- ICT in Developing Communities
- Green IT and Sustainability
- Spam and Phishing Detection
- Caching and Content Delivery
- Network Security and Intrusion Detection
- Child Development and Digital Technology
- ICT Impact and Policies
- Advanced Malware Detection Techniques
- Web Data Mining and Analysis
- Digital Communication and Language
Hainan Normal University
2025
National University of Computer and Emerging Sciences
2021
COMSATS University Islamabad
2018
With the rapid development of internet, phishing attacks have become more diverse, making website detection a key focus in cybersecurity. While machine learning and deep led to various URL methods, many remain incomplete, limiting accuracy. This paper proposes CSPPC-BiLSTM, malicious model based on BiLSTM (Bidirectional Long Short-Term Memory, BiLSTM). The processes character sequences through an embedding layer captures contextual information via BiLSTM. By integrating CBAM (Convolutional...
In this paper, we present a user study conducted on students of local university in Pakistan and collected corpus Roman Urdu text messages. We were interested forms functions To end, mobile phone usage dataset. The data consists 116 users 346, 455 text, is the most widely adopted style writing messages Pakistan. Our leads to interesting results, for instance, able quantitatively show that number words are written using more than one spelling; participants our not comfortable English hence...
While users in the developed world can choose to adopt technology that suits their needs, <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">emergent</i> cannot afford this luxury, and hence, they adapt themselves is readily available. When designed, such as mobile-phone technology, it an implicit assumption would be adopted by emergent due course. However, user groups have different follow usage patterns compared from world. In paper, we target...
The effective utilization of a communication channel like calling person involves two steps. first step is storing the contact information another user, and second finding to initiate voice or text communication. However, current smartphone interfaces for management are mainly textual; which leaves many emergent users at severe disadvantage in using this most basic functionality fullest. Previous studies indicated that less-educated adopt various coping strategies store identify contacts....