default search action
Vasif V. Nabiyev
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Ugur Turhal, Asuman Günay Yilmaz, Vasif V. Nabiyev:
A new face presentation attack detection method based on face-weighted multi-color multi-level texture features. Vis. Comput. 40(3): 1537-1552 (2024) - 2023
- [j24]Seçkin Yilmaz, Vasif V. Nabiyev:
Comprehensive survey of the solving puzzle problems. Comput. Sci. Rev. 50: 100586 (2023) - [j23]Muharrem Aydin, Hasan Karal, Vasif V. Nabiyev:
Examination of adaptation components in serious games: a systematic review study. Educ. Inf. Technol. 28(6): 6541-6562 (2023) - [j22]Asuman Günay Yilmaz, Ugur Turhal, Vasif V. Nabiyev:
Face presentation attack detection performances of facial regions with multi-block LBP features. Multim. Tools Appl. 82(26): 40039-40063 (2023) - [j21]Esra Odabas Yildirim, Gul Tahaoglu, Güzin Ulutas, Beste Ustubioglu, Vasif V. Nabiyev:
Color Image Splicing Localization Based on Block Classification Using Transition Probability Matrix. Wirel. Pers. Commun. 129(3): 1893-1919 (2023) - [j20]Gul Tahaoglu, Beste Ustubioglu, Güzin Ulutas, Mustafa Ulutas, Vasif V. Nabiyev:
Robust Copy-Move Forgery Detection Technique Against Image Degradation and Geometric Distortion Attacks. Wirel. Pers. Commun. 131(4): 2919-2947 (2023) - 2022
- [j19]Zafer Durakli, Vasif V. Nabiyev:
A new approach based on Bezier curves to solve path planning problems for mobile robots. J. Comput. Sci. 58: 101540 (2022) - [j18]Rabeb Hendaoui, Vasif V. Nabiyev:
An end-to-end neural network for detecting hidden people in images based on multiple attention network. Multim. Tools Appl. 81(13): 18531-18542 (2022) - [j17]Gul Tahaoglu, Güzin Ulutas, Beste Ustubioglu, Mustafa Ulutas, Vasif V. Nabiyev:
Ciratefi based copy move forgery detection on digital images. Multim. Tools Appl. 81(16): 22867-22902 (2022) - 2021
- [j16]Gul Tahaoglu, Güzin Ulutas, Beste Ustubioglu, Vasif V. Nabiyev:
Improved copy move forgery detection method via L*a*b* color space and enhanced localization technique. Multim. Tools Appl. 80(15): 23419-23456 (2021) - [j15]Sayyad Alizadeh, Hossein Barghi Jond, Vasif V. Nabiyev, Cemal Köse:
Automatic Retrieval of Shoeprints Using Modified Multi-Block Local Binary Pattern. Symmetry 13(2): 296 (2021) - [c28]Erkan Bayram, Vasif V. Nabiyev:
Classification of Camouflage Images Using Local Binary Patterns (LBP). SIU 2021: 1-4
2010 – 2019
- 2019
- [j14]Asuman Günay, Vasif V. Nabiyev:
A novel age classification method using morph-based models. Int. Arab J. Inf. Technol. 16(4): 677-685 (2019) - 2018
- [j13]Hossein Barghi Jond, Vasif V. Nabiyev, Nurhan Gürsel Özmen, Dalibor Lukás:
Existence of Nash equilibrium in differential Game Approach to formation control. Int. J. Robotics Autom. 33(4) (2018) - [j12]Güzin Ulutas, Beste Ustubioglu, Mustafa Ulutas, Vasif V. Nabiyev:
Frame duplication detection based on BoW model. Multim. Syst. 24(5): 549-567 (2018) - [j11]Asuman Günay, Vasif V. Nabiyev:
A new facial age estimation method using centrally overlapped block based local texture features. Multim. Tools Appl. 77(6): 6555-6581 (2018) - [c27]Beste Ustubioglu, Güzin Ulutas, Vasif V. Nabiyev, Mustafa Ulutas, Arda Ustubioglu:
Using correlation matrix to detect frame duplication forgery in videos. SIU 2018: 1-4 - 2017
- [j10]Güzin Ulutas, Beste Ustubioglu, Mustafa Ulutas, Vasif V. Nabiyev:
Frame duplication/mirroring detection method with binary features. IET Image Process. 11(5): 333-342 (2017) - [j9]Güzin Ulutas, Arda Ustubioglu, Beste Ustubioglu, Vasif V. Nabiyev, Mustafa Ulutas:
Medical Image Tamper Detection Based on Passive Image Authentication. J. Digit. Imaging 30(6): 695-709 (2017) - [c26]Beste Ustubioglu, Güzin Ulutas, Vasif V. Nabiyev, Mustafa Ulutas, Arda Ustubioglu:
A fast detection method for frame duplication forgery based on correlation. SIU 2017: 1-4 - 2016
- [j8]Ergün Yücesoy, Vasif V. Nabiyev:
A new approach with score-level fusion for the classification of a speaker age and gender. Comput. Electr. Eng. 53: 29-39 (2016) - [c25]Asuman Günay, Vasif V. Nabiyev:
Facial age estimation using spatial Weber Local Descriptor. TSP 2016: 466-469 - 2015
- [c24]Beste Ustubioglu, Güzin Ulutas, Mustafa Ulutas, Vasif V. Nabiyev, Arda Ustubioglu:
LBP-DCT Based Copy Move Forgery Detection Algorithm. ISCIS 2015: 127-136 - [c23]Asuman Günay, Vasif V. Nabiyev:
