Follow
Hisham Al-Assam
Title
Cited by
Cited by
Year
Evaluation of machine learning methods with Fourier Transform features for classifying ovarian tumors based on ultrasound images
J Martínez-Más, A Bueno-Crespo, S Khazendar, M Remezal-Solano, ...
PLoS One 14 (7), e0219388, 2019
552019
Automated characterisation of ultrasound images of ovarian tumours: the diagnostic accuracy of a support vector machine and image processing with a local binary pattern operator
S Khazendar, A Sayasneh, H Al-Assam, H Du, J Kaijser, L Ferrara, ...
Facts, views & vision in ObGyn 7 (1), 7, 2015
402015
Improving performance and security of biometrics using efficient and stable random projection techniques
S Jassim, H Al-Assam, H Sellahewa
2009 Proceedings of 6th International Symposium on Image and Signal …, 2009
402009
A lightweight approach for biometric template protection
H Al-Assam, H Sellahewa, S Jassim
Mobile Multimedia/Image Processing, Security, and Applications 2009 7351 …, 2009
402009
Automated classification of static ultrasound images of ovarian tumours based on decision level fusion
S Khazendar, H Al-Assam, H Du, S Jassim, A Sayasneh, T Bourne, ...
2014 6th Computer Science and Electronic Engineering Conference (CEEC), 148-153, 2014
282014
On security of multi-factor biometric authentication
H Al-Assam, H Sellahewa, S Jassim
2010 International Conference for Internet Technology and Secured …, 2010
282010
Security evaluation of biometric keys
H Al-Assam, S Jassim
computers & security 31 (2), 151-163, 2012
272012
Automatic spine curvature estimation from X-ray images of a mouse model
O Al Okashi, H Du, H Al-Assam
Computer methods and programs in biomedicine 140, 175-184, 2017
242017
Automated biometric authentication with cloud computing
H Al-Assam, W Hassan, S Zeadally
Biometric-based physical and cybersecurity systems, 455-475, 2019
222019
Multi-Factor Biometrics for Authentication: A false sense of security
H Al-Assam, H Sellahewa, S Jassim
Proceedings of the 12th ACM Workshop on Multimedia and Security, 81-88, 2010
202010
Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange
H Al-Assam, R Rashid, S Jassim
8th International Conference for Internet Technology and Secured …, 2013
172013
LocBiometrics: Mobile phone based multifactor biometric authentication with time and location assurance
I Lami, T Kuseler, H Al-Assam, SA Jassim
172010
An evaluation of the effectiveness of image-based texture features extracted from static B-mode ultrasound images in distinguishing between benign and malignant ovarian masses
D Al-Karawi, H Al-Assam, H Du, A Sayasneh, C Landolfo, D Timmerman, ...
Ultrasonic Imaging 43 (3), 124-138, 2021
122021
Exploiting relative entropy and quality analysis in cumulative partial biometric fusion
H Al-Assam, A Abboud, H Sellahewa, S Jassim
Transactions on Data Hiding and Multimedia Security VIII: Special Issue on …, 2012
122012
Accuracy and security evaluation of multi-factor biometric authentication
H Al-Assam, H Sellahewa, S Jassim
International Journal for Information Security Research 1 (1), 11-19, 2011
122011
Hidden assumption of face recognition evaluation under different quality conditions
H Al-Assam, A Abboud, S Jassim
International Conference on Information Society (i-Society 2011), 27-32, 2011
102011
Analysis of relative entropy, accuracy, and quality of face biometric
AJ Jassim, H Al-Assam, AJ Abboud, H Sellahewa
Proceedings of the Workshop on Pattern Recognition for IT, 2010
102010
Robust biometric based key agreement and remote mutual authentication
H Al-Assam, S Jassim
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
92012
Multi-factor challenge/response approach for remote biometric authentication
H Al-Assam, SA Jassim
Mobile Multimedia/Image Processing, Security, and Applications 2011 8063 …, 2011
82011
Challenge-response mutual authentication protocol for EMV contactless cards
O Al-Maliki, H Al-Assam
Computers & Security 103, 102186, 2021
72021
The system can't perform the operation now. Try again later.
Articles 1–20