Charlie Obimbo

Orcid: 0000-0001-9422-1522

According to our database1, Charlie Obimbo authored at least 34 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture.
IEEE Access, 2024

2023
Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps.
Cryptogr., June, 2023

2022
Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization.
IEEE Internet Things J., 2022

2020
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain.
IACR Cryptol. ePrint Arch., 2020

2019
A Synergistic Approach to Enhance the Accuracy-interpretability Trade-off of the NECLASS Classifier for Skewed Data Distribution.
Proceedings of the 11th International Joint Conference on Computational Intelligence, 2019

2018
A comprehensive keyword analysis of online privacy policies.
Inf. Secur. J. A Glob. Perspect., 2018

Information Disclosure, Security, and Data Quality.
Proceedings of the Recent Trends and Future Technology in Applied Intelligence, 2018

2017
An improved differential privacy algorithm to protect re-identification of data.
Proceedings of the IEEE Canada International Humanitarian Technology Conference, 2017

An Improved Data Sanitization Algorithm for Privacy Preserving Medical Data Publishing.
Proceedings of the Advances in Artificial Intelligence, 2017

2016
A Novel Differential Privacy Approach that Enhances Classification Accuracy.
Proceedings of the Ninth International C* Conference on Computer Science & Software Engineering, 2016

2013
CaptchAll: An Improvement on the Modern Text-based CAPTCHA.
Proceedings of the Complex Adaptive Systems 2013 Conference, 2013

2012
Applying Variable Coe_cient functions to Self-Organizing Feature Maps for Network Intrusion Detection on the 1999 KDD Cup Dataset.
Proceedings of the Conference on Systems Engineering Research, 2012

2011
Multiple SOFMs Working Cooperatively In a Vote-based Ranking System For Network Intrusion Detection.
Proceedings of the Complex Adaptive Systems 2011 Conference, 2011

An evolutionary computation attack on one-round TEA.
Proceedings of the Complex Adaptive Systems 2011 Conference, 2011

Vulnerabilities of LDAP As An Authentication Service.
J. Information Security, 2011

Self-organizing feature maps for User-to-Root and Remote-to-Local network intrusion detection on the KDD Cup 1999 dataset.
Proceedings of the 2011 World Congress on Internet Security, 2011

2009
A Watermark Generation Algorithm Using The Mersenne Twister.
Proceedings of the 2009 International Conference on Image Processing, 2009

An Intrusion Detection System for Mobile Ad-Hoc Networks.
Proceedings of the 2009 International Conference on Security & Management, 2009

Near-linear wirelength estimation for FPGA placement.
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009

2008
Using the HC for Shape Representation and Description.
Proceedings of the 2008 International Conference on Image Processing, 2008

Approximating the Vertex Cover Problem by Selection of Nodes of Maximum Degrees for use in Wireless Sensor Networks.
Proceedings of the 2008 International Conference on Foundations of Computer Science, 2008

An Adaptive Coding Algorithm for Secret Transmission of Information.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption.
J. Supercomput., 2007

2006
A Watchdog Enhancement to IDS in MANET.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006

A multi-bitwatermark generation algorithm with properties of error correction.
Proceedings of the Third IASTED International Conference on Communication, 2006

A grey-level image watermarking method based on block DCT and statistic correlation adjustment.
Proceedings of the Third IASTED International Conference on Communication, 2006

2005
How to Protect Personal Information against Keyloggers.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005

Embedding Digital Signatures in MP3s.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005

A System That Can Enhance E-Business In The Developing World.
Proceedings of The 2005 International Conference on E-Business, 2005

A Parallel Algorithm For Determining The Inverse Of A Matrix For Use In Block Cipher Encryption And Decryption.
Proceedings of The 2005 International Conference on Scientific Computing, 2005

2004
The Threat of a Deterministic Polynomial Time Algorithm for Primality Testing in Applied Cryptography.
Proceedings of the International Conference on Modeling, 2004

An Approximate Solution for Steiner Trees in Multicast Routing.
Proceedings of the International Conference on Artificial Intelligence, 2004

An Online Linking System for Researchers.
Proceedings of the International Conference on Internet Computing, 2004

2003
Hierarchical Genetic Algorithms Applied to Datapath Synthesis.
Proceedings of the International Conference on Artificial Intelligence, 2003


  Loading...