Farhan Ullah

Orcid: 0000-0002-1030-1275

According to our database1, Farhan Ullah authored at least 60 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Adaptive IoT Defense With Deep Q-Learning Model for DNS Spoofing Prevention in Self-Organizing Networks.
IEEE Commun. Stand. Mag., September, 2025

Metaheuristic-Driven Secure Task Optimization for Consumer Edge Devices.
IEEE Consumer Electron. Mag., July, 2025

Q-P2FL: Quantum-Enhanced Federated Edge Intelligence for Privacy-Preserving Adversarial Attack Detection on Consumer Edge Devices.
IEEE Trans. Consumer Electron., May, 2025

Federated Edge Intelligence for Enhanced Security in Consumer Intermittent Healthcare Devices Using Adversarial Examples.
IEEE Trans. Consumer Electron., May, 2025

TCAD-Net: Integrating Transformer and Convolution for Weakly Supervised Anomaly Data Discovery.
IEEE Trans. Consumer Electron., May, 2025

A Survey on Emerging Trends and Applications of 5G and 6G to Healthcare Environments.
ACM Comput. Surv., April, 2025

Semantic-Based Federated Defense for Distributed Malicious Attacks.
IEEE Consumer Electron. Mag., March, 2025

Efficient malware detection using hybrid approach of transfer learning and generative adversarial examples with image representation.
Expert Syst. J. Knowl. Eng., February, 2025

Homomorphic Encryption Applications for IoT and Light-Weighted Environments: A Review.
IEEE Internet Things J., January, 2025

Classification of intrusion cyber-attacks in smart power grids using deep ensemble learning with metaheuristic-based optimization.
Expert Syst. J. Knowl. Eng., January, 2025

A Stochastic Prototypical Network for Few-Shot Intrusion Detection in CAN-Based IoV Network.
IEEE Open J. Commun. Soc., 2025

THE-TAFL: Transforming Healthcare Edge with Transformer-based Adaptive Federated Learning and Learning Rate Optimization.
Internet Things, 2025

Optimizing vehicle security: A multiclassification framework using deep transfer learning and metaheuristic-based genetic algorithm optimization.
Int. J. Crit. Infrastructure Prot., 2025

Elevating e-health excellence with IOTA distributed ledger technology: Sustaining data integrity in next-gen fog-driven systems.
Future Gener. Comput. Syst., 2025

Measuring student attention based on EEG brain signals using deep reinforcement learning.
Expert Syst. Appl., 2025

Advanced EEG Signal Processing and Deep Q-Learning for Accurate Student Attention Monitoring.
IEEE Access, 2025

ActionSync Video Transformation: Automated Object Removal and Responsive Effects in Motion Videos Using Hybrid CNN and GRU.
IEEE Access, 2025

A Deep Learning-Based RIDNet Approach for Enhanced Denoising of SAR Images.
Proceedings of the Advanced Information Networking and Applications, 2025

2024
A Lightweight Zero Trust Framework for Secure 5G VANET Vehicular Communication.
IEEE Wirel. Commun., December, 2024

NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble.
Wirel. Networks, August, 2024

Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory.
Sensors, July, 2024

A Scalable Federated Learning Approach for Collaborative Smart Healthcare Systems With Intermittent Clients Using Medical Imaging.
IEEE J. Biomed. Health Informatics, June, 2024

Intelligent multimedia content delivery in 5G/6G networks: A reinforcement learning approach.
Trans. Emerg. Telecommun. Technol., April, 2024

NIDS-VSB: Network Intrusion Detection System for VANET Using Spark-Based Big Data Optimization and Transfer Learning.
IEEE Trans. Consumer Electron., February, 2024

Privacy-Preserving Federated Learning Approach for Distributed Malware Attacks With Intermittent Clients and Image Representation.
IEEE Trans. Consumer Electron., February, 2024

Intelligent decision making for energy efficient fog nodes selection and smart switching in the IOT: a machine learning approach.
PeerJ Comput. Sci., 2024

Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system.
PeerJ Comput. Sci., 2024

An expert system for hybrid edge to cloud computational offloading in heterogeneous MEC-MCC environments.
J. Netw. Comput. Appl., 2024

The revolution and vision of explainable AI for Android malware detection and protection.
Internet Things, 2024

Computational modeling of animal behavior in T-mazes: Insights from machine learning.
Ecol. Informatics, 2024

IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic.
Digit. Commun. Networks, 2024

Collaborative Intrusion Detection System for Intermittent 10 Vs Using Federated Learning and Deep Swarm Particle Optimization.
Proceedings of the 11th IEEE International Conference on Data Science and Advanced Analytics, 2024

Homomorphic Cryptography Authentication Scheme to Eliminate Machine Tools Gaps in Industry 4.0.
Proceedings of the Advanced Information Networking and Applications, 2024

P2FL: Privacy-Preserving Federated Learning Approach for Healthcare Informatics at the Edge.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2024

2023
Dynamic Resource Allocation Techniques for Wireless Network Data in Elastic Optical Network Applications.
Mob. Networks Appl., October, 2023

Development of a deep stacked ensemble with process based volatile memory forensics for platform independent malware detection and classification.
Expert Syst. Appl., August, 2023

Video Resources Recommendation for Online Tourism Teaching in Interactive Network.
Mob. Networks Appl., June, 2023

Droid-MCFG: Android malware detection system using manifest and control flow traces with multi-head temporal convolutional network.
Phys. Commun., April, 2023

Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey.
Comput. Sci. Rev., February, 2023

Android-IoT Malware Classification and Detection Approach Using Deep URL Features Analysis.
J. Database Manag., 2023

A typology of secure multicast communication over 5 G/6 G networks.
Int. J. Inf. Sec., 2023

2022
IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification.
ACM Trans. Internet Techn., 2022

Explainable artificial intelligence approach in combating real-time surveillance of COVID19 pandemic from CT scan and X-ray images using ensemble model.
J. Supercomput., 2022

Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation.
Sensors, 2022

Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation.
Sensors, 2022

A Deep Convolutional Neural Network Stacked Ensemble for Malware Threat Classification in Internet of Things.
J. Circuits Syst. Comput., 2022

A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization.
J. Cloud Comput., 2022

A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments.
J. Inf. Secur. Appl., 2022

CroLSSim: Cross-language software similarity detector using hybrid approach of LSA-based AST-MDrep features and CNN-LSTM model.
Int. J. Intell. Syst., 2022

Detection of clone scammers in Android markets using IoT-based edge computing.
Trans. Emerg. Telecommun. Technol., 2022

2021
A Deep Learning-based Approach for Emotions Classification in Big Corpus of Imbalanced Tweets.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021

Clone detection in 5G-enabled social IoT system using graph semantics and deep learning model.
Int. J. Mach. Learn. Cybern., 2021

An intelligent decision support system for software plagiarism detection in academia.
Int. J. Intell. Syst., 2021

2020
Malware detection in industrial internet of things based on hybrid image visualization and deep learning model.
Ad Hoc Networks, 2020

An Efficient Framework for Text Document Security and Privacy.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

2019
A Cross-Platform Malware Variant Classification based on Image Representation.
KSII Trans. Internet Inf. Syst., 2019

Identification of malicious code variants based on image visualization.
Comput. Electr. Eng., 2019

Source Code Authorship Attribution Using Hybrid Approach of Program Dependence Graph and Deep Learning Model.
IEEE Access, 2019

Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach.
IEEE Access, 2019

Scalable Mutation Testing Using Predictive Analysis of Deep Learning Model.
IEEE Access, 2019


  Loading...