关注
Rasha Elsayed Sakr
Rasha Elsayed Sakr
Assoc.Prof. at Computer Science Department, Faculty of Computers and Information Sciences, Mansoura
在 mans.edu.eg 的电子邮件经过验证
标题
引用次数
引用次数
年份
Optimizing hyperparameters of deep reinforcement learning for autonomous driving based on whale optimization algorithm
NM Ashraf, RR Mostafa, RH Sakr, MZ Rashad
Plos one 16 (6), e0252754, 2021
612021
Skin lesion segmentation and classification using conventional and deep learning based framework
A Bibi, MA Khan, MY Javed, U Tariq, BG Kang, Y Nam, RR Mostafa, ...
Comput. Mater. Contin 71 (2), 2477-2495, 2022
362022
An Ensemble of Optimal Deep Learning Features for Brain Tumor Classification.
A Aziz, M Attique, U Tariq, Y Nam, M Nazir, CW Jeong, RR Mostafa, ...
Computers, Materials & Continua 69 (2), 2021
292021
COVID19 Classification Using CT Images via Ensembles of Deep Learning Models.
A Majid, MA Khan, Y Nam, U Tariq, S Roy, RR Mostafa, RH Sakr
Computers, Materials & Continua 69 (1), 2021
292021
A state-of-the-art review of deep reinforcement learning techniques for real-time strategy games
NM Ashraf, RR Mostafa, RH Sakr, MZ Rashad
Applications of Artificial Intelligence in Business, Education and …, 2021
52021
An optimized technique for secure data over cloud os
RH Sakr, F Omara, O Nomir
International Journal of Emerging Trends & Technology in Computer Science …, 0
5
An ensemble of CNNs with self-attention mechanism for DeepFake video detection
K Omar, RH Sakr, MF Alrahmawy
Neural Computing and Applications 36 (6), 2749-2765, 2024
22024
Implementing and Comparing LIDBPP (Local Intrusion Detection by Bluff Probe Packet)
II Saada, MZ Rashad, RH Sakr
International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016
22016
Identifying the most accurate machine learning classification technique to detect network threats
RHSNH Mohamed Farouk
Neural Computing and Applications, 2024
2024
Authentication Using Fingerprint and Rivest-Shamir-Adleman Encryption in Mobile Ad Hoc Network
II Saada, RH Sakr, MZ Rashad
Journal of Computational and Theoretical Nanoscience 15 (8), 2510-2514, 2018
2018
A COMPARATIVE STUDY OF SECURITY ALGORITHMS FOR CLOUD COMPUTING
RHSF Omara, O Nomir
系统目前无法执行此操作,请稍后再试。
文章 1–11