Martin Fleury
Martin Fleury
Verified email at - Homepage
Cited by
Cited by
Opnet modeler and ns-2: Comparing the accuracy of network simulators for packet-level analysis using a network testbed
GF Lucio, M Paredes-Farrera, E Jammeh, M Fleury, MJ Reed
wseas transactions on computers 2 (3), 700-707, 2003
Interval type-2 fuzzy logic congestion control for video streaming across IP networks
EA Jammeh, M Fleury, C Wagner, H Hagras, M Ghanbari
IEEE Transactions on Fuzzy Systems 17 (5), 1123-1142, 2009
A practical feature-engineering framework for electricity theft detection in smart grids
R Razavi, A Gharipour, M Fleury, IJ Akpan
Applied energy 238, 481-494, 2019
Occupancy detection of residential buildings using smart meter data: A large-scale study
R Razavi, A Gharipour, M Fleury, IJ Akpan
Energy and Buildings 183, 195-208, 2019
Improving propagation modeling in urban environments for vehicular ad hoc networks
SAH Tabatabaei, M Fleury, NN Qadri, M Ghanbari
IEEE Transactions on Intelligent Transportation Systems 12 (3), 705-716, 2011
Data driven approach for eye disease classification with machine learning
S Malik, N Kanwal, MN Asghar, MAA Sadiq, I Karamat, M Fleury
Applied Sciences 9 (14), 2789, 2019
Multi-source video streaming in a wireless vehicular ad hoc network
NN Qadri, M Fleury, M Altaf, M Ghanbari
IET communications 4 (11), 1300-1311, 2010
Visual surveillance within the EU general data protection regulation: A technology perspective
MN Asghar, N Kanwal, B Lee, M Fleury, M Herbst, Y Qiao
IEEE Access 7, 111709-111726, 2019
Socio-economic predictors of electricity theft in developing countries: An Indian case study
R Razavi, M Fleury
Energy for Sustainable Development 49, 1-10, 2019
Robust video streaming over an urban vanet
N Qadri, M Altaf, M Fleury, M Ghanbari, H Sammak
2009 IEEE International Conference on Wireless and Mobile Computing …, 2009
H. 264 video streaming with data-partitioning and growth codes
R Razavi, M Fleury, M Altaf, H Sammak, M Ghanbari
2009 16th IEEE International Conference on Image Processing (ICIP), 909-912, 2009
Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering
A Shifa, MS Afgan, MN Asghar, M Fleury, I Memon, S Abdullah, ...
IEEE Access 6, 16189-16206, 2018
Parallel entropic auto-thresholding
M Fleury, L Hayat, AF Clark
Image and Vision Computing 14 (4), 247-263, 1996
Network simulators: A developer’s perspective
M Małowidzki
Proc. Int. Symp. Perform. Eval. Comput. Telecommun. Syst. SPECTS’04, 2004
Skin detection and lightweight encryption for privacy protection in real-time surveillance applications
A Shifa, MB Imtiaz, MN Asghar, M Fleury
Image and Vision Computing 94, 103859, 2020
SWT and PCA image fusion methods for multi-modal imagery
R Bashir, R Junejo, NN Qadri, M Fleury, MY Qadri
Multimedia tools and applications 78, 1235-1263, 2019
Multimedia security perspectives in IoT
A Shifa, MN Asghar, M Fleury
2016 sixth international conference on innovative computing technology …, 2016
Parallel pipeline implementation of wavelet transforms
H Sava, M Fleury, AC Downton, AF Clark
IEE Proceedings-Vision, Image and Signal Processing 144 (6), 355-359, 1997
Confidentiality of a selectively encrypted H. 264 coded video bit-stream
MN Asghar, M Ghanbari, M Fleury, MJ Reed
Journal of Visual Communication and Image Representation 25 (2), 487-498, 2014
MuLViS: Multi-level encryption based security system for surveillance videos
A Shifa, MN Asghar, M Fleury, N Kanwal, MS Ansari, B Lee, M Herbst, ...
IEEE Access 8, 177131-177155, 2020
The system can't perform the operation now. Try again later.
Articles 1–20