Secure surveillance framework for IoT systems using probabilistic image encryption K Muhammad, R Hamza, J Ahmad, J Lloret, H Wang, SW Baik IEEE Transactions on Industrial Informatics 14 (8), 3679-3689, 2018 | 315 | 2018 |
A privacy-preserving cryptosystem for IoT E-healthcare R Hamza, Z Yan, K Muhammad, P Bellavista, F Titouna Information Sciences 527, 493-510, 2020 | 190 | 2020 |
Hash based encryption for keyframes of diagnostic hysteroscopy R Hamza, K Muhammad, N Arunkumar, G Ramirez-Gonzalez IEEE Access 6, 60160-60170, 2017 | 153 | 2017 |
Sensitive and energetic IoT access control for managing cloud electronic health records K Riad, R Hamza, H Yan IEEE Access 7, 86384-86393, 2019 | 107 | 2019 |
A novel pseudo random sequence generator for image-cryptographic applications R Hamza Journal of Information Security and Applications 35, 119-127, 2017 | 92 | 2017 |
A novel sensitive image encryption algorithm based on Zaslavsky chaotic map R Hamza, F Titouna Information Security Journal: A Global Perspective, 1-18, 2016 | 81 | 2016 |
Secure video summarization framework for personalized wireless capsule endoscopy R Hamza, K Muhammad, Z Lv, F Titouna Pervasive and Mobile Computing 41, 436-450, 2017 | 73 | 2017 |
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts AS Patil, R Hamza, A Hassan, N Jiang, H Yan, J Li Computers & Security 97, 101958, 2020 | 71 | 2020 |
A novel image encryption algorithm based on hybrid chaotic maps using a key image S Benaissi, N Chikouche, R Hamza Optik 272, 170316, 2023 | 41 | 2023 |
An efficient outsourced privacy preserving machine learning scheme with public verifiability A Hassan, R Hamza, H Yan, P Li IEEE Access 1 (PP(99)), 1-1, 2019 | 37 | 2019 |
An efficient cryptosystem for video surveillance in the internet of things environment R Hamza, A Hassan, T Huang, L Ke, H Yan Complexity 2019 (1), 1625678, 2019 | 34 | 2019 |
Towards secure big data analysis via fully homomorphic encryption algorithms R Hamza, A Hassan, A Ali, MB Bashir, SM Alqhtani, TM Tawfeeg, A Yousif Entropy 24 (4), 519, 2022 | 30 | 2022 |
Blockchain-PUF-based secure authentication protocol for Internet of Things AS Patil, R Hamza, H Yan, A Hassan, J Li Algorithms and Architectures for Parallel Processing: 19th International …, 2020 | 16 | 2020 |
Greedy firefly algorithm for optimizing job scheduling in iot grid computing A Yousif, SM Alqhtani, MB Bashir, A Ali, R Hamza, A Hassan, TM Tawfeeg Sensors 22 (3), 850, 2022 | 15 | 2022 |
A lightweight secure IoT surveillance framework based on DCT-DFRT algorithms R Hamza, A Hassan, AS Patil Machine Learning for Cyber Security: Second International Conference, ML4CS …, 2019 | 14 | 2019 |
A survey of intellectual property rights protection in big data applications R Hamza, H Pradana Algorithms 15 (11), 418, 2022 | 12 | 2022 |
Cloud dynamic load balancing and reactive fault tolerance techniques: a systematic literature review (SLR) TM Tawfeeg, A Yousif, A Hassan, SM Alqhtani, R Hamza, MB Bashir, A Ali IEEE Access 10, 71853-71873, 2022 | 10 | 2022 |
Research on privacy-preserving techniques in the era of the 5G applications. R Hamza, MS Dao Virtual Real. Intell. Hardw. 4 (3), 210-222, 2022 | 9* | 2022 |
Investigation on privacy-preserving techniques for personal data R Hamza, K Zettsu Proceedings of the 2021 ACM Workshop on Intelligent Cross-Data Analysis and …, 2021 | 8 | 2021 |
Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings X Chen, X Huang, J Zhang Springer Nature, 2019 | 8 | 2019 |