Kadhim Hayawi

Orcid: 0000-0002-8092-4590

According to our database1, Kadhim Hayawi authored at least 33 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Inevitable-Metaverse: A Novel Twitter Dataset for Public Sentiments on Metaverse.
CoRR, 2024

Enhancing Anomaly Detection in Agricultural IoT Systems through Incremental Learning with Spike Neural Networks.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Impact and Challenges of Intelligent IoT in Meteorological Science.
IEEE Internet Things Mag., June, 2023

Social media bot detection with deep learning methods: a systematic review.
Neural Comput. Appl., April, 2023

Dynamic Data Sample Selection and Scheduling in Edge Federated Learning.
IEEE Open J. Commun. Soc., 2023

Airborne Computing: A Toolkit for UAV-Assisted Federated Computing for Sustainable Smart Cities.
IEEE Internet Things J., 2023

The Imitation Game: Detecting Human and AI-Generated Texts in the Era of Large Language Models.
CoRR, 2023

Let's have a chat! A Conversation with ChatGPT: Technology, Applications, and Limitations.
CoRR, 2023

Leveraging Nucleotide Dependencies for Improved mRNA Vaccine Degradation Prediction.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

2022
DeeProBot: a hybrid deep neural network model for social bot detection based on user profile data.
Soc. Netw. Anal. Min., 2022

Trajectory Design for UAV-Based Data Collection Using Clustering Model in Smart Farming.
Sensors, 2022

Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment.
Sensors, 2022

A Bilevel Optimization Model Based on Edge Computing for Microgrid.
Sensors, 2022

Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT).
J. Cloud Comput., 2022

Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey.
Clust. Comput., 2022

NFTGAN: Non-Fungible Token Art Generation Using Generative Adversarial Networks.
Proceedings of the ICMLT 2022: 7th International Conference on Machine Learning Technologies, Rome, Italy, March 11, 2022

Global Aggregation Node Selection Scheme in Federated Learning for Vehicular Ad Hoc Networks (VANETs).
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2022

On the Impact of Deep Learning and Feature Extraction for Arabic Audio Classification and Speaker Identification.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

Using Self-labeling and Co-Training to Enhance Bots Labeling in Twitter.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

2021
Hybrid feature selection approach to identify optimal features of profile metadata to detect social bots in Twitter.
Soc. Netw. Anal. Min., 2021

Multi-Level Resource Sharing Framework Using Collaborative Fog Environment for Smart Cities.
IEEE Access, 2021

D2Gen: A Decentralized Device Genome Based Integrity Verification Mechanism for Collaborative Intrusion Detection Systems.
IEEE Access, 2021

Which Virtualization Technology is Right for My Online IT Educational Labs?
Proceedings of the IEEE Global Engineering Education Conference, 2021

Blockchain-based Secure CIDS Operation.
Proceedings of the 5th Cyber Security in Networking Conference, 2021

Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka.
Proceedings of the 5th Cyber Security in Networking Conference, 2021

Smart Online Exam Proctoring Assist for Cheating Detection.
Proceedings of the Advanced Data Mining and Applications - 17th International Conference, 2021

2020
Thwarting ICMP Low-Rate Attacks Against Firewalls While Minimizing Legitimate Traffic Loss.
IEEE Access, 2020

Characteristics of Similar-Context Trending Hashtags in Twitter: A Case Study.
Proceedings of the Web Services - ICWS 2020, 2020

Effective Patient Similarity Computation for Clinical Decision Support Using Time Series and Static Data.
Proceedings of the Australasian Computer Science Week, 2020

2019
Denial of Firewalling Attacks (DoF): The Case Study of the Emerging BlackNurse Attack.
IEEE Access, 2019

2017
Securing the Internet of Things: A Worst-Case Analysis of Trade-Off between Query-Anonymity and Communication-Cost.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2015
The Limits of the Trade-Off Between Query-Anonymity and Communication-Cost in Wireless Sensor Networks.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2006
End-to-end security solutions for WLAN: a performance analysis for the underlying encryption algorithms in the lightweight devices.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006


  Loading...