Iqbal H. Sarker
Orcid: 0000-0003-1740-5517Affiliations:
- Cyber Security Cooperative Research Centre, Australia
- Edith Cowan University, Perth, WA, Australia
- Swinburne University, Australia (former)
- Chittagong University of Engineering & Technology, Bangladesh (former)
  According to our database1,
  Iqbal H. Sarker
  authored at least 118 papers
  between 2013 and 2026.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on scopus.com
- 
    on orcid.org
- 
    on dl.acm.org
On csauthors.net:
Bibliography
  2026
Mitigating malware prevalence in networks with arbitrary topologies: a Flip-It cyber game approach integrated with epidemic modeling.
    
  
    Inf. Sci., 2026
    
  
  2025
SME-TEAM: Leveraging Trust and Ethics for Secure and Responsible Use of AI and LLMs in SMEs.
    
  
    CoRR, September, 2025
    
  
    CoRR, September, 2025
    
  
A Unified Framework for Human AI Collaboration in Security Operations Centers with Trusted Autonomy.
    
  
    CoRR, May, 2025
    
  
A hybrid deep learning framework for daily living human activity recognition with cluster-based video summarization.
    
  
    Multim. Tools Appl., March, 2025
    
  
    CoRR, March, 2025
    
  
  2024
    Sensors, June, 2024
    
  
Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures.
    
  
    Internet Things, April, 2024
    
  
An improved transformer-based model for detecting phishing, spam and ham emails: A large language model approach.
    
  
    Secur. Priv., 2024
    
  
A differential privacy aided DeepFed intrusion detection system for IoT applications.
    
  
    Secur. Priv., 2024
    
  
Cyberbullying Text Identification based on Deep Learning and Transformer-based Language Models.
    
  
    EAI Endorsed Trans. Ind. Networks Intell. Syst., 2024
    
  
Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects.
    
  
    ICT Express, 2024
    
  
LLM potentiality and awareness: a position paper from the perspective of trustworthy and responsible AI modeling.
    
  
    Discov. Artif. Intell., 2024
    
  
Can We Trust Large Language Models Generated Code? A Framework for In-Context Learning, Security Patterns, and Code Evaluations Across Diverse LLMs.
    
  
    CoRR, 2024
    
  
ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis.
    
  
    CoRR, 2024
    
  
    CoRR, 2024
    
  
    CoRR, 2024
    
  
An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach.
    
  
    CoRR, 2024
    
  
Agricultural Recommendation System based on Deep Learning: A Multivariate Weather Forecasting Approach.
    
  
    CoRR, 2024
    
  
Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis.
    
  
    CoRR, 2024
    
  
PDF Malware Detection: Toward Machine Learning Modeling With Explainability Analysis.
    
  
    IEEE Access, 2024
    
  
    IEEE Access, 2024
    
  
AI-Driven Cybersecurity and Threat Intelligence - Cyber Automation, Intelligent Decision-Making and Explainability
    
  
    Springer, ISBN: 978-3-031-54497-2, 2024
    
  
  2023
CovTiNet: Covid text identification network using attention-based positional embedding feature fusion.
    
  
    Neural Comput. Appl., June, 2023
    
  
Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions.
    
  
    Mob. Networks Appl., February, 2023
    
  
Multi-aspects AI-based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview.
    
  
    Secur. Priv., 2023
    
  
    Data, 2023
    
  
Exploring a Hybrid Deep Learning Framework to Automatically Discover Topic and Sentiment in COVID-19 Tweets.
    
  
    CoRR, 2023
    
  
AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity.
    
  
    CoRR, 2023
    
  
Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper.
    
  
    CoRR, 2023
    
  
Improved YOLOv5-Based Real-Time Road Pavement Damage Detection in Road Infrastructure Management.
    
  
    Algorithms, 2023
    
  
  2022
AI-Based Modeling: Techniques, Applications and Research Issues Towards Automation, Intelligent and Smart Systems.
    
  
    SN Comput. Sci., 2022
    
  
Effectively predicting cyber-attacks through isolation forest learning-based outlier detection.
    
