BibTeX records: Mahmoud Emam

download as .bib file

@article{DBLP:journals/apin/JiangY0ME024,
  author       = {Yan Jiang and
                  Guisheng Yin and
                  Weipeng Jing and
                  Linda Mohaisen and
                  Mahmoud Emam and
                  Ye Yuan},
  title        = {Box-spoof attack against single object tracking},
  journal      = {Appl. Intell.},
  volume       = {54},
  number       = {2},
  pages        = {1585--1601},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10489-023-05264-2},
  doi          = {10.1007/S10489-023-05264-2},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/JiangY0ME024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/LuSSZXE24,
  author       = {Jianfeng Lu and
                  Mengtao Shi and
                  Chuhua Song and
                  Weihao Zhao and
                  Lifeng Xi and
                  Mahmoud Emam},
  title        = {Classifier-guided multi-style tile image generation method},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {36},
  number       = {1},
  pages        = {101899},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jksuci.2023.101899},
  doi          = {10.1016/J.JKSUCI.2023.101899},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/LuSSZXE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/ZahraAEE24,
  author       = {Aya Zahra and
                  Mohamed Amin and
                  Fathi E. Abd El{-}Samie and
                  Mahmoud Emam},
  title        = {Efficient utilization of deep learning for the detection of fabric
                  defects},
  journal      = {Neural Comput. Appl.},
  volume       = {36},
  number       = {11},
  pages        = {6037--6050},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00521-023-09137-0},
  doi          = {10.1007/S00521-023-09137-0},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/ZahraAEE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssc/AlmehriziE23,
  author       = {Rashid S. Almehrizi and
                  Mahmoud Emam},
  title        = {Asymptotic standard errors of intraclass correlation coefficients
                  for two-way model},
  journal      = {Commun. Stat. Simul. Comput.},
  volume       = {52},
  number       = {5},
  pages        = {2073--2092},
  year         = {2023},
  url          = {https://doi.org/10.1080/03610918.2021.1897624},
  doi          = {10.1080/03610918.2021.1897624},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cssc/AlmehriziE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiBCFGE23,
  author       = {Li Li and
                  Yu Bai and
                  Ching{-}Chun Chang and
                  Yunyuan Fan and
                  Wei Gu and
                  Mahmoud Emam},
  title        = {Anti-pruning multi-watermarking for ownership proof of steganographic
                  autoencoders},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103548},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103548},
  doi          = {10.1016/J.JISA.2023.103548},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiBCFGE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/ChenLZLECJWL23,
  author       = {Guangsheng Chen and
                  Hailiang Lu and
                  Weitao Zou and
                  Linhui Li and
                  Mahmoud Emam and
                  Xuebin Chen and
                  Weipeng Jing and
                  Jian Wang and
                  Chao Li},
  title        = {Spatiotemporal fusion for spectral remote sensing: {A} statistical
                  analysis and review},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {35},
  number       = {3},
  pages        = {259--273},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jksuci.2023.02.021},
  doi          = {10.1016/J.JKSUCI.2023.02.021},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/ChenLZLECJWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/staeors/ZhuJKEL23,
  author       = {Songyu Zhu and
                  Weipeng Jing and
                  Peilun Kang and
                  Mahmoud Emam and
                  Chao Li},
  title        = {Data Augmentation and Few-Shot Change Detection in Forest Remote Sensing},
  journal      = {{IEEE} J. Sel. Top. Appl. Earth Obs. Remote. Sens.},
  volume       = {16},
  pages        = {5919--5934},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSTARS.2023.3285389},
  doi          = {10.1109/JSTARS.2023.3285389},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/staeors/ZhuJKEL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/ZhangLDWCJE22,
  author       = {Xiaoyan Zhang and
                  Linhui Li and
                  Donglin Di and
                  Jian Wang and
                  Guangsheng Chen and
                  Weipeng Jing and
                  Mahmoud Emam},
  title        = {SERNet: Squeeze and Excitation Residual Network for Semantic Segmentation
                  of High-Resolution Remote Sensing Images},
  journal      = {Remote. Sens.},
  volume       = {14},
  number       = {19},
  pages        = {4770},
  year         = {2022},
  url          = {https://doi.org/10.3390/rs14194770},
  doi          = {10.3390/RS14194770},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/ZhangLDWCJE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sp/RenAZME21,
  author       = {Honge Ren and
                  Walid Atwa and
                  Haosu Zhang and
                  Shafiq Muhammad and
                  Mahmoud Emam},
  title        = {Frame Duplication Forgery Detection and Localization Algorithm Based
                  on the Improved Levenshtein Distance},
  journal      = {Sci. Program.},
  volume       = {2021},
  pages        = {5595850:1--5595850:10},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5595850},
  doi          = {10.1155/2021/5595850},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sp/RenAZME21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbea/OmaraEHZ17,
  author       = {Ibrahim Omara and
                  Mahmoud Emam and
                  Mohamed Hammad and
                  Wangmeng Zuo},
  editor       = {David Zhang and
                  Gautam Sethi and
                  Raymond N. J. Veldhuis and
                  Yasushi Yagi and
                  Andrew Beng Jin Teoh},
  title        = {Ear verification based on a novel local feature extraction},
  booktitle    = {Proceedings of the 2017 International Conference on Biometrics Engineering
                  and Application, {ICBEA} 2017, Hong Kong, Hong Kong, April 21-23,
                  2017},
  pages        = {28--32},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3077829.3077834},
  doi          = {10.1145/3077829.3077834},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icbea/OmaraEHZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icta/Al-HarthiE17,
  author       = {Aisha Salim Ali Al{-}Harthi and
                  Mahmoud Emam},
  title        = {Leadership of technology in inclusive practice},
  booktitle    = {6th International Conference on Information and Communication Technology
                  and Accessibility, {ICTA} 2017, Muscat, Oman, December 19-21, 2017},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICTA.2017.8336021},
  doi          = {10.1109/ICTA.2017.8336021},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icta/Al-HarthiE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icta/EmamKA17,
  author       = {Mahmoud Emam and
                  Khalf{-}Al{-}Abri and
                  Yasser Al{-}Mahdy},
  title        = {Assistive technology competencies in learning disability program candidates
                  at Sultan Qaboos University: {A} proposed model},
  booktitle    = {6th International Conference on Information and Communication Technology
                  and Accessibility, {ICTA} 2017, Muscat, Oman, December 19-21, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICTA.2017.8336014},
  doi          = {10.1109/ICTA.2017.8336014},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icta/EmamKA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/EmamHYZ16,
  author       = {Mahmoud Emam and
                  Qi Han and
                  Liyang Yu and
                  Hongli Zhang},
  title        = {A Keypoint-Based Region Duplication Forgery Detection Algorithm},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {9},
  pages        = {2413--2416},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2016EDL8024},
  doi          = {10.1587/TRANSINF.2016EDL8024},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/EmamHYZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/EmamHN16,
  author       = {Mahmoud Emam and
                  Qi Han and
                  Xiamu Niu},
  title        = {{PCET} based copy-move forgery detection in images under geometric
                  transforms},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {18},
  pages        = {11513--11527},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-015-2872-2},
  doi          = {10.1007/S11042-015-2872-2},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/EmamHN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycsee/EmamHZ16,
  author       = {Mahmoud Emam and
                  Qi Han and
                  Hongli Zhang},
  editor       = {Wanxiang Che and
                  Qilong Han and
                  Hongzhi Wang and
                  Weipeng Jing and
                  Shaoliang Peng and
                  Junyu Lin and
                  Guanglu Sun and
                  Xianhua Song and
                  Hongtao Song and
                  Zeguang Lu},
  title        = {Detection of Copy-Scale-Move Forgery in Digital Images Using {SFOP}
                  and {MROGH}},
  booktitle    = {Social Computing - Second International Conference of Young Computer
                  Scientists, Engineers and Educators, {ICYCSEE} 2016, Harbin, China,
                  August 20-22, 2016, Proceedings, Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {623},
  pages        = {326--334},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-981-10-2053-7\_29},
  doi          = {10.1007/978-981-10-2053-7\_29},
  timestamp    = {Thu, 15 Feb 2024 16:58:31 +0100},
  biburl       = {https://dblp.org/rec/conf/icycsee/EmamHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdip/EmamHYZN15,
  author       = {Mahmoud Emam and
                  Qi Han and
                  Liyang Yu and
                  Ye Zhang and
                  Xiamu Niu},
  editor       = {Charles M. Falco and
                  Xudong Jiang},
  title        = {A passive technique for detecting copy-move forgery with rotation
                  based on polar complex exponential transform},
  booktitle    = {Seventh International Conference on Digital Image Processing, {ICDIP}
                  2015, Los Angeles, CA, USA, April 9-10, 2015},
  series       = {{SPIE} Proceedings},
  volume       = {9631},
  pages        = {963104},
  publisher    = {{SPIE}},
  year         = {2015},
  url          = {https://doi.org/10.1117/12.2196997},
  doi          = {10.1117/12.2196997},
  timestamp    = {Fri, 22 Sep 2023 15:13:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icdip/EmamHYZN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics