Saqib Hakak

ORCID: 0000-0002-6670-1032
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Spam and Phishing Detection
  • Misinformation and Its Impacts
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Cloud Data Security Solutions
  • Caching and Content Delivery
  • Autonomous Vehicle Technology and Safety
  • Adversarial Robustness in Machine Learning
  • Network Security and Intrusion Detection
  • Artificial Intelligence in Healthcare
  • Imbalanced Data Classification Techniques
  • Brain Tumor Detection and Classification
  • Sentiment Analysis and Opinion Mining
  • Internet Traffic Analysis and Secure E-voting
  • Acute Ischemic Stroke Management
  • Energy Efficient Wireless Sensor Networks
  • Retinal Imaging and Analysis
  • Security in Wireless Sensor Networks
  • IoT Networks and Protocols
  • Privacy-Preserving Technologies in Data
  • Information and Cyber Security
  • COVID-19 diagnosis using AI
  • Machine Fault Diagnosis Techniques
  • Advanced Neural Network Applications

University of New Brunswick
2020-2023

University of Wah
2022

King Saud University
2022

The University of Texas at San Antonio
2022

University of Northern British Columbia
2020

In the next few years, smart farming will reach each and every nook of world. The prospects using unmanned aerial vehicles (UAV) for are immense. However, cost ease in controlling UAVs might play an important role motivating farmers to use farming. Mostly, controlled by remote controllers radio waves. There several technologies such as WiFi or ZigBee that also used UAVs. Smart Bluetooth (also referred Low Energy) is a wireless technology transfer data over short distances. cheaper than other...

10.1109/jsen.2021.3049471 article EN IEEE Sensors Journal 2021-01-07

The Internet of Things (IoT) has paved the way to a highly connected society where all things are interconnected and exchanging information become more accessible through internet. With use IoT devices, threat malware increased rapidly. number existing new variants made protecting devices networks challenging. can hide in systems disables its activity when there attempts discover detect them. technological advances, various emerging techniques address this problem. However, they still...

10.1109/access.2023.3235389 article EN cc-by IEEE Access 2023-01-01

As technology and digitization grows, there is a huge surge in digital storage of health records. Machine learning has an important role uncovering patterns existing these records providing interesting insights to medical practitioners for assistance the diagnosis various ailments. Due sensitivity records, machine algorithms often fail predict diseases accurately. In present work, ensemble based model comprising Learning (ML) Algorithms namely Random Forest classifier, Decision Tree...

10.1109/ic-etite47903.2020.235 article EN 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE) 2020-02-01

Cybercriminals are constantly on the lookout for new attack vectors, and recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, stay-at-home orders, consequently increasing reliance information communications technologies, such as Zoom. also attempted to exploit facilitate a broad range of malicious activities, attempting take over videoconferencing platforms used online meetings/educational theft, other fraudulent...

10.1109/access.2020.3006172 article EN cc-by IEEE Access 2020-01-01

Summary In the competing era of online industries, understanding customer feedback and satisfaction is one important concern for any business organization. The well‐known social media platforms like Twitter are a place where customers share their feedbacks. Analyzing beneficial, as it provides an advantage way unveiling interests. proposed system, namely Senti‐eSystem , aims at development sentiment‐based eSystem using hybridized Fuzzy Deep Neural Network Measuring Customer Satisfaction to...

10.1002/spe.2853 article EN Software Practice and Experience 2020-08-03

The application of machine learning (ML) algorithms are massively scaling up due to rapid digitization and emergence new tecnologies like the Internet Things (IoT). In today's digital era, we can find ML being applied in areas healthcare, IoT, engineering, finance, more. However, all these need be trained order predict/solve a particular problem. There is high possibility tampering with training datasets producing biased results. Hence, this article, propose blockchain-based solution secure...

10.1109/iotm.1021.2000160 article EN IEEE Internet of Things Magazine 2021-09-01

One of the major components Societal Digitalization is Online social networks (OSNs). OSNs can expose people to different popular trends in various aspects life and alter people’s beliefs, behaviors, decisions communication. Social bots malicious users are significant sources for spreading misinformation on media pose serious cyber threats society. The degree similarity user profiles a bot fake news so great that it very difficult differentiate both based their attributes. Over years,...