  
    Secur. Priv., 2022
    
  
    Internet Things, 2022
    
  
CARAN: A Context-Aware Recency-Based Attention Network for Point-of-Interest Recommendation.
    
  
    IEEE Access, 2022
    
  
    Proceedings of the Machine Intelligence and Emerging Technologies, 2022
    
  
A Stacked Ensemble Spyware Detection Model Using Hyper-Parameter Tuned Tree Based Classifiers.
    
  
    Proceedings of the Machine Intelligence and Emerging Technologies, 2022
    
  
Aspect Based Sentiment Analysis of COVID-19 Tweets Using Blending Ensemble of Deep Learning Models.
    
  
    Proceedings of the Machine Intelligence and Emerging Technologies, 2022
    
  
Diagnosis and Classification of Fetal Health Based on CTG Data Using Machine Learning Techniques.
    
  
    Proceedings of the Machine Intelligence and Emerging Technologies, 2022
    
  
  2021
Mobile Expert System: Exploring Context-Aware Machine Learning Rules for Personalized Decision-Making in Mobile Applications.
    
  
    Symmetry, 2021
    
  
AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions.
    
  
    SN Comput. Sci., 2021
    
  
Mobile Deep Learning: Exploring Deep Neural Network for Predicting Context-Aware Smartphone Usage.
    
  
    SN Comput. Sci., 2021
    
  
Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions.
    
  
    SN Comput. Sci., 2021
    
  
Data Science and Analytics: An Overview from Data-Driven Smart Computing, Decision-Making and Applications Perspective.
    
  
    SN Comput. Sci., 2021
    
  
    SN Comput. Sci., 2021
    
  
Deep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective.
    
  
    SN Comput. Sci., 2021
    
  
A Data-Driven Heart Disease Prediction Model Through K-Means Clustering-Based Anomaly Detection.
    
  
    SN Comput. Sci., 2021
    
  
Mobile Data Science and Intelligent Apps: Concepts, AI-Based Modeling and Research Directions.
    
  
    Mob. Networks Appl., 2021
    
  
CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks.
    
  
    Internet Things, 2021
    
  
    Expert Syst. Appl., 2021
    
  
    IEEE Access, 2021
    
  
Authorship Classification in a Resource Constraint Language Using Convolutional Neural Networks.
    
  
    IEEE Access, 2021
    
  
    IEEE Access, 2021
    
  
Emotion Classification in a Resource Constrained Language Using Transformer-based Approach.
    
  
    Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Student Research Workshop, 2021
    
  
    Proceedings of the ICSIE 2021: 10th International Conference on Software and Information Engineering, Cairo, Egypt, November 12, 2021
    
  
iMedMS: An IoT Based Intelligent Medication Monitoring System for Elderly Healthcare.
    
  
    ICO, 2021
    
  
Hybrid CNN-GRU Framework with Integrated Pre-trained Language Transformer for SMS Phishing Detection.
    
  
    Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021
    
  
    Proceedings of the Hybrid Intelligent Systems, 2021
    
  
Context-Aware Machine Learning and Mobile Data Analytics - Automated Rule-based Services with Intelligent Decision-Making
    
  
    Springer, ISBN: 978-3-030-88530-4, 2021
    
  
  2020
    IEEE Trans. Artif. Intell., 2020
    
  
ContextPCA: Predicting Context-Aware Smartphone Apps Usage Based On Machine Learning Techniques.
    
  
    Symmetry, 2020
    
  
    Symmetry, 2020
    
  
K-Nearest Neighbor Learning based Diabetes Mellitus Prediction and Analysis for eHealth Services.
    
  
    EAI Endorsed Trans. Scalable Inf. Syst., 2020
    
  
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.
    
  
    Sensors, 2020
    
  
    EAI Endorsed Trans. Pervasive Health Technol., 2020
    
  
BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model.
    
  
    Mob. Networks Appl., 2020
    
  
ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services.
    
  
    J. Netw. Comput. Appl., 2020
    
  
    J. Big Data, 2020
    
  
Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling.
    
