Kadhim Hayawi
Orcid: 0000-0002-8092-4590
According to our database1,
Kadhim Hayawi
authored at least 34 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
2
6
6
3
1
1
1
1
4
4
2
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Putting GPT-4o to the Sword: A Comprehensive Evaluation of Language, Vision, Speech, and Multimodal Proficiency.
CoRR, 2024
CoRR, 2024
Enhancing Anomaly Detection in Agricultural IoT Systems through Incremental Learning with Spike Neural Networks.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
2023
IEEE Internet Things Mag., June, 2023
Neural Comput. Appl., April, 2023
IEEE Open J. Commun. Soc., 2023
Airborne Computing: A Toolkit for UAV-Assisted Federated Computing for Sustainable Smart Cities.
IEEE Internet Things J., 2023
The Imitation Game: Detecting Human and AI-Generated Texts in the Era of Large Language Models.
CoRR, 2023
Let's have a chat! A Conversation with ChatGPT: Technology, Applications, and Limitations.
CoRR, 2023
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023
2022
DeeProBot: a hybrid deep neural network model for social bot detection based on user profile data.
Soc. Netw. Anal. Min., 2022
Trajectory Design for UAV-Based Data Collection Using Clustering Model in Smart Farming.
Sensors, 2022
Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment.
Sensors, 2022
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT).
J. Cloud Comput., 2022
Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey.
Clust. Comput., 2022
Proceedings of the ICMLT 2022: 7th International Conference on Machine Learning Technologies, Rome, Italy, March 11, 2022
Global Aggregation Node Selection Scheme in Federated Learning for Vehicular Ad Hoc Networks (VANETs).
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2022
On the Impact of Deep Learning and Feature Extraction for Arabic Audio Classification and Speaker Identification.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022
2021
Hybrid feature selection approach to identify optimal features of profile metadata to detect social bots in Twitter.
Soc. Netw. Anal. Min., 2021
Multi-Level Resource Sharing Framework Using Collaborative Fog Environment for Smart Cities.
IEEE Access, 2021
D2Gen: A Decentralized Device Genome Based Integrity Verification Mechanism for Collaborative Intrusion Detection Systems.
IEEE Access, 2021
Proceedings of the IEEE Global Engineering Education Conference, 2021
Proceedings of the 5th Cyber Security in Networking Conference, 2021
Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka.
Proceedings of the 5th Cyber Security in Networking Conference, 2021
Proceedings of the Advanced Data Mining and Applications - 17th International Conference, 2021
2020
Thwarting ICMP Low-Rate Attacks Against Firewalls While Minimizing Legitimate Traffic Loss.
IEEE Access, 2020
Proceedings of the Web Services - ICWS 2020, 2020
Effective Patient Similarity Computation for Clinical Decision Support Using Time Series and Static Data.
Proceedings of the Australasian Computer Science Week, 2020
2019
Denial of Firewalling Attacks (DoF): The Case Study of the Emerging BlackNurse Attack.
IEEE Access, 2019
2017
Securing the Internet of Things: A Worst-Case Analysis of Trade-Off between Query-Anonymity and Communication-Cost.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2015
The Limits of the Trade-Off Between Query-Anonymity and Communication-Cost in Wireless Sensor Networks.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2006
End-to-end security solutions for WLAN: a performance analysis for the underlying encryption algorithms in the lightweight devices.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006