear Dynamics 86 (1), 639-653, 2016 | 90 | 2016 |
An efficient and secure chaotic cipher algorithm for image content preservation S Amina, FK Mohamed Communications in Nonlinear Science and Numerical Simulation 60, 12-32, 2018 | 89 | 2018 |
Genetic programming approach for multi-category pattern classification applied to network intrusions detection KM Faraoun, A Boukelif International Journal of Computational Intelligence and Applications 6 (01 …, 2006 | 88 | 2006 |
Chaos-Based Key Stream Generator Based on Multiple Maps Combinations and its Application to Images Encryption. K Faraoun Int. Arab J. Inf. Technol. 7 (3), 231-240, 2010 | 54 | 2010 |
Fast and efficient randomized encryption scheme for digital images based on quadtree decomposition and reversible memory cellular automata A Souyah, KM Faraoun Nonlinear Dynamics 84 (2), 715-732, 2016 | 46 | 2016 |
Fast encryption of RGB color digital images using a tweakable cellular automaton based schema FK Mohamed Optics & Laser Technology 64, 145-155, 2014 | 39 | 2014 |
Speeding up fractal image compression by genetic algorithms FK Mohamed, B Aoued Multidimensional Systems and Signal Processing 16, 217-236, 2005 | 36 | 2005 |
Feature-based color correction of multiview video for coding and rendering enhancement SA Fezza, MC Larabi, KM Faraoun IEEE Transactions on Circuits and Systems for Video Technology 24 (9), 1486-1498, 2014 | 32 | 2014 |
Neural networks learning improvement using the k-means clustering algorithm to detect network intrusions KM Faraoun, A Boukelif International Journal of Computer and Information Engineering 1 (10), 3151-3158, 2007 | 31 | 2007 |
Data dimensionality reduction based on genetic selection of feature subsets KM Faraoun, A Rabhi EEDIS UDL University-SBA, 2007 | 31 | 2007 |
Stereoscopic image quality metric based on local entropy and binocular just noticeable difference SA Fezza, MC Larabi, KM Faraoun 2014 IEEE International Conference on Image Processing (ICIP), 2002-2006, 2014 | 25 | 2014 |
A genetic strategy to design cellular automata based block ciphers KM Faraoun Expert Systems with Applications 41 (17), 7958-7967, 2014 | 23 | 2014 |
Robust and reversible image watermarking scheme using combined DCT-DWT-SVD transforms S Bekkouch, KM Faraoun Journal of Information Processing Systems 11 (3), 406-420, 2015 | 22 | 2015 |
Design of a new efficient and secure multi-secret images sharing scheme KM Faraoun Multimedia Tools and Applications 76 (5), 6247-6261, 2017 | 21 | 2017 |
RST robust watermarking schema based on image normalization and DCT decomposition FK Mohamed, R Abbes Malaysian Journal of Computer Science 20 (1), 2007 | 17 | 2007 |
Artificial Immune Systems for text-dependent speaker recognition KM Faraoun, A Boukelif INFOCOMP Journal of Computer Science 5 (4), 19-26, 2006 | 14 | 2006 |
Building secure and fast cryptographic hash functions using programmable cellular automata AE Belfedhal, KM Faraoun Journal of computing and information technology 23 (4), 317-328, 2015 | 13 | 2015 |
Design of fast one-pass authenticated and randomized encryption schema using reversible cellular automata KM Faraoun Communications in Nonlinear Science and Numerical Simulation 19 (9), 3136-3148, 2014 | 12 | 2014 |