Brij B. Gupta

Orcid: 0000-0003-4929-4698

Affiliations:
  • National Institute of Technology Kurukshetra, India
  • Indian Institute of Technology Roorkee, India (PhD)


According to our database1, Brij B. Gupta authored at least 428 papers between 2008 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
LSTM-GRU Based Efficient Intrusion Detection in 6G-Enabled Metaverse Environments.
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025

Enhanced Virtual Try-On in the Metaverse Leveraging Unet Model for Improved Cloth Detection.
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025

2024
HSADR: A New Highly Secure Aggregation and Dropout-Resilient Federated Learning Scheme for Radio Access Networks With Edge Computing Systems.
IEEE Trans. Green Commun. Netw., September, 2024

Trapezoidal fuzzy number methodology for prioritising the predictors of social media addiction.
Enterp. Inf. Syst., September, 2024

PANNER: POS-Aware Nested Named Entity Recognition Through Heterogeneous Graph Neural Network.
IEEE Trans. Comput. Soc. Syst., August, 2024

A systematic data-driven approach for targeted marketing in enterprise information system.
Enterp. Inf. Syst., August, 2024

Guest Editorial Special Issue on Future Trends and Transition in Connected and Autonomous Transportation With Artificial Intelligence and Robotics.
IEEE Trans Autom. Sci. Eng., July, 2024

Privacy-Centric AI and IoT Solutions for Smart Rural Farm Monitoring and Control.
Sensors, July, 2024

SEIR-driven semantic integration framework: Internet of Things-enhanced epidemiological surveillance in COVID-19 outbreaks using recurrent neural networks.
IET Cyper-Phys. Syst.: Theory & Appl., June, 2024

Knowledge-based Data Processing for Multilingual Natural Language Analysis.
ACM Trans. Asian Low Resour. Lang. Inf. Process., May, 2024

A Flexible and Verifiable Keyword PIR Scheme for Cloud-Edge-Terminal Collaboration in AIoT.
IEEE Internet Things J., May, 2024

Features level sentiment mining in enterprise systems from informal text corpus using machine learning techniques.
Enterp. Inf. Syst., May, 2024

Navigating the security landscape of large language models in enterprise information systems.
Enterp. Inf. Syst., April, 2024

Sustainable Authentication and Key Agreement Protocol Using Chaotic Maps for Industry 5.0.
IEEE Trans. Consumer Electron., February, 2024

Secure and Privacy-Preserving Decentralized Federated Learning for Personalized Recommendations in Consumer Electronics Using Blockchain and Homomorphic Encryption.
IEEE Trans. Consumer Electron., February, 2024

A novel Cumulative Indicator score using Indicator averaging for optimizing local business websites of enterprise systems.
Enterp. Inf. Syst., February, 2024

A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic.
Neural Comput. Appl., January, 2024

Reliable and Sustainable Product Evaluation Management System Based on Blockchain.
IEEE Trans. Engineering Management, 2024

Fog-Enabled Secure and Efficient Fine-Grained Searchable Data Sharing and Management Scheme for IoT-Based Healthcare Systems.
IEEE Trans. Engineering Management, 2024

Leveraging Probabilistic Optimization for Digital Transformation Maturity Evaluation of Construction Enterprises.
IEEE Trans. Engineering Management, 2024

IoT-enabled smart farming with Industry 5.0.
J. High Speed Networks, 2024

A lightweight network for abdominal multi-organ segmentation based on multi-scale context fusion and dual self-attention.
Inf. Fusion, 2024

Deep CNN based brain tumor detection in intelligent systems.
Int. J. Intell. Networks, 2024

Prioritizing user requirements for digital products using explainable artificial intelligence: A data-driven analysis on video conferencing apps.
Future Gener. Comput. Syst., 2024

Mutual information based logistic regression for phishing URL detection.
Cyber Secur. Appl., 2024

Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments.
Cyber Secur. Appl., 2024

A novel generative adversarial network-based fuzzing cases generation method for industrial control system protocols.
Comput. Electr. Eng., 2024

Thai-language chatbot security: Detecting instruction attacks with XLM-RoBERTa and Bi-GRU.
Comput. Electr. Eng., 2024

CloudIntellMal: An advanced cloud based intelligent malware detection framework to analyze android applications.
Comput. Electr. Eng., 2024

Enhancing user prompt confidentiality in Large Language Models through advanced differential encryption.
Comput. Electr. Eng., 2024

Fuzzy logic and biometric-based lightweight cryptographic authentication for metaverse security.
Appl. Soft Comput., 2024

Deep Learning Model for Driver Behavior Detection in Cyber-Physical System-Based Intelligent Transport Systems.
IEEE Access, 2024

Securing NetSoftIoT Environments with Enhanced Attack Detection Using RandomForest and LSTM in SDN.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

BERT Based Model for Robust Mental Health Analysis in Clinical Informatics.
Proceedings of the 21st International Joint Conference on Computer Science and Software Engineering, 2024

Intelligent FaultEdge: AI-Driven Fault-Tolerant Edge Framework for Smart Grid Monitoring in IoT.
Proceedings of the 12th IEEE International Conference on Intelligent Systems, 2024

Cloud-Based Image Segmentation Approach for Internet of Drones (IoD).
Proceedings of the IEEE INFOCOM 2024, 2024

Revolutionizing Healthcare Systems: Synergistic Multimodal Ensemble Learning & Knowledge Transfer for Lung Cancer Delineation & Taxonomy.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

Tempered Image Detection Using ELA and Convolutional Neural Networks.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

Autoencoders Based Optimized Deep Learning Model for the Detection of Cyber Attack in IoT Environment.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

Deep Learning-Based Facial Emotion Detection in the Metaverse.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

Enhancing Email Security in Consumer Electronics with a Hybrid Deep Learning Approach.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

Towards Sustainable Consumer Electronics: DL-based SoH and RUL Prediction for E-Waste Reduction.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

Region-Controlled Style Transfer.
Proceedings of the IEEE International Conference on Communications, 2024

Deep Learning and Big Data Integration with Cuckoo Search Optimization for Robust Phishing Attack Detection.
Proceedings of the IEEE International Conference on Communications, 2024

Unmanned Aerial Vehicle-Based Animal Detection via Hybrid CNN and LSTM Model.
Proceedings of the IEEE International Conference on Communications, 2024

Enhancing Intrusion Detection in Software Defined Networks with Optimized Feature Selection and Logistic Regression.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

Secure Integration of Internet of Things with Cloud Computing Using Optimized Feature Selection and Convolutional Neural Network.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

Optimal Machine Learning Approach for EEG Eye-State Classification in Metaverse Environment.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

Efficient DDoS Attack Detection through Lightweight Deep Learning Model in Cloud Computing Environment.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

Deep Neural Network Framework for the Identification of Smoking Events in 6G and Cloud-Enabled Smart Cities.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

Big Data Management and Analytics
World Scientific Series on Future Computing Paradigms and Applications 1, WorldScientific, ISBN: 9789811257131, 2024

SDN and NFV - A New Dimension to Virtualization
World Scientific Series on Future Computing Paradigms and Applications 2, WorldScientific, ISBN: 9789811255991, 2024

2023
Hierarchical Sampling for the Visualization of Large Scale-Free Graphs.
IEEE Trans. Vis. Comput. Graph., December, 2023

Personal Mobility in Metaverse With Autonomous Vehicles Using Q-Rung Orthopair Fuzzy Sets Based OPA-RAFSI Model.
IEEE Trans. Intell. Transp. Syst., December, 2023

Determination of Critical Edges in Air Route Network Using Modified Weighted Sum Method and Grey Relational Analysis.
IEEE Trans. Intell. Transp. Syst., December, 2023

Evaluating the Sustainable COVID-19 Vaccination Framework of India Using Recurrent Neural Networks.
Wirel. Pers. Commun., November, 2023

Analysis of cutting-edge technologies for enterprise information system and management.
Enterp. Inf. Syst., November, 2023

A Novel Hybrid Convolutional Neural Network- and Gated Recurrent Unit-Based Paradigm for IoT Network Traffic Attack Detection in Smart Cities.
Sensors, October, 2023

Lights, Camera, Metaverse!: Eliciting Intention to Use Industrial Metaverse, Organizational Agility, and Firm Performance.
J. Glob. Inf. Manag., October, 2023

Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management.
Inf. Sci., October, 2023

Privacy protection framework for face recognition in edge-based Internet of Things.
Clust. Comput., October, 2023

Novel Graph-Based Machine Learning Technique to Secure Smart Vehicles in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., August, 2023

Co-Design Dedicated System for Efficient Object Tracking Using Swarm Intelligence-Oriented Search Strategies.
Sensors, July, 2023

IoT-based health monitoring system to handle pandemic diseases using estimated computing.
Neural Comput. Appl., July, 2023

Advanced Persistent Threats (APT): evolution, anatomy, attribution and countermeasures.
J. Ambient Intell. Humaniz. Comput., July, 2023

A privacy-preserving logistic regression-based diagnosis scheme for digital healthcare.
Future Gener. Comput. Syst., July, 2023

Ubiquitous intelligent federated learning privacy-preserving scheme under edge computing.
Future Gener. Comput. Syst., July, 2023

A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing.
IEEE Internet Things J., June, 2023

Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs.
IEEE J. Biomed. Health Informatics, May, 2023

RBWCI: Robust and Blind Watermarking Framework for Cultural Images.
IEEE Trans. Consumer Electron., May, 2023

A Context-Aware Multi-Event Identification Method for Nonintrusive Load Monitoring.
IEEE Trans. Consumer Electron., May, 2023

Secure authentication and privacy-preserving blockchain for industrial internet of things.
Comput. Electr. Eng., May, 2023

A Deep Learning-based Fast Fake News Detection Model for Cyber-Physical Social Services.
Pattern Recognit. Lett., April, 2023

Machine learning-based IoT system for COVID-19 epidemics.
Computing, April, 2023

The NITRDrone Dataset to Address the Challenges for Road Extraction from Aerial Images.
J. Signal Process. Syst., March, 2023

Machine learning and smart card based two-factor authentication scheme for preserving anonymity in telecare medical information system (TMIS).
Neural Comput. Appl., March, 2023

A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system.
Enterp. Inf. Syst., March, 2023

Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

Identity-Based Authentication Mechanism for Secure Information Sharing in the Maritime Transport System.
IEEE Trans. Intell. Transp. Syst., February, 2023

Defensive mechanism against DDoS attack based on feature selection and multi-classifier algorithms.
Telecommun. Syst., February, 2023

GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems.
IEEE Trans. Netw. Sci. Eng., 2023

PCNN<sub>CEC</sub>: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration.
IEEE Trans. Netw. Sci. Eng., 2023

GradDT: Gradient-Guided Despeckling Transformer for Industrial Imaging Sensors.
IEEE Trans. Ind. Informatics, 2023

Deep Network-Enabled Haze Visibility Enhancement for Visual IoT-Driven Intelligent Transportation Systems.
IEEE Trans. Ind. Informatics, 2023

Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology.
Soft Comput., 2023

Cyberbullying in the Metaverse: A Prescriptive Perception on Global Information Systems for User Protection.
J. Glob. Inf. Manag., 2023

