Mohammed Aloraini

Orcid: 0000-0002-1655-8098

According to our database1, Mohammed Aloraini authored at least 15 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Two-stream convolutional networks for skin cancer classification.
Multim. Tools Appl., March, 2024

An effective human monkeypox classification using vision transformer.
Int. J. Imaging Syst. Technol., January, 2024

2023
Toward a Vision-Based Intelligent System: A Stacked Encoded Deep Learning Framework for Sign Language Recognition.
Sensors, November, 2023

FaceMD: convolutional neural network-based spatiotemporal fusion facial manipulation detection.
Signal Image Video Process., February, 2023

2022
An Efficient and Effective Deep Learning-Based Model for Real-Time Face Mask Detection.
Sensors, 2022

An Efficient Pest Detection Framework with a Medium-Scale Benchmark to Increase the Agricultural Productivity.
Sensors, 2022

An Effective Skin Cancer Classification Mechanism via Medical Vision Transformer.
Sensors, 2022

Quantized Gaussian JPEG Steganography and Pool Steganalysis.
IEEE Access, 2022

2021
Sequential and Patch Analyses for Object Removal Video Forgery Detection and Localization.
IEEE Trans. Circuits Syst. Video Technol., 2021

2020
Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography.
IEEE Trans. Inf. Forensics Secur., 2020

2019
Dictionary Learning and Sparse Coding for Digital Image Forgery Detection.
Proceedings of the Media Watermarking, 2019

Statistical Sequential Analysis for Object-based Video Forgery Detection.
Proceedings of the Media Watermarking, 2019

Quantized Gaussian Embedding Steganography.
Proceedings of the IEEE International Conference on Acoustics, 2019

2017
Convolutional neural network steganalysis's application to steganography.
Proceedings of the 2017 IEEE Visual Communications and Image Processing, 2017

2012
Resolving Wireless Security Limitations Using a New Wi-Fi Secure Access.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012


  Loading...