2025
Ego-SLD: A Video Dataset of Egocentric Action Recognition for Bengali Sign Language Detection.
Dataset, January, 2025
Convolutional Attention Based Mechanism for Facial Microexpression Recognition.
IEEE Access, 2025
Micro-Expression Recognition Using Convolutional Variational Attention Transformer (ConVAT) With Multihead Attention Mechanism.
IEEE Access, 2025
2024
Design and performance of an AI-enabled threat intelligence framework for IoT-enabled autonomous vehicles.
Comput. Electr. Eng., 2024
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security.
IEEE Access, 2024
LPN-IDD: A Lightweight Pyramid Network for Image Deraining and Detection.
IEEE Access, 2024
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches.
IEEE Access, 2024
2023
Analyzing the Impact of Active Attack on the Performance of the AMCTD Protocol in Underwater Wireless Sensor Networks.
Sensors, March, 2023
Comparative study of SPI success factors in global and in-house environment for large-scale software companies.
PeerJ Comput. Sci., 2023
Toward Performance and Energy-Efficient Edge-of-Things.
IT Prof., 2023
Deep AI-Powered Cyber Threat Analysis in IIoT.
IEEE Internet Things J., 2023
An Empirical Study to Investigate the Impact of Factors Influencing Knowledge Sharing in Virtual Teams.
IEEE Access, 2023
Optimizing Document Classification: Unleashing the Power of Genetic Algorithms.
IEEE Access, 2023
Exploring the Significance of Publication-Age-Based Parameters for Evaluating Researcher Impact.
IEEE Access, 2023
Comprehensive Evaluation of Publication and Citation Metrics for Quantifying Scholarly Influence.
IEEE Access, 2023
DHSDJArch: An Efficient Design of Distributed Heterogeneous Stream-Disk Join Architecture.
IEEE Access, 2023
The Impact of Mitigation Strategies for Socio-Cultural Distance Issues in GSD: An Empirical Study.
IEEE Access, 2023
Risk Factors and Practices for the Development of Open Source Software From Developers' Perspective.
IEEE Access, 2023
SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework.
IEEE Access, 2023
Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning.
IEEE Access, 2023
Enhancing Performance of Movie Recommendations Using LSTM With Meta Path Analysis.
IEEE Access, 2023
Evaluating the Effectiveness of Author-Count Based Metrics in Measuring Scientific Contributions.
IEEE Access, 2023
Machine Learning Approach for Effective Ranking of Researcher Assessment Parameters.
IEEE Access, 2023
Stock Price Prediction using CuDNNLSTM and multiple CNN layers.
Proceedings of the IEEE International Conference on Artificial Intelligence, 2023
2022
FIPAM: Fuzzy Inference Based Placement and Migration Approach for NFV-Based IoTs.
IEEE Trans. Netw. Serv. Manag., December, 2022
Secure Distributed Mobile Volunteer Computing with Android.
ACM Trans. Internet Techn., 2022
Dynamic link adaptation for filterband multicarrier in networks with diverse service quality and throughput requirements.
Telecommun. Syst., 2022
Lightweight Internet of Things Botnet Detection Using One-Class Classification.
Sensors, 2022
Automatic Modulation Recognition Based on the Optimized Linear Combination of Higher-Order Cumulants.
Sensors, 2022
5G/SDR-Assisted Cognitive Communication in UAV Swarms: Architecture and Applications.
IT Prof., 2022
MalDroid: Secure DL-enabled intelligent malware detection framework.
IET Commun., 2022
Proactive Defense for Fog-to-Things Critical Infrastructure.
IEEE Commun. Mag., 2022
FineCodeAnalyzer: Multi-Perspective Source Code Analysis Support for Software Developer Through Fine-Granular Level Interactive Code Visualization.
IEEE Access, 2022
Model to Cope With Requirements Engineering Issues for Software Development Outsourcing.
IEEE Access, 2022
Research Perspectives and Challenges of Blockchain for Data-Intensive and Resource-Constrained Devices.
IEEE Access, 2022
An Attention-Based ResNet Architecture for Acute Hemorrhage Detection and Classification: Toward a Health 4.0 Digital Twin Study.
IEEE Access, 2022
Prediction of Pakistani Honey Authenticity Through Machine Learning.
IEEE Access, 2022
A Tacit-Knowledge-Based Requirements Elicitation Model Supporting COVID-19 Context.
IEEE Access, 2022
Correction to "Performance Evaluation of LoRaWAN for Green Internet of Things".
IEEE Access, 2022
2021
Dynamic Priority Real-Time Scheduling on Power Asymmetric Multicore Processors.
Symmetry, 2021
TARS: A Novel Mechanism for Truly Autonomous Resource Selection in LTE-V2V Mode 4.
Sensors, 2021
Fake news outbreak 2021: Can we stop the viral spread?
J. Netw. Comput. Appl., 2021
Power and Performance Efficient SDN-Enabled Fog Architecture.
IT Prof., 2021
SOK: Fake News Outbreak 2021: Can We Stop the Viral Spread?
CoRR, 2021
A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT).
Comput. Commun., 2021
CFFD-MAC: A Hybrid MAC for Collision Free Full-Duplex Communication in Wireless Ad-Hoc Networks.
IEEE Access, 2021
A Conceptual Model to Support the Transmuters in Acquiring the Desired Knowledge of a Data Scientist.
IEEE Access, 2021
A Dynamic Robust DL-Based Model for Android Malware Detection.
IEEE Access, 2021
An Empirical Investigation of Factors Causing Scope Creep in Agile Global Software Development Context: A Conceptual Model for Project Managers.
IEEE Access, 2021
2020
Securing Cyberspace of Future Smart Cities with 5G Technologies.
IEEE Netw., 2020
QoS-aware service provisioning in fog computing.
J. Netw. Comput. Appl., 2020
SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT).
Comput. Commun., 2020
Empirical evaluation and study of text stemming algorithms.
Artif. Intell. Rev., 2020
A Priori Multiobjective Self-Adaptive Multi-Population Based Jaya Algorithm to Optimize DERs Operations and Electrical Tasks.
IEEE Access, 2020
Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN.
IEEE Access, 2020
A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks.
IEEE Access, 2020
A Dynamic DL-Driven Architecture to Combat Sophisticated Android Malware.
IEEE Access, 2020
Orchestrating SDN Control Plane towards Enhanced IoT Security.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
2019
Towards augmented proactive cyberthreat intelligence.
J. Parallel Distributed Comput., 2019
Energy and performance aware fog computing: A case of DVFS and green renewable energy.
Future Gener. Comput. Syst., 2019
A comparative review of Urdu stemmers: Approaches and challenges.
Comput. Sci. Rev., 2019
A Novel Internet of Things-Centric Framework to Mine Malicious Frequent Patterns.
IEEE Access, 2019
Performance Evaluation of LoRaWAN for Green Internet of Things.
IEEE Access, 2019
Deep Learning based Ensemble Convolutional Neural Network Solution for Distributed Denial of Service Detection in SDNs.
Proceedings of the UK/China Emerging Technologies, 2019
An Effective Android Ransomware Detection Through Multi-Factor Feature Filtration and Recurrent Neural Network.
Proceedings of the UK/China Emerging Technologies, 2019
Exploring IoT Applications for Disaster Management: Identifying Key Factors and Proposing Future Directions.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019
Scheduling Algorithms for High-Performance Computing: An Application Perspective of Fog Computing.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019
Internet Traffic Flow Analysis in Fog Computing: An Experimental Case Study.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019
Seven Pillars to Achieve Energy Efficiency in High-Performance Computing Data Centers.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019
2018
A Comprehensive Analysis of Congestion Control Protocols in Wireless Sensor Networks.
Mob. Networks Appl., 2018
NPRA: Novel Policy Framework for Resource Allocation in 5G Software Defined Networks.
EAI Endorsed Trans. Mob. Commun. Appl., 2018
Implications of deep learning for the automation of design patterns organization.
J. Parallel Distributed Comput., 2018
An improved Urdu stemming algorithm for text mining based on multi-step hybrid approach.
J. Exp. Theor. Artif. Intell., 2018
A Dynamic Replication Aware Load Balanced Scheduling for Data Grids in Distributed Environments of Internet of Things.
Ad Hoc Sens. Wirel. Networks, 2018
Evaluation of Propagation Path Delay Using 3D Scattered Model in LoRaWAN.
Ad Hoc Sens. Wirel. Networks, 2018
Taxonomy of Factors Causing Integration Failure during Global Software Development.
IEEE Access, 2018
Social Internet of Vehicles: Complexity, Adaptivity, Issues and Beyond.
IEEE Access, 2018
Trust and Reputation Management in Healthcare Systems: Taxonomy, Requirements and Open Issues.
IEEE Access, 2018
Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare.
IEEE Access, 2018
2017
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification.
IEEE Trans. Inf. Forensics Secur., 2017
Formal modeling and verification of security controls for multimedia systems in the cloud.
Multim. Tools Appl., 2017
Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges.
J. Netw. Comput. Appl., 2017
Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues.
IEEE Commun. Mag., 2017
A high-level domain-specific language for SIEM (design, development and formal verification).
Clust. Comput., 2017
Reducing Power Consumption in Wireless Body Area Networks: A Novel Data Segregation and Classification Technique.
IEEE Consumer Electron. Mag., 2017
2016
Formal Verification of the xDAuth Protocol.
IEEE Trans. Inf. Forensics Secur., 2016
Secure and dependable software defined networks.
J. Netw. Comput. Appl., 2016
Survey on Network Virtualization Using OpenFlow: Taxonomy, Opportunities, and Open Issues.
KSII Trans. Internet Inf. Syst., 2016
A survey on Test Suite Reduction frameworks and tools.
Int. J. Inf. Manag., 2016
2015
Network-centric performance analysis of runtime application migration in mobile cloud computing.
Simul. Model. Pract. Theory, 2015
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions.
J. Netw. Comput. Appl., 2015
Impact analysis and change propagation in service-oriented enterprises: A systematic review.
Inf. Syst., 2015
Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues.
ACM Comput. Surv., 2015
Securing software defined networks: taxonomy, requirements, and open issues.
IEEE Commun. Mag., 2015