Zunera Jalil

Orcid: 0000-0003-2531-2564

According to our database1, Zunera Jalil authored at least 27 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
RansomGuard: a framework for proactive detection and mitigation of cryptographic windows ransomware.
J. Comput. Virol. Hacking Tech., November, 2024

Data Augmentation-based Novel Deep Learning Method for Deepfaked Images Detection.
ACM Trans. Multim. Comput. Commun. Appl., November, 2024

Multimodal Religiously Hateful Social Media Memes Classification Based on Textual and Image Data.
ACM Trans. Asian Low Resour. Lang. Inf. Process., August, 2024

2023
Identification and Categorization of Unusual Internet of Vehicles Events in Noisy Audio.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

2022
Ensemble Adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles.
Trans. Emerg. Telecommun. Technol., 2022

A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions.
IEEE Access, 2022

Deepfake Audio Detection via MFCC Features Using Machine Learning.
IEEE Access, 2022

A Large-Scale Benchmark Dataset for Anomaly Detection and Rare Event Classification for Audio Forensics.
IEEE Access, 2022

Deepfake Audio Detection Via Feature Engineering And Machine Learning.
Proceedings of the CIKM 2022 Workshops co-located with 31st ACM International Conference on Information and Knowledge Management (CIKM 2022), 2022

2021
A comprehensive survey of AI-enabled phishing attacks detection techniques.
Telecommun. Syst., 2021

BCD-WERT: a novel approach for breast cancer detection using whale optimization based efficient features and extremely randomized tree algorithm.
PeerJ Comput. Sci., 2021

SHA-AMD: sample-efficient hyper-tuned approach for detection and identification of Android malware family and category.
Int. J. Ad Hoc Ubiquitous Comput., 2021

DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU).
Future Gener. Comput. Syst., 2021

DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network.
Future Gener. Comput. Syst., 2021

A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions.
Eng. Appl. Artif. Intell., 2021

Security in Next Generation Mobile Payment Systems: A Comprehensive Survey.
CoRR, 2021

SeFACED: Semantic-Based Forensic Analysis and Classification of E-Mail Data Using Deep Learning.
IEEE Access, 2021

Security in Next Generation Mobile Payment Systems: A Comprehensive Survey.
IEEE Access, 2021

ElStream: An Ensemble Learning Approach for Concept Drift Detection in Dynamic Social Big Data Stream Learning.
IEEE Access, 2021

Email Classification and Forensics Analysis using Machine Learning.
Proceedings of the 2021 IEEE SmartWorld, 2021

2020
KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks.
IEEE Access, 2020

2019
Are Computer Experience and Anxiety Irrelevant? Towards a Simple Model for Adoption of E-Learning Systems.
Int. J. Eng. Pedagog., 2019

2013
Efficient spectrum optimization and mobility in cognitive radio based inter-vehicle communcation system.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

2010
Content based Zero-Watermarking Algorithm for Authentication of Text Documents
CoRR, 2010

2009
Opposition based initialization in particle swarm optimization (O-PSO).
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

An Invisible Text Watermarking Algorithm using Image Watermark.
Proceedings of the Innovations in Computing Sciences and Software Engineering, 2009

2008
Is Non Technical Person a Better Software Project Manager?
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...