Anas Bilal

ORCID: 0000-0002-5037-804X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • ICT in Developing Communities
  • Green IT and Sustainability
  • Spam and Phishing Detection
  • Caching and Content Delivery
  • Network Security and Intrusion Detection
  • Child Development and Digital Technology
  • ICT Impact and Policies
  • Advanced Malware Detection Techniques
  • Web Data Mining and Analysis
  • Digital Communication and Language

Hainan Normal University
2025

National University of Computer and Emerging Sciences
2021

COMSATS University Islamabad
2018

With the rapid development of internet, phishing attacks have become more diverse, making website detection a key focus in cybersecurity. While machine learning and deep led to various URL methods, many remain incomplete, limiting accuracy. This paper proposes CSPPC-BiLSTM, malicious model based on BiLSTM (Bidirectional Long Short-Term Memory, BiLSTM). The processes character sequences through an embedding layer captures contextual information via BiLSTM. By integrating CBAM (Convolutional...

10.1038/s41598-025-91148-z article EN cc-by-nc-nd Scientific Reports 2025-02-24

In this paper, we present a user study conducted on students of local university in Pakistan and collected corpus Roman Urdu text messages. We were interested forms functions To end, mobile phone usage dataset. The data consists 116 users 346, 455 text, is the most widely adopted style writing messages Pakistan. Our leads to interesting results, for instance, able quantitatively show that number words are written using more than one spelling; participants our not comfortable English hence...

10.1145/3098279.3098552 article EN 2017-09-01

While users in the developed world can choose to adopt technology that suits their needs, <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">emergent</i> cannot afford this luxury, and hence, they adapt themselves is readily available. When designed, such as mobile-phone technology, it an implicit assumption would be adopted by emergent due course. However, user groups have different follow usage patterns compared from world. In paper, we target...

10.1109/access.2018.2885332 article EN cc-by-nc-nd IEEE Access 2018-12-26

The effective utilization of a communication channel like calling person involves two steps. first step is storing the contact information another user, and second finding to initiate voice or text communication. However, current smartphone interfaces for management are mainly textual; which leaves many emergent users at severe disadvantage in using this most basic functionality fullest. Previous studies indicated that less-educated adopt various coping strategies store identify contacts....

10.1371/journal.pone.0259719 article EN cc-by PLoS ONE 2021-12-02
Coming Soon ...