A survey on internet of things enabled smart campus applications A Abuarqoub, H Abusaimeh, M Hammoudeh, D Uliyan, MA Abu-Hashem, ... Proceedings of the International Conference on Future Networks and …, 2017 | 154 | 2017 |
Anti-spoofing method for fingerprint recognition using patch based deep learning machine D Uliyan, S saddeghi, H Jalab Engineering Science and Technology, an International Journal 2019 (3), 10, 2019 | 106 | 2019 |
State of the art in passive digital image forgery detection: Copy-Move image forgery. S Sadeghi, S Dadkhah, HA Jalab, D Uliyan. Pattern Analysis and Applications, 1-16, 2018 | 74 | 2018 |
Copy move image forgery detection using Hessian and center symmetric local binary pattern DM Uliyan, HA Jalab, AWA Wahab 2015 IEEE conference on open systems (ICOS), 7-11, 2015 | 53 | 2015 |
A novel forged blurred region detection system for image forensic applications DM Uliyan, HA Jalab, AWA Wahab, P Shivakumara, S Sadeghi Expert Systems with Applications 64, 1-10, 2016 | 51 | 2016 |
Image region duplication forgery detection based on angular radial partitioning and Harris key-points DM Uliyan, HA Jalab, AW Abdul Wahab, S Sadeghi Symmetry Journal 8 (7), 62, 2016 | 46 | 2016 |
A deep learning model to predict Student learning outcomes in LMS using CNN and LSTM AS Aljaloud, DM Uliyan, A Alkhalil, M Abd Elrhman, AFM Alogali, ... IEEE Access 10, 85255-85265, 2022 | 38 | 2022 |
Deep learning model to predict students retention using BLSTM and CRF D Uliyan, AS Aljaloud, A Alkhalil, HS Al Amer, MAEA Mohamed, ... IEEE Access 9, 135550-135558, 2021 | 33 | 2021 |
Keypoint based authentication and localization of copy-move forgery in digital image S Sadeghi, HA Jalab, KS Wong, D Uliyan, S Dadkhah Malaysian Journal of Computer Science 30 (2), 117-133, 2017 | 23 | 2017 |
A Secret-Key Image Steganography Technique using Random Chain Codes DM Uliyan, MA Al-Husainy International Journal of Technology 10 (4), 731-740, 2019 | 17 | 2019 |
Mandible bone osteoporosis detection using cone-beam computed tomography RFA Marar, DM Uliyan, HA Al-Sewadi Engineering, Technology & Applied Science Research 10 (4), 6027-6033, 2020 | 15 | 2020 |
Image Encryption Technique based on the Entropy Value of a Random Block MAF Al-Husainy, DM Uliyan International Journal of Advanced Computer Science and Systems application 8 (7), 2017 | 12 | 2017 |
Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics. S Dadkhah, M Köppen, HA Jalab, S Sadeghi, AA Manaf, DM Uliyan Proceedings of the 6th International Conference on Pattern Recognition …, 2017 | 10 | 2017 |
A Deep Learning Model to Inspect Image Forgery on SURF Keypoints of SLIC Segmented Regions U Diaa Engineering, Technology & Applied Science Research 14 (1), 12549-12555, 2024 | 7 | 2024 |
A Smooth Textual Password Authentication Scheme Against Shoulder Surfing Attack DMU MOHAMMED A. FADHIL AL-HUSAINY Journal of Theoretical and Applied Information Technology 96 (9), 11, 2018 | 7 | 2018 |
Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor DM Uliyan, HA Jalab, A Abuarqoub, M Abu-Hashem Proceedings of the International Conference on Future Networks and …, 2017 | 7 | 2017 |
Image Steganography Technique Based on Extracted Chains from the Secret Key MA Husainy, DM Uliyan Journal Journal of Engineering and Applied Sciences 13 (11), 4235-4244, 2018 | 6 | 2018 |
An intersection-based segment aware algorithm for geographic routing in VANETs YRB Al-Mayouf, OA Mahdi, DM Uliyan 2018 9th International Conference on Information and Communication Systems …, 2018 | 5 | 2018 |
Detection of scaled region duplication image forgery using color based segmentation with LSB signature DM Uliyan, MAF Al-Husainy International Journal Of Advanced Computer Science And Applications 8 (5), 2017 | 5 | 2017 |
Investigation of image forgery based on multiscale retinex under illumination variations DM Uliyan, MT Alshammari Forensic Imaging 22, 200385, 2020 | 4 | 2020 |