default search action
Abdurahman Kadir
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Sardar Parhat, Mutallip Sattar, Askar Hamdulla, Abdurahman Kadir:
Uyghur-Kazakh-Kirghiz Text Keyword Extraction Based on Morpheme Segmentation. Inf. 14(5): 283 (2023) - 2021
- [j14]Hongjun Liu, Xingyuan Wang, Abdurahman Kadir:
Constructing chaos-based hash function via parallel impulse perturbation. Soft Comput. 25(16): 11077-11086 (2021) - 2020
- [j13]Hongjun Liu, Abdurahman Kadir, Chengbo Xu:
Cryptanalysis and constructing S-Box based on chaotic map and backtracking. Appl. Math. Comput. 376: 125153 (2020) - [j12]Hongjun Liu, Abdurahman Kadir, Chengbo Xu:
Color Image Encryption with Cipher Feedback and Coupling Chaotic Map. Int. J. Bifurc. Chaos 30(12): 2050173:1-2050173:14 (2020)
2010 – 2019
- 2019
- [j11]Hongjun Liu, Abdurahman Kadir, Jian Liu:
Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation. IEEE Access 7: 37211-37219 (2019) - [j10]Hongjun Liu, Yingqian Zhang, Abdurahman Kadir, Yanqiu Xu:
Image encryption using complex hyper chaotic system by injecting impulse into parameters. Appl. Math. Comput. 360: 83-93 (2019) - [j9]Hongjun Liu, Fengtong Wen, Abdurahman Kadir:
Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multim. Tools Appl. 78(12): 15997-16010 (2019) - 2018
- [j8]Hongjun Liu, Abdurahman Kadir, Xiaobo Sun, Yanling Li:
Chaos based adaptive double-image encryption scheme using hash function and S-boxes. Multim. Tools Appl. 77(1): 1391-1407 (2018) - 2017
- [j7]Hongjun Liu, Abdurahman Kadir, Xiaobo Sun:
Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Process. 11(5): 324-332 (2017) - 2016
- [j6]Guoyan Liu, Abdurahman Kadir, Hongjun Liu:
Color pathological image encryption scheme with S-boxes generated by complex chaotic system and environmental noise. Neural Comput. Appl. 27(3): 687-697 (2016) - 2015
- [j5]Hongjun Liu, Abdurahman Kadir:
Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process. 113: 104-112 (2015) - 2014
- [j4]Guoyan Liu, Hongjun Liu, Abdurahman Kadir:
Hiding message into DNA sequence through DNA coding and chaotic maps. Medical Biol. Eng. Comput. 52(9): 741-747 (2014) - 2013
- [j3]Hongjun Liu, Da Lin, Abdurahman Kadir:
A novel data hiding method based on deoxyribonucleic acid coding. Comput. Electr. Eng. 39(4): 1164-1173 (2013) - 2012
- [j2]Hongjun Liu, Xingyuan Wang, Abdurahman Kadir:
Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12(5): 1457-1466 (2012) - [j1]Guoyan Liu, Hongjun Liu, Abdurahman Kadir:
Wavelet-Based Color Pathological Image Watermark through Dynamically Adjusting the Embedding Intensity. Comput. Math. Methods Medicine 2012: 406349:1-406349:10 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint