Now showing items 1-10 of 10

    • 6G secure quantum communication: a success probability prediction model 

      Akbar, Muhammad Azeem; Khan, Arif Ali; Hyrynsalmi, Sami; Khan, Javed Ali (2024-05)
      The emergence of 6G networks initiates significant transformations in the communication technology landscape. Yet, the melding of quantum computing (QC) with 6G networks although promising an array of benefits, particularly ...
    • Behind the Bait: Delving into PhishTank's hidden data 

      Yasin, Affan; Fatima, Rubia; Khan, Javed Ali; Afzal, Wasif (2024-02-28)
      Phishing constitutes a form of social engineering that aims to deceive individuals through email communication. Extensive prior research has underscored phishing as one of the most commonly employed attack vectors for ...
    • Emotion detection from handwriting and drawing samples using an attention-based transformer model 

      Khan, Zohaib Ahmad; Xia, Yuanqing; Aurangzeb, Khursheed; Khaliq, Fiza; Alam, Mahmood; Khan, Javed Ali; Anwar, Muhammad Shahid (2024-03-29)
      Emotion detection (ED) involves the identification and understanding of an individual’s emotional state through various cues such as facial expressions, voice tones, physiological changes, and behavioral patterns. In this ...
    • GPU-based Parallel Technique for Solving the N-Similarity Problem in Textual Data Mining 

      Fazlali, Mahmood; Mirhosseini, Mina; Shahsavari, Mahyar; Shafarenko, Alex; Mashinchi, Mashaallah (Institute of Electrical and Electronics Engineers (IEEE), 2024-03-04)
      An important issue in data mining and information retrieval is the problem of multiple similarity or n-similarity. This problem entails finding a group of n data points with the highest similarity within a large dataset. ...
    • Identification of Software Bugs by Analyzing Natural Language-Based Requirements Using Optimized Deep Learning Features 

      Haq, Qazi Mazhar ul; Arif, Fahim; Aurangzeb, Khursheed; Ain, Noor ul; Khan, Javed Ali; Rubab, Saddaf; Anwar, Muhammad Shahid (2024-03-26)
      Software project outcomes heavily depend on natural language requirements, often causing diverse interpretations and issues like ambiguities and incomplete or faulty requirements. Researchers are exploring machine learning ...
    • Insights into software development approaches: mining Q &A repositories 

      Khan, Arif Ali; Khan, Javed Ali; Akbar, Muhammad Azeem; Zhou, Peng; Fahmideh, Mahdi (2024-01)
      Context: Software practitioners adopt approaches like DevOps, Scrum, and Waterfall for high-quality software development. However, limited research has been conducted on exploring software development approaches concerning ...
    • Machine Learning Based Diagnostic Paradigm in Viral and Non-Viral Hepatocellular Carcinoma 

      Asif, Arun; Ahmed, Faheem; Zeeshan; Khan, Javed Ali; Allogmani, Eman; Rashidy, Nora El; Manzoor, Sobia; Anwar, Muhammad Shahid (2024-02-23)
      Viral and non-viral hepatocellular carcinoma (HCC) is becoming predominant in developing countries. A major issue linked to HCC-related mortality rate is the late diagnosis of cancer development. Although traditional ...
    • A Q-learning-based smart clustering routing method in flying Ad Hoc networks 

      Hosseinzadeh, Mehdi; Tanveer, Jawad; Rahmani, Amir Masoud; Yousefpoor, Efat; Aurangzeb, Khursheed; Yousefpoor, Mohammad Sadegh; Darwesh, Aso; Lee , Sang-Woong; Fazlali, Mahmood (2024-01)
      Flying ad hoc networks (FANETs) have particular importance in various military and civilian applications due to their specific features, including frequent topological changes, the movement of drones in a three-dimensional ...
    • Smart homes under siege: Assessing the robustness of physical security against wireless network attacks 

      Allen, Ashley; Mylonas, Alexios; Vidalis, Stilianos; Gritzalis, Dimitris (2024-04)
      Nowadays domestic smart security devices, such as smart locks, smart doorbells, and security cameras, are becoming increasingly popular with users, due to their ease of use, convenience, and declining prices. Unlike ...
    • Winternitz stack protocols for embedded systems and IoT 

      Shafarenko, Alex (2024-12)
      This paper proposes and evaluates a new bipartite post-quantum digital signature protocol based on Winternitz chains and an oracle. Mutually mistrustful Alice and Bob are able to agree and sign a series of documents in a ...