default search action
Bassem Abd-El-Atty
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Aceng Sambas, Miroslav Mahdal, Sundarapandian Vaidyanathan, Brisbane Ovilla-Martínez, Esteban Tlelo-Cuautle, Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Khaled Benkouider, Talal Bonny:
A New Hyperjerk System With a Half Line Equilibrium: Multistability, Period Doubling Reversals, Antimonotonocity, Electronic Circuit, FPGA Design, and an Application to Image Encryption. IEEE Access 12: 9177-9194 (2024) - 2023
- [j28]Xianhua Song, Guanglong Chen, Ahmed A. Abd El-Latif, Mudasir Ahmad Wani, Bassem Abd-El-Atty:
Quantum Geometric Transformation Based on QIRHSI Quantum Color images. IEEE Access 11: 21883-21899 (2023) - [j27]Bassem Abd-El-Atty, Mohammed Ahmed El-Affendi, Samia Allaoua Chelloug, Ahmed A. Abd El-Latif:
Double Medical Image Cryptosystem Based on Quantum Walk. IEEE Access 11: 69164-69176 (2023) - [j26]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty:
Adaptive Particle Swarm Optimization With Quantum-Inspired Quantum Walks for Robust Image Security. IEEE Access 11: 71143-71153 (2023) - [j25]Sundarapandian Vaidyanathan, Irene M. Moroz, Aceng Sambas, Bassem Abd-El-Atty, Ahmed A. Abd El-Latif:
Cryptographic applications of a new hyperchaotic system with a hidden attractor. Int. J. Comput. Appl. Technol. 72(4): 249-261 (2023) - [j24]Bassem Abd-El-Atty:
A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks. Neural Comput. Appl. 35(1): 773-785 (2023) - [j23]Bassem Abd-El-Atty, Ahmed A. Abd El-Latif:
Applicable image cryptosystem using bit-level permutation, particle swarm optimisation, and quantum walks. Neural Comput. Appl. 35(25): 18325-18341 (2023) - 2022
- [j22]Khaled Benkouider, Sundarapandian Vaidyanathan, Aceng Sambas, Esteban Tlelo-Cuautle, Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Ciro Fabian Bermudez-Marquez, Ibrahim Mohammed Sulaiman, Aliyu Muhammed Awwal, Poom Kumam:
A New 5-D Multistable Hyperchaotic System With Three Positive Lyapunov Exponents: Bifurcation Analysis, Circuit Design, FPGA Realization and Image Encryption. IEEE Access 10: 90111-90132 (2022) - [j21]Bassem Abd-El-Atty:
Quaternion with quantum walks for designing a novel color image cryptosystem. J. Inf. Secur. Appl. 71: 103367 (2022) - [j20]Li Li, Ahmed A. Abd El-Latif, Sajad Jafari, Karthikeyan Rajagopal, Fahimeh Nazarimehr, Bassem Abd-El-Atty:
Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold. Sensors 22(1): 334 (2022) - [j19]Nestor Tsafack, Akram Belazi, Bassem Abd-El-Atty, Md Nazish Aslam, Christos K. Volos, Jean De Dieu Nkapkop, Ahmed A. Abd El-Latif:
A New 4D Hyperchaotic System with Dynamics Analysis, Synchronization, and Application to Image Encryption. Symmetry 14(2): 424 (2022) - 2021
- [j18]Sundarapandian Vaidyanathan, Aceng Sambas, Bassem Abd-El-Atty, Ahmed A. Abd El-Latif, Esteban Tlelo-Cuautle, Omar Guillén-Fernández, Mustafa Mamat, Mohamad Afendee Mohamed, Murat Alçin, Murat Tuna, Ihsan Pehlivan, Ismail Koyuncu, Mohd Asrul Hery Ibrahim:
A 5-D Multi-Stable Hyperchaotic Two-Disk Dynamo System With No Equilibrium Point: Circuit Design, FPGA Realization and Applications to TRNGs and Image Encryption. IEEE Access 9: 81352-81369 (2021) - [j17]Sundarapandian Vaidyanathan, Aceng Sambas, Esteban Tlelo-Cuautle, Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Omar Guillén-Fernández, Khaled Benkouider, Mohamad Afendee Mohamed, Mustafa Mamat, Mohd Asrul Hery Ibrahim:
A New 4-D Multi-Stable Hyperchaotic System With No Balance Point: Bifurcation Analysis, Circuit Simulation, FPGA Realization and Image Cryptosystem. IEEE Access 9: 144555-144573 (2021) - [j16]Bassem Abd-El-Atty, Abdullah M. Iliyasu, Ahmed A. Abd El-Latif:
A Multi-Image Cryptosystem Using Quantum Walks and Chebyshev Map. Complex. 2021: 9424469:1-9424469:16 (2021) - [j15]Sundarapandian Vaidyanathan, Irene M. Moroz, Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Aceng Sambas:
