default search action
Mohamed El Haziti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Ange Gabriel Belinga
, Stéphane Cédric Koumétio Tékouabou
, Mohamed El Haziti, Mohammed El Hassouni:
Knowledge Distillation in Image Classification: The Impact of Datasets. Comput. 13(8): 184 (2024) - 2023
- [c11]Ange Gabriel Beling, Mohamed El Haziti:
Comparative Analysis of Datasets for Response-based Knowledge Distillation in Image Classification. CiSt 2023: 688-691 - [i6]Ahmed Ibnoulouafi, Mohamed El Haziti, Hocine Cherifi:
M-Centrality: identifying key nodes based on global position and local degree variation. CoRR abs/2301.01256 (2023) - 2021
- [j6]Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, Mohammed El Hassouni:
A Hybrid Robust Image Watermarking Method Based on DWT-DCT and SIFT for Copyright Protection. J. Imaging 7(10): 218 (2021)
2010 – 2019
- 2019
- [j5]Mohamed Hamidi, Aladine Chetouani, Mohamed El Haziti, Mohammed El Hassouni, Hocine Cherifi
:
Blind Robust 3D Mesh Watermarking Based on Mesh Saliency and Wavelet Transform for Copyright Protection. Inf. 10(2): 67 (2019) - [c10]Mohamed Hamidi, Aladine Chetouani, Mohamed El Haziti, Mohammed El Hassouni, Hocine Cherifi:
Blind Robust 3-D Mesh Watermarking Based on Mesh Saliency and QIM Quantization for Copyright Protection. IbPRIA (1) 2019: 170-181 - [c9]Maryam Lafkih, Mounia Mikram, Sanaa Ghouzali, Mohamed El Haziti:
Evaluation of the Impact of Noise on Biometric Authentication Systems. ICAAI 2019: 188-192 - [c8]Mohamed Hamidi, Aladine Chetouani, Mohamed El Haziti, Mohammed El Hassouni, Hocine Cherifi:
A Robust Blind 3-D Mesh Watermarking Technique Based on SCS Quantization and Mesh Saliency for Copyright Protection. MSPN 2019: 211-228 - [i5]Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, Driss Aboutajdine:
A blind Robust Image Watermarking Approach exploiting the DFT Magnitude. CoRR abs/1910.11185 (2019) - [i4]Mohamed Hamidi, Aladine Chetouani, Mohamed El Haziti, Mohammed El Hassouni, Hocine Cherifi:
A Robust Blind 3-D Mesh Watermarking technique based on SCS quantization and mesh Saliency for Copyright Protection. CoRR abs/1910.11211 (2019) - [i3]Mohamed Hamidi, Aladine Chetouani, Mohamed El Haziti, Mohammed El Hassouni, Hocine Cherifi:
Blind Robust 3-D Mesh Watermarking based on Mesh Saliency and QIM quantization for Copyright Protection. CoRR abs/1910.12828 (2019) - [i2]Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, Mohammed El Hassouni:
Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform. CoRR abs/1911.00753 (2019) - [i1]Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, Driss Aboutajdine:
A Robust Blind 3-D Mesh Watermarking based on Wavelet Transform for Copyright Protection. CoRR abs/1911.03793 (2019) - 2018
- [j4]Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi
, Mohammed El Hassouni:
Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform. Multim. Tools Appl. 77(20): 27181-27214 (2018) - [c7]Bahae Abidi, Francisco Miguel Moreno, Mohamed El Haziti, Ahmed Hussein, Abdulla Al-Kaff, David Martín Gómez
:
Hybrid V2X Communication Approach using WiFi and 4G Connections. ICVES 2018: 1-5 - 2017
- [j3]Salma El Fellah
, Mohammed Rziza
, Mohamed El Haziti:
An Efficient Approach for Filling Gaps in Landsat 7 Satellite Images. IEEE Geosci. Remote. Sens. Lett. 14(1): 62-66 (2017) - [c6]Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi
, Driss Aboutajdine:
A robust blind 3-D mesh watermarking based on wavelet transform for copyright protection. ATSIP 2017: 1-6 - [c5]Salma El Fellah, Salwa Lagdali, Mohammed Rziza
, Mohamed El Haziti:
Noisy Satellite Image Segmentation Using Statistical Features. SCA 2017: 129-135 - [c4]Bahae Abidi, Abdelilah Jilbab
, Mohamed El Haziti:
A New Generation of Wireless Sensors Networks: Wireless Body Area Networks. WorldCIST (2) 2017: 384-393 - 2016
- [j2]Maryam Lafkih, Mounia Mikram, Sanaa Ghouzali, Mohamed El Haziti, Driss Aboutajdine:
Biometric cryptosystems based fuzzy commitment scheme: a security evaluation. Int. Arab J. Inf. Technol. 13(4): 443-449 (2016) - [j1]Sanaa Ghouzali, Maryam Lafkih, Wadood Abdul
, Mounia Mikram, Mohamed El Haziti, Driss Aboutajdine:
Trace Attack against Biometric Mobile Applications. Mob. Inf. Syst. 2016: 2065948:1-2065948:15 (2016) - 2015
- [c3]Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi
, Driss Aboutajdine:
A blind robust image watermarking approach exploiting the DFT magnitude. AICCSA 2015: 1-6 - [c2]Maryam Lafkih, Patrick Lacharme, Christophe Rosenberger
, Mounia Mikram, Sanaa Ghouzali
, Mohamed El Haziti, Driss Aboutajdine:
Vulnerabilities of fuzzy vault schemes using biometric data with traces. IWCMC 2015: 822-827 - 2012
- [c1]Maryam Lafkih, Mounia Mikram, Sanaa Ghouzali
, Mohamed El Haziti:
Security Analysis of Key Binding Biometric Cryptosystems. ICISP 2012: 269-281
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint