Huwaida T. Elshoush

688 total citations
17 papers, 404 citations indexed

About

Huwaida T. Elshoush is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Computer Networks and Communications. According to data from OpenAlex, Huwaida T. Elshoush has authored 17 papers receiving a total of 404 indexed citations (citations by other indexed papers that have themselves been cited), including 10 papers in Artificial Intelligence, 8 papers in Computer Vision and Pattern Recognition and 6 papers in Computer Networks and Communications. Recurrent topics in Huwaida T. Elshoush's work include Advanced Steganography and Watermarking Techniques (7 papers), Chaos-based Image/Signal Encryption (6 papers) and Digital Media Forensic Detection (5 papers). Huwaida T. Elshoush is often cited by papers focused on Advanced Steganography and Watermarking Techniques (7 papers), Chaos-based Image/Signal Encryption (6 papers) and Digital Media Forensic Detection (5 papers). Huwaida T. Elshoush collaborates with scholars based in Sudan, Malaysia and Saudi Arabia. Huwaida T. Elshoush's co-authors include Maheyzah Md Siraj, Fatin A. Elhaj, Anazida Zainal, Muawia A. Elsadig, Shafaatunnur Hasan, Bazara I. A. Barry, Lip Yee Por, Chin Soon Ku, Yen‐Lin Chen and Mohamed Gabr and has published in prestigious journals such as PLoS ONE, IEEE Access and Australasian Journal of Paramedicine.

In The Last Decade

Huwaida T. Elshoush

17 papers receiving 376 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Huwaida T. Elshoush Sudan 11 195 190 115 97 95 17 404
Songlei Jian China 15 367 1.9× 136 0.7× 85 0.7× 167 1.7× 112 1.2× 34 490
Alexandru Coman Canada 8 183 0.9× 142 0.7× 53 0.5× 91 0.9× 139 1.5× 10 410
Kyungroul Lee South Korea 10 90 0.5× 130 0.7× 144 1.3× 152 1.6× 81 0.9× 38 306
Abhishek Mallik India 12 220 1.1× 62 0.3× 63 0.5× 96 1.0× 47 0.5× 19 464
Yiqun Zhang China 13 287 1.5× 52 0.3× 31 0.3× 89 0.9× 149 1.6× 54 435
C. Nalini India 7 104 0.5× 84 0.4× 20 0.2× 60 0.6× 47 0.5× 39 292
Prashant Narayankar India 5 140 0.7× 67 0.4× 37 0.3× 76 0.8× 142 1.5× 7 279
X. D. Zhang United States 12 456 2.3× 46 0.2× 45 0.4× 111 1.1× 109 1.1× 30 557
Jeffrey Jestes United States 9 138 0.7× 337 1.8× 238 2.1× 142 1.5× 136 1.4× 11 576

Countries citing papers authored by Huwaida T. Elshoush

Since Specialization
Citations

This map shows the geographic impact of Huwaida T. Elshoush's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Huwaida T. Elshoush with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Huwaida T. Elshoush more than expected).

Fields of papers citing papers by Huwaida T. Elshoush

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Huwaida T. Elshoush. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Huwaida T. Elshoush. The network helps show where Huwaida T. Elshoush may publish in the future.

Co-authorship network of co-authors of Huwaida T. Elshoush

This figure shows the co-authorship network connecting the top 25 collaborators of Huwaida T. Elshoush. A scholar is included among the top collaborators of Huwaida T. Elshoush based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Huwaida T. Elshoush. Huwaida T. Elshoush is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

17 of 17 papers shown
1.
Gabr, Mohamed, Huwaida T. Elshoush, Yen‐Lin Chen, et al.. (2024). Data Security Utilizing a Memristive Coupled Neural Network in 3D Models. IEEE Access. 12. 116457–116477. 13 indexed citations
2.
Elshoush, Huwaida T., et al.. (2023). Input Validation Vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-Art. IEEE Access. 11. 40128–40161. 10 indexed citations
3.
4.
Elshoush, Huwaida T., et al.. (2022). Enhancing LSB Using Binary Message Size Encoding for High Capacity, Transparent and Secure Audio Steganography–An Innovative Approach. IEEE Access. 10. 29954–29971. 23 indexed citations
5.
Elsadig, Muawia A., et al.. (2022). Breast cancer detection using machine learning approaches: a comparative study. International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering. 13(1). 736–736. 31 indexed citations
6.
Elshoush, Huwaida T., et al.. (2021). A Novel Approach to Information Hiding Technique using ASCII Mapping Based Image Steganography.. J. Inf. Hiding Multim. Signal Process.. 12. 65–82. 5 indexed citations
7.
Elshoush, Huwaida T., et al.. (2021). A new high capacity and secure image realization steganography based on ASCII code matching. Multimedia Tools and Applications. 81(4). 5191–5237. 11 indexed citations
8.
Hasan, Shafaatunnur, et al.. (2021). A Polymorphic Advanced Encryption Standard – A Novel Approach. IEEE Access. 9. 20191–20207. 28 indexed citations
9.
Elshoush, Huwaida T., et al.. (2021). Enhanced Serpent algorithm using Lorenz 96 Chaos-based block key generation and parallel computing for RGB image encryption. PeerJ Computer Science. 7. e812–e812. 3 indexed citations
11.
Elshoush, Huwaida T., et al.. (2018). A Novel Enhanced LSB Algorithm for High Secure Audio Steganography. 15. 125–130. 3 indexed citations
12.
Siraj, Maheyzah Md, et al.. (2016). Feature Selection Using Information Gain for Improved Structural-Based Alert Correlation. PLoS ONE. 11(11). e0166017–e0166017. 119 indexed citations
13.
Elshoush, Huwaida T.. (2014). An innovative framework for collaborative intrusion alert correlation. 54. 607–614. 4 indexed citations
14.
Elshoush, Huwaida T., et al.. (2014). Cache-timing attack against aes crypto system - countermeasures review. Australasian Journal of Paramedicine. 1 indexed citations
15.
Elshoush, Huwaida T., et al.. (2012). An Improved Framework for Intrusion Alert Correlation. 18 indexed citations
16.
Elshoush, Huwaida T., et al.. (2011). Alert correlation in collaborative intelligent intrusion detection systems—A survey. Applied Soft Computing. 11(7). 4349–4365. 102 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026