  
    J. Big Data, 2020
    
  
CalBehav: A Machine Learning-Based Personalized Calendar Behavioral Model Using Time-Series Smartphone Data.
    
  
    Comput. J., 2020
    
  
E-MIIM: an ensemble-learning-based context-aware mobile telephony model for intelligent interruption management.
    
  
    AI Soc., 2020
    
  
    Proceedings of the Hybrid Intelligent Systems, 2020
    
  
    Proceedings of the Hybrid Intelligent Systems, 2020
    
  
An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies.
    
  
    Proceedings of the Hybrid Intelligent Systems, 2020
    
  
Predicting Individual Substance Abuse Vulnerability Using Machine Learning Techniques.
    
  
    Proceedings of the Hybrid Intelligent Systems, 2020
    
  
    Proceedings of the Hybrid Intelligent Systems, 2020
    
  
    Proceedings of the Hybrid Intelligent Systems, 2020
    
  
    Proceedings of the Computing Science, Communication and Security, 2020
    
  
    Proceedings of the Computing Science, Communication and Security, 2020
    
  
    Proceedings of the Computing Science, Communication and Security, 2020
    
  
    Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020
    
  
  2019
Exploiting Data-Centric Social Context in Phone Call Prediction: A Machine Learning based Study.
    
  
    EAI Endorsed Trans. Scalable Inf. Syst., 2019
    
  
Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage.
    
  
    J. Big Data, 2019
    
  
RecencyMiner: mining recency-based personalized behavior from contextual smartphone data.
    
  
    J. Big Data, 2019
    
  
Context-aware rule learning from smartphone data: survey, challenges and future directions.
    
  
    J. Big Data, 2019
    
  
    J. Ambient Intell. Smart Environ., 2019
    
  
Research issues in mining user behavioral rules for context-aware intelligent mobile applications.
    
  
    Iran J. Comput. Sci., 2019
    
  
    Internet Things, 2019
    
  
    Internet Things, 2019
    
  
    CoRR, 2019
    
  
  2018
Mobile Data Science: Towards Understanding Data-Driven Intelligent Mobile Applications.
    
  
    EAI Endorsed Trans. Scalable Inf. Syst., 2018
    
  
SilentPhone: Inferring User Unavailability based Opportune Moments to Minimize Call Interruptions.
    
  
    EAI Endorsed Trans. Mob. Commun. Appl., 2018
    
  
    Comput. J., 2018
    
  
Understanding the Role of Data-Centric Social Context in Personalized Mobile Applications.
    
  
    EAI Endorsed Trans. Context aware Syst. Appl., 2018
    
  
    Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018
    
  
    Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018
    
  
  2017
    Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017
    
  
An Approach to Modeling Call Response Behavior on Mobile Phones Based on Multi-Dimensional Contexts.
    
  
    Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017
    
  
    Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017
    
  
    Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017
    
  
    Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017
    
  
An Improved Naive Bayes Classifier-Based Noise Detection Technique for Classifying User Phone Call Behavior.
    
  
    Proceedings of the Data Mining, 2017
    
  
  2016
Predicting how you respond to phone calls: towards discovering temporal behavioral rules.
    
  
    Proceedings of the 28th Australian Conference on Computer-Human Interaction, 2016
    
  
    Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016
    
  
    Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016
    
  
Evidence-Based Behavioral Model for Calendar Schedules of Individual Mobile Phone Users.
    
  
    Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016
    
  
Behavior-Oriented Time Segmentation for Mining Individualized Rules of Mobile Phone Users.
    
  
    Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016
    
  
  2014
JMVC: A Java Framework for Rapidly Developing Desktop Application Software Based on MVC.
    
  
    Smart Comput. Rev., 2014
    
  
  2013
An Efficient Image Watermarking Scheme Using BFS Technique Based on Hadamard Transform.
    
  
    Smart Comput. Rev., 2013
    
  
    Smart Comput. Rev., 2013
    
  
Digital Watermarking for Image AuthenticationBased on Combined DCT, DWT and SVD Transformation.
    
  
    CoRR, 2013