El-Sayed M. El-Alfy

Orcid: 0000-0001-6279-9776

According to our database1, El-Sayed M. El-Alfy authored at least 107 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An interpretable neural network for robustly determining the location and number of cluster centers.
Int. J. Mach. Learn. Cybern., April, 2024

2023
Contextual Sequence-to-Point Deep Learning for Household Energy Disaggregation.
IEEE Access, 2023

Ensemble Multifeatured Deep Learning Models and Applications: A Survey.
IEEE Access, 2023

Two-Stage Face Detection and Anti-spoofing.
Proceedings of the Advances in Visual Computing - 18th International Symposium, 2023

Theory-Guided Convolutional Neural Network with an Enhanced Water Flow Optimizer.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

RF-Based Drone Detection with Deep Neural Network: Review and Case Study.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Spatiotemporal Particulate Matter Pollution Prediction Using Cloud-Edge Intelligence.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

2022
Utilizing motion and spatial features for sign language gesture recognition using cascaded CNN and LSTM models.
Turkish J. Electr. Eng. Comput. Sci., 2022

A comprehensive survey and taxonomy of sign language research.
Eng. Appl. Artif. Intell., 2022

2021
Comparative analysis of feature extraction and fusion for blind authentication of digital images using chroma channels.
Signal Process. Image Commun., 2021

Joint space representation and recognition of sign language fingerspelling using Gabor filter and convolutional neural network.
Multim. Tools Appl., 2021

URLCam: Toolkit for malicious URL analysis and modeling.
J. Intell. Fuzzy Syst., 2021

Combining Deep Learning and Multiresolution Analysis for Stock Market Forecasting.
IEEE Access, 2021

Early and Late Fusion of Emojis and Text to Enhance Opinion Mining.
IEEE Access, 2021

2020
A review of machine learning for big data analytics: bibliometric approach.
Technol. Anal. Strateg. Manag., 2020

Soft computing and intelligent systems: techniques and applications.
J. Intell. Fuzzy Syst., 2020

Empirical study on imbalanced learning of Arabic sentiment polarity with neural word embedding.
J. Intell. Fuzzy Syst., 2020

Enhanced Video Analytics for Sentiment Analysis Based on Fusing Textual, Auditory and Visual Information.
IEEE Access, 2020

Exploring Lattice-based Post-Quantum Signature for JWT Authentication: Review and Case Study.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

On Using Physical Based Intrusion Detection in SCADA Systems.
Proceedings of the 11th International Conference on Ambient Systems, 2020

2019
Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols.
Pers. Ubiquitous Comput., 2019

Soft computing and intelligent systems: techniques and applications.
J. Intell. Fuzzy Syst., 2019

A multi-matching approximation algorithm for Symmetric Traveling Salesman Problem.
J. Intell. Fuzzy Syst., 2019

Automated gait-based gender identification using fuzzy local binary patterns with tuned parameters.
J. Ambient Intell. Humaniz. Comput., 2019

Bibliography of digital image anti-forensics and anti-anti-forensics techniques.
IET Image Process., 2019

Special issue on Neural Information Processing for Optimization and Applications.
Appl. Soft Comput., 2019

Audio-Textual Arabic Dialect Identification for Opinion Mining Videos.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

Benchmarking Open-Source Android Malware Detection Tools.
Proceedings of the 2nd IEEE Middle East and North Africa COMMunications Conference, 2019

Overview and Case Study for Ransomware Classification Using Deep Neural Network.
Proceedings of the 2nd IEEE Middle East and North Africa COMMunications Conference, 2019

Multimodal Sentiment and Gender Classification for Video Logs.
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019

2018
Soft computing and intelligent systems: Techniques and applications.
J. Intell. Fuzzy Syst., 2018

Intrusion detection taxonomy and data preprocessing mechanisms.
J. Intell. Fuzzy Syst., 2018

