Saqib Hakak

Orcid: 0000-0002-8718-0336

According to our database1, Saqib Hakak authored at least 43 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Autonomous vehicles in 5G and beyond: A survey.
Veh. Commun., February, 2023

NEAT: A Resilient Deep Representational Learning for Fault Detection Using Acoustic Signals in IIoT Environment.
IEEE Internet Things J., February, 2023

Comprehensive risk assessment and analysis of blockchain technology implementation using fuzzy cognitive mapping.
Comput. Sci. Inf. Syst., 2023

IoT Malware Analysis Using Federated Learning: A Comprehensive Survey.
IEEE Access, 2023

A Comparison of Machine Learning Algorithms for Multilingual Phishing Detection.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging Infrastructure.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

2022
Driver Identification Using Optimized Deep Learning Model in Smart Transportation.
ACM Trans. Internet Techn., November, 2022

CP-BDHCA: Blockchain-Based Confidentiality-Privacy Preserving Big Data Scheme for Healthcare Clouds and Applications.
IEEE J. Biomed. Health Informatics, 2022

Green-Tech CAV: Next Generation Computing for Traffic Sign and Obstacle Detection in Connected and Autonomous Vehicles.
IEEE Trans. Green Commun. Netw., 2022

Antlion re-sampling based deep neural network model for classification of imbalanced multimodal stroke dataset.
Multim. Tools Appl., 2022

Arabic Quran Verses Authentication Using Deep Learning and Word Embeddings.
Int. Arab J. Inf. Technol., 2022

Digital Hadith authentication: Recent advances, open challenges, and future directions.
Trans. Emerg. Telecommun. Technol., 2022

Cloud computing security: A survey of service-based models.
Comput. Secur., 2022

Fuzzing vulnerability discovery techniques: Survey, challenges and future directions.
Comput. Secur., 2022

Blockchain-based cyber physical systems: Comprehensive model for challenge assessment.
Comput. Electr. Eng., 2022

Are You a Cyborg, Bot or Human? - A Survey on Detecting Fake News Spreaders.
IEEE Access, 2022

CephArmor: A Lightweight Cryptographic Interface for Secure High-Performance Ceph Storage Systems.
IEEE Access, 2022

Federated Learning Assisted IoT Malware Detection Using Static Analysis.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

2021
Senti-eSystem: A sentiment-based eSystem-using hybridized fuzzy and deep neural network for measuring customer satisfaction.
Softw. Pract. Exp., 2021

Blockchain-Based Attack Detection on Machine Learning Algorithms for IoT-Based e-Health Applications.
IEEE Internet Things Mag., 2021

Trust Management in Social Internet of Things: Architectures, Recent Advancements, and Future Challenges.
IEEE Internet Things J., 2021

Recent advances in blockchain technology: a survey on applications and challenges.
Int. J. Ad Hoc Ubiquitous Comput., 2021

An ensemble machine learning approach through effective feature extraction to classify fake news.
Future Gener. Comput. Syst., 2021

Ransomware: Recent advances, analysis, challenges and future research directions.
Comput. Secur., 2021

Social Engineering Attacks: Recent Advances and Challenges.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021

2020
Securing Smart Cities through Blockchain Technology: Architecture, Requirements, and Challenges.
IEEE Netw., 2020

Saliency-based bit plane detection for network applications.
Multim. Tools Appl., 2020

Industrial Wastewater Management using Blockchain Technology: Architecture, Requirements, and Future Directions.
IEEE Internet Things Mag., 2020

Unmanned Aerial Vehicles in Smart Agriculture: Applications, Requirements and Challenges.
CoRR, 2020

Blended Multi-Modal Deep ConvNet Features for Diabetic Retinopathy Severity Prediction.
CoRR, 2020

A deep neural networks based model for uninterrupted marine environment monitoring.
Comput. Commun., 2020

A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks.
IEEE Access, 2020

Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies.
IEEE Access, 2020

Propagation of Fake News on Social Media: Challenges and Opportunities.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

A Framework for Edge-Assisted Healthcare Data Analytics using Federated Learning.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges.
Inf. Process. Manag., 2019

Edge computing: A survey.
Future Gener. Comput. Syst., 2019

Cloud-assisted gamification for education and learning - Recent advances and challenges.
Comput. Electr. Eng., 2019

Exact String Matching Algorithms: Survey, Issues, and Future Research Directions.
IEEE Access, 2019

Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy.
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019

2018
Factorial Analysis of Biological Datasets.
Proceedings of International Joint Conference on Computational Intelligence, 2018

An Efficient Text Representation for Searching and Retrieving Classical Diacritical Arabic Text.
Proceedings of the Fourth International Conference On Arabic Computational Linguistics, 2018

2017
Preserving Content Integrity of Digital Holy Quran: Survey and Open Challenges.
IEEE Access, 2017


  Loading...