Select Publications
Journal articles
2022, 'Privacy-Preserved Cyberattack Detection in Industrial Edge of Things (IEoT): A Blockchain-Orchestrated Federated Learning Approach', IEEE Transactions on Industrial Informatics, 18, pp. 7920 - 7934, http://dx.doi.org/10.1109/TII.2022.3167663
,2022, 'Toward Privacy Preserving Federated Learning in Internet of Vehicular Things: Challenges and Future Directions', IEEE Consumer Electronics Magazine, 11, pp. 56 - 66, http://dx.doi.org/10.1109/MCE.2021.3117232
,2022, 'Perturbation-enabled Deep Federated Learning for Preserving Internet of Things-based Social Networks', ACM Transactions on Multimedia Computing, Communications and Applications, 18, http://dx.doi.org/10.1145/3537899
,2022, 'A Blockchain-Based Emergency Message Transmission Protocol for Cooperative VANET', IEEE Transactions on Intelligent Transportation Systems, 23, pp. 19624 - 19633, http://dx.doi.org/10.1109/TITS.2021.3115245
,2022, 'A Secure and Intelligent Framework for Vehicle Health Monitoring Exploiting Big-Data Analytics', IEEE Transactions on Intelligent Transportation Systems, 23, pp. 19727 - 19742, http://dx.doi.org/10.1109/TITS.2021.3138255
,2022, 'An Intelligent Risk Management Framework for Monitoring Vehicular Engine Health', IEEE Transactions on Green Communications and Networking, 6, pp. 1298 - 1306, http://dx.doi.org/10.1109/TGCN.2022.3179350
,2022, 'One-class tensor machine with randomized projection for large-scale anomaly detection in high-dimensional and noisy data', International Journal of Intelligent Systems, 37, pp. 4515 - 4536, http://dx.doi.org/10.1002/int.22729
,2022, 'A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems', IEEE Transactions on Industrial Informatics, 18, pp. 5007 - 5017, http://dx.doi.org/10.1109/TII.2021.3105527
,2022, 'A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks', IEEE Internet of Things Journal, 9, pp. 11604 - 11613, http://dx.doi.org/10.1109/JIOT.2021.3130156
,2022, 'H2HI-Net: A Dual-Branch Network for Recognizing Human-to-Human Interactions From Channel-State Information', IEEE Internet of Things Journal, 9, pp. 10010 - 10021, http://dx.doi.org/10.1109/JIOT.2021.3117909
,2022, 'Enhancing IoT anomaly detection performance for federated learning', Digital Communications and Networks, 8, pp. 314 - 323, http://dx.doi.org/10.1016/j.dcan.2022.02.007
,2022, 'Interval type-2 fuzzy temporal convolutional autoencoder for gait-based human identification and authentication', Information Sciences, 597, pp. 144 - 165, http://dx.doi.org/10.1016/j.ins.2022.03.046
,2022, 'Rethinking maximum-margin softmax for adversarial robustness', Computers and Security, 116, http://dx.doi.org/10.1016/j.cose.2022.102640
,2022, 'A holistic survey on the use of emerging technologies to provision secure healthcare solutions', Computers and Electrical Engineering, 99, http://dx.doi.org/10.1016/j.compeleceng.2022.107691
,2022, 'A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks', Computers and Electrical Engineering, 99, http://dx.doi.org/10.1016/j.compeleceng.2022.107745
,2022, 'A Risk Assessment Model for Cyber-Physical Water and Wastewater Systems: Towards Sustainable Development', Sustainability (Switzerland), 14, http://dx.doi.org/10.3390/su14084480
,2022, 'Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems', Ad Hoc Networks, 128, http://dx.doi.org/10.1016/j.adhoc.2022.102786
,2022, 'Federated Intrusion Detection in Blockchain-Based Smart Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, 23, pp. 2523 - 2537, http://dx.doi.org/10.1109/TITS.2021.3119968
,2022, 'Guest Editorial: AI-Enabled Threat Intelligence and Hunting Microservices for Distributed Industrial IoT System', IEEE Transactions on Industrial Informatics, 18, pp. 1892 - 1895, http://dx.doi.org/10.1109/TII.2021.3111028
,2022, 'Progressive ShallowNet for large scale dynamic and spontaneous facial behaviour analysis in children', Image and Vision Computing, 119, pp. 104375, http://dx.doi.org/10.1016/j.imavis.2022.104375
,2022, 'Radial Basis Function Network with Differential Privacy', Future Generation Computer Systems, 127, pp. 473 - 486, http://dx.doi.org/10.1016/j.future.2021.09.013
,2022, 'XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks', Future Generation Computer Systems, 127, pp. 181 - 193, http://dx.doi.org/10.1016/j.future.2021.09.010
