Osama Hosam

According to our database1, Osama Hosam authored at least 20 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Review of Blockchain-based Privacy Computing Research.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

Utilizing Machine Learning to Develop Cloud-Based Apprenticeship Programs Aligned with Labor Market Demands.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

2022
An earthquake query system based on hidden Markov models.
Int. J. Embed. Syst., 2022

5GSS: a framework for 5G-secure-smart healthcare monitoring.
Connect. Sci., 2022

A Survey of Recommender Systems Based on Hypergraph Neural Networks.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

2020
A new text-based w-distance metric to find the perfect match between words.
J. Intell. Fuzzy Syst., 2020

A novel watermarking algorithm based on characteristics model of local fragmentary images.
Int. J. Embed. Syst., 2020

Secure Digital Certificate-Based Data Access Control Scheme in Blockchain.
IEEE Access, 2020

2019
A secure hierarchical community detection algorithm.
Int. J. Comput. Sci. Eng., 2019

Hybrid design for cloud data security using combination of AES, ECC and LSB steganography.
Int. J. Comput. Sci. Eng., 2019

A Performance Evaluation Method of Coal-Fired Boiler Based on Neural Network.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

Intelligent Watermarking System Based on Soft Computing.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019, 2019

2018
Hiding Bitcoins in Steganographic Fractals.
Proceedings of the 2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2018

2016
Adaptive block-based pixel value differencing steganography.
Secur. Commun. Networks, 2016

A two-step MF signal acquisition method for wireless underground sensor networks.
Comput. Sci. Inf. Syst., 2016

2015
Colored texture classification with support vector machine and wavelet multiresolution analysis.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2015

2012
Public watermarking scheme for 3D laser scanned archeological models.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Motion compensation for video codec based on disparity estimation.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

2010
Watermarking 3D Triangular Mesh with High Visual Quality.
J. Digit. Content Technol. its Appl., 2010

2009
Three-Dimensional Reconstruction Using Enhanced Shape from Stereo Technique.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009


  Loading...