Building the Metaverse: Design Considerations, Socio-Technical Elements, and Future Research Directions of Metaverse.
J. Glob. Inf. Manag., 2023

Analysis of the Role of Global Information Management in Advanced Decision Support Systems (DSS) for Sustainable Development.
J. Glob. Inf. Manag., 2023

Metaverse integration alternatives of connected autonomous vehicles with self-powered sensors using fuzzy decision making model.
Inf. Sci., 2023

Secure Decision Approach for Internet of Healthcare Things Smart-System-Based Blockchain.
IEEE Internet Things J., 2023

A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions.
Inf., 2023

A Lightweight Cross-Domain Authentication Protocol for Trusted Access to Industrial Internet.
Int. J. Semantic Web Inf. Syst., 2023

A Rule-Based Expert Advisory System for Restaurants Using Machine Learning and Knowledge-Based Systems Techniques.
Int. J. Semantic Web Inf. Syst., 2023

Machine Learning-Based Automatic Litter Detection and Classification Using Neural Networks in Smart Cities.
Int. J. Semantic Web Inf. Syst., 2023

Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments.
Int. J. Softw. Sci. Comput. Intell., 2023

A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet.
Int. J. Inf. Secur. Priv., 2023

A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network.
Int. J. Inf. Sec., 2023

Multiround Transfer Learning and Modified Generative Adversarial Network for Lung Cancer Detection.
Int. J. Intell. Syst., 2023

Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset.
Int. J. Intell. Networks, 2023

The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds.
Int. J. Cloud Appl. Comput., 2023

A Novel Data Poisoning Attack in Federated Learning based on Inverted Loss Function.
Comput. Secur., 2023

Deep Learning Based Cyber Attack Detection in 6G Wireless Networks.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Adaptive Defense Mechanisms Against Phishing Threats in 6G Wireless Environments.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Leveraging SDN for Real World Windfarm Process Automation Architectures.
Proceedings of the Tenth International Conference on Software Defined Systems, 2023

A Deep CNN-based Framework for Distributed Denial of Services (DDoS) Attack Detection in Internet of Things (IoT).
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023

Long Short-Term Memory Network (LSTM) based Stock Price Prediction.
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023

Hyperdimensional Consumer Pattern Analysis with Quantum Neural Architectures using Non-Hermitian Operators.
Proceedings of the 5th International Conference on Information Management & Machine Intelligence, 2023

Exploring Advanced Neural Networks For Cross-Corpus Fake News Detection.
Proceedings of the 5th International Conference on Information Management & Machine Intelligence, 2023

Fuzzy Based Clustering of Consumers' Big Data in Industrial Applications.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

Low Resource Vs High Resource solutions for Federated learning sentiment analysis.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

DDoS Attack Detection Through Digital Twin Technique in Metaverse.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

Forging Faces: Exploring the Generation of Synthetic Identities using GANs.
Proceedings of the 13th IEEE International Conference on Consumer Electronics - Berlin, 2023

GRU-Based DDoS Detection for Enhanced Security in Consumer Electronics.
Proceedings of the 13th IEEE International Conference on Consumer Electronics - Berlin, 2023

Deep Learning Based Hate Speech Detection on Twitter.
Proceedings of the 13th IEEE International Conference on Consumer Electronics - Berlin, 2023

A Secure Blockchain-Based Authentication Control Framework for Cyber-Physical-Social System (CPSS) Big Data.
Proceedings of the IEEE Global Communications Conference, 2023

Machine Learning-Based DDoS Mitigation Framework for Unmanned Aerial Vehicles (UAV) Environment Using Software-Defined Networks (SDN).
Proceedings of the IEEE Global Communications Conference, 2023

Recent Research on Artificial Intelligence, Machine Learning, and Deep Learning in Consumer Electronics Technology.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

A DDoS Attack Detection System for Industry 5.0 using Digital Twins and Machine Learning.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

Optimized Edge-cCCN Based Model for the Detection of DDoS Attack in IoT Environment.
Proceedings of the Edge Computing - EDGE 2023, 2023

Deep Learning Based Model for Stress Measurement in Online Social Networks.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023

Revolutionizing Human-Machine Interaction through Hand Gesture Recognition in 6G-Enabled Metaverse Environments.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2023

Deep CNN Based Anomaly Detection in Centralized Metaverse Environment.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2023

2022
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification.
IEEE Trans. Netw. Serv. Manag., December, 2022

Machine learning algorithms for smart and intelligent healthcare system in Society 5.0.
Int. J. Intell. Syst., December, 2022

Ensemble feature selection for multi-label text classification: An intelligent order statistics approach.
Int. J. Intell. Syst., December, 2022

An efficient hardware supported and parallelization architecture for intelligent systems to overcome speculative overheads.
Int. J. Intell. Syst., December, 2022

A methodological framework for extreme climate risk assessment integrating satellite and location based data sets in intelligent systems.
Int. J. Intell. Syst., December, 2022

A content and URL analysis-based efficient approach to detect smishing SMS in intelligent systems.
Int. J. Intell. Syst., December, 2022

A comprehensive survey on DDoS attacks on various intelligent systems and it's defense techniques.
Int. J. Intell. Syst., December, 2022

A comprehensive analysis of blockchain and its applications in intelligent systems based on IoT, cloud and social media.
Int. J. Intell. Syst., December, 2022

PPRP: Preserving-Privacy Route Planning Scheme in VANETs.
ACM Trans. Internet Techn., November, 2022

Artificial intelligence empowered emails classifier for Internet of Things based systems in industry 4.0.
Wirel. Networks, 2022

