Ibrahim Kamel

Orcid: 0000-0001-5546-939X

According to our database1, Ibrahim Kamel authored at least 129 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SkyEye: continuous processing of moving spatial-keyword queries over moving objects.
GeoInformatica, October, 2024

High-Fidelity Steganography: A Covert Parity Bit Model-Based Approach.
Algorithms, August, 2024

An adaptive hybrid mutated differential evolution feature selection method for low and high-dimensional medical datasets.
Knowl. Based Syst., January, 2024

Security attacks in Opportunistic Mobile Networks: A systematic literature review.
J. Netw. Comput. Appl., January, 2024

Keeping an eye on moving objects: processing continuous spatial-keyword range queries.
GeoInformatica, January, 2024

JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks.
J. Netw. Comput. Appl., 2024

Medical image segmentation approach based on hybrid adaptive differential evolution and crayfish optimizer.
Comput. Biol. Medicine, 2024

2023
Secure kNN query of outsourced spatial data using two-cloud architecture.
J. Supercomput., December, 2023

FogLBS: Utilizing fog computing for providing mobile Location-Based Services to mobile customers.
Pervasive Mob. Comput., August, 2023

GPS Spoofing Attacks in FANETs: A Systematic Literature Review.
IEEE Access, 2023

Multimedia Fingerprinting Codes Resistant to Linear Attacks and Adversarial Noise.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

On the Linguistic Limitations of ChatGPT: An Experimental Case Study.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Toward Detection of Arabic Cyberbullying on Online Social Networks using Arabic BERT Models.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

A Direction for Swarm Robotic Path Planning Technique Using Potential Field Concepts and Particle Swarm Optimization.
Proceedings of the 15th International Conference on Innovations in Information Technology, 2023

Impact Study and Analysis of Hidden-mode of Wormhole Attack in Opportunistic Mobile Networks.
Proceedings of the 15th International Conference on Innovations in Information Technology, 2023

Minimizing Distortion in Secret Image Retrieval: A Novel Solution to Combat Data Loss in Steganography.
Proceedings of the 15th International Conference on Innovations in Information Technology, 2023

Path Planning Techniques for Multi-robot Systems: A Systematic Review.
Proceedings of the 15th International Conference on Innovations in Information Technology, 2023

Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

2022
NodeRank: Finding influential nodes in social networks based on interests.
J. Supercomput., 2022

Nonoverlapping Convex Polytopes with Vertices in a Boolean Cube and Other Problems in Coding Theory.
Probl. Inf. Transm., 2022

Polynomial fitting: enhancing the stego quality of DCT-based Steganography schemes.
Multim. Tools Appl., 2022

2021
Toward stronger energy compaction for high capacity dct-based steganography: a region-growing approach.
Multim. Tools Appl., 2021

Secure high payload steganography: A model-based approach.
J. Inf. Secur. Appl., 2021

Addressing Real-Time Demands for Robotic Path Planning Systems: A Routing Protocol Approach.
IEEE Access, 2021

Utilizing Spatio-Temporal Redundancy to Maximize the Performance of Video Steganography: An Octree Approach.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

Accuracy of Linear Measurements of Maxillary Sinus Dimensions in Gender Identification Using Machine Learning.
Proceedings of the 14th International Conference on Developments in eSystems Engineering, 2021

2020
Toward watermarking compressed data in columnar database architectures.
Secur. Priv., 2020

L*a*b* color space high capacity steganography utilizing quad-trees.
Multim. Tools Appl., 2020

Detection of Bots in Social Media: A Systematic Review.
Inf. Process. Manag., 2020

Optimising energy in distributed phenomena detection for mobile WSN.
IET Wirel. Sens. Syst., 2020

SparkNN: A Distributed In-Memory Data Partitioning for KNN Queries on Big Spatial Data.
Data Sci. J., 2020

Achieving Stronger Compaction for DCT-Based Steganography: A Region-Growing Approach.
Proceedings of the Trends and Innovations in Information Systems and Technologies, 2020

Towards Improving the Imperceptibility of Steganography Schemes: Adaptive Scaling Approach.
Proceedings of the 14th International Conference on Innovations in Information Technology, 2020

A Review of Color Image Steganalysis in the Transform Domain.
Proceedings of the 14th International Conference on Innovations in Information Technology, 2020

Framework for Protecting the Confidentiality of Outsourced Data on Cloud.
Proceedings of the 14th International Conference on Innovations in Information Technology, 2020

A New High Capacity Video Steganography Scheme Using Differential Directional Pixogram.
Proceedings of the 14th International Conference on Innovations in Information Technology, 2020

2019
Facilitating Secure and Efficient Spatial Query Processing on the Cloud.
IEEE Trans. Cloud Comput., 2019

GeoSimMR: A MapReduce Algorithm for Detecting Communities based on Distance and Interest in Social Networks.
Data Sci. J., 2019

