Follow
Junaid Akram, Phd
Junaid Akram, Phd
Postdoc Research Associate at SnT, University of Luxembourg
Verified email at uni.lu
Title
Cited by
Cited by
Year
MTHAEL: Cross-architecture IoT malware detection based on neural network advanced ensemble learning
D Vasan, M Alazab, S Venkatraman, J Akram, Z Qin
IEEE Transactions on Computers 69 (11), 1654-1667, 2020
752020
Droidcc: A scalable clone detection approach for android applications to detect similarity at source code level
J Akram, Z Shi, M Mumtaz, P Luo
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018
332018
Civil infrastructure damage and corrosion detection: An application of machine learning
HS Munawar, F Ullah, D Shahzad, A Heravi, S Qayyum, J Akram
Buildings 12 (2), 156, 2022
322022
Using adaptive sensors for optimised target coverage in wireless sensor networks
J Akram, HS Munawar, AZ Kouzani, MAP Mahmud
Sensors 22 (3), 1083, 2022
262022
How to build a vulnerability benchmark to overcome cyber security attacks
J Akram, L Ping
IET Information Security 14 (1), 60-71, 2020
242020
Cloud-and fog-integrated smart grid model for efficient resource utilisation
J Akram, A Tahir, HS Munawar, A Akram, AZ Kouzani, MAP Mahmud
Sensors 21 (23), 7846, 2021
192021
Swarm intelligence based localization in wireless sensor networks
J Akram, A Javed, S Khan, A Akram, HS Munawar, W Ahmad
Proceedings of the 36th annual ACM symposium on applied computing, 1906-1914, 2021
172021
An RSA based authentication system for smart IoT environment
M Mumtaz, J Akram, L Ping
2019 IEEE 21st International Conference on High Performance Computing and …, 2019
172019
SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment
J Akram, P Luo
Software: Practice and Experience 51 (2), 294-318, 2021
152021
Chained-Drones: Blockchain-based privacy-preserving framework for secure and intelligent service provisioning in Internet of Drone Things
J Akram, M Umair, RH Jhaveri, MN Riaz, H Chi, S Malebary
Computers and Electrical Engineering 110, 108772, 2023
132023
DroidMD: an efficient and scalable android malware detection approach at source code level
J Akram, M Mumtaz, G Jabeen, P Luo
International Journal of Information and Computer Security 15 (2-3), 299-321, 2021
132021
VCIPR: vulnerable code is identifiable when a patch is released (hacker's perspective)
J Akram, L Qi, P Luo
2019 12th IEEE Conference on Software Testing, Validation and Verification …, 2019
122019
DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code.
J Akram, Z Shi, M Mumtaz, P Luo
SEKE, 354-353, 2018
122018
IBFET: Index‐based features extraction technique for scalable code clone detection at file level granularity
J Akram, M Mumtaz, P Luo
Software: Practice and Experience 50 (1), 22-46, 2020
112020
Efficient resource distribution in cloud and fog computing
M Mehmood, N Javaid, J Akram, SH Abbasi, A Rahman, F Saeed
Advances in Network-Based Information Systems: The 21st International …, 2019
102019
BC-IoDT: blockchain-based framework for authentication in internet of drone things
J Akram, A Akram, RH Jhaveri, M Alazab, H Chi
Proceedings of the 5th international ACM mobicom workshop on drone assisted …, 2022
82022
Intelligent target coverage in wireless sensor networks with adaptive sensors
J Akram, S Malik, S Ansari, H Rizvi, D Kim, R Hasnain
2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), 1-5, 2020
82020
Cognitive effects of visualization on learning data structure and algorithms
J Akram, L Fang
The Third International Conference on Digital Enterprise and Information …, 2015
82015
An Integrated Software Vulnerability Discovery Model based on Artificial Neural Network.
G Jabeen, P Luo, J Akram, AA Shah
SEKE, 349-458, 2019
72019
Drone-as-a-Service (DaaS) for COVID-19 self-testing kits delivery in smart healthcare setups: A technological perspective
HS Munawar, J Akram, SI Khan, F Ullah, BJ Choi
ICT Express 9 (4), 748-753, 2023
52023
The system can't perform the operation now. Try again later.
Articles 1–20