InFeMo: Flexible Big Data Management Through a Federated Cloud System.
ACM Trans. Internet Techn., 2022

Synergic Deep Learning for Smart Health Diagnosis of COVID-19 for Connected Living and Smart Cities.
ACM Trans. Internet Techn., 2022

An Anonymous Pre-Authentication and Post-Authentication Scheme Assisted by Cloud for Medical IoT Environments.
IEEE Trans. Netw. Sci. Eng., 2022

A Fine-Grained Access Control and Security Approach for Intelligent Vehicular Transport in 6G Communication System.
IEEE Trans. Intell. Transp. Syst., 2022

An Efficient and Secure Identity-Based Signature System for Underwater Green Transport System.
IEEE Trans. Intell. Transp. Syst., 2022

DeepSuite: A Test Suite Optimizer for Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

Renewable Energy Re-Distribution via Multiscale IoT for 6G-Oriented Green Highway Management.
IEEE Trans. Intell. Transp. Syst., 2022

Guest Editorial Artificial Intelligence and Deep Learning for Intelligent and Sustainable Traffic and Vehicle Management (VANETs).
IEEE Trans. Intell. Transp. Syst., 2022

A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box.
IEEE Trans. Ind. Informatics, 2022

SDN-Assisted Safety Message Dissemination Framework for Vehicular Critical Energy Infrastructure.
IEEE Trans. Ind. Informatics, 2022

An Edge-AI Based Forecasting Approach for Improving Smart Microgrid Efficiency.
IEEE Trans. Ind. Informatics, 2022

Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System.
IEEE Trans. Green Commun. Netw., 2022

Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks.
Telecommun. Syst., 2022

Special Issue on Industrial Information Integration in Space Applications.
IEEE Trans. Aerosp. Electron. Syst., 2022

An improved entity recognition approach to cyber-social knowledge provision of intellectual property using a CRF-LSTM model.
Pattern Recognit. Lett., 2022

Efficient deep learning approach for augmented detection of Coronavirus disease.
Neural Comput. Appl., 2022

Building a knowledge graph by using cross-lingual transfer method and distributed MinIE algorithm on apache spark.
Neural Comput. Appl., 2022

The monarch butterfly optimization algorithm for solving feature selection problems.
Neural Comput. Appl., 2022

Myocardial infarction detection based on deep neural network on imbalanced data.
Multim. Syst., 2022

Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System.
J. Web Eng., 2022

A Robust Authentication System With Application Anonymity in Multiple Identity Smart Cards.
J. Inf. Technol. Res., 2022

XSS Armor: Constructing XSS Defensive Framework for Preserving Big Data Privacy in Internet-of-Things (IoT) Networks.
J. Circuits Syst. Comput., 2022

Guest Editorial: Deep Learning Assisted Visual IoT Technologies for Critical Infrastructure Protection.
IEEE Internet Things Mag., 2022

Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment.
IEEE Internet Things J., 2022

Multiagent Federated Reinforcement Learning for Secure Incentive Mechanism in Intelligent Cyber-Physical Systems.
IEEE Internet Things J., 2022

Boosting-Based DDoS Detection in Internet of Things Systems.
IEEE Internet Things J., 2022

Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey.
IEEE Internet Things J., 2022

Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions.
Int. J. Semantic Web Inf. Syst., 2022

Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study.
Int. J. Semantic Web Inf. Syst., 2022

Multiobjective whale optimization algorithm-based feature selection for intelligent systems.
Int. J. Intell. Syst., 2022

Blockchain technology with its application in medical and healthcare systems: A survey.
Int. J. Intell. Syst., 2022

CDPS-IoT: Cardiovascular Disease Prediction System Based on IoT using Machine Learning.
Int. J. Interact. Multim. Artif. Intell., 2022

A location-based privacy-preserving oblivious sharing scheme for indoor navigation.
Future Gener. Comput. Syst., 2022

GreenCloudNet++: Simulation framework for energy efficient and secure, green job scheduling in geographically distributed data centers.
Trans. Emerg. Telecommun. Technol., 2022

A survey of phishing attack techniques, defence mechanisms and open research challenges.
Enterp. Inf. Syst., 2022

A PBNM and economic incentive-based defensive mechanism against DDoS attacks.
Enterp. Inf. Syst., 2022

A Survey of Deep Active Learning.
ACM Comput. Surv., 2022

A Blockchain-Based Distributed Computational Resource Trading System for Industrial Internet of Things Considering Multiple Preferences.
CoRR, 2022

Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense.
Comput. Secur., 2022

Securing heterogeneous embedded devices against XSS attack in intelligent IoT system.
Comput. Secur., 2022

Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems.
Comput. Electr. Eng., 2022

Deep Learning Models for Arrhythmia Detection in IoT Healthcare Applications.
Comput. Electr. Eng., 2022

Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiers.
Comput. Electr. Eng., 2022

Real-Time Traffic Speed Estimation for Smart Cities with Spatial Temporal Data: A Gated Graph Attention Network Approach.
Big Data Res., 2022

A Deep Learning Approach to Protecting Cultural Heritage Buildings Through IoT-Based Systems.
Proceedings of the 2022 IEEE International Conference on Smart Computing, 2022

Identity-Based Authentication Technique for IoT Devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2022

Cognitive XSS Defensive Approach to Secure Smart Devices.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022

A Novel Approach of Securing Medical Cyber Physical Systems (MCPS) from DDoS Attacks.
Proceedings of the Big Data Intelligence and Computing, 2022

Detection of Malicious Node in VANETs Using Digital Twin.
Proceedings of the Big Data Intelligence and Computing, 2022

2021
Joint computation offloading and task caching for multi-user and multi-task MEC systems: reinforcement learning-based algorithms.
Wirel. Networks, 2021

An attribute-based keyword search for m-Health networks.
J. Comput. Virol. Hacking Tech., 2021

A Multimodal, Multimedia Point-of-Care Deep Learning Framework for COVID-19 Diagnosis.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Pre-Trained Convolutional Neural Networks for Breast Cancer Detection Using Ultrasound Images.
ACM Trans. Internet Techn., 2021

Adaptive Feature Selection and Construction for Day-Ahead Load Forecasting Use Deep Learning Method.
IEEE Trans. Netw. Serv. Manag., 2021

Efficient and Secure Routing Protocol Based on Artificial Intelligence Algorithms With UAV-Assisted for Vehicular Ad Hoc Networks in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021

Secure and Energy Efficient-Based E-Health Care Framework for Green Internet of Things.
IEEE Trans. Green Commun. Netw., 2021

Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller.
Telecommun. Syst., 2021

A secure and efficient key agreement framework for critical energy infrastructure using mobile device.
Telecommun. Syst., 2021

Developing a Vietnamese Tourism Question Answering System Using Knowledge Graph and Deep Learning.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021

Correction to: A biometric cryptosystem scheme based on random projection and neural network.
Soft Comput., 2021

A biometric cryptosystem scheme based on random projection and neural network.
Soft Comput., 2021

Extended-Range Prediction Model Using NSGA-III Optimized RNN-GRU-LSTM for Driver Stress and Drowsiness.
Sensors, 2021

Handling Data Heterogeneity in Electricity Load Disaggregation via Optimized Complete Ensemble Empirical Mode Decomposition and Wavelet Packet Transform.
Sensors, 2021

A trust infrastructure based authentication method for clustered vehicular ad hoc networks.
Peer-to-Peer Netw. Appl., 2021

A QoS Ensuring Two-Layered Multi-Attribute Auction Mechanism to Mitigate DDoS Attack.
Mob. Networks Appl., 2021

Ensemble machine learning approach for classification of IoT devices in smart home.
Int. J. Mach. Learn. Cybern., 2021

Secure blockchain enabled Cyber-physical systems in healthcare using deep belief network with ResNet model.
J. Parallel Distributed Comput., 2021

A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server.
J. Organ. End User Comput., 2021

An Auction-Based Incentivized Solution Against DDoS Attacks.
J. Inf. Technol. Res., 2021

Harness the Global Impact of Big Data in Nurturing Social Entrepreneurship: A Systematic Literature Re view.
J. Glob. Inf. Manag., 2021

Information Management and IoT Technology for Safety and Security of Smart Home and Farm Systems.
J. Glob. Inf. Manag., 2021

Blockchain-based authentication and authorization for smart city applications.
Inf. Process. Manag., 2021

IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network.
IEEE Internet Things J., 2021

A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care.
IEEE Internet Things J., 2021

Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System.
IEEE CAA J. Autom. Sinica, 2021

A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense.
Future Gener. Comput. Syst., 2021

Security, privacy and forensics in the enterprise information systems.
Enterp. Inf. Syst., 2021

DNS rule-based schema to botnet detection.
Enterp. Inf. Syst., 2021

Three-dimensional Measurement Using Structured Light Based on Deep Learning.
Comput. Syst. Sci. Eng., 2021

PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks.
CoRR, 2021

Clustering Algorithm to Detect Adversaries in Federated Learning.
CoRR, 2021

A taxonomy of various attacks on smart card-based applications and countermeasures.
Concurr. Comput. Pract. Exp., 2021

Survey on atrial fibrillation detection from a single-lead ECG wave for Internet of Medical Things.
Comput. Commun., 2021

A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment.
Comput. Commun., 2021

Hybrid ant genetic algorithm for efficient task scheduling in cloud data centers.
Comput. Electr. Eng., 2021

Multiple features based approach for automatic fake news detection on social networks using deep learning.
Appl. Soft Comput., 2021

An energy aware grouping memetic algorithm to schedule the sensing activity in WSNs-based IoT for smart cities.
Appl. Soft Comput., 2021

Lightweight Intrusion Detection System In IoT Networks Using Raspberry pi 3b+.
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021

A lightweight Anomaly based DDoS flood attack detection for Internet of vehicles.
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021

Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks.
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021

A Survey on Data mining classification approaches.
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021

An Integrated BIM-IoT approach to support energy monitoring.
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021

A Novel Approach for Fake Comments and Reviews Detection on the Online Social Networks.
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021

Decentralized approach for data security of Medical IoT Devices.
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021

Clustering based Rewarding Algorithm to Detect Adversaries in Federated Machine Learning based IoT Environment.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

An End-to-End Security Framework for Smart Healthcare Information Sharing against Botnet-based Cyber-Attacks.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Entropy based Defensive Mechanism against DDoS Attack in SDN-Cloud enabled Online Social Networks.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Fog Layer-based DDoS attack Detection Approach for Internet-of-Things (IoTs) devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Mitigating Botnet based DDoS Attacks by Selecting Incentivized Cooperating ISPs for Risk Transfer.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Shielding Smart Home IoT Devices against Adverse Effects of XSS using AI model.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Deep Learning Based Approach for Secure Web of Things (WoT).
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Unsupervised Federated Learning based IoT Intrusion Detection.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

The early detection of malicious communication with DNS traffic through the use of simple features.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

A Big Data and Deep Learning based Approach for DDoS Detection in Cloud Computing Environment.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

Analysis of IoT Concept Applications: Smart Home Perspective.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2021

Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021

Fake News Detection Using LDA Topic Modelling and K-Nearest Neighbor Classifier.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021