Ant colony inspired method for reducing load imbalance in multiprocessor systems.
J. Intell. Fuzzy Syst., 2018

A novel approach for face recognition using fused GMDH-based networks.
Int. Arab J. Inf. Technol., 2018

Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Searching Encrypted Data on the Cloud.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Robust content authentication of gray and color images using lbp-dct markov-based features.
Multim. Tools Appl., 2017

Special issue on soft computing and intelligent systems: Tools, techniques and applications.
J. Intell. Fuzzy Syst., 2017

Evaluation of sequential adaptive testing with real-data simulation: A case study.
J. Intell. Fuzzy Syst., 2017

A multiclass cascade of artificial neural network for network intrusion detection.
J. Intell. Fuzzy Syst., 2017

AdaBoost-based artificial neural network learning.
Neurocomputing, 2017

Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering.
Comput. J., 2017

Hybrid Deep Learning for Sentiment Polarity Determination of Arabic Microblogs.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Learning mechanisms for anomaly-based intruson detection: Updated review.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

Silhouette-Based Gender Recognition in Smart Environments Using Fuzzy Local Binary Patterns and Support Vector Machines.
Proceedings of the 8th International Conference on Ambient Systems, 2017

Using Word Embedding and Ensemble Learning for Highly Imbalanced Data Sentiment Analysis in Short Arabic Text.
Proceedings of the 8th International Conference on Ambient Systems, 2017

2016
Selectivity estimation of extended XML query tree patterns based on prime number labeling and synopsis modeling.
Simul. Model. Pract. Theory, 2016

Towards scalable rough set based attribute subset selection for intrusion detection using parallel genetic algorithm in MapReduce.
Simul. Model. Pract. Theory, 2016

XHQE: A hybrid system for scalable selectivity estimation of XML queries.
Inf. Syst. Frontiers, 2016

Spam filtering framework for multimodal mobile communication based on dendritic cell algorithm.
Future Gener. Comput. Syst., 2016

Multi-Kernel Fuzzy-Based Local Gabor Patterns for Gait Recognition.
Proceedings of the Advances in Visual Computing - 12th International Symposium, 2016

Gait-based Recognition for Human Identification using Fuzzy Local Binary Patterns.
Proceedings of the 8th International Conference on Agents and Artificial Intelligence (ICAART 2016), 2016

Kernel-Based Fuzzy Local Binary Pattern for Gait Recognition.
Proceedings of the 2016 European Modelling Symposium, 2016

2015
Improved selectivity estimator for XML queries based on structural synopsis.
World Wide Web, 2015

Combining spatial and DCT based Markov features for enhanced blind detection of image splicing.
Pattern Anal. Appl., 2015

Detecting Cyber-Attacks on Wireless Mobile Networks Using Multicriterion Fuzzy Classifier with Genetic Attribute Selection.
Mob. Inf. Syst., 2015

Introduction to the special issue on Cognitive Radio Networks.
Comput. Electr. Eng., 2015

Boosting paraphrase detection through textual similarity metrics with abductive networks.
Appl. Soft Comput., 2015

Learning Rule for Linear Multilayer Feedforward ANN by Boosted Decision Stumps.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

Statistical Gabor-Based Gait Recognition Using Region-Level Analysis.
Proceedings of the 2015 IEEE European Modelling Symposium, 2015

Anonymous Connections Based on Onion Routing: A Review and a Visualization Tool.
Proceedings of the 6th International Conference on Ambient Systems, 2015

Dendritic Cell Algorithm for Mobile Phone Spam Filtering.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
Computational Intelligence in Smart Grids: Case Studies.
Proceedings of the Computational Intelligence for Decision Support in Cyber-Physical Systems, 2014

Abductive Learning Ensembles for Hand Shape Identification.
Cogn. Comput., 2014

Intrusion detection using a cascade of boosted classifiers (CBC).
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

ANFIS-Based Model for Improved Paraphrase Rating Prediction.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

