Mahmoud Emam

Orcid: 0000-0002-1290-4272

According to our database1, Mahmoud Emam authored at least 16 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient utilization of deep learning for the detection of fabric defects.
Neural Comput. Appl., April, 2024

Classifier-guided multi-style tile image generation method.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

Box-spoof attack against single object tracking.
Appl. Intell., 2024

2023
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders.
J. Inf. Secur. Appl., August, 2023

Asymptotic standard errors of intraclass correlation coefficients for two-way model.
Commun. Stat. Simul. Comput., May, 2023

Spatiotemporal fusion for spectral remote sensing: A statistical analysis and review.
J. King Saud Univ. Comput. Inf. Sci., March, 2023

Data Augmentation and Few-Shot Change Detection in Forest Remote Sensing.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023

2022
SERNet: Squeeze and Excitation Residual Network for Semantic Segmentation of High-Resolution Remote Sensing Images.
Remote. Sens., 2022

2021
Frame Duplication Forgery Detection and Localization Algorithm Based on the Improved Levenshtein Distance.
Sci. Program., 2021

2017
Assistive technology competencies in learning disability program candidates at Sultan Qaboos University: A proposed model.
Proceedings of the 6th International Conference on Information and Communication Technology and Accessibility, 2017

Leadership of technology in inclusive practice.
Proceedings of the 6th International Conference on Information and Communication Technology and Accessibility, 2017

Ear verification based on a novel local feature extraction.
Proceedings of the 2017 International Conference on Biometrics Engineering and Application, 2017

2016
PCET based copy-move forgery detection in images under geometric transforms.
Multim. Tools Appl., 2016

A Keypoint-Based Region Duplication Forgery Detection Algorithm.
IEICE Trans. Inf. Syst., 2016

Detection of Copy-Scale-Move Forgery in Digital Images Using SFOP and MROGH.
Proceedings of the Social Computing, 2016

2015
A passive technique for detecting copy-move forgery with rotation based on polar complex exponential transform.
Proceedings of the Seventh International Conference on Digital Image Processing, 2015


  Loading...