Follow
Rafik Hamza
Title
Cited by
Cited by
Year
Secure surveillance framework for IoT systems using probabilistic image encryption
K Muhammad, R Hamza, J Ahmad, J Lloret, H Wang, SW Baik
IEEE Transactions on Industrial Informatics 14 (8), 3679-3689, 2018
2942018
A privacy-preserving cryptosystem for IoT E-healthcare
R Hamza, Z Yan, K Muhammad, P Bellavista, F Titouna
Information Sciences 527, 493-510, 2020
1822020
Hash based encryption for keyframes of diagnostic hysteroscopy
R Hamza, K Muhammad, N Arunkumar, G Ramirez-Gonzalez
IEEE Access 6, 60160-60170, 2017
1562017
Sensitive and energetic IoT access control for managing cloud electronic health records
K Riad, R Hamza, H Yan
IEEE Access 7, 86384-86393, 2019
922019
A novel pseudo random sequence generator for image-cryptographic applications
R Hamza
Journal of Information Security and Applications 35, 119-127, 2017
832017
A novel sensitive image encryption algorithm based on Zaslavsky chaotic map
R Hamza, F Titouna
Information Security Journal: A Global Perspective, 1-18, 2016
792016
Secure video summarization framework for personalized wireless capsule endoscopy
R Hamza, K Muhammad, Z Lv, F Titouna
Pervasive and Mobile Computing 41, 436-450, 2017
692017
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts
AS Patil, R Hamza, A Hassan, N Jiang, H Yan, J Li
Computers & Security 97, 101958, 2020
552020
An efficient outsourced privacy preserving machine learning scheme with public verifiability
A Hassan, R Hamza, H Yan, P Li
IEEE Access 1 (PP(99)), 1-1, 2019
372019
An efficient cryptosystem for video surveillance in the internet of things environment
R Hamza, A Hassan, T Huang, L Ke, H Yan
Complexity 2019, 1-11, 2019
302019
Towards secure big data analysis via fully homomorphic encryption algorithms
R Hamza, A Hassan, A Ali, MB Bashir, SM Alqhtani, TM Tawfeeg, A Yousif
Entropy 24 (4), 519, 2022
172022
A novel image encryption algorithm based on hybrid chaotic maps using a key image
S Benaissi, N Chikouche, R Hamza
Optik 272, 170316, 2023
142023
Blockchain-puf-based secure authentication protocol for internet of things
AS Patil, R Hamza, H Yan, A Hassan, J Li
Algorithms and Architectures for Parallel Processing: 19th International …, 2020
142020
Greedy firefly algorithm for optimizing job scheduling in iot grid computing
A Yousif, SM Alqhtani, MB Bashir, A Ali, R Hamza, A Hassan, TM Tawfeeg
Sensors 22 (3), 850, 2022
122022
A lightweight secure IoT surveillance framework based on DCT-DFRT algorithms
R Hamza, A Hassan, AS Patil
Machine Learning for Cyber Security: Second International Conference, ML4CS …, 2019
122019
Investigation on privacy-preserving techniques for personal data
R Hamza, K Zettsu
Proceedings of the 2021 Workshop on Intelligent Cross-Data Analysis and …, 2021
82021
A Survey of Intellectual Property Rights Protection in Big Data Applications
R Hamza, H Pradana
Algorithms 15 (11), 418, 2022
52022
Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings
X Chen, X Huang, J Zhang
Springer Nature, 2019
52019
Cloud Dynamic Load Balancing and Reactive Fault Tolerance Techniques: A Systematic Literature Review (SLR)
TM Tawfeeg, A Yousif, A Hassan, SM Alqhtani, R Hamza, MB Bashir, A Ali
IEEE Access, 2022
42022
Weighted-capsule routing via a fuzzy gaussian model
O Amira, S Xu, F Du, J Zhang, C Zhang, R Hamza
Pattern Recognition Letters 138, 424-430, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20