Wassim Alexan

Orcid: 0000-0001-6159-4971

According to our database1, Wassim Alexan authored at least 39 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Image Encryption Based on Fourier-DNA Coding for Hyperchaotic Chen System, Chen-Based Binary Quantization S-Box, and Variable-Base Modulo Operation.
IEEE Access, 2024

2023
Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption.
Symmetry, 2023

R<sup>3</sup> - Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems.
IEEE Access, 2023

Image Encryption via Base-n PRNGs and Parallel Base-n S-Boxes.
IEEE Access, 2023

AntEater: When Arnold's Cat Meets Langton's Ant to Encrypt Images.
IEEE Access, 2023

Color Image Cryptosystem Based on Sine Chaotic Map, 4D Chen Hyperchaotic Map of Fractional-Order and Hybrid DNA Coding.
IEEE Access, 2023

Color Image Encryption Through Chaos and KAA Map.
IEEE Access, 2023

Enhancing Image Security Using Legacy-Based Encryption With Chaotic Tent Map and Memristor.
Proceedings of the Signal Processing: Algorithms, 2023

Secure Communications of Visual Data Over CF Relays.
Proceedings of the Signal Processing: Algorithms, 2023

Enhanced Image Encryption Using the Hénon Map, the LCG and the Lorenz System.
Proceedings of the 6th International Conference on Signal Processing and Information Security, 2023

2022
Application of DNA Coding, the Lorenz Differential Equations and a Variation of the Logistic Map in a Multi-Stage Cryptosystem.
Symmetry, 2022

RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System.
Symmetry, 2022

Image encryption based on a combination of multiple chaotic maps.
Multim. Tools Appl., 2022

Image Encryption Through CA, Chaos and Lucas Sequence Based S-Box.
Proceedings of the Signal Processing: Algorithms, 2022

Visual Data Enciphering via DNA Encoding, S-Box, and Tent Mapping.
Proceedings of the 5th IEEE International Conference on Image Processing Applications and Systems, 2022

3D Object Encryption Through a Disruptive Rotational Symmetry Transformation.
Proceedings of the 32nd International Conference on Computer Theory and Applications, 2022

Identifying the Motivational Influences on Students' Choice of Engineering Major.
Proceedings of the IEEE Global Engineering Education Conference, 2022

Image Encryption Through Rössler System, PRNG S-Box and Recamán's Sequence.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

2021
Securing Sensitive Data Through Corner Filters, Chaotic Maps and LSB Embedding.
Proceedings of the 3rd Novel Intelligent and Leading Emerging Sciences Conference, 2021

SOR Weighting Factor Optimization of AC Systems and Electrical Circuits.
Proceedings of the 3rd Novel Intelligent and Leading Emerging Sciences Conference, 2021

Utilization of Corner Filters, AES and LSB Steganography for Secure Message Transmission.
Proceedings of the International Conference on Microelectronics, 2021

Lightweight Image Encryption: Cellular Automata and the Lorenz System.
Proceedings of the International Conference on Microelectronics, 2021

2020
Secure 3D data hiding technique based on a mesh traversal algorithm.
Multim. Tools Appl., 2020

Message Security Through AES and LSB Embedding in Edge Detected Pixels of 3D Images.
Proceedings of the 2nd Novel Intelligent and Leading Emerging Sciences Conference, 2020

2019
A Multiple Layer Security Scheme Utilizing Information Matrices.
Proceedings of the Signal Processing: Algorithms, 2019

Logistic Sine Map Based Image Encryption.
Proceedings of the Signal Processing: Algorithms, 2019

Security Through Blowfish and LSB Bit-Cycling With Mathematical Sequences.
Proceedings of the Signal Processing: Algorithms, 2019

A High capacity Double-Layer Gray Code Based Security Scheme for Secure Data Embedding.
Proceedings of the 2019 International Symposium on Networks, Computers and Communications, 2019

Triple-Layer Image Security Using a Zigzag Embedding Pattern.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019

Secure 2D Image Steganography Using Recamán's Sequence.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019

A High Capacity Geometrical Domain Based 3D Image Steganography Scheme.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019

Double-Layer Image Security Scheme with Aggregated Mathematical Sequences.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019

2018
A Threshold-Free LLR-Based Scheme to Minimize the BER for Decode-and-Forward Relaying.
Wirel. Pers. Commun., 2018

Adaptive Hybrid Scheme for Cooperative Communications.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

2017
A Comparative Study on the Performance of LLR- and SNR-Based Hybrid Relaying Schemes.
Wirel. Commun. Mob. Comput., 2017

2015
A relay selection method for bidirectional wireless cooperative networks based on the log-likelihood ratio.
Proceedings of the Signal Processing: Algorithms, 2015

A hybrid relaying protocol for wireless cooperative networks based on the log-likelihood ratio.
Proceedings of the Signal Processing: Algorithms, 2015

LLR-based hybrid relaying as a countermeasure against an impulsive noise jamming attack.
Proceedings of the Signal Processing: Algorithms, 2015

2014
A quantized reliability-relay selection method for wireless cooperative communications.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014


  Loading...