default search action
Said Sadoudi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Zeghdoud Sabrina, Camel Tanougast, Djamal Teguig, Ammar Mesloub, Said Sadoudi, Belqassim Bouteghrine:
SDR implementation of wideband spectrum sensing using machine learning. Int. J. Commun. Syst. 37(16) (2024) - [j19]Azzedine Bensaad, Khaled Loukhaoukha, Said Sadoudi, Aissa Snani:
Copy-move forgery detection algorithm based on binarized statistical image features and principal component analysis. J. Electronic Imaging 33(4) (2024) - 2023
- [j18]Moundher Messaadi, Said Sadoudi, Achour Ouslimani, Djamel Teguig, Hichem Bendecheche:
Chaotic RF Generator for Sub-1-GHz Chaos-Based Communication Systems: Mathematical Modeling and Experimental Validation. J. Circuits Syst. Comput. 32(1): 2350002:1-2350002:32 (2023) - [j17]Houssem Benimam, Said Sadoudi, Djamel Teguig:
Software defined radio implementation of a secure waveform for real-time data transmission using universal software radio peripheral. Secur. Priv. 6(3) (2023) - [c12]Noureddine Aissaoui, Fethi Demim, Abdenebi Rouigueb, Hadjira Belaidi, Ali Zakaria Messaoui, Kahina Louadj, Abdelkrim Nemra, Ahmed Allam, Yasmine Saidi, Said Sadoudi, Mohamed Salah Azzaz:
Secured Communication of Speech Signal Using the Discrete Cosine Transform Based on Hyperchaos-System. ICINCO (2) 2023: 69-76 - 2022
- [j16]Ilyas Benkhaddra, Mohammed Raouf Senouci, Abdelkader Senouci, Camel Tanougast, Said Sadoudi, Hang Lei:
An Efficient and Reliable Chaos-Based IoT Security Core for UDP/IP Wireless Communication. IEEE Access 10: 49625-49656 (2022) - [j15]Ilyas Benkhaddra, Mohammed Raouf Senouci, Sid Ali Madoune, Abdelkader Senouci, Camel Tanougast, Said Sadoudi, Hang Lei:
High randomness hyperchaos-based parameterizable TRNG: Design, FPGA implementation and exhaustive security analysis. Displays 74: 102274 (2022) - [j14]Hichem Bendecheche, Said Sadoudi, Djamel Teguig, Moundher Messaadi:
Efficient jamming attack against MIMO transceiver. Digit. Signal Process. 127: 103593 (2022) - [j13]Mahieddine Anouar Hadjadj, Said Sadoudi, Mohamed Salah Azzaz, Hichem Bendecheche, Redouane Kaibou:
A new hardware architecture of lightweight and efficient real-time video chaos-based encryption algorithm. J. Real Time Image Process. 19(6): 1049-1062 (2022) - [j12]Mohamed Lamine Benseddik, Khalil Zebbiche, Mohamed Salah Azzaz, Said Sadoudi:
Interpolation-based reversible data hiding in the transform domain for fingerprint images. Multim. Tools Appl. 81(14): 20329-20356 (2022) - [j11]Hichem Bendecheche, Said Sadoudi, Djamel Teguig:
The impact of intentional interference on the performances of ML detector in MIMO systems. Phys. Commun. 52: 101663 (2022) - [c11]Hamza Bouchendouka, Djamel Teguig, Said Sadoudi:
SDR Implementation of WIFI Attacks Using GNURadio. CSA 2022: 299-309 - 2021
- [j10]Belqassim Bouteghrine, Camel Tanougast, Said Sadoudi:
Design and FPGA Implementation of New Multidimensional Chaotic Map for Secure Communication. J. Circuits Syst. Comput. 30(15): 2150280:1-2150280:23 (2021) - [j9]Belqassim Bouteghrine, Camel Tanougast, Said Sadoudi:
Novel image encryption algorithm based on new 3-d chaos map. Multim. Tools Appl. 80(17): 25583-25605 (2021) - 2020
- [j8]Djamel Teguig, Mohamed Salah Azzaz, Said Sadoudi:
Analysis study and SDR implementation of GoF-based spectrum sensing for cognitive radio. IET Commun. 14(5): 857-864 (2020) - [j7]Mustapha Réda Senouci, Said Sadoudi, Badis Djamaa, Mohamed Abdelkrim Senouci:
