Ainuddin Wahid Abdul Wahab

Orcid: 0000-0003-1062-0329

According to our database1, Ainuddin Wahid Abdul Wahab authored at least 49 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Permissions-Based Detection of Android Malware Using Machine Learning.
Symmetry, 2022

A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review.
Multim. Tools Appl., 2022

2021
CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics.
IEEE Trans. Sustain. Comput., 2021

A tree-based multiclassification of breast tumor histopathology images through deep learning.
Comput. Medical Imaging Graph., 2021

An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network.
IEEE Access, 2021

Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges.
IEEE Access, 2021

2020
Ensembled deep convolution neural network-based breast cancer classification with misclassification reduction algorithms.
Multim. Tools Appl., 2020

Local descriptor for retinal fundus image registration.
IET Comput. Vis., 2020

Deep learning-based breast cancer classification through medical imaging modalities: state of the art and research challenges.
Artif. Intell. Rev., 2020

Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities.
IEEE Access, 2020

Understanding Link Fabrication Attack in Software Defined Network using Formal Methods.
Proceedings of the IEEE International Conference on Informatics, 2020

2019
Fractional means based method for multi-oriented keyword spotting in video/scene/license plate images.
Expert Syst. Appl., 2019

2018
Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme.
Symmetry, 2018

Image steganography in spatial domain: A survey.
Signal Process. Image Commun., 2018

2017
Low communication cost (LCC) scheme for localizing mobile wireless sensor networks.
Wirel. Networks, 2017

Energy harvesting and battery power based routing in wireless sensor networks.
Wirel. Networks, 2017

A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement.
Signal Process. Image Commun., 2017

SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack.
J. Vis. Commun. Image Represent., 2017

Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review.
J. Sensors, 2017

Source camera identification: a distributed computing approach using Hadoop.
J. Cloud Comput., 2017

Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art.
IEEE Commun. Surv. Tutorials, 2017

Computing two dimensional Poincaré maps for hyperchaotic dynamics.
Appl. Math. Comput., 2017

Concept of Entire Boolean Values Recalculation From Aggregates in the Preprocessed Category of Incomplete Soft Sets.
IEEE Access, 2017

An Overview of Audio Event Detection Methods from Feature Extraction to Classification.
Appl. Artif. Intell., 2017

Temporal Integration for Word-Wise Caption and Scene Text Identification.
Proceedings of the 14th IAPR International Conference on Document Analysis and Recognition, 2017

A Feedback-based Admission Control Unit for QoS provision of video Transmission over WLANs.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

2016
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation.
Wirel. Commun. Mob. Comput., 2016

Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-Points.
Symmetry, 2016

Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images.
Symmetry, 2016

Service delivery models of cloud computing: security issues and open challenges.
Secur. Commun. Networks, 2016

Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges.
IEEE Netw., 2016

A Framework and Mathematical Modeling for the Vehicular Delay Tolerant Network Routing.
Mob. Inf. Syst., 2016

WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs.
J. Sensors, 2016

Copy-move forgery detection: Survey, challenges and future directions.
J. Netw. Comput. Appl., 2016

Network forensics: Review, taxonomy, and open challenges.
J. Netw. Comput. Appl., 2016

A novel forged blurred region detection system for image forensic applications.
Expert Syst. Appl., 2016

A hybrid approach for phishing web site detection.
Electron. Libr., 2016

Chroma key background detection for digital video using statistical correlation of blurring artifact.
Digit. Investig., 2016

Cloud Log Forensics: Foundations, State of the Art, and Future Directions.
ACM Comput. Surv., 2016

Virtual Community Detection Through the Association between Prime Nodes in Online Social Networks and Its Application to Ranking Algorithms.
IEEE Access, 2016

Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis.
IEEE Access, 2016

2015
Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network.
J. King Saud Univ. Comput. Inf. Sci., 2015

A review on feature selection in mobile malware detection.
Digit. Investig., 2015

Pixel value differencing steganography techniques: Analysis and open challenge.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

SIDNFF: Source identification network forensics framework for cloud computing.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

2014
Blind source mobile device identification based on recorded call.
Eng. Appl. Artif. Intell., 2014

Passive video forgery detection techniques: A survey.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

2009
Has F5 really been broken?
Proceedings of the 3rd International Conference on Imaging for Crime Detection and Prevention, 2009

2008
On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008


  Loading...