Noshina Tariq

Orcid: 0000-0002-9754-253X

According to our database1, Noshina Tariq authored at least 26 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2019
2020
2021
2022
2023
2024
0
1
2
3
4
5
6
7
8
9
10
7
5
4
3
3
2
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BERT-Based Deceptive Review Detection in Social Media: Introducing DeceptiveBERT.
IEEE Trans. Comput. Soc. Syst., December, 2024

A fog-edge-enabled intrusion detection system for smart grids.
J. Cloud Comput., December, 2024

FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning.
Sensors, September, 2024

Machine learning and internet of things applications in enterprise architectures: Solutions, challenges, and open issues.
Expert Syst. J. Knowl. Eng., January, 2024

Corrections to "Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey".
IEEE Access, 2024

Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey.
IEEE Access, 2024

BBAD: Blockchain-Backed Assault Detection for Cyber Physical Systems.
IEEE Access, 2024

Federated Learning for Enhanced Malware Threat Detection to Secure Smart Power Grids.
Proceedings of the International Conference on Ubiquitous Computing and Ambient Intelligence (UCAmI 2024), 2024

A Federated Learning Mechanism for Mitigating Selective Forwarding Attacks in RPL-Based Internet of Things.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

2023
Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework.
Sensors, December, 2023

Instant_Anonymity: A Lightweight Semantic Privacy Guarantee for 5G-Enabled IIoT.
IEEE Trans. Ind. Informatics, 2023

BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things.
Sensors, 2023

CAPTCHA Types and Breaking Techniques: Design Issues, Challenges, and Future Research Directions.
CoRR, 2023

GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures.
IEEE Access, 2023

2022
A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing.
Wirel. Pers. Commun., 2022

Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.
Sensors, 2022

Machine learning and the Internet of Things security: Solutions and open challenges.
J. Parallel Distributed Comput., 2022

An efficient framework for semantically-correlated term detection and sanitization in clinical documents.
Comput. Electr. Eng., 2022

2021
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things.
Sensors, 2021

CTrust-RPL: A control layer-based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks-based Internet of Things applications.
Trans. Emerg. Telecommun. Technol., 2021

Tweet-Based Bot Detection Using Big Data Analytics.
IEEE Access, 2021

Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021

2020
Blockchain and Smart Healthcare Security: A Survey.
Proceedings of the 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2020) / The 15th International Conference on Future Networks and Communications (FNC-2020) / The 10th International Conference on Sustainable Energy Information Technology, 2020

2019
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.
Sensors, 2019

A Mechanism for Securing IoT-enabled Applications at the Fog Layer.
J. Sens. Actuator Networks, 2019

A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT.
J. Parallel Distributed Comput., 2019


  Loading...