ORCID as entered in ROS

Select Publications
2022, 'A Blockchain-Based Emergency Message Transmission Protocol for Cooperative VANET', IEEE Transactions on Intelligent Transportation Systems, 23, pp. 19624 - 19633, http://dx.doi.org/10.1109/TITS.2021.3115245
,2022, 'A Secure and Intelligent Framework for Vehicle Health Monitoring Exploiting Big-Data Analytics', IEEE Transactions on Intelligent Transportation Systems, 23, pp. 19727 - 19742, http://dx.doi.org/10.1109/TITS.2021.3138255
,2022, 'An Intelligent Risk Management Framework for Monitoring Vehicular Engine Health', IEEE Transactions on Green Communications and Networking, 6, pp. 1298 - 1306, http://dx.doi.org/10.1109/TGCN.2022.3179350
,2022, 'One-class tensor machine with randomized projection for large-scale anomaly detection in high-dimensional and noisy data', International Journal of Intelligent Systems, 37, pp. 4515 - 4536, http://dx.doi.org/10.1002/int.22729
,2022, 'A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems', IEEE Transactions on Industrial Informatics, 18, pp. 5007 - 5017, http://dx.doi.org/10.1109/TII.2021.3105527
,2022, 'A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks', IEEE Internet of Things Journal, 9, pp. 11604 - 11613, http://dx.doi.org/10.1109/JIOT.2021.3130156
,2022, 'H2HI-Net: A Dual-Branch Network for Recognizing Human-to-Human Interactions From Channel-State Information', IEEE Internet of Things Journal, 9, pp. 10010 - 10021, http://dx.doi.org/10.1109/JIOT.2021.3117909
,2022, 'Enhancing IoT anomaly detection performance for federated learning', Digital Communications and Networks, 8, pp. 314 - 323, http://dx.doi.org/10.1016/j.dcan.2022.02.007
,2022, 'Interval type-2 fuzzy temporal convolutional autoencoder for gait-based human identification and authentication', Information Sciences, 597, pp. 144 - 165, http://dx.doi.org/10.1016/j.ins.2022.03.046
,2022, 'Rethinking maximum-margin softmax for adversarial robustness', Computers and Security, 116, http://dx.doi.org/10.1016/j.cose.2022.102640
,2022, 'A holistic survey on the use of emerging technologies to provision secure healthcare solutions', Computers and Electrical Engineering, 99, http://dx.doi.org/10.1016/j.compeleceng.2022.107691
,2022, 'A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks', Computers and Electrical Engineering, 99, http://dx.doi.org/10.1016/j.compeleceng.2022.107745
,2022, 'A Risk Assessment Model for Cyber-Physical Water and Wastewater Systems: Towards Sustainable Development', Sustainability Switzerland, 14, http://dx.doi.org/10.3390/su14084480
,2022, 'Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems', Ad Hoc Networks, 128, http://dx.doi.org/10.1016/j.adhoc.2022.102786
,2022, 'Federated Intrusion Detection in Blockchain-Based Smart Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, 23, pp. 2523 - 2537, http://dx.doi.org/10.1109/TITS.2021.3119968
,2022, 'Guest Editorial: AI-Enabled Threat Intelligence and Hunting Microservices for Distributed Industrial IoT System', IEEE Transactions on Industrial Informatics, 18, pp. 1892 - 1895, http://dx.doi.org/10.1109/TII.2021.3111028
,2022, 'Progressive ShallowNet for large scale dynamic and spontaneous facial behaviour analysis in children', Image and Vision Computing, 119, pp. 104375, http://dx.doi.org/10.1016/j.imavis.2022.104375
,2022, 'Radial Basis Function Network with Differential Privacy', Future Generation Computer Systems, 127, pp. 473 - 486, http://dx.doi.org/10.1016/j.future.2021.09.013
,2022, 'XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks', Future Generation Computer Systems, 127, pp. 181 - 193, http://dx.doi.org/10.1016/j.future.2021.09.010
,2022, 'Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain', IEEE Access, 10, pp. 15681 - 15698, http://dx.doi.org/10.1109/ACCESS.2022.3146723
,2022, 'DFSat: Deep Federated Learning for Identifying Cyber Threats in IoT-based Satellite Networks', IEEE Transactions on Industrial Informatics, pp. 1 - 8, http://dx.doi.org/10.1109/TII.2022.3214652
,2022, 'Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2488 - 2500, http://dx.doi.org/10.1109/TDSC.2021.3060775
,2022, 'ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets', IEEE Internet of Things Journal, 9, pp. 485 - 496, http://dx.doi.org/10.1109/JIOT.2021.3085194
,2021, 'An anonymous device to device access control based on secure certificate for internet of medical things systems: An anonymous D2D access control scheme for IoMT', Sustainable Cities and Society, 75, http://dx.doi.org/10.1016/j.scs.2021.103322
,2021, 'Fair and size-scalable participant selection framework for large-scale mobile crowdsensing', Journal of Systems Architecture, 119, http://dx.doi.org/10.1016/j.sysarc.2021.102273
,2021, 'A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets', Sustainable Cities and Society, 72, pp. 102994, http://dx.doi.org/10.1016/j.scs.2021.102994
,2021, 'IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities', Sustainable Cities and Society, 72, http://dx.doi.org/10.1016/j.scs.2021.103041
,2021, 'Mitigating the impact of adversarial attacks in very deep networks', Applied Soft Computing, 105, http://dx.doi.org/10.1016/j.asoc.2021.107231
,2021, 'Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events from Intelligent Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, 22, pp. 4507 - 4518, http://dx.doi.org/10.1109/TITS.2020.3017882
,2021, 'A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks', IEEE Internet of Things Journal, 8, pp. 9463 - 9472, http://dx.doi.org/10.1109/JIOT.2020.2996590
,2021, 'A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks', Computers, Materials and Continua
,2021, 'A Data Driven Review of Board Game Design and Interactions of Their Mechanics', IEEE Access, 9, pp. 114051 - 114069, http://dx.doi.org/10.1109/ACCESS.2021.3103198
,2021, 'A Security-by-Design Decision-Making Model for Risk Management in Autonomous Vehicles', IEEE Access, 9, pp. 107657 - 107679, http://dx.doi.org/10.1109/ACCESS.2021.3098675
,2021, 'Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks', Computers Materials and Continua, 69, pp. 1823 - 1837, http://dx.doi.org/10.32604/cmc.2021.012877
,2021, 'Multi-Objective Task Scheduling Approach for Fog Computing', IEEE Access, 9, pp. 126988 - 127009, http://dx.doi.org/10.1109/ACCESS.2021.3111130
,2021, 'Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems', IEEE Access, 9, pp. 55077 - 55097, http://dx.doi.org/10.1109/ACCESS.2021.3069737
,2021, 'DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks', Future Generation Computer Systems, 118, pp. 240 - 251, http://dx.doi.org/10.1016/j.future.2021.01.011
,2020, 'A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports', IEEE Access, 8, pp. 209802 - 209834, http://dx.doi.org/10.1109/ACCESS.2020.3036728
,2020, 'An Automated Task Scheduling Model using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems', IEEE Transactions on Cloud Computing, http://dx.doi.org/10.1109/TCC.2020.3032386
,2020, 'Deep Learning-enabled Threat Intelligence Scheme in the Internet of Things Networks', IEEE Transactions on Network Science and Engineering
,2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics
,2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics (Switzerland)
,2020, 'Streaming service provisioning in IoT-based healthcare: An integrated edge-cloud perspective', Transactions on Emerging Telecommunications Technologies, 31, http://dx.doi.org/10.1002/ett.4109
,2020, 'FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems', Computers and Security, 96, http://dx.doi.org/10.1016/j.cose.2020.101906
,2020, 'Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things', Sustainability Switzerland, 12, http://dx.doi.org/10.3390/SU12166434
,2020, 'A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks', IEEE Transactions on Industrial Informatics, 16, pp. 5110 - 5118, http://dx.doi.org/10.1109/TII.2019.2957140
,2020, 'A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions', Electronics Switzerland, 9, http://dx.doi.org/10.3390/electronics9071177
,2020, 'A New Network Forensic Framework based on Deep Learning for Internet of Things Networks: A Particle Deep Framework', Future Generation Computers Systems
,2020, 'A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions', IEEE Access, 8, pp. 104893 - 104917, http://dx.doi.org/10.1109/ACCESS.2020.2999715
,2020, 'TON-IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems', IEEE Access, 8, pp. 165130 - 165150, http://dx.doi.org/10.1109/ACCESS.2020.3022862
,