Junaid Akram
Orcid: 0000-0003-1752-6124
According to our database1,
Junaid Akram
authored at least 44 papers
between 2018 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IEEE Consumer Electron. Mag., July, 2025
CoRR, May, 2025
AI-Generated Content-as-a-Service in IoMT-Based Smart Homes: Personalizing Patient Care With Human Digital Twins.
IEEE Trans. Consumer Electron., February, 2025
Adversarial Label-Flipping Attack and Defense for Anomaly Detection in Spatial Crowdsourcing UAV Services.
IEEE Trans. Consumer Electron., February, 2025
Privacy-Preserving Spatial Crowdsourcing Drone Services for Postdisaster Infrastructure Monitoring: A Conditional Federated Learning Approach.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2025
Blockchain-Based Model for Secure and Fair Data Provision in Crowdsourced Drone Services.
IEEE Open J. Commun. Soc., 2025
An Advanced Ensemble Framework for defending against obfuscated Windows, Android, and IoT malware.
Appl. Soft Comput., 2025
Detecting and Understanding Hateful Contents in Memes Through Captioning and Visual Question-Answering.
Proceedings of the Computational Science - ICCS 2025, 2025
2024
Digital Twin-Driven Trust Management in Open RAN-Based Spatial Crowdsourcing Drone Services.
IEEE Trans. Green Commun. Netw., September, 2024
GALTrust: Generative Adverserial Learning-Based Framework for Trust Management in Spatial Crowdsourcing Drone Services.
IEEE Trans. Consumer Electron., August, 2024
IEEE Trans. Consumer Electron., February, 2024
Privacy-First Crowdsourcing: Blockchain and Local Differential Privacy in Crowdsourced Drone Services.
CoRR, 2024
Ensemble Pretrained Models for Multimodal Sentiment Analysis using Textual and Video Data Fusion.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Leveraging Blockchain-as-a-Certificate Authority for Authentication in 6G-Enabled Spatial Crowdsourcing Drone Services.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024
DDRM: Distributed Drone Reputation Management for Trust and Reliability in Crowdsourced Drone Services.
Proceedings of the IEEE International Conference on Web Services, 2024
Decentralized PKI Framework for Data Integrity in Spatial Crowdsourcing Drone Services.
Proceedings of the IEEE International Conference on Web Services, 2024
A Blockchain-Enhanced Framework for Privacy and Data Integrity in Crowdsourced Drone Services.
Proceedings of the Service-Oriented Computing - 22nd International Conference, 2024
Optimized Biomedical Question-Answering Services with LLM and Multi-BERT Integration.
Proceedings of the IEEE International Conference on Data Mining, 2024
Proceedings of the IEEE International Conference on Data Mining, 2024
2023
Chained-Drones: Blockchain-based privacy-preserving framework for secure and intelligent service provisioning in Internet of Drone Things.
Comput. Electr. Eng., September, 2023
Drone-as-a-Service (DaaS) for COVID-19 self-testing kits delivery in smart healthcare setups: A technological perspective.
ICT Express, August, 2023
2022
Sensors, 2022
Sensors, 2022
Int. J. Inf. Comput. Secur., 2022
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022
2021
SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment.
Softw. Pract. Exp., 2021
Sensors, 2021
Inf. Fusion, 2021
DroidMD: an efficient and scalable Android malware detection approach at source code level.
Int. J. Inf. Comput. Secur., 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
2020
MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning.
IEEE Trans. Computers, 2020
IBFET: Index-based features extraction technique for scalable code clone detection at file level granularity.
Softw. Pract. Exp., 2020
J. Inf. Sci. Eng., 2020
IET Inf. Secur., 2020
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
2019
An Integrated Software Vulnerability Discovery Model based on Artificial Neural Network.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019
VCIPR: Vulnerable Code is Identifiable When a Patch is Released (Hacker's Perspective).
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
2018
DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018
Proceedings of the Advances in Network-Based Information Systems, 2018
Proceedings of the 24th International Conference on Automation and Computing, 2018
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018
DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018