Select Publications
Preprints
, 2025, Adaptive Clipping for Privacy-Preserving Few-Shot Learning: Enhancing Generalization with Limited Data, http://dx.doi.org/10.48550/arxiv.2503.22749
, 2025, Federated Learning with Differential Privacy: An Utility-Enhanced Approach, http://dx.doi.org/10.48550/arxiv.2503.21154
, 2025, Multi-Objective Optimization for Privacy-Utility Balance in Differentially Private Federated Learning, http://dx.doi.org/10.48550/arxiv.2503.21159
, 2025, BERTDetect: A Neural Topic Modelling Approach for Android Malware Detection, http://dx.doi.org/10.48550/arxiv.2503.18043
, 2025, Detecting Content Rating Violations in Android Applications: A Vision-Language Approach, http://dx.doi.org/10.48550/arxiv.2502.15739
, 2025, An Empirical Study of Code Obfuscation Practices in the Google Play Store, http://dx.doi.org/10.48550/arxiv.2502.04636
, 2024, Entailment-Driven Privacy Policy Classification with LLMs, http://dx.doi.org/10.48550/arxiv.2409.16621
, 2024, SHFL: Secure Hierarchical Federated Learning Framework for Edge Networks, http://dx.doi.org/10.48550/arxiv.2409.15067
, 2024, Smart CSI Processing for Accruate Commodity WiFi-based Humidity Sensing, http://dx.doi.org/10.48550/arxiv.2409.07857
, 2024, Detecting and Characterising Mobile App Metamorphosis in Google Play Store, http://dx.doi.org/10.48550/arxiv.2407.14565
, 2024, Optimal Reflection Coefficients for ASK Modulated Backscattering from Passive Tags, http://dx.doi.org/10.48550/arxiv.2406.17448
, 2023, Usability of Privacy Controls in Top Health Websites, http://dx.doi.org/10.48550/arxiv.2303.01838
, 2023, Cybersecurity Challenges of Power Transformers, http://dx.doi.org/10.48550/arxiv.2302.13161
, 2022, Intelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and Challenges, http://dx.doi.org/10.48550/arxiv.2206.09009
, 2021, Federated Learning for Smart Healthcare: A Survey, http://dx.doi.org/10.48550/arxiv.2111.08834
, 2021, Federated Learning for COVID-19 Detection with Generative Adversarial Networks in Edge Cloud Computing, http://dx.doi.org/10.48550/arxiv.2110.07136
, 2021, BEdgeHealth: A Decentralized Architecture for Edge-based IoMT Networks Using Blockchain, http://dx.doi.org/10.48550/arxiv.2109.14295
, 2021, Cooperative Task Offloading and Block Mining in Blockchain-based Edge Computing with Multi-agent Deep Reinforcement Learning, http://dx.doi.org/10.48550/arxiv.2109.14263
, 2021, 6G Internet of Things: A Comprehensive Survey, http://dx.doi.org/10.48550/arxiv.2108.04973
, 2021, Blockchain and AI-based Solutions to Combat Coronavirus (COVID-19)-like Epidemics: A Survey, http://dx.doi.org/10.48550/arxiv.2106.14631
, 2021, Federated Learning for Industrial Internet of Things in Future Industries, http://dx.doi.org/10.48550/arxiv.2105.14659
, 2021, Federated Learning for Internet of Things: A Comprehensive Survey, http://dx.doi.org/10.48550/arxiv.2104.07914
, 2021, Federated Learning Meets Blockchain in Edge Computing: Opportunities and Challenges, http://dx.doi.org/10.48550/arxiv.2104.01776
, 2021, A Cooperative Architecture of Data Offloading and Sharing for Smart Healthcare with Blockchain, http://dx.doi.org/10.48550/arxiv.2103.10186
, 2020, Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud, http://dx.doi.org/10.48550/arxiv.2005.07987
, 2020, Blockchain and AI-Based Solutions to Combat Coronavirus (COVID-19)-like Epidemics: A Survey, http://dx.doi.org/10.20944/preprints202004.0325.v1
, 2020, Conservative Plane Releasing for Spatial Privacy Protection in Mixed Reality, http://dx.doi.org/10.48550/arxiv.2004.08029
, 2020, Blockchain and AI-based Solutions to Combat Coronavirus (COVID-19)-like Epidemics: A Survey, http://dx.doi.org/10.36227/techrxiv.12121962.v1
, 2020, Blockchain and AI-based Solutions to Combat Coronavirus (COVID-19)-like Epidemics: A Survey, http://dx.doi.org/10.36227/techrxiv.12121962
, 2020, Enabling AI in Future Wireless Networks: A Data Life Cycle Perspective, http://dx.doi.org/10.48550/arxiv.2003.00866
, 2020, A Survey of COVID-19 Contact Tracing Apps., https://arxiv.org/abs/2006.10306
, 2019, Characterizing and Detecting Money Laundering Activities on the Bitcoin Network, http://dx.doi.org/10.48550/arxiv.1912.12060
, 2019, Leveraging lightweight blockchain to establish data integrity for surveillance cameras, http://dx.doi.org/10.48550/arxiv.1912.11044
, 2019, Blockchain as a Service for Multi-Access Edge Computing: A Deep Reinforcement Learning Approach, http://dx.doi.org/10.48550/arxiv.2001.08165
, 2019, Blockchain for 5G and Beyond Networks: A State of the Art Survey, http://dx.doi.org/10.48550/arxiv.1912.05062
, 2019, Integration of Blockchain and Cloud of Things: Architecture, Applications and Challenges, http://dx.doi.org/10.48550/arxiv.1908.09058
, 2019, Privacy-Preserved Task Offloading in Mobile Blockchain with Deep Reinforcement Learning, http://dx.doi.org/10.48550/arxiv.1908.07467
, 2019, Secure Computation Offloading in Blockchain based IoT Networks with Deep Reinforcement Learning, http://dx.doi.org/10.48550/arxiv.1908.07466
, 2019, H2B: Heartbeat-based Secret Key Generation Using Piezo Vibration Sensors, http://dx.doi.org/10.48550/arxiv.1904.00750
, 2018, Blockchain-based Smart Contracts - Applications and Challenges, http://dx.doi.org/10.48550/arxiv.1810.04699
, 2018, Virtualized Application Function Chaining: Maximizing the Wearable System Lifetime, http://arxiv.org/abs/1804.00739v1
, 2018, Security and Privacy Approaches in Mixed Reality: A Literature Survey, http://dx.doi.org/10.48550/arxiv.1802.05797
, 2018, A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain, http://dx.doi.org/10.48550/arxiv.1801.10295
, 2017, Seamless Resources Sharing in Wearable Networks by Application Function Virtualization, http://arxiv.org/abs/1711.08495v1
, 2017, BreathRNNet: Breathing Based Authentication on Resource-Constrained IoT Devices using RNNs, http://dx.doi.org/10.48550/arxiv.1709.07626
, 2017, uStash: a Novel Mobile Content Delivery System for Improving User QoE in Public Transport, http://dx.doi.org/10.48550/arxiv.1708.04078
, 2016, Are wearable devices ready for HTTPS? Measuring the cost of secure communication protocols on wearable devices, http://arxiv.org/abs/1608.04180v2
, 2006, Multicasting with selective delivery: A SafetyNet for vertical handoffs, http://dx.doi.org/10.48550/arxiv.cs/0607137