A survey on internet of things enabled smart campus applications A Abuarqoub, H Abusaimeh, M Hammoudeh, D Uliyan, MA Abu-Hashem, ... Proceedings of the International Conference on Future Networks and …, 2017 | 136 | 2017 |
Anti-spoofing method for fingerprint recognition using patch based deep learning machine D Uliyan, S saddeghi, H Jalab Engineering Science and Technology, an International Journal 2019 (3), 10, 2019 | 90 | 2019 |
State of the art in passive digital image forgery detection: Copy-Move image forgery. S Sadeghi, S Dadkhah, HA Jalab, D Uliyan. Pattern Analysis and Applications, 1-16, 2018 | 67 | 2018 |
A novel forged blurred region detection system for image forensic applications DM Uliyan, HA Jalab, AWA Wahab, P Shivakumara, S Sadeghi Expert Systems with Applications 64, 1-10, 2016 | 51 | 2016 |
Copy move image forgery detection using Hessian and center symmetric local binary pattern DM Uliyan, HA Jalab, AWA Wahab 2015 IEEE conference on open systems (ICOS), 7-11, 2015 | 50 | 2015 |
Image region duplication forgery detection based on angular radial partitioning and Harris key-points DM Uliyan, HA Jalab, AW Abdul Wahab, S Sadeghi Symmetry Journal 8 (7), 62, 2016 | 44 | 2016 |
Keypoint based authentication and localization of copy-move forgery in digital image S Sadeghi, HA Jalab, KS Wong, D Uliyan, S Dadkhah Malaysian Journal of Computer Science 30 (2), 117-133, 2017 | 23 | 2017 |
A deep learning model to predict Student learning outcomes in LMS using CNN and LSTM AS Aljaloud, DM Uliyan, A Alkhalil, M Abd Elrhman, AFM Alogali, ... IEEE Access 10, 85255-85265, 2022 | 21 | 2022 |
Deep learning model to predict students retention using BLSTM and CRF D Uliyan, AS Aljaloud, A Alkhalil, HS Al Amer, MAEA Mohamed, ... IEEE Access 9, 135550-135558, 2021 | 18 | 2021 |
A Secret-Key Image Steganography Technique using Random Chain Codes DM Uliyan, MA Al-Husainy International Journal of Technology 10 (4), 731-740, 2019 | 16 | 2019 |
Mandible bone osteoporosis detection using cone-beam computed tomography RFA Marar, DM Uliyan, HA Al-Sewadi Engineering, Technology & Applied Science Research 10 (4), 6027-6033, 2020 | 13 | 2020 |
Image Encryption Technique based on the Entropy Value of a Random Block MAF Al-Husainy, DM Uliyan International Journal of Advanced Computer Science and Systems application 8 (7), 2017 | 10 | 2017 |
Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics. S Dadkhah, M Köppen, HA Jalab, S Sadeghi, AA Manaf, DM Uliyan Proceedings of the 6th International Conference on Pattern Recognition …, 2017 | 9 | 2017 |
A Smooth Textual Password Authentication Scheme Against Shoulder Surfing Attack DMU MOHAMMED A. FADHIL AL-HUSAINY Journal of Theoretical and Applied Information Technology 96 (9), 11, 2018 | 7 | 2018 |
Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor DM Uliyan, HA Jalab, A Abuarqoub, M Abu-Hashem Proceedings of the International Conference on Future Networks and …, 2017 | 7 | 2017 |
Image Steganography Technique Based on Extracted Chains from the Secret Key MA Husainy, DM Uliyan Journal Journal of Engineering and Applied Sciences 13 (11), 4235-4244, 2018 | 6 | 2018 |
Investigation of image forgery based on multiscale retinex under illumination variations DM Uliyan, MT Alshammari Forensic Imaging 22, 200385, 2020 | 5 | 2020 |
Detection of scaled region duplication image forgery using color based segmentation with LSB signature DM Uliyan, MAF Al-Husainy International Journal Of Advanced Computer Science And Applications 8 (5), 2017 | 5 | 2017 |
Evaluating the accuracy of data mining algorithms for detecting fake facebook profiles using rapidminer, weka, and orange M albayati, ahmad mousa altamimi, diaa Mohammed Uliyan Journal of theoretical and applied information technology 97 (7), 37-47, 2019 | 3 | 2019 |
Copy-move Image Forgery Detection Based on Gabor Descriptors and K-Means Clustering HMS Parvez, HA Jalab, R Ala’a, S Sadeghi, DM Uliyan 2018 International Conference on Smart Computing and Electronic Enterprise …, 2018 | 3 | 2018 |