Pair-polar coordinate-based cancelable fingerprint templates T Ahmad, J Hu, S Wang Pattern recognition 44 (10-11), 2555-2564, 2011 | 159 | 2011 |
A fingerprint based bio‐cryptographic security protocol designed for client/server authentication in mobile computing environment K Xi, T Ahmad, F Han, J Hu Security and communication networks 4 (5), 487-499, 2011 | 108 | 2011 |
Hybrid Association Rule Learning and Process Mining for Fraud Detection. R Sarno, RD Dewandono, T Ahmad, MF Naufal, F Sinaga IAENG International Journal of Computer Science 42 (2), 2015 | 81 | 2015 |
An efficient mobile voting system security scheme based on elliptic curve cryptography T Ahmad, J Hu, S Han 2009 Third International Conference on Network and System Security, 474-479, 2009 | 52 | 2009 |
Information hiding scheme for digital images using difference expansion and modulus function P Maniriho, T Ahmad Journal of King Saud University-Computer and Information Sciences 31 (3 …, 2019 | 42 | 2019 |
Fuzzy MADM approach for Rating of Process-based Fraud S Huda, R Sarno, T Ahmad Journal of ICT Research and Applications 9 (2), 111-128, 2015 | 39 | 2015 |
An Improved Quad and RDE-based Medical Data Hiding Method T Ahmad, M Holil, W Wibisono, RM Ijtihadie CYBERNETICSCOM, 141-145, 2013 | 36 | 2013 |
Generating cancelable biometrie templates using a projection line T Ahmad, J Hu 2010 11th International Conference on Control Automation Robotics & Vision, 7-12, 2010 | 34 | 2010 |
Falls detection and notification system using tri-axial accelerometer and gyroscope sensors of a smartphone W Wibisono, DN Arifin, BA Pratomo, T Ahmad, RM Ijtihadie 2013 Conference on Technologies and Applications of Artificial Intelligence …, 2013 | 32 | 2013 |
Identification of Process-based Fraud Patterns in Credit Application S Huda, T Ahmad, R Sarno, HA Santoso | 30 | 2014 |
String-based cancelable fingerprint templates T Ahmad, J Hu, S Wang 2011 6th IEEE Conference on Industrial Electronics and Applications, 1028-1033, 2011 | 25 | 2011 |
Increasing accuracy of process-based fraud detection using a behavior model S Huda, R Sarno, T Ahmad International Journal of Software Engineering and Its Applications 10 (5 …, 2016 | 23 | 2016 |
Increasing the capacity of the secret data using DEpixels blocks and adjusted RDE-based on grayscale images MHA Al Huti, T Ahmad, S Djanali 2015 International Conference on Information & Communication Technology and …, 2015 | 19 | 2015 |
Medical Record Protection with Improved GRDE Data Hiding Method on Audio Files. MB Andra, T Ahmad, T Usagawa Engineering Letters 25 (2), 2017 | 18 | 2017 |
Enhancing the Capability of Data Hiding Method Based on Reduced Difference Expansion. P Maniriho, T Ahmad Engineering Letters 26 (1), 2018 | 17 | 2018 |
Increasing performance of IDS by selecting and transforming features IZ Muttaqien, T Ahmad 2016 IEEE International Conference on Communication, Networks and Satellite …, 2016 | 16 | 2016 |
Secret data hiding by optimizing general smoothness difference expansion-based method M Holil, T Ahmad Journal of Theoretical and Applied Information Technology 72 (2), 155-163, 2015 | 16 | 2015 |
Cartesian and polar transformation-based cancelable fingerprint template T Ahmad, F Han IECON 2011-37th Annual Conference of the IEEE Industrial Electronics Society …, 2011 | 15 | 2011 |
Data preprocessing and feature selection for machine learning intrusion detection systems T Ahmad, MN Aziz ICIC Express Letter 13 (2), 93-101, 2019 | 14 | 2019 |
Audio data hiding based on sample value modification using modulus function MHA Al-Hooti, S Djanali, T Ahmad Journal of information processing systems 12 (3), 525-537, 2016 | 14 | 2016 |