2020
Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security.
IEEE Trans. Sustain. Comput., 2020

ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment.
IEEE Trans. Serv. Comput., 2020

Soft computing techniques for big data and cloud computing.
Soft Comput., 2020

IoT transaction processing through cooperative concurrency control on fog-cloud computing environment.
Soft Comput., 2020

Visual saliency guided complex image retrieval.
Pattern Recognit. Lett., 2020

Parallel implementation for 3D medical volume fuzzy segmentation.
Pattern Recognit. Lett., 2020

Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud.
J. Organ. End User Comput., 2020

Designing a XSS Defensive Framework for Web Servers Deployed in the Existing Smart City Infrastructure.
J. Organ. End User Comput., 2020

Phishing Attack Detection using a Search Engine and Heuristics-based Technique.
J. Inf. Technol. Res., 2020

Taxonomy of Payment Structures and Economic Incentive Schemes in Internet.
J. Inf. Technol. Res., 2020

A Survey on Contactless Smart Cards and Payment System: Technologies, Policies, Attacks and Countermeasures.
J. Glob. Inf. Manag., 2020

Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags.
Int. J. Semantic Web Inf. Syst., 2020

Fake profile detection in multimedia big data on online social networks.
Int. J. Inf. Comput. Secur., 2020

Nested context-aware sanitisation and feature injection in clustered templates of JavaScript worms on the cloud-based OSN.
Int. J. Inf. Comput. Secur., 2020

An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks.
Int. J. E Serv. Mob. Appl., 2020

Attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications.
Int. J. Embed. Syst., 2020

Decentralised control-based interaction framework for secure data transmission in internet of automated vehicles.
Int. J. Embed. Syst., 2020

An internet-of-things-based security scheme for healthcare environment for robust location privacy.
Int. J. Comput. Sci. Eng., 2020

A crowdsourcing method for online social networks security assessment based on human-centric computing.
Hum. centric Comput. Inf. Sci., 2020

Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework.
Future Gener. Comput. Syst., 2020

Live forensics of software attacks on cyber-physical systems.
Future Gener. Comput. Syst., 2020

Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection.
Enterp. Inf. Syst., 2020

Cloud-based Federated Boosting for Mobile Crowdsensing.
CoRR, 2020

An efficient KP design framework of attribute-based searchable encryption for user level revocation in cloud.
Concurr. Comput. Pract. Exp., 2020

An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols.
Concurr. Comput. Pract. Exp., 2020

Multi attribute auction based incentivized solution against DDoS attacks.
Comput. Secur., 2020

Long Short-Term Memory Networks for Driver Drowsiness and Stress Prediction.
ICO, 2020

Differential Privacy Approach to Solve Gradient Leakage Attack in a Federated Machine Learning Environment.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

Behavioral Analysis to Detect Social Spammer in Online Social Networks (OSNs).
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

Metadata Security Measures for Protecting Confidential Information on the Cloud.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET).
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

XSSPro: XSS Attack Detection Proxy to Defend Social Networking Platforms.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

An Analysis of Provable Security Frameworks for RFID Security.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) Attacks.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

2019
Advanced Media-Based Smart Big Data on Intelligent Cloud Systems.
IEEE Trans. Sustain. Comput., 2019

Soft Computing-Based EEG Classification by Optimal Feature Selection and Neural Networks.
IEEE Trans. Ind. Informatics, 2019

A novel coverless information hiding method based on the average pixel value of the sub-images.
Multim. Tools Appl., 2019

Medical image resolution enhancement for healthcare using nonlocal self-similarity and low-rank prior.
Multim. Tools Appl., 2019

Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques.
Multim. Tools Appl., 2019

Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing.
Multim. Tools Appl., 2019

Impact of digital fingerprint image quality on the fingerprint recognition accuracy.
Multim. Tools Appl., 2019

Multi-orientation geometric medical volumes segmentation using 3D multiresolution analysis.
Multim. Tools Appl., 2019

An efficient employment of internet of multimedia things in smart and future agriculture.
Multim. Tools Appl., 2019

Collaboration networks of arab biomedical researchers.
Multim. Tools Appl., 2019

An Identity-Based Signcryption on Lattice without Trapdoor.
J. Univers. Comput. Sci., 2019

Feature Based Approach for Detection of Smishing Messages in the Mobile Environment.
J. Inf. Technol. Res., 2019

ISEkFT: An IBE-Based Searchable Encryption Scheme With k-Keyword Fuzzy Search Trapdoor.
J. Inf. Technol. Res., 2019

A machine learning based approach for phishing detection using hyperlinks information.
J. Ambient Intell. Humaniz. Comput., 2019

Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions.
J. Ambient Intell. Humaniz. Comput., 2019

Deep learning models for human centered computing in fog and mobile edge networks.
J. Ambient Intell. Humaniz. Comput., 2019

Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment.
J. Ambient Intell. Humaniz. Comput., 2019

Efficient fingerprint matching on smart cards for high security and privacy in smart systems.
Inf. Sci., 2019

A novel CNN based security guaranteed image watermarking generation scenario for smart city applications.
Inf. Sci., 2019

Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations.
IEEE Internet Things J., 2019

A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network.
Int. J. Inf. Technol. Web Eng., 2019

A novel ECC-based lightweight authentication protocol for internet of things devices.
Int. J. High Perform. Comput. Netw., 2019

Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches.
Int. J. E Serv. Mob. Appl., 2019

Dynamic Policy Attribute Based Encryption and its Application in Generic Construction of Multi-Keyword Search.
Int. J. E Serv. Mob. Appl., 2019

Classification of various attacks and their defence mechanism in online social networks: a survey.
Enterp. Inf. Syst., 2019

A client-server JavaScript code rewriting-based framework to detect the XSS worms from online social network.
Concurr. Comput. Pract. Exp., 2019

An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment.
Clust. Comput., 2019

Hybrid approach for detection of malicious profiles in twitter.
Comput. Electr. Eng., 2019

Improving fuzzy C-mean-based community detection in social networks using dynamic parallelism.
Comput. Electr. Eng., 2019

IEEE Access Special Section Editorial: Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing.
IEEE Access, 2019

MQTT-driven Remote Temperature Monitoring System for IoT-based Smart Homes.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Secure Fine-Grained Multi-Keyword Search with Protection from Key Abusers in the Cloud.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

PBNM and Economic Incentive Based Framework for Protection Against DDoS Attacks.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

DDoS Detection Framework in Resource Constrained Internet of Things Domain.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

2018
Recent Advances in Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2018

Guest Editorial Deep Learning Models for Industry Informatics.
IEEE Trans. Ind. Informatics, 2018

Towards detection of phishing websites on client-side using machine learning based approach.
Telecommun. Syst., 2018

Defending against phishing attacks: taxonomy of methods, current issues and future directions.
Telecommun. Syst., 2018

Security in Internet of Things: issues, challenges, taxonomy, and architecture.
Telecommun. Syst., 2018

Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT.
Sustain. Comput. Informatics Syst., 2018

Introduction to special issue on recent advances on sustainability for green cloud and fog computing.
Sustain. Comput. Informatics Syst., 2018

Advances in applying soft computing techniques for big data and cloud computing.
Soft Comput., 2018

Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram.
Multim. Tools Appl., 2018

Collusion attacks mitigation in internet of things: a fog based model.
Multim. Tools Appl., 2018

Visual data mining for crowd anomaly detection using artificial bacteria colony.
Multim. Tools Appl., 2018

Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition.
Multim. Tools Appl., 2018

Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure.
Multim. Tools Appl., 2018

Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing.
Multim. Tools Appl., 2018

XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud.
Multim. Tools Appl., 2018

A novel approach to defend multimedia flash crowd in cloud environment.
Multim. Tools Appl., 2018

Accelerating 3D medical volume segmentation using GPUs.
Multim. Tools Appl., 2018

Socially-conforming cooperative computation in cloud networks.
J. Parallel Distributed Comput., 2018

The convergence of new computing paradigms and big data analytics methodologies for online social networks.
J. Comput. Sci., 2018

Big data driven outlier detection for soybean straw near infrared spectroscopy.
J. Comput. Sci., 2018

Deep Recurrent neural network vs. support vector machine for aspect-based sentiment analysis of Arabic hotels' reviews.
J. Comput. Sci., 2018

Deep learning for Arabic NLP: A survey.
J. Comput. Sci., 2018

Two-level authentication approach to protect from phishing attacks in real time.
J. Ambient Intell. Humaniz. Comput., 2018

Plague of cross-site scripting on web applications: a review, taxonomy and challenges.
Int. J. Web Based Communities, 2018

A lightweight mutual authentication approach for RFID tags in IoT devices.
Int. J. Netw. Virtual Organisations, 2018

Intelligent phishing detection system using similarity matching algorithms.
Int. J. Inf. Commun. Technol., 2018

Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation.
Int. J. Inf. Comput. Secur., 2018

Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks.
Int. J. Inf. Comput. Secur., 2018

Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing.
Int. J. E Serv. Mob. Appl., 2018

Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices.
Int. J. E Serv. Mob. Appl., 2018

Petri net-based verification of security protocol implementation in software evolution.
Int. J. Embed. Syst., 2018

Assessment of Honeypots: Issues, Challenges and Future Directions.
Int. J. Cloud Appl. Comput., 2018

Social media security and trustworthiness: Overview and new direction.
Future Gener. Comput. Syst., 2018

Flexible data access control in D2D communications.
Future Gener. Comput. Syst., 2018

Secure integration of IoT and Cloud Computing.
Future Gener. Comput. Syst., 2018

Efficient IoT-based sensor BIG Data collection-processing and analysis in smart buildings.
Future Gener. Comput. Syst., 2018

An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework.
Future Gener. Comput. Syst., 2018

Cloud-assisted secure video transmission and sharing framework for smart cities.
Future Gener. Comput. Syst., 2018

Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs).
Future Gener. Comput. Syst., 2018

Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network.
Future Gener. Comput. Syst., 2018

An efficient key agreement protocol for Sybil-precaution in online social networks.
Future Gener. Comput. Syst., 2018

Recent advances in fog and mobile edge computing.
Trans. Emerg. Telecommun. Technol., 2018

SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks.
Concurr. Comput. Pract. Exp., 2018

Edge Computing with Cloud for Voice Disorder Assessment and Treatment.
IEEE Commun. Mag., 2018

Medical Image Forgery Detection for Smart Healthcare.
IEEE Commun. Mag., 2018

Mitigation and risk factor analysis of android applications.
Comput. Electr. Eng., 2018

Crowdsourcing based scientific issue tracking with topic analysis.
Appl. Soft Comput., 2018

Studying the controversy in online crowds' interactions.
Appl. Soft Comput., 2018

A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service.
IEEE Access, 2018

Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes.
IEEE Access, 2018

A Practical Public Key Encryption Scheme Based on Learning Parity With Noise.
IEEE Access, 2018

A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding.
IEEE Access, 2018

Variable Selection and Optimization in Rapid Detection of Soybean Straw Biomass Based on CARS.
IEEE Access, 2018

Cognitive Privacy Middleware for Deep Learning Mashup in Environmental IoT.
IEEE Access, 2018

Efficient Quantum Information Hiding for Remote Medical Image Sharing.
IEEE Access, 2018

Self-Adaptive Scheduling of Base Transceiver Stations in Green 5G Networks.
IEEE Access, 2018

Service Orchestration of Optimizing Continuous Features in Industrial Surveillance Using Big Data Based Fog-Enabled Internet of Things.
IEEE Access, 2018

Evaluation Models for the Nearest Closer Routing Protocol in Wireless Sensor Networks.
IEEE Access, 2018

Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol.
IEEE Access, 2018

Security and privacy of big data for social networking services in cloud.
Proceedings of the IEEE INFOCOM 2018, 2018

A robust anonymity preserving authentication protocol for IoT devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Malware propagation effects on SCADA system and smart power grid.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Economic incentive based solution against distributed denial of service attacks for IoT customers.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

A Dynamic Security Policies Generation Model for Access Control in Smart Card Based Applications.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

2017
Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags.
J. Supercomput., 2017

Internet of surveillance: a cloud supported large-scale wireless surveillance system.
J. Supercomput., 2017

Phishing Detection: Analysis of Visual Similarity Based Approaches.
Secur. Commun. Networks, 2017

Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art.
Int. J. Syst. Assur. Eng. Manag., 2017

Fighting against phishing attacks: state of the art and future challenges.
Neural Comput. Appl., 2017

Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment.
Neural Comput. Appl., 2017

CyVOD: a novel trinity multimedia social network scheme.
Multim. Tools Appl., 2017

Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain.
Multim. Tools Appl., 2017

Accelerating compute intensive medical imaging segmentation algorithms using hybrid CPU-GPU implementations.
Multim. Tools Appl., 2017

Smart XSS Attack Surveillance System for OSN in Virtualized Intelligence Network of Nodes of Fog Computing.
Int. J. Web Serv. Res., 2017

Automated wireless video surveillance: an evaluation framework.
J. Real Time Image Process., 2017

GARCH and ANN-based DDoS detection and filtering in cloud computing environment.
Int. J. Embed. Syst., 2017

Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud.
Int. J. Cloud Appl. Comput., 2017

Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities: Present and Future Challenges.
Int. J. Cloud Appl. Comput., 2017

Security challenges in cloud computing: state-of-art.
Int. J. Big Data Intell., 2017

A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices.
Int. J. Adv. Intell. Paradigms, 2017

Efficient yet robust biometric iris matching on smart cards for data high security and privacy.
Future Gener. Comput. Syst., 2017

Security Strength Indicator in Fallback Authentication: Nudging Users for Better Answers in Secret Questions.
CoRR, 2017

Software-Defined System Support for Enabling Ubiquitous Mobile Edge Computing.
Comput. J., 2017

Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions.
Ann. des Télécommunications, 2017

A survey on smart power grid: frameworks, tools, security issues, and solutions.
Ann. des Télécommunications, 2017

A Comparative Evaluation of Atrial Fibrillation Detection Methods in Koreans Based on Optical Recordings Using a Smartphone.
IEEE Access, 2017

Efficient Large-scale Medical Data (eHealth Big Data) Analytics in Internet of Things.
Proceedings of the 19th IEEE Conference on Business Informatics, 2017

Risk transfer mechanism to defend DDoS attacks in IoT scenario.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2017

Solutions for inter-connectivity and security in a smart hospital building.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

2016
XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications.
Secur. Commun. Networks, 2016

JS-SAN: defense mechanism for HTML5-based web applications against javascript code injection vulnerabilities.
Secur. Commun. Networks, 2016

A novel approach to protect against phishing attacks at client side using auto-updated white-list.
EURASIP J. Inf. Secur., 2016

Guest editorial special issues on security trends in mobile cloud computing, web, and social networking.
EURASIP J. Inf. Secur., 2016

An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from OSN in Mobile Cloud Platforms.
Proceedings of the Network and System Security - 10th International Conference, 2016

On privacy verification in the IoT service based on PN<sup>2</sup>.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

XSS detection with automatic view isolation on online social network.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

2015
A Petri net-based framework of intrusion detection systems.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

DDoS detection and filtering technique in cloud environment using GARCH model.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015

2014
An Encapsulated Approach of Forensic Model for digital investigation.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2013
Predicting Number of Zombies in a DDoS Attacks Using Isotonic Regression.
Proceedings of the Mining Social Networks and Security Informatics, 2013

Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment
CoRR, 2013

Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email
CoRR, 2013

A Survey of Phishing Email Filtering Techniques.
IEEE Commun. Surv. Tutorials, 2013

2012
ANN Based Scheme to Predict Number of Zombies in a DDoS Attack.
Int. J. Netw. Secur., 2012

Distributed Denial of Service Prevention Techniques
CoRR, 2012

Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art
CoRR, 2012

Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network
CoRR, 2012

An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain
CoRR, 2012

An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach
CoRR, 2012

Predicting Number of Zombies in DDoS Attacks Using Pace Regression Model.
J. Comput. Inf. Technol., 2012

2011
A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

SVM Based Scheme for Predicting Number of Zombies in a DDoS Attack.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

On Estimating Strength of a DDoS Attack Using Polynomial Regression Model.
Proceedings of the Advances in Computing and Communications, 2011

2010
Estimating strength of DDoS attack using various regression models.
Int. J. Multim. Intell. Secur., 2010

2009
Defending against Distributed Denial of Service Attacks: Issues and Challenges.
Inf. Secur. J. A Glob. Perspect., 2009

2008
FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain.
Proceedings of the 16th International Conference on Networks, 2008


  Loading...