default search action
Akram Belazi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j12]Shilpa Choudhary, S. Sugumaran, Akram Belazi, Ahmed A. Abd El-Latif:
Linearly decreasing inertia weight PSO and improved weight factor-based clustering algorithm for wireless sensor networks. J. Ambient Intell. Humaniz. Comput. 14(6): 6661-6679 (2023) - 2022
- [j11]Akram Belazi, Sofiane Kharbech, Md Nazish Aslam, Muhammad Talha, Wei Xiang, Abdullah M. Iliyasu, Ahmed A. Abd El-Latif:
Improved Sine-Tangent chaotic map with application in medical images encryption. J. Inf. Secur. Appl. 66: 103131 (2022) - [j10]Nestor Tsafack, Akram Belazi, Bassem Abd-El-Atty, Md Nazish Aslam, Christos K. Volos, Jean De Dieu Nkapkop, Ahmed A. Abd El-Latif:
A New 4D Hyperchaotic System with Dynamics Analysis, Synchronization, and Application to Image Encryption. Symmetry 14(2): 424 (2022) - 2021
- [j9]Nestor Tsafack, Abdullah M. Iliyasu, Jean De Dieu Nkapkop, Zeric Tabekoueng Njitacke, Jacques Kengne, Bassem Abd-El-Atty, Akram Belazi, Ahmed A. Abd El-Latif:
A memristive RLC oscillator dynamics applied to image encryption. J. Inf. Secur. Appl. 61: 102944 (2021) - [j8]Héctor Migallón, Antonio Jimeno-Morenilla, Hector Rico, José-Luis Sánchez-Romero, Akram Belazi:
Multi-level parallel chaotic Jaya optimization algorithms for solving constrained engineering design problems. J. Supercomput. 77(11): 12280-12319 (2021) - 2020
- [j7]Nestor Tsafack, Syam Sankar, Bassem Abd-El-Atty, Jacques Kengne, K. C. Jithin, Akram Belazi, Irfan Mehmood, Ali Kashif Bashir, Oh-Young Song, Ahmed A. Abd El-Latif:
A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things. IEEE Access 8: 137731-137744 (2020) - [j6]Héctor Migallón, Antonio Jimeno-Morenilla, José-Luis Sánchez-Romero, Akram Belazi:
Efficient parallel and fast convergence chaotic Jaya algorithms. Swarm Evol. Comput. 56: 100698 (2020) - [j5]Sofiane Kharbech, Eric Pierre Simon, Akram Belazi, Wei Xiang:
Denoising Higher-Order Moments for Blind Digital Modulation Identification in Multiple-Antenna Systems. IEEE Wirel. Commun. Lett. 9(6): 765-769 (2020) - 2019
- [j4]Akram Belazi, Muhammad Talha, Sofiane Kharbech, Wei Xiang:
Novel Medical Image Encryption Scheme Based on Chaos and DNA Encoding. IEEE Access 7: 36667-36681 (2019) - [j3]Aslam Li, Akram Belazi, Sofiane Kharbech, Muhammad Talha, Wei Xiang:
Fourth Order MCA and Chaos-Based Image Encryption Scheme. IEEE Access 7: 66395-66409 (2019) - 2016
- [j2]Akram Belazi, Ahmed A. Abd El-Latif, Safya Belghith:
A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 128: 155-170 (2016) - 2014
- [j1]Houcemeddine Hermassi, Akram Belazi, Rhouma Rhouma, Safya Belghith:
Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multim. Tools Appl. 72(3): 2211-2224 (2014)
Conference and Workshop Papers
- 2022
- [c8]Sarra Ben Chaabane, Kais Bouallegue, Akram Belazi, Sofiane Kharbech, Ammar Bouallegue:
A hybrid Modified Black Widow Optimization and PSO Algorithm: Application in Feature Selection for Cognitive Radio Networks. APCC 2022: 18-23 - [c7]Sarra Ben Chaabane, Kais Bouallegue, Akram Belazi, Sofiane Kharbech, Ammar Bouallegue:
Chaotic Dingo Optimization Algorithm: Application in Feature Selection for Beamforming Aided Spectrum Sensing. ICCCI 2022: 660-673 - [c6]Sarra Ben Chaabane, Kais Bouallegue, Akram Belazi, Sofiane Kharbech, Ammar Bouallegue:
Smart Full-Exploitation of Beamforming Fusion assisted Spectrum Sensing for Cognitive Radio. WiMob 2022: 217-222 - 2020
- [c5]Oumeima Ghnimi, Sofiane Kharbech, Akram Belazi, Ammar Bouallegue:
Model selection for support-vector machines through metaheuristic optimization algorithms. ICMV 2020: 1160509 - [c4]Sarra Ben Chaabane, Sofiane Kharbech, Akram Belazi, Ammar Bouallegue:
Improved Whale optimization Algorithm for SVM Model Selection: Application in Medical Diagnosis. SoftCOM 2020: 1-6 - 2017
- [c3]Jialiang Peng, Ahmed A. Abd El-Latif, Akram Belazi, Zbigniew Kotulski:
Efficient chaotic nonlinear component for secure cryptosystems. ICUFN 2017: 989-993 - 2015
- [c2]Akram Belazi, Ahmed A. Abd El-Latif, Rhouma Rhouma, Safya Belghith:
Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. IWCMC 2015: 606-610 - [c1]Akram Belazi, Rhouma Rhouma, Safya Belghith:
A novel approach to construct S-box based on Rossler system. IWCMC 2015: 611-615
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-18 00:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint