Junaid Arshad

Orcid: 0000-0003-0424-9498

According to our database1, Junaid Arshad authored at least 72 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Deep behavioral analysis of machine learning algorithms against data poisoning.
Int. J. Inf. Sec., February, 2025

2024
Machine learning security and privacy: a review of threats and countermeasures.
EURASIP J. Inf. Secur., December, 2024

TruPro: a blockchain-based decentralised prosumer electricity trading platform for electrical vehicles (EVs).
Clust. Comput., December, 2024

Verify and trust: A multidimensional survey of zero-trust security in the age of IoT.
Internet Things, 2024

Outlier-Oriented Poisoning Attack: A Grey-box Approach to Disturb Decision Boundaries by Perturbing Outliers in Multiclass Learning.
CoRR, 2024

Smart agriculture assurance: IoT and blockchain for trusted sustainable produce.
Comput. Electron. Agric., 2024

ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph.
Big Data Min. Anal., 2024

NFTMosaic: Piecing Together Assets in a Unified Blockchain Token.
Proceedings of the Knowledge Science, Engineering and Management, 2024

2023
Guest Editorial: Machine learning applied to quality and security in software systems.
IET Softw., August, 2023

TruCert: Blockchain-based trustworthy product certification within autonomous automotive supply chains.
Comput. Electr. Eng., August, 2023

A Framework for Decentralized, Real-Time Reputation Aggregation in IoV.
IEEE Internet Things Mag., June, 2023

Corrigendum to "DEEPSEL: A novel feature selection for early identification of malware in mobile applications" [Future Gener. Comput. Syst. 129 (2022) 54-63].
Future Gener. Comput. Syst., June, 2023

Collaborative device-level botnet detection for internet of things.
Comput. Secur., June, 2023

S.U.S. You're SUS! - Identifying influencer hackers on dark web social networks.
Comput. Electr. Eng., April, 2023

A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT.
Inf., February, 2023

Ransomware prevention using moving target defense based approach.
Concurr. Comput. Pract. Exp., 2023

A Proxy-Layer Approach to Secure Smart Contract Deployment on Private EVM-Based PoA Blockchains.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
Scalable blockchains - A systematic review.
Future Gener. Comput. Syst., 2022

DEEPSEL: A novel feature selection for early identification of malware in mobile applications.
Future Gener. Comput. Syst., 2022

An empirical investigation of performance challenges within context-aware content sharing for vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2022

A privacy-preserving framework for smart context-aware healthcare applications.
Trans. Emerg. Telecommun. Technol., 2022

Chain-Net: An Internet-inspired Framework for Interoperable Blockchains.
Distributed Ledger Technol. Res. Pract., 2022

Blockchain-enabled real-time SLA monitoring for cloud-hosted services.
Clust. Comput., 2022

Blockchain-based Supply Chain Traceability for COVID-19 personal protective equipment.
Comput. Ind. Eng., 2022

REPUTABLE-A Decentralized Reputation System for Blockchain-Based Ecosystems.
IEEE Access, 2022

Threat Miner - A Text Analysis Engine for Threat Identification Using Dark Web Data.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
A bibliometric approach to quantitatively assess current research trends in 5G security.
Libr. Hi Tech, 2021

Analysis of security and privacy challenges for DNA-genomics applications and databases.
J. Biomed. Informatics, 2021

A First Look at Privacy Analysis of COVID-19 Contact-Tracing Mobile Applications.
IEEE Internet Things J., 2021

Empirical analysis of transaction malleability within blockchain-based e-Voting.
Comput. Secur., 2021

A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs.
Comput. Networks, 2021

A Blockchain-Based Approach for Drug Traceability in Healthcare Supply Chain.
IEEE Access, 2021

appXchain: Application-Level Interoperability for Blockchain Networks.
IEEE Access, 2021

Trustworthy Blockchain Gateways for Resource-Constrained Clients and IoT Devices.
IEEE Access, 2021

Design and Implementation of CryptoCargo: A Blockchain-Powered Smart Shipping Container for Vaccine Distribution.
IEEE Access, 2021

RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
Investigating performance constraints for blockchain based secure e-voting system.
Future Gener. Comput. Syst., 2020

Predicting likelihood of legitimate data loss in email DLP.
Future Gener. Comput. Syst., 2020

Socioscope: I know who you are, a robo, human caller or service number.
Future Gener. Comput. Syst., 2020

A First Look at Contact Tracing Apps.
CoRR, 2020

Simulation of transaction malleability attack for blockchain-based e-Voting.
Comput. Electr. Eng., 2020

Wind power prediction using a three stage genetic ensemble and auxiliary predictor.
Appl. Soft Comput., 2020

Blockchain-Based Solution for COVID-19 Digital Medical Passports and Immunity Certificates.
IEEE Access, 2020

Blockchain-Based Verifiable Tracking of Resellable Returned Drugs.
IEEE Access, 2020

Blockchain-Based Traceability and Management for Additive Manufacturing.
IEEE Access, 2020

2019
Energy Efficient Resource Allocation for M2M Devices in 5G.
Sensors, 2019

COLIDE: a collaborative intrusion detection framework for Internet of Things.
IET Networks, 2019

Pervasive blood pressure monitoring using Photoplethysmogram (PPG) sensor.
Future Gener. Comput. Syst., 2019

Performance analysis of content discovery for ad-hoc tactile networks.
Future Gener. Comput. Syst., 2019

Decentralized document version control using ethereum blockchain and IPFS.
Comput. Electr. Eng., 2019

2018
SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Secure Digital Voting System Based on Blockchain Technology.
Int. J. Electron. Gov. Res., 2018

A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT.
CoRR, 2018

2016
Clustering VoIP caller for SPIT identification.
Secur. Commun. Networks, 2016

Energy efficient techniques for M2M communication: A survey.
J. Netw. Comput. Appl., 2016

Multi-level meta-workflows: new concept for regularly occurring tasks in quantum chemistry.
J. Cheminformatics, 2016

A Formal Approach to Support Interoperability in Scientific Meta-workflows.
J. Grid Comput., 2016

A Model for Information and Action Flows Connecting Science Gateways to Distributed Computing Infrastructures.
Proceedings of the 8th International Workshop on Science Gateways, 2016

2014
Wind Power Prediction Using Genetic Programming Based Ensemble of Artificial Neural Networks (GPeANN).
Proceedings of the 12th International Conference on Frontiers of Information Technology, 2014

2013
Intrusion damage assessment for multi-stage attacks for clouds.
IET Commun., 2013

A novel intrusion severity analysis approach for Clouds.
Future Gener. Comput. Syst., 2013

2012
Cloud Computing Security: Opportunities and Pitfalls.
Int. J. Grid High Perform. Comput., 2012

2011
An Intrusion Diagnosis Perspective on Cloud Computing.
Proceedings of the Guide to e-Science, Next Generation Scientific Research and Discovery, 2011

An Abstract Model for Integrated Intrusion Detection and Severity Analysis for Clouds.
Int. J. Cloud Appl. Comput., 2011

An automatic intrusion diagnosis approach for clouds.
Int. J. Autom. Comput., 2011

A review of grid authentication and authorization technologies and support for federated access control.
ACM Comput. Surv., 2011

The Design, Development and Application of a Proxy Credential Auditing Infrastructure for Collaborative Research.
Proceedings of the E-Technologies: Transformation in a Connected World, 2011

2010
Authentication and authorization infrastructure for Grids - issues, technologies, trends and experiences.
J. Supercomput., 2010

A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems.
Proceedings of the Advances in Computer Science and Information Technology, 2010

2009
Quantification of Security for Compute Intensive Workloads in Clouds.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

2008
A Guanxi Shibboleth based Security Infrastructure.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

2006
Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006


  Loading...