Sani M. Abdullahi
Orcid: 0000-0003-4962-2794
According to our database1,
Sani M. Abdullahi
authored at least 32 papers
between 2016 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances.
Int. J. Inf. Sec., February, 2025
S-Faster R-CNN: Intraspectral Similarity Learning for Audio Copy-Move Forgery Localization in IoT Security.
IEEE Internet Things J., 2025
Recaptured Image Detection Based on Multi-Scale Residual Features of Discriminative Regions.
IEICE Trans. Inf. Syst., 2025
Comput. Electr. Eng., 2025
Quantitative Assessment of Energy Efficiency, Comfort, and Safety in an Intelligent Heating System Under False Data Injection Attacks.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2025 Workshops, 2025
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2025
Simulation-Based Analysis of OPC UA Set-Up Vulnerability and Its Security Risks in Cyber-Physical Manufacturing Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2025
2024
Inf. Fusion, March, 2024
J. Inf. Secur. Appl., 2024
Cybersecurity in Distributed Industrial Digital Twins: Threats, Defenses, and Key Takeaways.
DiDit@DisCoTec, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
The reversibility of cancelable biometric templates based on iterative perturbation stochastic approximation strategy.
Pattern Recognit. Lett., August, 2023
Constructing Immunized Stego-Image for Secure Steganography via Artificial Immune System.
IEEE Trans. Multim., 2023
Robust Blind Video Watermarking Against Geometric Deformations and Online Video Sharing Platform Processing.
IEEE Trans. Dependable Secur. Comput., 2023
Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Ordering.
IEEE Trans. Dependable Secur. Comput., 2023
Adaptive and Robust Fourier-Mellin-Based Image Watermarking for Social Networking Platforms.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
2022
Telecommun. Syst., 2022
Light-FireNet: an efficient lightweight network for fire detection in diverse environments.
Multim. Tools Appl., 2022
J. Inf. Secur. Appl., 2022
Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection.
Digit. Signal Process., 2022
Spoofed Fingerprint Image Detection Using Local Phase Patch Segment Extraction and a Lightweight Network.
Proceedings of the Advances in Digital Forensics XVIII, 2022
2021
Random Hash Code Generation for Cancelable Fingerprint Templates using Vector Permutation and Shift-order Process.
CoRR, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
High-Capacity Reversible Data Hiding in Encrypted Images Using Multi-Layer Embedding.
IEEE Access, 2020
2019
Int. J. Digit. Crime Forensics, 2019
2018
Robust enhancement and centroid-based concealment of fingerprint biometric data into audio signals.
Multim. Tools Appl., 2018
Int. J. Digit. Crime Forensics, 2018
Fourier-Mellin Transform and Fractal Coding for Secure and Robust Fingerprint Image Hashing.
Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018
2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016