MTHAEL: Cross-architecture IoT malware detection based on neural network advanced ensemble learning D Vasan, M Alazab, S Venkatraman, J Akram, Z Qin IEEE Transactions on Computers 69 (11), 1654-1667, 2020 | 88 | 2020 |
Civil infrastructure damage and corrosion detection: An application of machine learning HS Munawar, F Ullah, D Shahzad, A Heravi, S Qayyum, J Akram Buildings 12 (2), 156, 2022 | 51 | 2022 |
Droidcc: A scalable clone detection approach for android applications to detect similarity at source code level J Akram, Z Shi, M Mumtaz, P Luo 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 34 | 2018 |
Using adaptive sensors for optimised target coverage in wireless sensor networks J Akram, HS Munawar, AZ Kouzani, MAP Mahmud Sensors 22 (3), 1083, 2022 | 33 | 2022 |
Cloud-and fog-integrated smart grid model for efficient resource utilisation J Akram, A Tahir, HS Munawar, A Akram, AZ Kouzani, MAP Mahmud Sensors 21 (23), 7846, 2021 | 28 | 2021 |
How to build a vulnerability benchmark to overcome cyber security attacks J Akram, L Ping IET Information Security 14 (1), 60-71, 2020 | 25 | 2020 |
Chained-drones: Blockchain-based privacy-preserving framework for secure and intelligent service provisioning in internet of drone things J Akram, M Umair, RH Jhaveri, MN Riaz, H Chi, S Malebary Computers and Electrical Engineering 110, 108772, 2023 | 23 | 2023 |
An RSA based authentication system for smart IoT environment M Mumtaz, J Akram, L Ping 2019 IEEE 21st International Conference on High Performance Computing and …, 2019 | 20 | 2019 |
Swarm intelligence based localization in wireless sensor networks J Akram, A Javed, S Khan, A Akram, HS Munawar, W Ahmad Proceedings of the 36th annual ACM symposium on applied computing, 1906-1914, 2021 | 19 | 2021 |
SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment J Akram, P Luo Software: Practice and Experience 51 (2), 294-318, 2021 | 17 | 2021 |
BC-IoDT: blockchain-based framework for authentication in internet of drone things J Akram, A Akram, RH Jhaveri, M Alazab, H Chi Proceedings of the 5th international ACM mobicom workshop on drone assisted …, 2022 | 14 | 2022 |
Intelligent target coverage in wireless sensor networks with adaptive sensors J Akram, S Malik, S Ansari, H Rizvi, D Kim, R Hasnain 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), 1-5, 2020 | 14 | 2020 |
Efficient resource distribution in cloud and fog computing M Mehmood, N Javaid, J Akram, SH Abbasi, A Rahman, F Saeed Advances in Network-Based Information Systems: The 21st International …, 2019 | 14 | 2019 |
DroidMD: an efficient and scalable android malware detection approach at source code level J Akram, M Mumtaz, G Jabeen, P Luo International Journal of Information and Computer Security 15 (2-3), 299-321, 2021 | 13 | 2021 |
Drone-as-a-Service (DaaS) for COVID-19 self-testing kits delivery in smart healthcare setups: A technological perspective HS Munawar, J Akram, SI Khan, F Ullah, BJ Choi ICT Express 9 (4), 748-753, 2023 | 12 | 2023 |
IBFET: Index‐based features extraction technique for scalable code clone detection at file level granularity J Akram, M Mumtaz, P Luo Software: Practice and Experience 50 (1), 22-46, 2020 | 12 | 2020 |
VCIPR: vulnerable code is identifiable when a patch is released (hacker's perspective) J Akram, L Qi, P Luo 2019 12th IEEE Conference on Software Testing, Validation and Verification …, 2019 | 12 | 2019 |
DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code. J Akram, Z Shi, M Mumtaz, P Luo SEKE, 354-353, 2018 | 12 | 2018 |
Cognitive effects of visualization on learning data structure and algorithms J Akram, L Fang The Third International Conference on Digital Enterprise and Information …, 2015 | 11 | 2015 |
An Integrated Software Vulnerability Discovery Model based on Artificial Neural Network. G Jabeen, P Luo, J Akram, AA Shah SEKE, 349-458, 2019 | 8 | 2019 |