BOOSTRON: Boosting Based Perceptron Learning.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Full-Reference Predictive Modeling of Subjective Image Quality Assessment with ANFIS.
Proceedings of the Agents and Artificial Intelligence - 6th International Conference, 2014

Image Quality Assessment using ANFIS Approach.
Proceedings of the ICAART 2014, 2014

A Multicriterion Fuzzy Classification Method with Greedy Attribute Selection for Anomaly-based Intrusion Detection.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

Effects of Using Average Annual Daily Traffic (AADT) with Exogenous Factors to Predict Daily Traffic.
Proceedings of the 5th International Conference on Ambient Systems, 2014

2013
A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks.
J. Netw. Comput. Appl., 2013

Enhanced Hand Shape Identification Using Random Forests.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2013

2012
Analysis and extraction of sentence-level paraphrase sub-corpus in CS education.
Proceedings of the ACM Special Interest Group for Information Technology Education Conference, 2012

Automatic Identification Based on Hand Geometry and Probabilistic Neural Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector Machines.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Abductive Neural Network Modeling for Hand Recognition Using Geometric Features.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Fusion of Multiple Texture Representations for Palmprint Recognition Using Neural Networks.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Classification of Deformable Geometric Shapes - Using Radial-Basis Function Networks and Ring-wedge Energy Features.
Proceedings of the ICAART 2012 - Proceedings of the 4th International Conference on Agents and Artificial Intelligence, Volume 1, 2012

2011
Comparing a class of dynamic model-based reinforcement learning schemes for handoff prioritization in mobile communication networks.
Expert Syst. Appl., 2011

Using GMDH-based networks for improved spam detection and email feature analysis.
Appl. Soft Comput., 2011

A comparative study of PVD-based schemes for data hiding in digital images.
Proceedings of the 9th IEEE/ACS International Conference on Computer Systems and Applications, 2011

A reinforcement learning approach for sequential mastery testing.
Proceedings of the 2011 IEEE Symposium on Adaptive Dynamic Programming And Reinforcement Learning, 2011

An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing.
Proceedings of the Advances in Computing and Communications, 2011

2010
A hierarchical GMDH-based polynomial neural network for handwritten numeral recognition using topological features.
Proceedings of the International Joint Conference on Neural Networks, 2010

Flow-based path selection for Internet traffic engineering with NSGA-II.
Proceedings of the 17th International Conference on Telecommunications, 2010

A bio-inspired image encryption algorithm based on chaotic maps.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

Offline Recognition of Handwritten Numeral Characters with Polynomial Neural Networks Using Topological Features.
Proceedings of the Advances in Artificial Intelligence, 2010

2009
Constructing optimal educational tests using GMDH-based item ranking and selection.
Neurocomputing, 2009

Discovering classification rules for email spam filtering with an ant colony optimization algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2009

2008
Construction and analysis of educational tests using abductive machine learning.
Comput. Educ., 2008

Spam filtering with abductive networks.
Proceedings of the International Joint Conference on Neural Networks, 2008

A fuzzy similarity approach for automated spam filtering.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
A Review of Network Security.
IEEE Distributed Syst. Online, 2007

Applications of genetic algorithms to optimal multilevel design of MPLS-based networks.
Comput. Commun., 2007

Solving the minimum-cost constrained multipath routing with load balancing in MPLS networks using an evolutionary method.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

On Optimal Firewall Rule Ordering.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2006
A learning approach for prioritized handoff channel allocation in mobile multimedia networks.
IEEE Trans. Wirel. Commun., 2006

MPLS Network Topology Design Using Genetic Algorithms.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
A General Look at Building Applications for Mobile Devices.
IEEE Distributed Syst. Online, 2005

2001
Adaptive resource allocation with prioritized handoff in cellular mobile networks under QoS provisioning.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001

Autonomous call admission control with prioritized handoff in cellular networks.
Proceedings of the IEEE International Conference on Communications, 2001


  Loading...