A Survey on Using Blockchain in Trade Supply Chain Solutions.
IEEE Access, 2019

Privacy Preserving kNN Spatial Query with Voronoi Neighbors.
Proceedings of the New Knowledge in Information Systems and Technologies, 2019

Customs-Based Distributed Risk Assessment Method.
Proceedings of the Parallel Architectures, Algorithms and Programming, 2019

Customs-Based Blockchain Solution for Exportation Protection.
Proceedings of the Parallel Architectures, Algorithms and Programming, 2019

Real-Time Detection of Cyberbullying in Arabic Twitter Streams.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

High Payload Steganography: Surface-Fitting The Transform Domain.
Proceedings of the International Conference on Communications, 2019

Detection of Arabic Cyberbullying on Social Networks using Machine Learning.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Maximizing embedding capacity and stego quality: curve-fitting in the transform domain.
Multim. Tools Appl., 2018

Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid.
Multim. Tools Appl., 2018

Detection of Offensive Messages in Arabic Social Media Communications.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

Voronoi-based Secure kNN Queries over Spatial Data at the Cloud.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

Extending steganography payload capacity using the L*a*b* color space.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

Distortion-free Watermarking Scheme for Compressed Data in Columnar Database.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Indexing, Hilbert R-Tree, Spatial Indexing, Multimedia Indexing.
Proceedings of the Encyclopedia of GIS., 2017

Indexing Schemes for Multidimensional Moving Objects.
Proceedings of the Encyclopedia of GIS., 2017

Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach.
Multim. Tools Appl., 2017

High-capacity steganography: a global-adaptive-region discrete cosine transform approach.
Multim. Tools Appl., 2017

Dynamic spatial index for efficient query processing on the cloud.
J. Cloud Comput., 2017

Efficient Data Collection by Mobile Sink to Detect Phenomena in Internet of Things.
Inf., 2017

DISC: Query Processing on the Cloud Service Provider for Dynamic Spatial Databases.
Proceedings of the Third IEEE International Conference on Multimedia Big Data, 2017

2016
On the embedding limits of the discrete cosine transform.
Multim. Tools Appl., 2016

Phenomena Detection in Mobile Wireless Sensor Networks.
J. Netw. Syst. Manag., 2016

Privacy Protection in Outsourced Spatial Databases.
Int. J. Semantic Comput., 2016

Distortion-free fragile watermark for relational databases.
Int. J. Big Data Intell., 2016

SmartRecruiter: a similarity-based team formation algorithm.
Int. J. Big Data Intell., 2016

Secure kNN queries over outsourced spatial data for location-based services.
Proceedings of the 2016 12th International Conference on Innovations in Information Technology (IIT), 2016

On detecting communities in social networks with interests.
Proceedings of the 2016 12th International Conference on Innovations in Information Technology (IIT), 2016

A New Scheme for Protecting the Privacy and Integrity of Spatial Data on the Cloud.
Proceedings of the IEEE Second International Conference on Multimedia Big Data, 2016

Social community detection based on node distance and interest.
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016

2015
Hiding Information in Reversible English Transforms for a Blind Receiver.
Appl. Comput. Intell. Soft Comput., 2015

Enhancing Confidentiality and Privacy of Outsourced Spatial Data.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Realistic team formation using navigation and homophily.
Proceedings of the International Conference on Big Data and Smart Computing, BIGCOMP 2014, 2014

2013
Energy-efficient distributed wireless sensor network scheme for cluster detection.
Int. J. Parallel Emergent Distributed Syst., 2013

2012
On clustering large number of data streams.
Intell. Data Anal., 2012

Secure Delivery of Data in WSN .
Proceedings of the SENSORNETS 2012, 2012

2011
A Lightweight Data Integrity Scheme for Sensor Networks.
Sensors, 2011

Dynamic storage and access load balancing for answering range queries in peer-to-peer networks.
Peer-to-Peer Netw. Appl., 2011

Semi-fragile watermark for sensor data.
Int. J. Internet Protoc. Technol., 2011

Toward protecting the integrity of relational databases.
Proceedings of the 2011 World Congress on Internet Security, 2011

2010
QoS guarantee for multimedia traffic in smart homes.
Multim. Tools Appl., 2010

Managing multi-priority services in ubiquitous computing applications.
Int. J. Internet Protoc. Technol., 2010

Simplified watermarking scheme for sensor networks.
Int. J. Internet Protoc. Technol., 2010

MG-join: detecting phenomena and their correlation in high dimensional data streams.
Distributed Parallel Databases, 2010

2009
A novel memory management scheme for residential gateways.
Inf. Syst. Frontiers, 2009

Efficient range queries in spatial databases over Peer-to-Peer Networks.
Int. J. Internet Protoc. Technol., 2009

A robust software watermarking for copyright protection.
Comput. Secur., 2009

A schema for protecting the integrity of databases.
Comput. Secur., 2009

Distortion-Free Watermarking Scheme for Wireless Sensor Networks.
Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems, 2009

2008
Indexing, Hilbert R-Tree, Spatial Indexing, Multimedia Indexing.
Proceedings of the Encyclopedia of GIS., 2008

Indexing Schemes for Multi-dimensional Moving Objects.
Proceedings of the Encyclopedia of GIS., 2008

Special track on e-business applications: editorial message.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Identifying malicious peers in MANETs.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

On protecting the integrity of sensor data.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

2007
Automatic Morphological Generation for the Indexing of Arabic Speech Recordings.
Int. J. Comput. Process. Orient. Lang., 2007

2006
Scalability Management in Sensor-Network PhenomenaBases.
Proceedings of the 18th International Conference on Scientific and Statistical Database Management, 2006

Watermarking Essential Data Structures for Copyright Protection.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

2005
An active buffer management technique for providing interactive functions in broadcast video-on-demand systems.
IEEE Trans. Multim., 2005

An Indexing Method for Answering Queries on Moving Objects.
Distributed Parallel Databases, 2005

NILE-PDT: A Phenomenon Detection and Tracking Framework for Data Stream Management Systems.
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005

Detection and Tracking of Discrete Phenomena in Sensor-Network Databases.
Proceedings of the 17th International Conference on Scientific and Statistical Database Management, 2005

Identifying Semantically Similar Arabic Words using a Large Vocabulary Speech Recognition System.
Proceedings of the Internet and Multimedia Systems and Applications, 2005

2004
An efficient mechanism for searching Arabic audio libraries.
Proceedings of the Sixth IEEE International Symposium on Multimedia Software Engineering, 2004

Scalable Multimedia Disk Scheduling.
Proceedings of the 20th International Conference on Data Engineering, 2004

2003
A cost driven disk scheduling algorithm for multimedia object retrieval.
IEEE Trans. Multim., 2003

Analysis of Multi-Dimensional Space-Filling Curves.
GeoInformatica, 2003

An Efficient Indexing Scheme for Multi-dimensional Moving Objects.
Proceedings of the Database Theory, 2003

2002
Scalable QoS-Aware Disk-Scheduling.
Proceedings of the International Database Engineering & Applications Symposium, 2002

Performance of multi-dimensional space-filling curves.
Proceedings of the ACM-GIS 2002, 2002

Efficient answering of polyhedral queries in r<sup>d</sup> using bbs-trees.
Proceedings of the 14th Canadian Conference on Computational Geometry, 2002

2001
Disk Scheduling in Video Editing Systems.
IEEE Trans. Knowl. Data Eng., 2001

Handling Large Real-Time Disk Access Requests With Variable Priorities.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001

A Study on the Indexing of Satellite Images at NASA Regional Application Center.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

2000
A Novel Deadline Driven Disk Scheduling Algorithm for Multi-Priority Multimedia Objects.
Proceedings of the 16th International Conference on Data Engineering, San Diego, California, USA, February 28, 2000

New Trends in Multimedia Systems - Introduction.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000

On Multi-dimensional Sorting Orders.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000

1999
Providing Interactive Functions through Active Client-Buffer Management in Partitioned Video Multicast VoD Systems.
Proceedings of the Networked Group Communication, 1999

Autonomous Disks: The Building Block for a Scalable Distributed File System.
Proceedings of the MIS '99, 1999

A Study on Scheduling Multiple Priority Requests in Multimedia Servers.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Providing Interactive Functions for Staggered Multicast Near Video-on-Demand Systems.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

1997
Relaxing the Uniformity and Independence Assumptions Using the Concept of Fractal Dimension.
J. Comput. Syst. Sci., 1997

1996
Retrieving Electronic Ink by Content.
Proceedings of the International Workshop on Multi-Media Database Management Systems, 1996

Integrated Image and Speech Analysis for Content-Based Video Indexing.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1996

Declustering Spatial Databases on a Multi-Computer Architecture.
Proceedings of the Advances in Database Technology, 1996

Fast Retrieval of Cursive Handwriting.
Proceedings of the CIKM '96, Proceedings of the Fifth International Conference on Information and Knowledge Management, November 12, 1996

1995
On Handling Electronic Ink.
ACM Comput. Surv., 1995

1994
Hilbert R-tree: An Improved R-tree using Fractals.
Proceedings of the VLDB'94, 1994

Beyond Uniformity and Independence: Analysis of R-trees Using the Concept of Fractal Dimension.
Proceedings of the Thirteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1994

The Time Index+: An Incremental Access Structure for Temporal Databases.
Proceedings of the Third International Conference on Information and Knowledge Management (CIKM'94), Gaithersburg, Maryland, USA, November 29, 1994

1993
High Performance R-trees.
IEEE Data Eng. Bull., 1993

On Packing R-trees.
Proceedings of the CIKM 93, 1993

1992
Parallel R-trees.
Proceedings of the 1992 ACM SIGMOD International Conference on Management of Data, 1992


  Loading...