Naima Iltaf

Orcid: 0000-0001-5392-5187

According to our database1, Naima Iltaf authored at least 37 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RPf-GCNs: reciprocal perspective driven fused GCNs for rumor detection on social media.
J. Big Data, December, 2024

2023
Deep-view linguistic and inductive learning (DvLIL) based framework for Image Retrieval.
Inf. Sci., November, 2023

Detection of Offensive Language and ITS Severity for Low Resource Language.
ACM Trans. Asian Low Resour. Lang. Inf. Process., June, 2023

Shift-invariant discrete wavelet transform-based sparse fusion of medical images.
Signal Image Video Process., June, 2023

Low Resource Summarization using Pre-trained Language Models.
CoRR, 2023

Detection and Classification of Temporal Changes for Citrus Canker Growth Rate Using Deep Learning.
IEEE Access, 2023

CrossDomain Recommendation Based on MetaData Using Graph Convolution Networks.
IEEE Access, 2023

2022
S-RAP: relevance-aware QoS prediction in web-services and user contexts.
Knowl. Inf. Syst., 2022

A framework to predict early news popularity using deep temporal propagation patterns.
Expert Syst. Appl., 2022

2021
Dynamic distributed trust management scheme for the Internet of Things.
Turkish J. Electr. Eng. Comput. Sci., 2021

Contextual recommender system for E-commerce applications.
Appl. Soft Comput., 2021

Enhanced Metamorphic Techniques-A Case Study Against Havex Malware.
IEEE Access, 2021

2020
A multifocus image fusion using highlevel DWT components and guided filter.
Multim. Tools Appl., 2020

Enriching Non-negative Matrix Factorization with Contextual Embeddings for Recommender Systems.
Neurocomputing, 2020

DST-HRS: A topic driven hybrid recommender system based on deep semantics.
Comput. Commun., 2020

DTMSim-IoT: A Distributed Trust Management Simulator for IoT Networks.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Novel Approach Using Deep Learning for Intrusion Detection and Classification of the Network Traffic.
Proceedings of the IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications, 2020

2019
Magnetic resonance and computed tomography image fusion using saliency map and cross bilateral filter.
Signal Image Video Process., 2019

CATSWoTS: Context Aware Trustworthy Social Web of Things System.
Sensors, 2019

Weighted image fusion using cross bilateral filter and non-subsampled contourlet transform.
Multidimens. Syst. Signal Process., 2019

Automated acute lymphoblastic leukaemia detection system using microscopic images.
IET Image Process., 2019

Content-based histopathological image retrieval using multi-scale and multichannel decoder based LTP.
Biomed. Signal Process. Control., 2019

Using Trust in Collaborative Filtering for Recommendations.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

A Deep Learning Framework to Predict Rating for Cold Start Item Using Item Metadata.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

2018
HRS-CE: A hybrid framework to integrate content embeddings in recommender systems for cold start items.
J. Comput. Sci., 2018

Trust management for SOA based social WoT system.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

2017
Extension of Semantic Based Urdu Linguistic Resources Using Natural Language Processing.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2014
An Effective Model for Indirect Trust Computation in Pervasive Computing Environment.
Wirel. Pers. Commun., 2014

2013
A mechanism for detecting dishonest recommendation in indirect trust computation.
EURASIP J. Wirel. Commun. Netw., 2013

A fuzzy based credibility evaluation of recommended trust in pervasive computing environment.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

A Recommendation Exchange Protocol between Smart Devices in Pervasive Computing Environment.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Modeling interaction using trust and recommendation in ubiquitous computing enivornment.
EURASIP J. Wirel. Commun. Netw., 2012

An attack resistant method for detecting dishonest recommendations in pervasive computing environment.
Proceedings of the 18th IEEE International Conference on Networks, 2012

An adaptive framework for trust based security in pervasive computing environment.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
STEP-a: An Algorithmic Approach towards Trust Based Security in Pervasive Computing Environment.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

On Trust Management for Multimedia P2P Applications in Autonomic Networking.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

2009
A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment.
Proceedings of the Advances in Information Security and Assurance, 2009


  Loading...