Iqbal H. Sarker

Orcid: 0000-0003-1740-5517

Affiliations:
  • Cyber Security Cooperative Research Centre, Australia
  • Edith Cowan University, Perth, WA, Australia
  • Swinburne University, Australia (former)
  • Chittagong University of Engineering & Technology, Bangladesh (former)


According to our database1, Iqbal H. Sarker authored at least 111 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Automated Sensor Node Malicious Activity Detection with Explainability Analysis.
Sensors, June, 2024

Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures.
Internet Things, April, 2024

An improved transformer-based model for detecting phishing, spam and ham emails: A large language model approach.
Secur. Priv., 2024

Cyberbullying Text Identification based on Deep Learning and Transformer-based Language Models.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2024

Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects.
ICT Express, 2024

LLM potentiality and awareness: a position paper from the perspective of trustworthy and responsible AI modeling.
Discov. Artif. Intell., 2024

Can We Trust Large Language Models Generated Code? A Framework for In-Context Learning, Security Patterns, and Code Evaluations Across Diverse LLMs.
CoRR, 2024

ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis.
CoRR, 2024

Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities.
CoRR, 2024

A Data-Driven Predictive Analysis on Cyber Security Threats with Key Risk Factors.
CoRR, 2024

An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach.
CoRR, 2024

Agricultural Recommendation System based on Deep Learning: A Multivariate Weather Forecasting Approach.
CoRR, 2024

Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis.
CoRR, 2024

PDF Malware Detection: Toward Machine Learning Modeling With Explainability Analysis.
IEEE Access, 2024

AI-Driven Cybersecurity and Threat Intelligence - Cyber Automation, Intelligent Decision-Making and Explainability
Springer, ISBN: 978-3-031-54497-2, 2024

2023
CovTiNet: Covid text identification network using attention-based positional embedding feature fusion.
Neural Comput. Appl., June, 2023

Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions.
Mob. Networks Appl., February, 2023

Multi-aspects AI-based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview.
Secur. Priv., 2023

Attention-Based Human Age Estimation from Face Images to Enhance Public Security.
Data, 2023

Exploring a Hybrid Deep Learning Framework to Automatically Discover Topic and Sentiment in COVID-19 Tweets.
CoRR, 2023

AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity.
CoRR, 2023

Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper.
CoRR, 2023

Improved YOLOv5-Based Real-Time Road Pavement Damage Detection in Road Infrastructure Management.
Algorithms, 2023

2022
AI-Based Modeling: Techniques, Applications and Research Issues Towards Automation, Intelligent and Smart Systems.
SN Comput. Sci., 2022

BEmoC: A Corpus for Identifying Emotion in Bengali Texts.
SN Comput. Sci., 2022

Effectively predicting cyber-attacks through isolation forest learning-based outlier detection.
Secur. Priv., 2022

Smart City Data Science: Towards data-driven smart cities with open research issues.
Internet Things, 2022

Query-oriented topical influential users detection for top-k trending topics in twitter.
Appl. Intell., 2022

CARAN: A Context-Aware Recency-Based Attention Network for Point-of-Interest Recommendation.
IEEE Access, 2022

Cyber-Attack Detection Through Ensemble-Based Machine Learning Classifier.
Proceedings of the Machine Intelligence and Emerging Technologies, 2022

A Stacked Ensemble Spyware Detection Model Using Hyper-Parameter Tuned Tree Based Classifiers.
Proceedings of the Machine Intelligence and Emerging Technologies, 2022

Aspect Based Sentiment Analysis of COVID-19 Tweets Using Blending Ensemble of Deep Learning Models.
Proceedings of the Machine Intelligence and Emerging Technologies, 2022

Diagnosis and Classification of Fetal Health Based on CTG Data Using Machine Learning Techniques.
Proceedings of the Machine Intelligence and Emerging Technologies, 2022

Classifying Sentiments from Movie Reviews Using Deep Neural Networks.
ICO, 2022

2021
Mobile Expert System: Exploring Context-Aware Machine Learning Rules for Personalized Decision-Making in Mobile Applications.
Symmetry, 2021

AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions.
SN Comput. Sci., 2021

Mobile Deep Learning: Exploring Deep Neural Network for Predicting Context-Aware Smartphone Usage.
SN Comput. Sci., 2021

Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions.
SN Comput. Sci., 2021

Data Science and Analytics: An Overview from Data-Driven Smart Computing, Decision-Making and Applications Perspective.
SN Comput. Sci., 2021

Machine Learning: Algorithms, Real-World Applications and Research Directions.
SN Comput. Sci., 2021

Deep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective.
SN Comput. Sci., 2021

A Data-Driven Heart Disease Prediction Model Through K-Means Clustering-Based Anomaly Detection.
SN Comput. Sci., 2021

Mobile Data Science and Intelligent Apps: Concepts, AI-Based Modeling and Research Directions.
Mob. Networks Appl., 2021

CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks.
Internet Things, 2021

Bengali text document categorization based on very deep convolution neural network.
Expert Syst. Appl., 2021

A Dynamic Topic Identification and Labeling Approach of COVID-19 Tweets.
CoRR, 2021

Development of Duplex Eye Contact Framework for Human-Robot Inter Communication.
IEEE Access, 2021

Authorship Classification in a Resource Constraint Language Using Convolutional Neural Networks.
IEEE Access, 2021

Attribute Driven Temporal Active Online Community Search.
IEEE Access, 2021

Active Vision-Based Attention Monitoring System for Non-Distracted Driving.
IEEE Access, 2021

Emotion Classification in a Resource Constrained Language Using Transformer-based Approach.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Student Research Workshop, 2021

WikiServe: Using Wikipedia to Match IoT based Services for Situation Response.
Proceedings of the ICSIE 2021: 10th International Conference on Software and Information Engineering, Cairo, Egypt, November 12, 2021

iMedMS: An IoT Based Intelligent Medication Monitoring System for Elderly Healthcare.
ICO, 2021

Hybrid CNN-GRU Framework with Integrated Pre-trained Language Transformer for SMS Phishing Detection.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021

Spam Filtering of Mobile SMS Using CNN-LSTM Based Deep Learning Model.
Proceedings of the Hybrid Intelligent Systems, 2021

Context-Aware Machine Learning and Mobile Data Analytics - Automated Rule-based Services with Intelligent Decision-Making
Springer, ISBN: 978-3-030-88530-4, 2021

2020
A Systematic Review on the Use of AI and ML for Fighting the COVID-19 Pandemic.
IEEE Trans. Artif. Intell., 2020

ContextPCA: Predicting Context-Aware Smartphone Apps Usage Based On Machine Learning Techniques.
Symmetry, 2020

IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model.
Symmetry, 2020

K-Nearest Neighbor Learning based Diabetes Mellitus Prediction and Analysis for eHealth Services.
EAI Endorsed Trans. Scalable Inf. Syst., 2020

A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.
Sensors, 2020

Predicting Diabetes Mellitus and Analysing Risk-Factors Correlation.
EAI Endorsed Trans. Pervasive Health Technol., 2020

BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model.
Mob. Networks Appl., 2020

ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services.
J. Netw. Comput. Appl., 2020

Cybersecurity data science: an overview from machine learning perspective.
J. Big Data, 2020

Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling.
J. Big Data, 2020

A Survey on the Use of AI and ML for Fighting the COVID-19 Pandemic.
CoRR, 2020

CalBehav: A Machine Learning-Based Personalized Calendar Behavioral Model Using Time-Series Smartphone Data.
Comput. J., 2020

E-MIIM: an ensemble-learning-based context-aware mobile telephony model for intelligent interruption management.
AI Soc., 2020

Towards POS Tagging Methods for Bengali Language: A Comparative Analysis.
ICO, 2020

An Efficient K-Means Clustering Algorithm for Analysing COVID-19.
Proceedings of the Hybrid Intelligent Systems, 2020

An Effective Heart Disease Prediction Model Based on Machine Learning Techniques.
Proceedings of the Hybrid Intelligent Systems, 2020

An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies.
Proceedings of the Hybrid Intelligent Systems, 2020

Predicting Individual Substance Abuse Vulnerability Using Machine Learning Techniques.
Proceedings of the Hybrid Intelligent Systems, 2020

SentiLSTM: A Deep Learning Approach for Sentiment Analysis of Restaurant Reviews.
Proceedings of the Hybrid Intelligent Systems, 2020

Text Classification Using Convolution Neural Networks with FastText Embedding.
Proceedings of the Hybrid Intelligent Systems, 2020

A Rule-Based Expert System to Assess Coronary Artery Disease Under Uncertainty.
Proceedings of the Computing Science, Communication and Security, 2020

Crime Prediction Using Spatio-Temporal Data.
Proceedings of the Computing Science, Communication and Security, 2020

Cyber Intrusion Detection Using Machine Learning Classification Techniques.
Proceedings of the Computing Science, Communication and Security, 2020

Rice Leaf Diseases Recognition Using Convolutional Neural Networks.
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020

2019
Exploiting Data-Centric Social Context in Phone Call Prediction: A Machine Learning based Study.
EAI Endorsed Trans. Scalable Inf. Syst., 2019

Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage.
J. Big Data, 2019

RecencyMiner: mining recency-based personalized behavior from contextual smartphone data.
J. Big Data, 2019

Context-aware rule learning from smartphone data: survey, challenges and future directions.
J. Big Data, 2019

Mining individualized context-dependent behavioral rules from smartphone data.
J. Ambient Intell. Smart Environ., 2019

Research issues in mining user behavioral rules for context-aware intelligent mobile applications.
Iran J. Comput. Sci., 2019

AppsPred: Predicting context-aware smartphone apps using random forest learning.
Internet Things, 2019

A machine learning based robust prediction model for real-life mobile phone data.
Internet Things, 2019

Performance Analysis of Machine Learning Techniques to Predict Diabetes Mellitus.
CoRR, 2019

2018
Mobile Data Science: Towards Understanding Data-Driven Intelligent Mobile Applications.
EAI Endorsed Trans. Scalable Inf. Syst., 2018

SilentPhone: Inferring User Unavailability based Opportune Moments to Minimize Call Interruptions.
EAI Endorsed Trans. Mob. Commun. Appl., 2018

Individualized Time-Series Segmentation for Mining Mobile Phone User Behavior.
Comput. J., 2018

Understanding the Role of Data-Centric Social Context in Personalized Mobile Applications.
EAI Endorsed Trans. Context aware Syst. Appl., 2018

BehavMiner: Mining User Behaviors from Mobile Phone Data for Personalized Services.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Mining User Behavioral Rules from Smartphone Data Through Association Analysis.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

2017
Identifying Recent Behavioral Data Length in Mobile Phone Log.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

An Approach to Modeling Call Response Behavior on Mobile Phones Based on Multi-Dimensional Contexts.
Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017

Understanding recency-based behavior model for individual mobile phone users.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

Designing architecture of a rule-based system for managing phone call interruptions.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

An effective call prediction model based on noisy mobile phone data.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

An Improved Naive Bayes Classifier-Based Noise Detection Technique for Classifying User Phone Call Behavior.
Proceedings of the Data Mining, 2017

2016
Predicting how you respond to phone calls: towards discovering temporal behavioral rules.
Proceedings of the 28th Australian Conference on Computer-Human Interaction, 2016

Phone call log as a context source to modeling individual user behavior.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

Understanding individuals phone call behavior for calendar events.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

Evidence-Based Behavioral Model for Calendar Schedules of Individual Mobile Phone Users.
Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016

Behavior-Oriented Time Segmentation for Mining Individualized Rules of Mobile Phone Users.
Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016

2014
A Tutorial for Blind Audio Watermarking Scheme.
Smart Comput. Rev., 2014

JMVC: A Java Framework for Rapidly Developing Desktop Application Software Based on MVC.
Smart Comput. Rev., 2014

2013
An Efficient Image Watermarking Scheme Using BFS Technique Based on Hadamard Transform.
Smart Comput. Rev., 2013

Content-based Image Retrieval Using Haar Wavelet Transform and Color Moment.
Smart Comput. Rev., 2013

Digital Watermarking for Image AuthenticationBased on Combined DCT, DWT and SVD Transformation.
CoRR, 2013


  Loading...