A lightweight efficient chaos-based cryptosystem for constrained-node networks. Int. J. Commun. Syst. 33(10) (2020) - [c10]Mohamed Lamine Benseddik, Khalil Zebbiche, Mohamed Salah Azzaz, Said Sadoudi:
Perceptual Masking Model Using Lifting Wavelet Transform for Fingerprint Images. CSA 2020: 175-184
2010 – 2019
- 2019
- [c9]Belqassim Bouteghrine, Mohammed Rabiai, Camel Tanougast, Said Sadoudi:
Hardware Implementation of Secured Socket Communication based on Chaotic Cryptosystem. Cyber Security 2019: 1-4 - [c8]Belqassim Bouteghrine, Mohammed Rabiai, Camel Tanougast, Said Sadoudi:
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem. IDAACS 2019: 384-387 - 2018
- [j6]Said Sadoudi, Ibrahim Fennouh, Camel Tanougast:
Hyperchaos-Based Spreading Codes Generator for DS-CDMA Communication Systems. J. Circuits Syst. Comput. 27(13): 1850207:1-1850207:23 (2018) - 2017
- [j5]Ammar Mesloub, Arezki Boukhelifa, Omar Merad, Said Sadoudi, Arezki Younsi, Mustapha Djeddou:
Chip Averaging Chaotic ON-OFF Keying: A New Non-Coherent Modulation for Ultra Wide Band Direct Chaotic Communication. IEEE Commun. Lett. 21(10): 2166-2169 (2017) - 2014
- [c7]Said Sadoudi, Mohamed Salah Azzaz, Camel Tanougast:
Novel experimental synchronization technique for embedded chaotic communications. CoDIT 2014: 669-672 - [c6]Tarek Hadjem, Mohamed Salah Azzaz, Camel Tanougast, Said Sadoudi:
A new image crypto-compression system SPIHT-PSCS. CoDIT 2014: 706-711 - 2013
- [j4]Mohamed Salah Azzaz, Camel Tanougast, Said Sadoudi, Rabiai Fellah, Abbas Dandache:
A new auto-switched chaotic system and its FPGA implementation. Commun. Nonlinear Sci. Numer. Simul. 18(7): 1792-1804 (2013) - [j3]Mohamed Salah Azzaz, Camel Tanougast, Said Sadoudi, Ahmed Bouridane:
Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption. Commun. Nonlinear Sci. Numer. Simul. 18(8): 2035-2047 (2013) - [j2]Said Sadoudi, Camel Tanougast, Mohamed S. Azzaz, Abbas Dandache:
Design and FPGA implementation of a wireless hyperchaotic communication system for secure real-time image transmission. EURASIP J. Image Video Process. 2013: 43 (2013) - [j1]Mohamed S. Azzaz, Camel Tanougast, Said Sadoudi, Abbas Dandache:
Robust chaotic key stream generator for real-time images encryption. J. Real Time Image Process. 8(3): 297-306 (2013) - [c5]Said Sadoudi, Camel Tanougast, Mohamed S. Azzaz, Abbas Dandache:
Embedded hyperchaotic Lorenz generator for secure communications. NEWCAS 2013: 1-4 - 2011
- [c4]Mohamed S. Azzaz, Camel Tanougast, Said Sadoudi, Abbas Dandache:
New hardware Cryptosystem based chaos for the secure real-time of embedded applications. SiPS 2011: 251-254 - 2010
- [c3]Said Sadoudi, Camel Tanougast, Mohamed S. Azzaz, Abbas Dandache, Ahmed Bouridane:
Embedded Genesio-Tesi chaotic generator for ciphering communications. CSNDSP 2010: 234-238 - [c2]Mohamed S. Azzaz, Camel Tanougast, Said Sadoudi, Ahmed Bouridane, Abbas Dandache:
An FPGA implementation of a Feed-Back Chaotic Synchronization for secure communications. CSNDSP 2010: 239-243
2000 – 2009
- 2009
- [c1]Said Sadoudi, Mohamed S. Azzaz, Camel Tanougast, Abbas Dandache:
Real time hardware implementation of a new Duffing's chaotic attractor. ICECS 2009: 559-562
Coauthor Index
aka: Mohamed Salah Azzaz
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint