default search action
Wassim Alexan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Wassim Alexan, Dina El-Damak, Mohamed Gabr:
Image Encryption Based on Fourier-DNA Coding for Hyperchaotic Chen System, Chen-Based Binary Quantization S-Box, and Variable-Base Modulo Operation. IEEE Access 12: 21092-21113 (2024) - [j18]Wassim Alexan, Laila Aly, Yousef Korayem, Mohamed Gabr, Dina El-Damak, Abdallah Fathy, Hany A. A. Mansour:
Secure Communication of Military Reconnaissance Images Over UAV-Assisted Relay Networks. IEEE Access 12: 78589-78610 (2024) - [j17]Wassim Alexan, Ibrahim M. Karkouti:
Exploring Key Success Factors in First-Year Engineering Education at Egyptian Higher Education Institutions. IEEE Access 12: 100738-100759 (2024) - [j16]Dina El-Damak, Wassim Alexan, Eyad Mamdouh, Minar El-Aasser, Abdallah Fathy, Mohamed Gabr:
Fibonacci Q-Matrix, Hyperchaos, and Galois Field (2⁸) for Augmented Medical Image Encryption. IEEE Access 12: 102718-102744 (2024) - [j15]Mohamed Gabr, Amr Diab, Huwaida T. I. Elshoush, Yen-Lin Chen, Lip Yee Por, Chin Soon Ku, Wassim Alexan:
Data Security Utilizing a Memristive Coupled Neural Network in 3D Models. IEEE Access 12: 116457-116477 (2024) - [j14]Wassim Alexan, Noor Elabyad, Maya Khaled, Remas Osama, Dina El-Damak, Mohamed A. Abde El Ghany, Yousef Korayem, Eyad Mamdouh, Mohamed Gabr:
Triple Layer RGB Image Encryption Algorithm Utilizing Three Hyperchaotic Systems and Its FPGA Implementation. IEEE Access 12: 118339-118361 (2024) - [j13]Mohammed Youssef, Mohamed Gabr, Wassim Alexan, Marvy Badr Monir Mansour, Karim Kamal, Hisham H. Hussein, Dina El-Damak:
Enhancing Satellite Image Security Through Multiple Image Encryption via Hyperchaos, SVD, RC5, and Dynamic S-Box Generation. IEEE Access 12: 123921-123945 (2024) - [c29]Wassim Alexan, Ibrahim M. Karkouti:
Examining Critical Factors Influencing Academic Performance of Freshman Engineering Students at Private Universities in Egypt. EDUCON 2024: 1-3 - [c28]Rana Lotfy, Mohamed Gabr, Eyad Mamdouh, Amr Aboshousha, Wassim Alexan, Dina El-Damak, Abdallah Fathy, Marvy Badr Monir Mansour:
Image Encryption Based on Chen Chaotic System, OpenSSL S-Box and the Fibonacci Q-Matrix. SPA 2024: 30-35 - [c27]Farah Hamed, Mohamed Gabr, Eyad Mamdouh, Amr Aboshousha, Wassim Alexan, Dina El-Damak, Abdallah Fathy, Marvy Badr Monir Mansour:
Memristive Coupled Neural Network Based Audio Signal Encryption. SPA 2024: 149-154 - 2023
- [j12]Wassim Alexan, Marwa Tarek Elkandoz, Maggie Mashaly, Eman Azab, Amr Aboshousha:
Color Image Encryption Through Chaos and KAA Map. IEEE Access 11: 11541-11554 (2023) - [j11]Wassim Alexan, Mohamed Gabr, Eyad Mamdouh, Rimon Elias, Amr Aboshousha:
Color Image Cryptosystem Based on Sine Chaotic Map, 4D Chen Hyperchaotic Map of Fractional-Order and Hybrid DNA Coding. IEEE Access 11: 54928-54956 (2023) - [j10]Mohamed Gabr, Rimon Elias, Khalid M. Hosny, George A. Papakostas, Wassim Alexan:
Image Encryption via Base-n PRNGs and Parallel Base-n S-Boxes. IEEE Access 11: 85002-85030 (2023) - [j9]Wassim Alexan, Yousef Korayem, Mohamed Gabr, Minar El-Aasser, Engy Aly Maher, Dina El-Damak, Amr Aboshousha:
AntEater: When Arnold's Cat Meets Langton's Ant to Encrypt Images. IEEE Access 11: 106249-106276 (2023) - [j8]Mohamed Gabr, Yousef Korayem, Yen-Lin Chen, Lip Yee Por, Chin Soon Ku, Wassim Alexan:
R3 - Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems. IEEE Access 11: 119284-119312 (2023) - [j7]Wassim Alexan, Yen-Lin Chen, Lip Yee Por, Mohamed Gabr:
Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption. Symmetry 15(5): 1081 (2023) - [c26]Omar Elnoamy, Alaa Aref, Lobna Desoki, Menna Roushdy, Yousef Korayem, Mohamed Gabr, Wassim Alexan:
Enhanced Image Encryption Using the Hénon Map, the LCG and the Lorenz System. ICSPIS 2023: 93-98 - [c25]Omar Elnoamy, Mohamed Gabr, Yousef Korayem, Wassim Alexan, Minar El-Aasser:
Enhancing Image Security Using Legacy-Based Encryption With Chaotic Tent Map and Memristor. SPA 2023: 124-129 - [c24]Mohannad Alkotb, Mohamed Gabr, Minar El-Aasser, Wassim Alexan:
Secure Communications of Visual Data Over CF Relays. SPA 2023: 130-135 - 2022
- [j6]Marwa Tarek Elkandoz, Wassim Alexan:
Image encryption based on a combination of multiple chaotic maps. Multim. Tools Appl. 81(18): 25497-25518 (2022) - [j5]Wassim Alexan, Mohamed ElBeltagy, Amr Aboshousha:
RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System. Symmetry 14(3): 443 (2022) - [j4]Mohamed Gabr, Hana Younis, Marwa Ibrahim, Sara Alajmy, Ijaz Khalid, Eman Azab, Rimon Elias, Wassim Alexan:
Application of DNA Coding, the Lorenz Differential Equations and a Variation of the Logistic Map in a Multi-Stage Cryptosystem. Symmetry 14(12): 2559 (2022) - [c23]Mohamed ElBeltagy, Wassim Alexan, Abdelrahman Elkhamry, Mohamed Moustafa, Hisham H. Hussein:
Image Encryption Through Rössler System, PRNG S-Box and Recamán's Sequence. CCWC 2022: 716-722 - [c22]Wassim Alexan:
Identifying the Motivational Influences on Students' Choice of Engineering Major. EDUCON 2022: 1502-1511 - [c21]Wassim Alexan, Hana Younis, Marwa Ibrahim, Sara Alajmy, Mohamed Gabr, Amr Aboshousha:
3D Object Encryption Through a Disruptive Rotational Symmetry Transformation. ICCTA 2022: 169-174 - [c20]Mohamed Gabr, Hana Younis, Marwa Ibrahim, Sara Alajmy, Wassim Alexan:
Visual Data Enciphering via DNA Encoding, S-Box, and Tent Mapping. IPAS 2022: 1-6 - [c19]Mohamed Gabr, Wassim Alexan, Kareem Moussa:
Image Encryption Through CA, Chaos and Lucas Sequence Based S-Box. SPA 2022: 34-39 - 2021
- [c18]Wassim Alexan, Abdelrahman Elkhateeb, Eyad Mamdouh, Fahd Al-Seba'ey, Ziad Amr, Hana Khalil:
Utilization of Corner Filters, AES and LSB Steganography for Secure Message Transmission. ICM 2021: 29-33 - [c17]Wassim Alexan, Mohamed ElBeltagy, Amr Aboshousha:
Lightweight Image Encryption: Cellular Automata and the Lorenz System. ICM 2021: 34-39 - [c16]Wassim Alexan, Ziad Amr, Abdelrahman Elkhateeb, Eyad Mamdouh, Hana Khalil, Fahd Al-Seba'ey:
