El-Sayed M. El-Alfy

According to our database1, El-Sayed M. El-Alfy
  • authored at least 67 papers between 2001 and 2017.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Robust content authentication of gray and color images using lbp-dct markov-based features.
Multimedia Tools Appl., 2017

Special issue on soft computing and intelligent systems: Tools, techniques and applications.
Journal of Intelligent and Fuzzy Systems, 2017

Evaluation of sequential adaptive testing with real-data simulation: A case study.
Journal of Intelligent and Fuzzy Systems, 2017

A multiclass cascade of artificial neural network for network intrusion detection.
Journal of Intelligent and Fuzzy Systems, 2017

AdaBoost-based artificial neural network learning.
Neurocomputing, 2017

Hybrid Deep Learning for Sentiment Polarity Determination of Arabic Microblogs.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Silhouette-Based Gender Recognition in Smart Environments Using Fuzzy Local Binary Patterns and Support Vector Machines.
Proceedings of the 8th International Conference on Ambient Systems, 2017

Using Word Embedding and Ensemble Learning for Highly Imbalanced Data Sentiment Analysis in Short Arabic Text.
Proceedings of the 8th International Conference on Ambient Systems, 2017

2016
Selectivity estimation of extended XML query tree patterns based on prime number labeling and synopsis modeling.
Simulation Modelling Practice and Theory, 2016

Towards scalable rough set based attribute subset selection for intrusion detection using parallel genetic algorithm in MapReduce.
Simulation Modelling Practice and Theory, 2016

XHQE: A hybrid system for scalable selectivity estimation of XML queries.
Information Systems Frontiers, 2016

Spam filtering framework for multimodal mobile communication based on dendritic cell algorithm.
Future Generation Comp. Syst., 2016

Multi-Kernel Fuzzy-Based Local Gabor Patterns for Gait Recognition.
Proceedings of the Advances in Visual Computing - 12th International Symposium, 2016

Gait-based Recognition for Human Identification using Fuzzy Local Binary Patterns.
Proceedings of the 8th International Conference on Agents and Artificial Intelligence (ICAART 2016), 2016

Kernel-Based Fuzzy Local Binary Pattern for Gait Recognition.
Proceedings of the 2016 European Modelling Symposium, 2016

2015
Improved selectivity estimator for XML queries based on structural synopsis.
World Wide Web, 2015

Combining spatial and DCT based Markov features for enhanced blind detection of image splicing.
Pattern Anal. Appl., 2015

Detecting Cyber-Attacks on Wireless Mobile Networks Using Multicriterion Fuzzy Classifier with Genetic Attribute Selection.
Mobile Information Systems, 2015

Introduction to the special issue on Cognitive Radio Networks.
Computers & Electrical Engineering, 2015

Boosting paraphrase detection through textual similarity metrics with abductive networks.
Appl. Soft Comput., 2015

Learning Rule for Linear Multilayer Feedforward ANN by Boosted Decision Stumps.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

Statistical Gabor-Based Gait Recognition Using Region-Level Analysis.
Proceedings of the 2015 IEEE European Modelling Symposium, 2015

Anonymous Connections Based on Onion Routing: A Review and a Visualization Tool.
Proceedings of the 6th International Conference on Ambient Systems, 2015

Dendritic Cell Algorithm for Mobile Phone Spam Filtering.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
Computational Intelligence in Smart Grids: Case Studies.
Proceedings of the Computational Intelligence for Decision Support in Cyber-Physical Systems, 2014

Abductive Learning Ensembles for Hand Shape Identification.
Cognitive Computation, 2014

Intrusion detection using a cascade of boosted classifiers (CBC).
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

ANFIS-Based Model for Improved Paraphrase Rating Prediction.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

BOOSTRON: Boosting Based Perceptron Learning.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Full-Reference Predictive Modeling of Subjective Image Quality Assessment with ANFIS.
Proceedings of the Agents and Artificial Intelligence - 6th International Conference, 2014

Image Quality Assessment using ANFIS Approach.
Proceedings of the ICAART 2014, 2014

A Multicriterion Fuzzy Classification Method with Greedy Attribute Selection for Anomaly-based Intrusion Detection.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

Effects of Using Average Annual Daily Traffic (AADT) with Exogenous Factors to Predict Daily Traffic.
Proceedings of the 5th International Conference on Ambient Systems, 2014

2013
A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks.
J. Network and Computer Applications, 2013

Enhanced Hand Shape Identification Using Random Forests.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2013

2012
Analysis and extraction of sentence-level paraphrase sub-corpus in CS education.
Proceedings of the ACM Special Interest Group for Information Technology Education Conference, 2012

Automatic Identification Based on Hand Geometry and Probabilistic Neural Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector Machines.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Abductive Neural Network Modeling for Hand Recognition Using Geometric Features.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Fusion of Multiple Texture Representations for Palmprint Recognition Using Neural Networks.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Classification of Deformable Geometric Shapes - Using Radial-Basis Function Networks and Ring-wedge Energy Features.
Proceedings of the ICAART 2012 - Proceedings of the 4th International Conference on Agents and Artificial Intelligence, Volume 1, 2012

2011
Comparing a class of dynamic model-based reinforcement learning schemes for handoff prioritization in mobile communication networks.
Expert Syst. Appl., 2011

Using GMDH-based networks for improved spam detection and email feature analysis.
Appl. Soft Comput., 2011

A comparative study of PVD-based schemes for data hiding in digital images.
Proceedings of the 9th IEEE/ACS International Conference on Computer Systems and Applications, 2011

A reinforcement learning approach for sequential mastery testing.
Proceedings of the 2011 IEEE Symposium on Adaptive Dynamic Programming And Reinforcement Learning, 2011

An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing.
Proceedings of the Advances in Computing and Communications, 2011

2010
A hierarchical GMDH-based polynomial neural network for handwritten numeral recognition using topological features.
Proceedings of the International Joint Conference on Neural Networks, 2010

A bio-inspired image encryption algorithm based on chaotic maps.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

Offline Recognition of Handwritten Numeral Characters with Polynomial Neural Networks Using Topological Features.
Proceedings of the Advances in Artificial Intelligence, 2010

2009
Constructing optimal educational tests using GMDH-based item ranking and selection.
Neurocomputing, 2009

Discovering classification rules for email spam filtering with an ant colony optimization algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2009

2008
Construction and analysis of educational tests using abductive machine learning.
Computers & Education, 2008

Spam filtering with abductive networks.
Proceedings of the International Joint Conference on Neural Networks, 2008

A fuzzy similarity approach for automated spam filtering.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
A Review of Network Security.
IEEE Distributed Systems Online, 2007

Applications of genetic algorithms to optimal multilevel design of MPLS-based networks.
Computer Communications, 2007

Solving the minimum-cost constrained multipath routing with load balancing in MPLS networks using an evolutionary method.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

On Optimal Firewall Rule Ordering.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2006
A learning approach for prioritized handoff channel allocation in mobile multimedia networks.
IEEE Trans. Wireless Communications, 2006

MPLS Network Topology Design Using Genetic Algorithms.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
A General Look at Building Applications for Mobile Devices.
IEEE Distributed Systems Online, 2005

2001
Adaptive resource allocation with prioritized handoff in cellular mobile networks under QoS provisioning.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001

Autonomous call admission control with prioritized handoff in cellular networks.
Proceedings of the IEEE International Conference on Communications, 2001


  Loading...