Kamal A. ElDahshan

Orcid: 0000-0002-9953-5480

Affiliations:
  • Al-Azhar University, Cairo, Egypt


According to our database1, Kamal A. ElDahshan authored at least 26 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SwinVid: Enhancing Video Object Detection Using Swin Transformer.
Comput. Syst. Sci. Eng., 2024

2022
An integrated spatiotemporal-based methodology for deepfake detection.
Neural Comput. Appl., 2022

Meta-Heuristic Optimization Algorithm-Based Hierarchical Intrusion Detection System.
Comput., 2022

An Ameliorated Multiattack Network Anomaly Detection in Distributed Big Data System-Based Enhanced Stacking Multiple Binary Classifiers.
IEEE Access, 2022

2021
A Software Security Optimization Architecture (SoSOA) and its Adaptation for Mobile Applications.
Int. J. Interact. Mob. Technol., June, 2021

A New Deep Learning-Based Methodology for Video Deepfake Detection Using XGBoost.
Sensors, 2021

Deepfake video detection: YOLO-Face convolution recurrent approach.
PeerJ Comput. Sci., 2021

BC-HRM: A Blockchain-Based Human Resource Management System Utilizing Smart Contracts.
Proceedings of the International Conference on Deep Learning, 2021

2020
Data in the time of COVID-19: a general methodology to select and secure a NoSQL DBMS for medical data.
PeerJ Comput. Sci., 2020

Semantic Smart World Framework.
Appl. Comput. Intell. Soft Comput., 2020

Blockchain Applications in Human Resources Management: Opportunities and Challenges.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

2019
Reverse engineering approach for improving the quality of mobile applications.
PeerJ Comput. Sci., 2019

Feature selection for face authentication systems: feature space reductionism and QPSO.
Int. J. Biom., 2019

Comparative Study for Detecting Mobile Application's Anti-Patterns.
Proceedings of the 2019 8th International Conference on Software and Information Engineering, 2019

2017
Scalable Video Summarization: A Comparative Study.
Proceedings of the International Conference on Compute and Data Analysis, 2017

2016
Secure Authentication Protocol Based on Machine-metrics and RC4-EA Hashing.
Int. J. Netw. Secur., 2016

Effective and Efficient Video Summarization Approach for Mobile Devices.
Int. J. Interact. Mob. Technol., 2016

Energy Efficient Flow Coverage Scheme for Mobile Crowd Sensing in Urban Streets.
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016

Context-Aware Joint Video Summarization and Streaming (CVSS) Approach.
Proceedings of the IEEE International Symposium on Multimedia, 2016

2015
EA Based Dynamic Key Generation in RC4 Ciphering Applied to CMS.
Int. J. Netw. Secur., 2015

2013
Automatic evaluation technique for certain types of open questions in semantic learning systems.
Hum. centric Comput. Inf. Sci., 2013

2010
The Instructional Use of Learning Objects in Early Childhood Education.
Egypt. Comput. Sci. J., 2010

Data Driven DSS in telecommunications industry.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

Mining uncertain data warehouse.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2007
Using Ontology Mining Towards Building a Unified Data Mining Engine.
Egypt. Comput. Sci. J., 2007

2006
New Methodology for Seismology Mining.
Egypt. Comput. Sci. J., 2006


  Loading...