SOR Weighting Factor Optimization of AC Systems and Electrical Circuits. NILES 2021: 350-354 - [c15]Wassim Alexan, Eyad Mamdouh, Abdelrahman Elkhateeb, Fahd Al-Seba'ey, Ziad Amr, Hana Khalil:
Securing Sensitive Data Through Corner Filters, Chaotic Maps and LSB Embedding. NILES 2021: 359-364 - 2020
- [j3]Sara Farrag, Wassim Alexan:
Secure 3D data hiding technique based on a mesh traversal algorithm. Multim. Tools Appl. 79(39-40): 29289-29303 (2020) - [c14]Yomna Moussa, Wassim Alexan:
Message Security Through AES and LSB Embedding in Edge Detected Pixels of 3D Images. NILES 2020: 224-229
2010 – 2019
- 2019
- [c13]Marwa Tarek Elkandoz, Wassim Alexan, Hisham H. Hussein:
Double-Layer Image Security Scheme with Aggregated Mathematical Sequences. CommNet 2019: 1-7 - [c12]Sara Farrag, Wassim Alexan:
A High Capacity Geometrical Domain Based 3D Image Steganography Scheme. CommNet 2019: 1-7 - [c11]Sara Farrag, Wassim Alexan:
Secure 2D Image Steganography Using Recamán's Sequence. CommNet 2019: 1-6 - [c10]Sara Farrag, Wassim Alexan, Hisham H. Hussein:
Triple-Layer Image Security Using a Zigzag Embedding Pattern. CommNet 2019: 1-8 - [c9]Ghadir Mostafa, Wassim Alexan:
A High capacity Double-Layer Gray Code Based Security Scheme for Secure Data Embedding. ISNCC 2019: 1-6 - [c8]Wassim Alexan, Farah Hemeida:
Security Through Blowfish and LSB Bit-Cycling With Mathematical Sequences. SPA 2019: 229-234 - [c7]Maggie Mashaly, Ahmed El Saied, Wassim Alexan, Abeer S. Khalifa:
A Multiple Layer Security Scheme Utilizing Information Matrices. SPA 2019: 284-289 - [c6]Marwa Tarek Elkandoz, Wassim Alexan, Hisham H. Hussein:
Logistic Sine Map Based Image Encryption. SPA 2019: 290-295 - 2018
- [j2]Ahmed E. El-Mahdy, Wassim Alexan:
A Threshold-Free LLR-Based Scheme to Minimize the BER for Decode-and-Forward Relaying. Wirel. Pers. Commun. 100(3): 787-801 (2018) - [c5]Youstina Megalli, Wassim Alexan, Ahmed E. El-Mahdy:
Adaptive Hybrid Scheme for Cooperative Communications. GIIS 2018: 1-4 - 2017
- [j1]Ahmed E. El-Mahdy, Wassim Alexan:
A Comparative Study on the Performance of LLR- and SNR-Based Hybrid Relaying Schemes. Wirel. Commun. Mob. Comput. 2017 (2017) - 2015
- [c4]Wassim Alexan, Ahmed E. El-Mahdy:
A hybrid relaying protocol for wireless cooperative networks based on the log-likelihood ratio. SPA 2015: 128-133 - [c3]Wassim Alexan, Ahmed E. El-Mahdy:
A relay selection method for bidirectional wireless cooperative networks based on the log-likelihood ratio. SPA 2015: 134-138 - [c2]Wassim Alexan, Lamiaa Daoud, Ahmed E. El-Mahdy:
LLR-based hybrid relaying as a countermeasure against an impulsive noise jamming attack. SPA 2015: 139-144 - 2014
- [c1]Wassim Alexan, Ahmed E. El-Mahdy:
A quantized reliability-relay selection method for wireless cooperative communications. ISWCS 2014: 318-322
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint