Iqbal H. Sarker
Orcid: 0000-0003-1740-5517Affiliations:
- Cyber Security Cooperative Research Centre, Australia
- Edith Cowan University, Perth, WA, Australia
- Swinburne University, Australia (former)
- Chittagong University of Engineering & Technology, Bangladesh (former)
According to our database1,
Iqbal H. Sarker
authored at least 111 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Sensors, June, 2024
Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures.
Internet Things, April, 2024
An improved transformer-based model for detecting phishing, spam and ham emails: A large language model approach.
Secur. Priv., 2024
Cyberbullying Text Identification based on Deep Learning and Transformer-based Language Models.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2024
Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects.
ICT Express, 2024
LLM potentiality and awareness: a position paper from the perspective of trustworthy and responsible AI modeling.
Discov. Artif. Intell., 2024
Can We Trust Large Language Models Generated Code? A Framework for In-Context Learning, Security Patterns, and Code Evaluations Across Diverse LLMs.
CoRR, 2024
ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis.
CoRR, 2024
CoRR, 2024
CoRR, 2024
An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach.
CoRR, 2024
Agricultural Recommendation System based on Deep Learning: A Multivariate Weather Forecasting Approach.
CoRR, 2024
Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis.
CoRR, 2024
PDF Malware Detection: Toward Machine Learning Modeling With Explainability Analysis.
IEEE Access, 2024
AI-Driven Cybersecurity and Threat Intelligence - Cyber Automation, Intelligent Decision-Making and Explainability
Springer, ISBN: 978-3-031-54497-2, 2024
2023
CovTiNet: Covid text identification network using attention-based positional embedding feature fusion.
Neural Comput. Appl., June, 2023
Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions.
Mob. Networks Appl., February, 2023
Multi-aspects AI-based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview.
Secur. Priv., 2023
Data, 2023
Exploring a Hybrid Deep Learning Framework to Automatically Discover Topic and Sentiment in COVID-19 Tweets.
CoRR, 2023
AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity.
CoRR, 2023
Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper.
CoRR, 2023
Improved YOLOv5-Based Real-Time Road Pavement Damage Detection in Road Infrastructure Management.
Algorithms, 2023
2022
AI-Based Modeling: Techniques, Applications and Research Issues Towards Automation, Intelligent and Smart Systems.
SN Comput. Sci., 2022
Effectively predicting cyber-attacks through isolation forest learning-based outlier detection.
Secur. Priv., 2022
Internet Things, 2022
Query-oriented topical influential users detection for top-k trending topics in twitter.
Appl. Intell., 2022
CARAN: A Context-Aware Recency-Based Attention Network for Point-of-Interest Recommendation.
IEEE Access, 2022
Proceedings of the Machine Intelligence and Emerging Technologies, 2022
A Stacked Ensemble Spyware Detection Model Using Hyper-Parameter Tuned Tree Based Classifiers.
Proceedings of the Machine Intelligence and Emerging Technologies, 2022
Aspect Based Sentiment Analysis of COVID-19 Tweets Using Blending Ensemble of Deep Learning Models.
Proceedings of the Machine Intelligence and Emerging Technologies, 2022
Diagnosis and Classification of Fetal Health Based on CTG Data Using Machine Learning Techniques.
Proceedings of the Machine Intelligence and Emerging Technologies, 2022
2021
Mobile Expert System: Exploring Context-Aware Machine Learning Rules for Personalized Decision-Making in Mobile Applications.
Symmetry, 2021
AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions.
SN Comput. Sci., 2021
Mobile Deep Learning: Exploring Deep Neural Network for Predicting Context-Aware Smartphone Usage.
SN Comput. Sci., 2021
Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions.
SN Comput. Sci., 2021
Data Science and Analytics: An Overview from Data-Driven Smart Computing, Decision-Making and Applications Perspective.
SN Comput. Sci., 2021
SN Comput. Sci., 2021
Deep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective.
SN Comput. Sci., 2021
A Data-Driven Heart Disease Prediction Model Through K-Means Clustering-Based Anomaly Detection.
SN Comput. Sci., 2021
Mobile Data Science and Intelligent Apps: Concepts, AI-Based Modeling and Research Directions.
Mob. Networks Appl., 2021
CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks.
Internet Things, 2021
Expert Syst. Appl., 2021
IEEE Access, 2021
Authorship Classification in a Resource Constraint Language Using Convolutional Neural Networks.
IEEE Access, 2021
IEEE Access, 2021
Emotion Classification in a Resource Constrained Language Using Transformer-based Approach.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Student Research Workshop, 2021
Proceedings of the ICSIE 2021: 10th International Conference on Software and Information Engineering, Cairo, Egypt, November 12, 2021
iMedMS: An IoT Based Intelligent Medication Monitoring System for Elderly Healthcare.
ICO, 2021
Hybrid CNN-GRU Framework with Integrated Pre-trained Language Transformer for SMS Phishing Detection.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021
Proceedings of the Hybrid Intelligent Systems, 2021
Context-Aware Machine Learning and Mobile Data Analytics - Automated Rule-based Services with Intelligent Decision-Making
Springer, ISBN: 978-3-030-88530-4, 2021
2020
IEEE Trans. Artif. Intell., 2020
ContextPCA: Predicting Context-Aware Smartphone Apps Usage Based On Machine Learning Techniques.
Symmetry, 2020
Symmetry, 2020
K-Nearest Neighbor Learning based Diabetes Mellitus Prediction and Analysis for eHealth Services.
EAI Endorsed Trans. Scalable Inf. Syst., 2020
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.
Sensors, 2020
EAI Endorsed Trans. Pervasive Health Technol., 2020
BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model.
Mob. Networks Appl., 2020
ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services.
J. Netw. Comput. Appl., 2020
J. Big Data, 2020
Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling.
J. Big Data, 2020
CalBehav: A Machine Learning-Based Personalized Calendar Behavioral Model Using Time-Series Smartphone Data.
Comput. J., 2020
E-MIIM: an ensemble-learning-based context-aware mobile telephony model for intelligent interruption management.
AI Soc., 2020
Proceedings of the Hybrid Intelligent Systems, 2020
Proceedings of the Hybrid Intelligent Systems, 2020
An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies.
Proceedings of the Hybrid Intelligent Systems, 2020
Predicting Individual Substance Abuse Vulnerability Using Machine Learning Techniques.
Proceedings of the Hybrid Intelligent Systems, 2020
Proceedings of the Hybrid Intelligent Systems, 2020
Proceedings of the Hybrid Intelligent Systems, 2020
Proceedings of the Computing Science, Communication and Security, 2020
Proceedings of the Computing Science, Communication and Security, 2020
Proceedings of the Computing Science, Communication and Security, 2020
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020
2019
Exploiting Data-Centric Social Context in Phone Call Prediction: A Machine Learning based Study.
EAI Endorsed Trans. Scalable Inf. Syst., 2019
Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage.
J. Big Data, 2019
RecencyMiner: mining recency-based personalized behavior from contextual smartphone data.
J. Big Data, 2019
Context-aware rule learning from smartphone data: survey, challenges and future directions.
J. Big Data, 2019
J. Ambient Intell. Smart Environ., 2019
Research issues in mining user behavioral rules for context-aware intelligent mobile applications.
Iran J. Comput. Sci., 2019
Internet Things, 2019
Internet Things, 2019
CoRR, 2019
2018
Mobile Data Science: Towards Understanding Data-Driven Intelligent Mobile Applications.
EAI Endorsed Trans. Scalable Inf. Syst., 2018
SilentPhone: Inferring User Unavailability based Opportune Moments to Minimize Call Interruptions.
EAI Endorsed Trans. Mob. Commun. Appl., 2018
Comput. J., 2018
Understanding the Role of Data-Centric Social Context in Personalized Mobile Applications.
EAI Endorsed Trans. Context aware Syst. Appl., 2018
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018
2017
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017
An Approach to Modeling Call Response Behavior on Mobile Phones Based on Multi-Dimensional Contexts.
Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017
An Improved Naive Bayes Classifier-Based Noise Detection Technique for Classifying User Phone Call Behavior.
Proceedings of the Data Mining, 2017
2016
Predicting how you respond to phone calls: towards discovering temporal behavioral rules.
Proceedings of the 28th Australian Conference on Computer-Human Interaction, 2016
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016
Evidence-Based Behavioral Model for Calendar Schedules of Individual Mobile Phone Users.
Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016
Behavior-Oriented Time Segmentation for Mining Individualized Rules of Mobile Phone Users.
Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016
2014
JMVC: A Java Framework for Rapidly Developing Desktop Application Software Based on MVC.
Smart Comput. Rev., 2014
2013
An Efficient Image Watermarking Scheme Using BFS Technique Based on Hadamard Transform.
Smart Comput. Rev., 2013
Smart Comput. Rev., 2013
Digital Watermarking for Image AuthenticationBased on Combined DCT, DWT and SVD Transformation.
CoRR, 2013