Abdul Razaque

Orcid: 0000-0003-0409-3526

According to our database1, Abdul Razaque authored at least 98 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A depth analysis of recent innovations in non-invasive techniques using artificial intelligence approach for cancer prediction.
Medical Biol. Eng. Comput., December, 2024

Blockchain-enabled heterogeneous 6G supported secure vehicular management system over cloud edge computing.
Internet Things, April, 2024

Comparative analysis of machine learning and deep learning models for improved cancer detection: A comprehensive review of recent advancements in diagnostic techniques.
Expert Syst. Appl., 2024

Deep learning for unmanned aerial vehicles detection: A review.
Comput. Sci. Rev., 2024

A review of artificial intelligence methods for Alzheimer's disease diagnosis: Insights from neuroimaging to sensor data analysis.
Biomed. Signal Process. Control., 2024

2023
Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology.
Sensors, December, 2023

ESOA-HGRU: egret swarm optimization algorithm-based hybrid gated recurrent unit for classification of diabetic retinopathy.
Artif. Intell. Rev., November, 2023

Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things.
Sensors, July, 2023

A comprehensive review on blockchains for Internet of Vehicles: Challenges and directions.
Comput. Sci. Rev., May, 2023

Heterogeneous Algorithm for Efficient-Path Detection and Congestion Avoidance for a Vehicular-Management System.
Sensors, 2023

Enhancing Gain and Bandwidth of Microstrip Antennas Through Optimized 3D Printing: A Study on Design and Implementation.
Proceedings of the Workshops and Short Paper Proceedings of the 8th International Conference on Digital Technologies in Education, 2023

Analysis of Major Factors Preventing Cybercrime Reduction in Kazakhstan.
Proceedings of the Workshops and Short Paper Proceedings of the 8th International Conference on Digital Technologies in Education, 2023

Performance Comparison of Convolutional Neural Networks for Handwritten Digit Recognition Using Activation Functions and Optimization Methods.
Proceedings of the Workshops and Short Paper Proceedings of the 8th International Conference on Digital Technologies in Education, 2023

Binary Rainfall Classification using SMOTE: An Effective Machine Learning Strategy.
Proceedings of the Workshops and Short Paper Proceedings of the 8th International Conference on Digital Technologies in Education, 2023

Enhanced Algorithm Blend and Turing for Improving Quality-of-Service of Multiple Datasets.
Proceedings of the Workshops and Short Paper Proceedings of the 8th International Conference on Digital Technologies in Education, 2023

Enhancing Cloud Computing Security through AI-Based Intelligent Intrusion Detection Leveraging Neural Networks and Artificial Bee Colony Optimization.
Proceedings of the Workshops and Short Paper Proceedings of the 8th International Conference on Digital Technologies in Education, 2023

A Comparative Study of Secure and Efficient Data Duplication Mechanisms for Cloud-Based IoT Applications.
Proceedings of the 2023 International Conference on Advances in Computing Research, 2023

Toward Secure and Efficient CNN Recognition with Different Activation and Optimization Functions.
Proceedings of the 2023 International Conference on Advances in Computing Research, 2023

2022
Hybrid energy-efficient algorithm for efficient Internet of Things deployment.
Sustain. Comput. Informatics Syst., 2022

A blockchain-enabled framework for securing connected consumer electronics against wireless attacks.
Simul. Model. Pract. Theory, 2022

Resilient Back Propagation Neural Network Security Model For Containerized Cloud Computing.
Simul. Model. Pract. Theory, 2022

State-of-art review of information diffusion models and their impact on social network vulnerabilities.
J. King Saud Univ. Comput. Inf. Sci., 2022

A Mobility-Aware Human-Centric Cyber-Physical System for Efficient and Secure Smart Healthcare.
IEEE Internet Things J., 2022

Energy-efficient and secure mobile fog-based cloud for the Internet of Things.
Future Gener. Comput. Syst., 2022

Light Weight Authentication Scheme for Smart Home IoT Devices.
Cryptogr., 2022

A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions.
CoRR, 2022

Blockchain-Enabled Deep Recurrent Neural Network Model for Clickbait Detection.
IEEE Access, 2022

Intelligent Ensemble based System for Rare Attacks Dectection in IoT Networks.
Proceedings of the IEEE Global Communications Conference, 2022

Control Frame Protection from Denial-of-Service Attacks during Handover Process.
Proceedings of the 7th International Conference on Digital Technologies in Education, 2022

Development System of Application Security Testing.
Proceedings of the 7th International Conference on Digital Technologies in Education, 2022

2021
Improved Support Vector Machine Enabled Radial Basis Function and Linear Variants for Remote Sensing Image Classification.
Sensors, 2021

DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network.
Int. J. Mach. Learn. Cybern., 2021

Efficient and reliable forensics using intelligent edge computing.
Future Gener. Comput. Syst., 2021

Enhancing the Performance of Lightweight Configurable PUF for Robust IoT Hardware-Assisted Security.
IEEE Access, 2021

Comparative Analysis of Digital Signature and Elliptic Curve Digital Signature Algorithms for the Validation of QR Code Vulnerabilities.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021

Novel File-Checksum Method for Data Duplication Removal of Patients.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021

Analysis of Sentimental Behaviour over Social Data Using Machine Learning Algorithms.
Proceedings of the Advances and Trends in Artificial Intelligence. Artificial Intelligence Practices, 2021

An Efficient and Reliable Lightweight PUF for IoT-based Applications.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

2020
Deep recurrent neural network for IoT intrusion detection system.
Simul. Model. Pract. Theory, 2020

A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers.
J. Cloud Comput., 2020

Cascaded hybrid intrusion detection model based on SOM and RBF neural networks.
Concurr. Comput. Pract. Exp., 2020

Enhanced Grey Risk Assessment Model for Support of Cloud Service Provider.
IEEE Access, 2020

Secure Password-Driven Fingerprint Biometrics Authentication.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

Efficient Context-aware File System Approach.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and Data.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

Android CompCache based on Graphics Processing Unit.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

2019
Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain.
IEEE Access, 2019

Pair Data Division Algorithm For Handling Data Classification.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

Fuzzy-GRA Trust Model for Cloud Risk Management.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

Intelligent Intrusion Detection Using Radial Basis Function Neural Network.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

Burglary Detection Framework for House Crime Control.
Proceedings of the 19th International Conference on Computational Science and Its Applications, 2019

Bluetooth Application-Layer Packet-Filtering For Blueborne Attack Defending.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

2018
Location-Based Lattice Mobility Model for Wireless Sensor Networks.
Sensors, 2018

Context-aware latency reduction protocol for secure encryption and decryption.
Int. J. High Perform. Comput. Netw., 2018

Token security for internet of things.
Int. J. Embed. Syst., 2018

Proposing Logical Table Constructs for Enhanced Machine Learning Process.
IEEE Access, 2018

Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Distributed allocating algorithm based on cloud CPU scheme.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

Energy saving and maximize utilization cloud resources allocation via online multi-dimensional vector bin packing.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

Intelligent intrusion detection system using clustered self organized map.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

Naïve Bayesian and Fuzzy C-Means Algorithm for Mobile Malware Detection Precision.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

Enhanced Risk Minimization Framework for Cloud Computing Environment.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

2017
Privacy preserving model: a new scheme for auditing cloud stakeholders.
J. Cloud Comput., 2017

Secure and quality-of-service-supported service-oriented architecture for mobile cloud handoff process.
Comput. Secur., 2017

Secure data aggregation using access control and authentication for wireless sensor networks.
Comput. Secur., 2017

2016
Privacy Preserving Framework to Support Mobile Government Services.
Int. J. Inf. Technol. Web Eng., 2016

Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment.
Comput. Secur., 2016

Multi-biometric system using Fuzzy Vault.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

Power reduction for Smart Homes in an Internet of Things framework.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

Simultaneous Priority and Detection based Carrier Sense Multiple Access protocol.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

Efficient allocation of slot using Medium Access Control protocol.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

Automatic Tampering Detection Paradigm to Support Personal Health Record.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

2015
Low Duty Cycle, Energy-Efficient and Mobility-Based Boarder Node - MAC Hybrid Protocol for Wireless Sensor Networks.
J. Signal Process. Syst., 2015

Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks.
Sensors, 2015

Novel Architecture of Self-organized Mobile Wireless Sensor Networks.
J. Comput. Sci. Eng., 2015

Cloud Data Integrity Using a Designated Public Verifier.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud Environment.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks.
Sensors, 2014

Simulation based Study of TCP Variants in Hybrid Network.
CoRR, 2014

Fostering of innovative usability testing to develop mobile application for mobile collaborative learning (MCL).
CoRR, 2014

Dynamic Cluster Head Node Election (DCHNE) Model over Wireless Sensor Networks (WSNs).
CoRR, 2014

2013
Efficient Search (RES) for One-Hop Destination over Wireless Sensor Network.
CoRR, 2013

Automatic energy saving (AES) modelto boost ubiquitous wireless sensor networks (WSNs).
CoRR, 2013

Restoring the privacy and confidentiality of users over Mobile collaborative learning (MCL) environment.
CoRR, 2013

Stream Control Transmission Protocol (SCTP): Robust and Efficient for Data Centre Applications.
CoRR, 2013

Deployment of Stream Control Transmission Protocol (SCTP) to Maintain the Applications of Data Centers.
CoRR, 2013

Least Distance Smart Neighboring Search (LDSNS) over Wireless Sensor Networks (WSNs).
Proceedings of the Seventh UKSim/AMSS European Modelling Symposium, 2013

2012
Interactive Prototypes to Foster Pedagogical Activities for Mobile Collaborative Learning Environment (MCLE).
Int. J. Interact. Mob. Technol., 2012

Multi-frame Signature-cum Anomaly-based Intrusion Detection Systems (MSAIDS) to Protect Privacy of Users over Mobile Collaborative Learning (MCL).
CoRR, 2012

TCP-UB: A New congestion aware transmission control protocolvariant
CoRR, 2012

Novel Framework for Mobile Collaborative learning (MCL)to substantiate pedagogical activities
CoRR, 2012

Analytical Study of Pre-congestion notification (PCN) techniques
CoRR, 2012

Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL)
CoRR, 2012

Automated Energy Saving (AES) Paradigm to Support Pedagogical Activities over Wireless Sensor Networks.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2012

Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

2011
Suggested Collaborative Learning Conceptual Architecture and Applications for Mobile Devices.
Proceedings of the Design, User Experience, and Usability. Theory, Methods, Tools and Practice, 2011

2008
Performance Evaluation of TCP Variants under Mobility Based Anchor Point Node (APN) Hybrid Network.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008


  Loading...