Alexander G. Chefranov

Orcid: 0000-0003-4116-520X

According to our database1, Alexander G. Chefranov authored at least 22 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Building discriminative features of scene recognition using multi-stages of inception-ResNet-v2.
Appl. Intell., August, 2023

2022
Stage classification using two-stream deep convolutional neural networks.
Signal Image Video Process., 2022

Adaptive to pixel value and pixel value difference irreversible spatial data hiding method using modified LSB for grayscale images.
J. Inf. Secur. Appl., 2022

2021
Image scene geometry recognition using low-level features fusion at multi-layer deep CNN.
Neurocomputing, 2021

Ciphertext-only attack on RSA using lattice basis reduction.
Int. Arab J. Inf. Technol., 2021

White blood cell type identification using multi-layer convolutional features with an extreme-learning machine.
Biomed. Signal Process. Control., 2021

2020
Image-Level Structure Recognition Using Image Features, Templates, and Ensemble of Classifiers.
Symmetry, 2020

NTRU-Like Random Congruential Public-Key Cryptosystem for Wireless Sensor Networks.
Sensors, 2020

2018
A New Secure and Usable Captcha-Based Graphical Password Scheme.
Proceedings of the Computer and Information Sciences - 32nd International Symposium, 2018

2016
Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

2015
Editorial: Special issue on security of information and networks.
J. Inf. Secur. Appl., 2015

Special issue on trust and security in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015

2014
Group Key Exchange Protocol Based on Diffie-Hellman Technique in Ad-Hoc Network.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2013
Countering Wrapping Attack on XML Signature in SOAP Message for Cloud Computing.
CoRR, 2013

Secure true random number generator in WLAN/LAN.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Commutative Matrix-based Diffie-Hellman-Like Key-Exchange Protocol.
Proceedings of the Information Sciences and Systems 2013, 2013

2012
Investigation of Hill Cipher Modifications Based on Permutation and Iteration
CoRR, 2012

2010
Elgamal public key cryptosystem and signature scheme in GU(m, p, n).
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

2009
Hill cipher modification based on eigenvalues HCM-EE.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

2008
Parameterized Improved Fast Encryption Algorithm for Multimedia PIFEA-M.
IEEE Commun. Lett., 2008

2001
Parallel SPMD-Tasks Graph Description Language for Network Clusters.
Proceedings of the Parallel Computing Technologies, 2001

Mechanisms of Parallel Computing Organization for NeuroCluster.
Proceedings of the Parallel Computing Technologies, 2001


  Loading...