Junaid Akram
Orcid: 0000-0003-1752-6124
According to our database1,
Junaid Akram
authored at least 32 papers
between 2018 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Digital Twin-Driven Trust Management in Open RAN-Based Spatial Crowdsourcing Drone Services.
IEEE Trans. Green Commun. Netw., September, 2024
IEEE Trans. Consumer Electron., February, 2024
A Blockchain-Enhanced Framework for Privacy and Data Integrity in Crowdsourced Drone Services.
CoRR, 2024
Privacy-First Crowdsourcing: Blockchain and Local Differential Privacy in Crowdsourced Drone Services.
CoRR, 2024
Ensemble Pretrained Models for Multimodal Sentiment Analysis using Textual and Video Data Fusion.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
DDRM: Distributed Drone Reputation Management for Trust and Reliability in Crowdsourced Drone Services.
Proceedings of the IEEE International Conference on Web Services, 2024
Decentralized PKI Framework for Data Integrity in Spatial Crowdsourcing Drone Services.
Proceedings of the IEEE International Conference on Web Services, 2024
2023
Chained-Drones: Blockchain-based privacy-preserving framework for secure and intelligent service provisioning in Internet of Drone Things.
Comput. Electr. Eng., September, 2023
Drone-as-a-Service (DaaS) for COVID-19 self-testing kits delivery in smart healthcare setups: A technological perspective.
ICT Express, August, 2023
2022
Sensors, 2022
Sensors, 2022
Int. J. Inf. Comput. Secur., 2022
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022
2021
SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment.
Softw. Pract. Exp., 2021
Sensors, 2021
Inf. Fusion, 2021
DroidMD: an efficient and scalable Android malware detection approach at source code level.
Int. J. Inf. Comput. Secur., 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
2020
MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning.
IEEE Trans. Computers, 2020
IBFET: Index-based features extraction technique for scalable code clone detection at file level granularity.
Softw. Pract. Exp., 2020
J. Inf. Sci. Eng., 2020
IET Inf. Secur., 2020
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
2019
An Integrated Software Vulnerability Discovery Model based on Artificial Neural Network.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019
VCIPR: Vulnerable Code is Identifiable When a Patch is Released (Hacker's Perspective).
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
2018
DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018
Proceedings of the Advances in Network-Based Information Systems, 2018
Proceedings of the 24th International Conference on Automation and Computing, 2018
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018
DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018