ORCID as entered in ROS

Select Publications
2023, VCTP: A Verifiable Credential-based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms, http://arxiv.org/abs/2308.01539v1
,2023, Discretization-based ensemble model for robust learning in IoT, http://dx.doi.org/10.48550/arxiv.2307.08955
,2023, DualVAE: Controlling Colours of Generated and Real Images, http://dx.doi.org/10.48550/arxiv.2305.18769
,2023, Transformative Effects of ChatGPT on Modern Education: Emerging Era of AI Chatbots, http://dx.doi.org/10.48550/arxiv.2306.03823
,2023, Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness, http://dx.doi.org/10.48550/arxiv.2301.12680
,2023, Diverse Multimedia Layout Generation with Multi Choice Learning, http://dx.doi.org/10.48550/arxiv.2301.06629
,2023, Masked Vector Quantization, http://dx.doi.org/10.48550/arxiv.2301.06626
,2022, PlexiChain: A Secure Blockchain-based Flexibility Aggregator Framework, http://dx.doi.org/10.48550/arxiv.2212.09064
,2022, Trust and Reputation Management for Blockchain-enabled IoT, http://arxiv.org/abs/2212.04658v1
,2022, Reconstruction Attack on Differential Private Trajectory Protection Mechanisms, http://dx.doi.org/10.1145/3564625.3564628
,2022, Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News, http://arxiv.org/abs/2209.03162v1
,2022, PhishClone: Measuring the Efficacy of Cloning Evasion Attacks, http://dx.doi.org/10.48550/arxiv.2209.01582
,2022, Towards Blockchain-based Trust and Reputation Management for Trustworthy 6G Networks, http://arxiv.org/abs/2208.07562v1
,2022, Deception for Cyber Defence: Challenges and Opportunities, http://dx.doi.org/10.48550/arxiv.2208.07127
,2022, Transferable Graph Backdoor Attack, http://dx.doi.org/10.48550/arxiv.2207.00425
,2022, PublicCheck: Public Integrity Verification for Services of Run-time Deep Models, http://dx.doi.org/10.48550/arxiv.2203.10902
,2022, TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing, http://dx.doi.org/10.48550/arxiv.2203.07580
,2022, Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study, http://dx.doi.org/10.48550/arxiv.2203.06793
,2022, DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains, http://arxiv.org/abs/2203.05769v1
,2022, AI for Next Generation Computing: Emerging Trends and Future Directions, http://dx.doi.org/10.48550/arxiv.2203.04159
,2022, Device Identification in Blockchain-Based Internet of Things, http://dx.doi.org/10.48550/arxiv.2202.09603
,2021, Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines, http://dx.doi.org/10.48550/arxiv.2111.11874
,2021, Decentralised Trustworthy Collaborative Intrusion Detection System for IoT, http://dx.doi.org/10.1109/Blockchain53845.2021.00048
,2021, From MANET to people-centric networking: milestones and open research challenges, http://dx.doi.org/10.48550/arxiv.2109.10159
,2021, Blockchain for Trust and Reputation Management in Cyber-physical Systems, http://arxiv.org/abs/2109.07721v1
,2021, Blockchain in Supply Chain: Opportunities and Design Considerations, http://dx.doi.org/10.48550/arxiv.2108.12032
,2021, In-situ MIMO-WPT Recharging of UAVs Using Intelligent Flying Energy Sources, http://dx.doi.org/10.20944/preprints202107.0545.v1
,2021, TradeChain: Decoupling Traceability and Identity inBlockchain enabled Supply Chains, http://dx.doi.org/10.48550/arxiv.2105.11217
,2021, PrivChain: Provenance and Privacy Preservation in Blockchain enabled Supply Chains, http://dx.doi.org/10.48550/arxiv.2104.13964
,2021, Trust-based Blockchain Authorization for IoT, http://dx.doi.org/10.48550/arxiv.2104.00832
,2021, DIMY: Enabling Privacy-preserving Contact Tracing, http://dx.doi.org/10.48550/arxiv.2103.05873
,2020, HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios, http://dx.doi.org/10.48550/arxiv.2012.07474
,2020, Privacy in targeted advertising: A survey, http://dx.doi.org/10.36227/techrxiv.12952073
,2020, Energy and Service-priority aware Trajectory Design for UAV-BSs using Double Q-Learning, http://dx.doi.org/10.48550/arxiv.2010.13346
,2020, Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs, http://dx.doi.org/10.48550/arxiv.2010.12134
,2020, Privacy in Targeted Advertising: A Survey, http://arxiv.org/abs/2009.06861v3
,2020, Privacy-preserving targeted mobile advertising: A Blockchain-based framework for mobile ads, http://dx.doi.org/10.48550/arxiv.2008.10479
,2020, A Novel Emergency Light Based Smart Building Solution: Design, Implementation and Use Cases, http://dx.doi.org/10.48550/arxiv.2007.15906
,2020, B-FERL: Blockchain based Framework for Securing Smart Vehicles, http://dx.doi.org/10.48550/arxiv.2007.10528
,2020, Recommender Systems for the Internet of Things: A Survey, http://dx.doi.org/10.48550/arxiv.2007.06758
,2020, A Survey of COVID-19 Contact Tracing Apps, http://dx.doi.org/10.48550/arxiv.2006.10306
,2020, Context-based smart contracts for appendable-block blockchains, http://dx.doi.org/10.48550/arxiv.2005.00895
,2020, Attacking with bitcoin: Using Bitcoin to Build Resilient Botnet Armies, http://dx.doi.org/10.48550/arxiv.2004.01855
,2020, How mobility patterns drive disease spread: A case study using public transit passenger card travel data, http://dx.doi.org/10.48550/arxiv.2004.01466
,2020, Identifying highly influential travellers for spreading disease on a public transport system, http://dx.doi.org/10.48550/arxiv.2004.01581
,2020, Trajectory Optimization of Flying Energy Sources using Q-Learning to Recharge Hotspot UAVs, http://dx.doi.org/10.48550/arxiv.2003.12258
,2020, Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT, http://dx.doi.org/10.48550/arxiv.2002.07512
,2020, Energy-aware Demand Selection and Allocation for Real-time IoT Data Trading, http://dx.doi.org/10.1109/SMARTCOMP50058.2020.00038
,2019, Impact of consensus on appendable-block blockchain for IoT, http://dx.doi.org/10.48550/arxiv.1912.11043
,2019, Leveraging lightweight blockchain to establish data integrity for surveillance cameras, http://dx.doi.org/10.48550/arxiv.1912.11044
,