Age Estimation Based on Hybrid Features of Facial Images. ISCIS 2015: 295-304 - [c22]Burçin Kurt, Vasif V. Nabiyev, Kemal Turhan:
A Novel Algorithm for Segmentation of Suspicious Microcalcification Regions on Mammograms. IWBBIO (1) 2015: 222-230 - [c21]Asuman Günay, Vasif V. Nabiyev:
Age estimation using hybrid features of facial images. SIU 2015: 702-705 - [c20]Ergün Yücesoy, Vasif V. Nabiyev:
Age and gender recognition of a speaker from short-duration phone conversations. SIU 2015: 751-754 - [c19]Beste Ustubioglu, Güzin Ulutas, Vasif V. Nabiyev, Mustafa Ulutas:
Image forgery detection based on energy probability. SIU 2015: 919-922 - [c18]Beste Ustubioglu, Vasif V. Nabiyev, Güzin Ulutas, Mustafa Ulutas:
Image forgery detection using colour moments. TSP 2015: 540-544 - 2014
- [j7]Burçin Kurt, Vasif V. Nabiyev, Kemal Turhan:
A novel automatic suspicious mass regions identification using Havrda & Charvat entropy and Otsu's N thresholding. Comput. Methods Programs Biomed. 114(3): 349-360 (2014) - [c17]Burçin Kurt, Vasif V. Nabiyev, Kemal Turhan:
Comparison of Enhancement Methods for Mammograms with Performance Measures. MIE 2014: 486-490 - [c16]Ergün Yücesoy, Vasif V. Nabiyev:
Comparison of MFCC, LPCC and PLP features for the determination of a speaker's gender. SIU 2014: 321-324 - [c15]Hossein Barghi Jond, Vasif V. Nabiyev, Adel Akbarimajd:
Planning of mobile robots under limitted velocity and acceleration. SIU 2014: 1579-1582 - [c14]Beste Gencturk, Vasif V. Nabiyev, Güzin Ulutas, Mustafa Ulutas:
A hybrid image authentication method robust to JPEG attacks. SIU 2014: 1596-1599 - [c13]Katira Soleymanzadeh, Vasif V. Nabiyev:
Nested compartment secret image sharing scheme. SIU 2014: 2074-2077 - 2013
- [j6]Mustafa Ulutas, Güzin Ulutas, Vasif V. Nabiyev:
Invertible secret image sharing for gray level and dithered cover images. J. Syst. Softw. 86(2): 485-500 (2013) - [j5]Güzin Ulutas, Mustafa Ulutas, Vasif V. Nabiyev:
Secret image sharing scheme with adaptive authentication strength. Pattern Recognit. Lett. 34(3): 283-291 (2013) - [c12]Burçin Kurt, Vasif V. Nabiyev, Kemal Turhan:
Automatic Microcalcification Segmentation Using Rough Entropy and Fuzzy Approach. ITBAM 2013: 103-105 - [c11]Beste Gencturk, Vasif V. Nabiyev, Arda Ustubioglu:
ACromegaly Pre-Diagnosis Based On Principal Component And Linear Discriminant Analysis. SIU 2013: 1-4 - [c10]Güzin Ulutas, Mustafa Ulutas, Vasif V. Nabiyev:
Copy move forgery detection based on LBP. SIU 2013: 1-4 - [c9]Ergün Yücesoy, Vasif V. Nabiyev:
Gender identification of a speaker from voice source. SIU 2013: 1-4 - [c8]Beste Gencturk, Vasif V. Nabiyev, Arda Ustubioglu, Seniha Ketenci:
Automated pre-diagnosis of Acromegaly disease using Local Binary Patterns and its variants. TSP 2013: 817-821 - 2012
- [c7]Asuman Günay, Vasif V. Nabiyev:
Age Estimation Based on Local Radon Features of Facial Images. ISCIS 2012: 183-190 - [c6]Vasif V. Nabiyev, Beste Gencturk:
Similarity assessment with local binary patterns. SIU 2012: 1-4 - [c5]Güzin Ulutas, Mustafa Ulutas, Vasif V. Nabiyev:
A new casccaded secret image sharing scheme. SIU 2012: 1-4 - 2011
- [j4]Burçin Kurt, Vasif V. Nabiyev:
Down syndrome recognition using local binary patterns and statistical evaluation of the system. Expert Syst. Appl. 38(7): 8690-8695 (2011) - [j3]Mustafa Ulutas, Güzin Ulutas, Vasif V. Nabiyev:
Medical image security and EPR hiding using Shamir's secret sharing scheme. J. Syst. Softw. 84(3): 341-353 (2011) - [c4]Güzin Ulutas, Mustafa Ulutas, Vasif V. Nabiyev:
Improved Secret Image Sharing Method By Encoding Shared Values With Authentication Bits. ISCIS 2011: 331-335 - [c3]Güzin Ulutas, Mustafa Ulutas, Vasif V. Nabiyev:
Distortion free geometry based secret image sharing. WCIT 2011: 721-726
2000 – 2009
- 2009
- [j2]Hüseyin Pehlivan, Vasif V. Nabiyev:
Score calculation from final tournament tables. Comput. Oper. Res. 36(3): 936-950 (2009) - [c2]Güzin Ulutas, Vasif V. Nabiyev, Mustafa Ulutas:
Polynomial approach in a secret image sharing using quadratic residue. ISCIS 2009: 586-591 - 2008
- [j1]Vasif V. Nabiyev, Hüseyin Pehlivan:
Tournament scoring problem. Appl. Math. Comput. 199(1): 211-222 (2008) - 2005
- [c1]Murat Ekinci, Eyüp Gedikli, Vasif V. Nabiyev:
View Distance Based Human Motion Analysis. MVA 2005: 233-236
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint