Junaid Akram

Orcid: 0000-0003-1752-6124

According to our database1, Junaid Akram authored at least 32 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Digital Twin-Driven Trust Management in Open RAN-Based Spatial Crowdsourcing Drone Services.
IEEE Trans. Green Commun. Netw., September, 2024

DroneSSL: Self-Supervised Multimodal Anomaly Detection in Internet of Drone Things.
IEEE Trans. Consumer Electron., February, 2024

A Blockchain-Enhanced Framework for Privacy and Data Integrity in Crowdsourced Drone Services.
CoRR, 2024

Privacy-First Crowdsourcing: Blockchain and Local Differential Privacy in Crowdsourced Drone Services.
CoRR, 2024

Ensemble Pretrained Models for Multimodal Sentiment Analysis using Textual and Video Data Fusion.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

DDRM: Distributed Drone Reputation Management for Trust and Reliability in Crowdsourced Drone Services.
Proceedings of the IEEE International Conference on Web Services, 2024

Decentralized PKI Framework for Data Integrity in Spatial Crowdsourcing Drone Services.
Proceedings of the IEEE International Conference on Web Services, 2024

2023
Chained-Drones: Blockchain-based privacy-preserving framework for secure and intelligent service provisioning in Internet of Drone Things.
Comput. Electr. Eng., September, 2023

Drone-as-a-Service (DaaS) for COVID-19 self-testing kits delivery in smart healthcare setups: A technological perspective.
ICT Express, August, 2023

2022
Automatic Target Detection from Satellite Imagery Using Machine Learning.
Sensors, 2022

Using Adaptive Sensors for Optimised Target Coverage in Wireless Sensor Networks.
Sensors, 2022

Obfuscated code is identifiable by a token-based code clone detection technique.
Int. J. Inf. Comput. Secur., 2022

BC-IoDT: blockchain-based framework for authentication in internet of drone things.
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022

2021
SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment.
Softw. Pract. Exp., 2021

Cloud- and Fog-Integrated Smart Grid Model for Efficient Resource Utilisation.
Sensors, 2021

SPICE-IT: Smart COVID-19 pandemic controlled eradication over NDN-IoT.
Inf. Fusion, 2021

DroidMD: an efficient and scalable Android malware detection approach at source code level.
Int. J. Inf. Comput. Secur., 2021

Swarm intelligence based localization in wireless sensor networks.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2020
MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning.
IEEE Trans. Computers, 2020

IBFET: Index-based features extraction technique for scalable code clone detection at file level granularity.
Softw. Pract. Exp., 2020

DroidSD: An Efficient Indexed Based Android Applications Similarity Detection Tool.
J. Inf. Sci. Eng., 2020

How to build a vulnerability benchmark to overcome cyber security attacks.
IET Inf. Secur., 2020

Intelligent Target Coverage in Wireless Sensor Networks with Adaptive Sensors.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

2019
An Integrated Software Vulnerability Discovery Model based on Artificial Neural Network.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019

VCIPR: Vulnerable Code is Identifiable When a Patch is Released (Hacker's Perspective).
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019

An RSA Based Authentication System for Smart IoT Environment.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Efficient Resource Distribution in Cloud and Fog Computing.
Proceedings of the Advances in Network-Based Information Systems, 2018

Statistical Topic Modeling for Urdu Text Articles.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Lexicon and Heuristics Based Approach for Identification of Emotion in Text.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018

Efficient Resource Utilization in Cloud-Fog Environment Integrated with Smart Grids.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018

DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018


  Loading...