Image scene geometry recognition using low-level features fusion at multi-layer deep CNN A Khan, A Chefranov, H Demirel Neurocomputing 440, 111-126, 2021 | 50 | 2021 |
White blood cell type identification using multi-layer convolutional features with an extreme-learning machine A Khan, A Eker, A Chefranov, H Demirel Biomedical Signal Processing and Control 69, 102932, 2021 | 44 | 2021 |
Hill cipher modification based on eigenvalues hcm-EE AY Mahmoud, AG Chefranov Proceedings of the 2nd international conference on Security of information …, 2009 | 41 | 2009 |
Hill cipher modification based on pseudo-random eigenvalues A Mahmoud, A Chefranov Applied Mathematics & Information Sciences 8 (2), 505, 2014 | 34 | 2014 |
One-time password authentication with infinite hash chains AG Chefranov Novel algorithms and techniques in telecommunications, automation and …, 2008 | 34 | 2008 |
Secure hill cipher modification shc-m AG Chefranov, A Elci, B Ors, B Preneel Proc. Of the First International Conference on Security of Information and …, 2008 | 27 | 2008 |
Secure hill cipher modification based on generalized permutation matrix SHC-GPM AY Mahmoud, AG Chefranov Information Sciences Letters, 91-102, 2012 | 23 | 2012 |
Hydrodynamic Methods and Exact Solutions in Application to the Electromagnetic Field Theory in Medium SG Chefranov, AS Chefranov Nonlinear Optics-Novel Results in Theory and Applications, 2018 | 21 | 2018 |
A hill cipher modification based on eigenvalues extension with dynamic key size hcm-exdks AY Mahmoud, AG Chefranov International Journal of Computer Network and Information Security 6 (5), 57, 2014 | 21 | 2014 |
Secure Hill cipher modifications and key exchange protocol AY Mahmoud, AG Chefranov 2010 IEEE international conference on automation, quality and testing …, 2010 | 21 | 2010 |
Elgamal public key cryptosystem and signature scheme in GU (m, p, n) AG Chefranov, AY Mahmoud Proceedings of the 3rd international conference on Security of information …, 2010 | 20 | 2010 |
Encryption schemes with hyper-complex number systems and their hardware-oriented implementation E Doukhnitch, AG Chefranov, A Mahmoud Theory and Practice of Cryptography Solutions for Secure Information Systems …, 2013 | 18 | 2013 |
Hill cipher modification based on pseudo-random eigen values HCM-PRE YM Ahmed, A Chefranov Applied Mathematics and Information Sciences (SCI-E) 8 (2), 505-516, 2011 | 18 | 2011 |
Commutative matrix-based Diffie-Hellman-like key-exchange protocol AG Chefranov, AY Mahmoud Information Sciences and Systems 2013: Proceedings of the 28th International …, 2013 | 16 | 2013 |
The new exact solution of the compressible 3D Navier–Stokes equations SG Chefranov, AS Chefranov Communications in Nonlinear Science and Numerical Simulation 83, 105118, 2020 | 15 | 2020 |
Countering wrapping attack on XML signature in SOAP message for cloud computing HR Kouchaksaraei, AG Chefranov arXiv preprint arXiv:1310.0441, 2013 | 14 | 2013 |
Adaptive to pixel value and pixel value difference irreversible spatial data hiding method using modified LSB for grayscale images AG Chefranov, G Öz Journal of Information Security and Applications 70, 103314, 2022 | 13 | 2022 |
Point vortices dynamics on a rotating sphere and modeling of global atmospheric vortices interaction II Mokhov, SG Chefranov, AG Chefranov Physics of Fluids 32 (10), 2020 | 13 | 2020 |
Exact solution of the compressible Euler–Helmholtz equation and the millennium prize problem generalization SG Chefranov, AS Chefranov Physica Scripta 94 (5), 054001, 2019 | 13 | 2019 |
Pseudo-random number generator RC4 period improvement AG Chefranov, TA Mazurova 2006 IEEE international conference on automation, quality and testing …, 2006 | 12 | 2006 |