| Research Title | MAG. TITLE | RESEARCH AREA | PUBLISH YEAR | DOI | Journal URL |
| Adding extra security layer to chatGPT: machine learning based model to detect malicious cybersecurity prompts | Cluster Computing | SECURITY | 2025 | |
Visit URL
|
| A cutting-edge intelligent cyber model for intrusion detection | Cluster Computing | Cyber security 5G networks IoT SYNFLOOD attack Simulation Machine learning | 2024 | |
Visit URL
|
| An intelligent healthcare monitoring system-based novel deep learning approach for detecting covid-19 from x-rays images | Multimedia Tools and Applications | Classification · Deep learning · Intelligent diagnosing · COVID-19 · Lung disease diagnosis · Computer added diagnosis · Smart medicine | 2024 | |
Visit URL
|
| Big dermatological data service for precise and immediate diagnosis by utilizing pre-trained learning models | Cluster Computing | Smart dermatology services Big data as a service Big data intelligence Classification Pretrained models | 2024 | |
Visit URL
|
| Dimensionality reduction for off-line object recognition and detection using supervised learning | Indonesian Journal of Electrical Engineering and Computer Science | Artificial Intelligence Applications | 2024 | |
Visit URL
|
| Emotion Unveiled: A Deep Learning Odyssey in Facial Expression Analysis for Intelligent HCI | International Journal of Advances in Soft Computing and its Applicationsopen access | facial emotion detection, computer vision, convolutional neu?ral network, deep learning, facial expression recognition | 2024 | |
Visit URL
|
| Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things | International Journal of Information Security | Cybersecurity · Cryptography · Cloud computing · Architectural model · Intelligent | 2024 | |
Visit URL
|
| Optimizing risk mitigation: A simulation-based model for detecting fake IoT clients in smart city environments | Sustainable Computing: Informatics and Systems | Fake clients Smart city Internet of Thing (IoT) Machine learning (ML) CyberSecurity | 2024 | |
Visit URL
|
| A novel machine learning and face recognition technique for fake accounts detection system on cyber social networks | Multimedia Tools and Applications | Social media · Cyber attacks · Social media privacy · Computer vision in social media · Social media security · Face recognition | 2023 | |
Visit URL
|
| A novel secure cryptography model for data transmission based on Rotor64 technique | Multimedia Tools and Applications | CYBER SECURITY | 2023 | |
Visit URL
|
| AnIntelligent and Precise Agriculture Model in Sustainable Cities Based on Visualized Symptoms | agriculture | agriculture intelligence; precise agriculture; sustainability; predefined model; computer vision; intelligent systems | 2023 | |
Visit URL
|
| Diabetes Monitoring System in Smart Health Cities Based on Big Data Intelligence | Future Internet | big data intelligence; classification; data science; deep learning; E-health; healthcare analytics; intelligent diagnosis; machine learning; diabetes prediction | 2023 | |
Visit URL
|
| Exploring the Capabilities and Limitations of ChatGPT and Alternative Big Language Models | Artificial Intelligence and Applications | natural language processing, applied AI, conversational AI, machine learning, language model, ChatGPT, Google BARD, dialogue generation, intelligent systems. | 2023 | |
Visit URL
|
| Performance Evaluation of Machine Learning Approaches in Detecting IoT-Botnet Attacks | International Journal of Interactive Mobile Technologies (iJIM) | Network Security | 2023 | |
Visit URL
|
| Simulation and analysis performance of ad-hoc routing protocols under DDoS attack and proposed solution | International Journal of Data and Network Science | Ad hoc networks DSR AODV OLSR Routing protocols Wireless Networks and DDoS | 2023 | |
Visit URL
|
| A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education | Electronics | emotional intelligence; online education; deep learning; intelligent education; transfer learning; computer vision | 2022 | |
Visit URL
|
| An intelligent cyber security phishing detection system using deep learning techniques | Cluster Computing | Cybersecurity and machine Learning | 2022 | |
Visit URL
|
| An intelligent cybersecurity system for detecting fake news in social media websites | Soft Computing | Cybersecurity and Machine Learning | 2022 | |
Visit URL
|
| Business intelligence using deep learning techniques for social media contents | Cluster Computing | Big data - Business data analytics - Machine learning - Deep learning - Social media | 2022 | |
Visit URL
|
| Design of a Virtual Reality-Based Learning System for Spoken English | International Journal of Emerging Technologies in Learning | virtual reality, spoken English, remote learning system design | 2022 | |
Visit URL
|
| Hybrid CLAHE-CNN Deep Neural Networks for Classifying Lung Diseases from X-ray Acquisitions | Electronics | Machine learning | 2022 | |
Visit URL
|
| Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches | Multimedia Tools and Applications | Cyber security · 5G networks · Dropping attack · Simulation · Machine learning · Attack detection | 2022 | |
Visit URL
|
| Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture | Cluster Computing | Artificial intelligence Machine learning Smart agriculture Neural networks Deep learning Extreme learning machine (ELM) Binary dragonfly (BDA) Image segmentation Feature extraction Plant diseases | 2021 | |
Visit URL
|
| Efficient 3D medical image segmentation algorithm over a secured multimedia network | Multimedia Tools and Applications (2020) | Image segmentation · Hidden Markov Model (HMM) · Computer aided diagnosis · Multimedia networking security · Distributed systems | 2020 | |
Visit URL
|
| A secure encrypted protocol for clients handshaking in the same network | International Journal of Interactive Mobile Technologies | Cyber Security | 2019 | |
Visit URL
|
| Investigating the cyberbullying risk in digital media: protecting victims in school teenagers | Social Network Analysis and Mining | Computer Science: Computer Science Applications ,Computer Science: Information Systems,Social Sciences: Communication,Engineering: Media Technology | 2011 | |
Visit URL
|