A new multistable jerk system with Hopf bifurcations, its electronic circuit simulation and an application to image encryption. Int. J. Comput. Appl. Technol. 67(1): 29-46 (2021) - [j14]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Irfan Mehmood, Khan Muhammad, Salvador E. Venegas-Andraca, Jialiang Peng:
Quantum-Inspired Blockchain-Based Cybersecurity: Securing Smart Edge Utilities in IoT-Based Smart Cities. Inf. Process. Manag. 58(4): 102549 (2021) - [j13]Nestor Tsafack, Abdullah M. Iliyasu, Jean De Dieu Nkapkop, Zeric Tabekoueng Njitacke, Jacques Kengne, Bassem Abd-El-Atty, Akram Belazi, Ahmed A. Abd El-Latif:
A memristive RLC oscillator dynamics applied to image encryption. J. Inf. Secur. Appl. 61: 102944 (2021) - [j12]Ahmad Alanezi, Bassem Abd-El-Atty, Hoshang Kolivand, Ahmed A. Abd El-Latif, Basma Abd El-Rahiem, Syam Sankar, Hany S. Khalifa:
Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment. Secur. Commun. Networks 2021: 6615512:1-6615512:17 (2021) - 2020
- [j11]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Haitham Elwahsh, Md. Jalil Piran, Ali Kashif Bashir, Oh-Young Song, Wojciech Mazurczyk:
Providing End-to-End Security Using Quantum Walks in IoT Networks. IEEE Access 8: 92687-92696 (2020) - [j10]Aceng Sambas, Sundarapandian Vaidyanathan, Esteban Tlelo-Cuautle, Bassem Abd-El-Atty, Ahmed A. Abd El-Latif, Omar Guillén-Fernández, Sukono, Yuyun Hidayat, Gugun Gundara:
A 3-D Multi-Stable System With a Peanut-Shaped Equilibrium Curve: Circuit Design, FPGA Realization, and an Application to Image Encryption. IEEE Access 8: 137116-137132 (2020) - [j9]Nestor Tsafack, Syam Sankar, Bassem Abd-El-Atty, Jacques Kengne, K. C. Jithin, Akram Belazi, Irfan Mehmood, Ali Kashif Bashir, Oh-Young Song, Ahmed A. Abd El-Latif:
A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things. IEEE Access 8: 137731-137744 (2020) - [j8]Nestor Tsafack, Jacques Kengne, Bassem Abd-El-Atty, Abdullah M. Iliyasu, Kaoru Hirota, Ahmed A. Abd El-Latif:
Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf. Sci. 515: 191-217 (2020) - [j7]Bassem Abd-El-Atty, Abdullah M. Iliyasu, Haya Alaskar, Ahmed A. Abd El-Latif:
A Robust Quasi-Quantum Walks-based Steganography Protocol for Secure Transmission of Images on Cloud-based E-healthcare Platforms. Sensors 20(11): 3108 (2020) - [j6]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Wojciech Mazurczyk, Carol J. Fung, Salvador E. Venegas-Andraca:
Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario. IEEE Trans. Netw. Serv. Manag. 17(1): 118-131 (2020)
2010 – 2019
- 2019
- [j5]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk:
Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Future Gener. Comput. Syst. 100: 893-906 (2019) - [j4]Bassem Abd-El-Atty, Ahmed A. Abd El-Latif, Salvador E. Venegas-Andraca:
An encryption protocol for NEQR images based on one-particle quantum walks on a circle. Quantum Inf. Process. 18(9): 272 (2019) - [c3]Bassem Abd-El-Atty, Mohamed Amin, Ahmed A. Abd El-Latif, Hassan Ugail, Irfan Mehmood:
An Efficient Cryptosystem based on the Logistic-Chebyshev Map. SKIMA 2019: 1-6 - 2018
- [j3]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Muhammad Talha:
Robust Encryption of Quantum Medical Images. IEEE Access 6: 1073-1081 (2018) - [j2]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, M. Shamim Hossain, Samir Elmougy, Ahmed Ghoneim:
Secure Quantum Steganography Protocol for Fog Cloud Internet of Things. IEEE Access 6: 10332-10340 (2018) - [j1]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, M. Shamim Hossain, Md. Abdur Rahman, Atif Alamri, Brij B. Gupta:
Efficient Quantum Information Hiding for Remote Medical Image Sharing. IEEE Access 6: 21075-21083 (2018) - 2017
- [c2]Li Li, Bassem Abd-El-Atty, Ahmed A. Abd El-Latif, Ahmed Ghoneim:
Quantum color image encryption based on multiple discrete chaotic systems. FedCSIS 2017: 555-559 - 2016
- [c1]Bassem Abd-El-Atty, Ahmed A. Abd El-Latif, Mohamed Amin:
New Quantum Image Steganography Scheme with Hadamard Transformation. AISI 2016: 342-352
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 20:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint