A big data approach to sentiment analysis using greedy feature selection with cat swarm optimization-based long short-term memory neural networks A Alarifi, A Tolba, Z Al-Makhadmeh, W Said The Journal of Supercomputing 76, 4414-4429, 2020 | 109 | 2020 |
MutantXL J Ding, J Buchmann, MSE Mohamed, W Mohamed, RP Weinmann Proceedings of the 1st international conference on Symbolic Computation and …, 2008 | 83 | 2008 |
Internet of things-based urban waste management system for smart cities using a Cuckoo Search Algorithm F Alqahtani, Z Al-Makhadmeh, A Tolba, W Said Cluster Computing 23, 1769-1780, 2020 | 81 | 2020 |
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy MSE Mohamed, WSAE Mohamed, J Ding, J Buchmann Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 …, 2008 | 80 | 2008 |
Proof of credibility: A blockchain approach for detecting and blocking fake news in social networks M Torky, E Nabil, W Said International Journal of Advanced Computer Science and Applications 10 (12), 2019 | 40 | 2019 |
IoT security based on iris verification using multi-algorithm feature level fusion scheme R Gad, AA Abd El-Latif, S Elseuofi, HM Ibrahim, M Elmezain, W Said 2019 2nd international conference on computer applications & information …, 2019 | 31 | 2019 |
MutantXL: Solving multivariate polynomial equations for cryptanalysis JA Buchmann, J Ding, MSE Mohamed, WSAE Mohamed Dagstuhl seminar proceedings, 2009 | 28 | 2009 |
PWXL: A parallel Wiedemann-XL algorithm for solving polynomial equations over GF (2) WSA Mohamed, J Ding, T Kleinjung, S Bulygin, J Buchmann Conference on Symbolic Computation and Cryptography, 89, 2010 | 20 | 2010 |
Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication AM Mostafa, M Ezz, MK Elbashir, M Alruily, E Hamouda, M Alsarhani, ... Applied Sciences 13 (19), 10871, 2023 | 19 | 2023 |
Blockchain-driven intelligent scheme for IoT-based public safety system beyond 5G networks T Rathod, NK Jadav, S Tanwar, R Sharma, A Tolba, MS Raboaca, ... Sensors 23 (2), 969, 2023 | 19 | 2023 |
Brain tumor segmentation using deep capsule network and latent-dynamic conditional random fields M Elmezain, A Mahmoud, DT Mosa, W Said Journal of Imaging 8 (7), 190, 2022 | 18 | 2022 |
Towards a hybrid immune algorithm based on danger theory for database security W Said, AM Mostafa IEEE Access 8, 145332-145362, 2020 | 13 | 2020 |
Explainable deep inherent learning for multi-classes skin lesion classification KM Hosny, W Said, M Elmezain, MA Kassem Applied Soft Computing 159, 111624, 2024 | 12 | 2024 |
Improvements for the XL algorithm with applications to algebraic cryptanalysis WSA Mohamed Universitäts-und Landesbibliothek Darmstadt, 2011 | 9 | 2011 |
Quantum machine learning‐based framework to detect heart failures in Healthcare 4.0 M Munshi, R Gupta, NK Jadav, Z Polkowski, S Tanwar, F Alqahtani, ... Software: Practice and Experience, 1-18, 2023 | 8 | 2023 |
A multi-factor authentication-based framework for identity management in cloud applications W Said, E Mostafa, MM Hassan, AM Mostafa Computers, Materials & Continua 71 (2), 3193-3209, 2022 | 7 | 2022 |
FedSL: A Communication Efficient Federated Learning With Split Layer Aggregation W Zhang, T Zhou, Q Lu, Y Yuan, A Tolba, W Said IEEE Internet of Things Journal, 2024 | 6 | 2024 |
Practical algebraic cryptanalysis for dragon-based cryptosystems J Buchmann, S Bulygin, J Ding, WSAE Mohamed, F Werner Cryptology and Network Security: 9th International Conference, CANS 2010 …, 2010 | 6 | 2010 |
Investigating epidemic growth of COVID-19 in saudi arabia based on time series models M Torky, MS Torky, A Ahmed, AE Hassanein, W Said International Journal of Advanced Computer Science and Applications 11 (12), 2020 | 5 | 2020 |
Breast Ultrasound Images Augmentation and Segmentation Using GAN with Identity Block and Modified U-Net 3+ M Alruily, W Said, AM Mostafa, M Ezz, M Elmezain Sensors 23 (20), 8599, 2023 | 4 | 2023 |