Rabia Latif

Orcid: 0000-0001-5304-5948

According to our database1, Rabia Latif authored at least 39 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
LSTMDD: an optimized LSTM-based drift detector for concept drift in dynamic cloud computing.
PeerJ Comput. Sci., 2024

Cross-Lingual News Event Correlation for Stock Market Trend Prediction.
CoRR, 2024

A Benchmark Dataset with Larger Context for Non-Factoid Question Answering over Islamic Text.
CoRR, 2024

Optimizing Multi-Stuttered Speech Classification: Leveraging Whisper's Encoder for Efficient Parameter Reduction in Automated Assessment.
CoRR, 2024

DRIFTNET-EnVACK: Adaptive Drift Detection in Cloud Data Streams With Ensemble Variational Auto-Encoder Featuring Contextual Network.
IEEE Access, 2024

2023
Assessing Urdu Language Processing Tools via Statistical and Outlier Detection Methods on Urdu Tweets.
ACM Trans. Asian Low Resour. Lang. Inf. Process., October, 2023

Image Encryption Scheme Based on Orbital Shift Pixels Shuffling with ILM Chaotic System.
Entropy, 2023

Whisper in Focus: Enhancing Stuttered Speech Classification with Encoder Layer Optimization.
CoRR, 2023

CrossDomain Recommendation Based on MetaData Using Graph Convolution Networks.
IEEE Access, 2023

Multi Factor Authentication as a Service (MFAaaS) for Federated Cloud Environments.
Proceedings of the Second International Conference on Innovations in Computing Research (ICR'23), 2023

2022
RiceChain: secure and traceable rice supply chain framework using blockchain technology.
PeerJ Comput. Sci., 2022

A novel searchable encryption scheme to reduce the access pattern leakage.
Future Gener. Comput. Syst., 2022

ConTrust: A Novel Context-Dependent Trust Management Model in Social Internet of Things.
IEEE Access, 2022

2021
A novel cloud management framework for trust establishment and evaluation in a federated cloud environment.
J. Supercomput., 2021

T-Smart: Trust Model for Blockchain Based Smart Marketplace.
J. Theor. Appl. Electron. Commer. Res., 2021

Analyzing LDA and NMF Topic Models for Urdu Tweets via Automatic Labeling.
IEEE Access, 2021

Suspicious Activity Recognition Using Proposed Deep L4-Branched-Actionnet With Entropy Coded Ant Colony System Optimization.
IEEE Access, 2021

Behavioral Based Insider Threat Detection Using Deep Learning.
IEEE Access, 2021

Question Classification Using Universal Sentence Encoder and Deep Contextualized Transformer.
Proceedings of the 14th International Conference on Developments in eSystems Engineering, 2021

2020
Analytical study of hardware-rooted security standards and their implementation techniques in mobile.
Telecommun. Syst., 2020

Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols.
IEEE Access, 2020

Malicious Insider Attack Detection in IoTs Using Data Analytics.
IEEE Access, 2020

Backward-Forward Sequence Generative Network for Multiple Lexical Constraints.
Proceedings of the Artificial Intelligence Applications and Innovations, 2020

MAD-Malicious Activity Detection Framework in Federated Cloud Computing.
Proceedings of the 13th International Conference on Developments in eSystems Engineering, 2020

Crowdsourcing Cybercrimes through Online Resources.
Proceedings of the 13th International Conference on Developments in eSystems Engineering, 2020

Detection and Prevention of a Malicious Activity in Industrial Federated Cloud Computing Paradigm.
Proceedings of the Advances in Neuroergonomics and Cognitive Engineering, 2020

2018
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review.
Multim. Tools Appl., 2018

Detection of Denial of Service (DoS) Attack in Vehicular Ad Hoc Networks: A Systematic Literature Review.
Ad Hoc Sens. Wirel. Networks, 2018

Enhancing E-Healthcare Privacy Preservation Framework through L-Diversity.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

2017
An Adaptive Rule-Based Approach to Resolving Real-Time VoIP Wholesale Billing Disputes.
J. Inf. Sci. Eng., 2017

2016
Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.
J. Medical Syst., 2016

Distributed denial of service (DDoS) attack detection using data mining approach in cloud-assisted wireless body area networks.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems.
Ann. des Télécommunications, 2016

2015
EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network.
Mob. Inf. Syst., 2015

Designing an Assistive Learning Aid for Writing Acquisition: A Challenge for Children with Dyslexia.
Proceedings of the Assistive Technology, 2015

2014
Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: <i>A Systematic Literature Review</i>.
J. Medical Syst., 2014

Analyzing Feasibility for Deploying Very Fast Decision Tree for DDoS Attack Detection in Cloud-Assisted WBAN.
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014

2012
A Boundary Node Detection Based Solution for Minimizing the Effects of Nodes Distribution over Key Exchange in Group Based WSN.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

2009
Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs).
Proceedings of the Advances in Information Security and Assurance, 2009


  Loading...