Login / Signup
Akram Belazi
ORCID
Publication Activity (10 Years)
Years Active: 2014-2023
Publications (10 Years): 19
Top Topics
Engineering Design Problems
Image Encryption
Optimization Algorithm
Feature Selection
Top Venues
IEEE Access
IWCMC
J. Inf. Secur. Appl.
Swarm Evol. Comput.
</>
Publications
</>
Shilpa Choudhary
,
S. Sugumaran
,
Akram Belazi
,
Ahmed A. Abd El-Latif
Linearly decreasing inertia weight PSO and improved weight factor-based clustering algorithm for wireless sensor networks.
J. Ambient Intell. Humaniz. Comput.
14 (6) (2023)
Sarra Ben Chaabane
,
Kais Bouallegue
,
Akram Belazi
,
Sofiane Kharbech
,
Ammar Bouallegue
Smart Full-Exploitation of Beamforming Fusion assisted Spectrum Sensing for Cognitive Radio.
WiMob
(2022)
Akram Belazi
,
Sofiane Kharbech
,
Md Nazish Aslam
,
Muhammad Talha
,
Wei Xiang
,
Abdullah M. Iliyasu
,
Ahmed A. Abd El-Latif
Improved Sine-Tangent chaotic map with application in medical images encryption.
J. Inf. Secur. Appl.
66 (2022)
Sarra Ben Chaabane
,
Kais Bouallegue
,
Akram Belazi
,
Sofiane Kharbech
,
Ammar Bouallegue
A hybrid Modified Black Widow Optimization and PSO Algorithm: Application in Feature Selection for Cognitive Radio Networks.
APCC
(2022)
Tsafack Nestor
,
Akram Belazi
,
Bassem Abd-El-Atty
,
Md Nazish Aslam
,
Christos K. Volos
,
Jean De Dieu Nkapkop
,
Ahmed A. Abd El-Latif
A New 4D Hyperchaotic System with Dynamics Analysis, Synchronization, and Application to Image Encryption.
Symmetry
14 (2) (2022)
Sarra Ben Chaabane
,
Kais Bouallegue
,
Akram Belazi
,
Sofiane Kharbech
,
Ammar Bouallegue
Chaotic Dingo Optimization Algorithm: Application in Feature Selection for Beamforming Aided Spectrum Sensing.
ICCCI
(2022)
Nestor Tsafack
,
Abdullah M. Iliyasu
,
Jean De Dieu Nkapkop
,
Zeric Tabekoueng Njitacke
,
Jacques Kengne
,
Bassem Abd-El-Atty
,
Akram Belazi
,
Ahmed A. Abd El-Latif
A memristive RLC oscillator dynamics applied to image encryption.
J. Inf. Secur. Appl.
61 (2021)
Héctor Migallón
,
Antonio Jimeno-Morenilla
,
Hector Rico
,
José-Luis Sánchez-Romero
,
Akram Belazi
Multi-level parallel chaotic Jaya optimization algorithms for solving constrained engineering design problems.
J. Supercomput.
77 (11) (2021)
Sarra Ben Chaabane
,
Sofiane Kharbech
,
Akram Belazi
,
Ammar Bouallegue
Improved Whale optimization Algorithm for SVM Model Selection: Application in Medical Diagnosis.
SoftCOM
(2020)
Sofiane Kharbech
,
Eric Pierre Simon
,
Akram Belazi
,
Wei Xiang
Denoising Higher-Order Moments for Blind Digital Modulation Identification in Multiple-Antenna Systems.
IEEE Wirel. Commun. Lett.
9 (6) (2020)
Héctor Migallón
,
Antonio Jimeno-Morenilla
,
José-Luis Sánchez-Romero
,
Akram Belazi
Efficient parallel and fast convergence chaotic Jaya algorithms.
Swarm Evol. Comput.
56 (2020)
Oumeima Ghnimi
,
Sofiane Kharbech
,
Akram Belazi
,
Ammar Bouallegue
Model selection for support-vector machines through metaheuristic optimization algorithms.
ICMV
(2020)
Nestor Tsafack
,
Syam Sankar
,
Bassem Abd-El-Atty
,
Jacques Kengne
,
K. C. Jithin
,
Akram Belazi
,
Irfan Mehmood
,
Ali Kashif Bashir
,
Oh-Young Song
,
Ahmed A. Abd El-Latif
A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things.
IEEE Access
8 (2020)
Akram Belazi
,
Muhammad Talha
,
Sofiane Kharbech
,
Wei Xiang
Novel Medical Image Encryption Scheme Based on Chaos and DNA Encoding.
IEEE Access
7 (2019)
Aslam Li
,
Akram Belazi
,
Sofiane Kharbech
,
Muhammad Talha
,
Wei Xiang
Fourth Order MCA and Chaos-Based Image Encryption Scheme.
IEEE Access
7 (2019)
Jialiang Peng
,
Ahmed A. Abd El-Latif
,
Akram Belazi
,
Zbigniew Kotulski
Efficient chaotic nonlinear component for secure cryptosystems.
ICUFN
(2017)
Akram Belazi
,
Ahmed A. Abd El-Latif
,
Safya Belghith
A novel image encryption scheme based on substitution-permutation network and chaos.
Signal Process.
128 (2016)
Akram Belazi
,
Rhouma Rhouma
,
Safya Belghith
A novel approach to construct S-box based on Rossler system.
IWCMC
(2015)
Akram Belazi
,
Ahmed A. Abd El-Latif
,
Rhouma Rhouma
,
Safya Belghith
Selective image encryption scheme based on DWT, AES S-box and chaotic permutation.
IWCMC
(2015)
Houcemeddine Hermassi
,
Akram Belazi
,
Rhouma Rhouma
,
Safya Belghith
Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps.
Multim. Tools Appl.
72 (3) (2014)