,2022, 'Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain', IEEE Access, 10, pp. 15681 - 15698, http://dx.doi.org/10.1109/ACCESS.2022.3146723
,2022, 'CNA-TCC: Campaign Network Attribute Based Thematic Campaign Classification', IEEE Transactions on Computational Social Systems, http://dx.doi.org/10.1109/TCSS.2022.3184387
,2022, 'DFSat: Deep Federated Learning for Identifying Cyber Threats in IoT-based Satellite Networks', IEEE Transactions on Industrial Informatics, http://dx.doi.org/10.1109/TII.2022.3214652
,2022, 'Dynamic Hypersphere Embedding Scale Against Adversarial Attacks', IEEE Transactions on Engineering Management, http://dx.doi.org/10.1109/TEM.2022.3194487
,2022, 'Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2488 - 2500, http://dx.doi.org/10.1109/TDSC.2021.3060775
,2022, 'ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets', IEEE Internet of Things Journal, 9, pp. 485 - 496, http://dx.doi.org/10.1109/JIOT.2021.3085194
,2021, 'An anonymous device to device access control based on secure certificate for internet of medical things systems: An anonymous D2D access control scheme for IoMT', Sustainable Cities and Society, 75, http://dx.doi.org/10.1016/j.scs.2021.103322
,2021, 'Fair and size-scalable participant selection framework for large-scale mobile crowdsensing', Journal of Systems Architecture, 119, http://dx.doi.org/10.1016/j.sysarc.2021.102273
,2021, 'A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets', Sustainable Cities and Society, 72, pp. 102994, http://dx.doi.org/10.1016/j.scs.2021.102994
,2021, 'IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities', Sustainable Cities and Society, 72, http://dx.doi.org/10.1016/j.scs.2021.103041
,2021, 'Mitigating the impact of adversarial attacks in very deep networks', Applied Soft Computing, 105, http://dx.doi.org/10.1016/j.asoc.2021.107231
,2021, 'Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events from Intelligent Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, 22, pp. 4507 - 4518, http://dx.doi.org/10.1109/TITS.2020.3017882
,2021, 'A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks', IEEE Internet of Things Journal, 8, pp. 9463 - 9472, http://dx.doi.org/10.1109/JIOT.2020.2996590
,2021, 'A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks', Computers, Materials and Continua
,2021, 'A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks', IEEE Transactions on Computational Social Systems, http://dx.doi.org/10.1109/TCSS.2021.3134463
,2021, 'A Data Driven Review of Board Game Design and Interactions of Their Mechanics', IEEE Access, 9, pp. 114051 - 114069, http://dx.doi.org/10.1109/ACCESS.2021.3103198
,2021, 'A Security-by-Design Decision-Making Model for Risk Management in Autonomous Vehicles', IEEE Access, 9, pp. 107657 - 107679, http://dx.doi.org/10.1109/ACCESS.2021.3098675
,2021, 'DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks', Future Generation Computer Systems, 118, pp. 240 - 251, http://dx.doi.org/10.1016/j.future.2021.01.011
,2021, 'Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks', Computers, Materials and Continua, 69, pp. 1823 - 1837, http://dx.doi.org/10.32604/cmc.2021.012877
,2021, 'Multi-Objective Task Scheduling Approach for Fog Computing', IEEE Access, 9, pp. 126988 - 127009, http://dx.doi.org/10.1109/ACCESS.2021.3111130
,2021, 'Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems', IEEE Access, 9, pp. 55077 - 55097, http://dx.doi.org/10.1109/ACCESS.2021.3069737
,2020, 'A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports', IEEE Access, 8, pp. 209802 - 209834, http://dx.doi.org/10.1109/ACCESS.2020.3036728
,2020, 'An Automated Task Scheduling Model using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems', IEEE Transactions on Cloud Computing, http://dx.doi.org/10.1109/TCC.2020.3032386
,2020, 'Deep Learning-enabled Threat Intelligence Scheme in the Internet of Things Networks', IEEE Transactions on Network Science and Engineering
,2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics
,2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics (Switzerland)
,2020, 'Streaming service provisioning in IoT-based healthcare: An integrated edge-cloud perspective', Transactions on Emerging Telecommunications Technologies, 31, http://dx.doi.org/10.1002/ett.4109
,2020, 'FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems', Computers and Security, 96, http://dx.doi.org/10.1016/j.cose.2020.101906
,