10.1109/access.2022.3157724 article EN cc-by IEEE Access 2022-01-01

Since its emergence in December 2019, there have been numerous posts and news regarding the COVID-19 pandemic social media, traditional print, electronic media. These sources information from both trusted non-trusted medical sources. Furthermore, these media are spread rapidly. Spreading a piece of deceptive may lead to anxiety, unwanted exposure remedies, tricks for digital marketing, deadly factors. Therefore, model detecting fake pool is essential. In this work, dataset which fusion...

10.3389/fpubh.2021.788074 article EN cc-by Frontiers in Public Health 2022-01-04

Fake news is a major threat to democracy (e.g., influencing public opinion), and its impact cannot be understated particularly in our current socially digitally connected society. Researchers from different disciplines computer science, political information linguistics) have also studied the dissemination, detection, mitigation of fake news; however, it remains challenging detect prevent dissemination practice. In addition, we emphasize importance designing artificial intelligence...

10.1109/tcss.2022.3177359 article EN IEEE Transactions on Computational Social Systems 2022-06-06

The Intelligent Transportation System (ITS) is said to revolutionize the travel experience by making it safe, secure, and comfortable for people. Although vehicles have been automated up a certain extent, still has critical security issues that require thorough study advanced solutions. vulnerabilities of ITS allows attacker steal vehicle. Therefore, identification drivers required in order develop safe secure system so can be protected from theft. There are two ways which driver identified:...

10.1145/3412353 article EN ACM Transactions on Internet Technology 2022-02-12

The rise of blockchain technology within a few years has attracted researchers across the world. prime reason for worldwide attention is undoubtedly due to its feature immutability along with decentralized approach data protection. As this progressing, lots developments in terms identifying new applications, blockchain-based platforms, consensus mechanisms, etc are taking place. Hence, article, an attempt been made review recent advancements technology. Furthermore, we have also explored...

10.1504/ijahuc.2021.119089 article EN International Journal of Ad Hoc and Ubiquitous Computing 2021-01-01

In recent years, advanced technologies are used in automobiles, which make it simpler to drive on roads. However, driving is not trouble-free considering the unexpected hindrances and difficulty recognizing traffic signs while at high speeds. Due advancement such as image recognition, several automated vehicles techniques developed assist drivers driving. this paper, an integrated intelligent system designed using YOLO V3 neural architecture for obstacles visualizing sign through input from...

10.1109/tgcn.2022.3162698 article EN IEEE Transactions on Green Communications and Networking 2022-03-28

Healthcare big data (HBD) allows medical stakeholders to analyze, access, retrieve personal and electronic health records (EHR) of patients. Mostly, the are stored on healthcare cloud application (HCA) servers, thus, subjected end-user latency, extensive computations, single-point failures, security privacy risks. A joint solution is required address issues responsive analytics, coupled with high ingestion in HBD secure EHR access. Motivated from research gaps, paper proposes a scheme, that...

10.1109/jbhi.2021.3097237 article EN IEEE Journal of Biomedical and Health Informatics 2021-08-24

Fault diagnostics involving the Internet-of-Things (IoT) sensors and edge devices is a challenging task due to their limited energy computational capabilities. Another challenge concerning IoT or incursion of noise when used in an industrial environment. The noisy samples affect decision support system that could lead financial operational losses. This article proposes encoder using artificial intelligence things (NEAT) architecture for fault diagnosis devices. NEAT combines autoencoders...

10.1109/jiot.2021.3109668 article EN IEEE Internet of Things Journal 2021-09-02

Clustered storage systems are dominant solutions in modern-day data production. Ceph represents a sustainable clustered solution, supporting object, block, and file capabilities, with no single point of failure. Despite the strong management abilities, security remains serious concern system. To date, authentication access control only supported protocols Data confidentiality will be undermined if malicious insider or outside intruder accesses to devices. This study proposes lightweight...

10.1109/access.2022.3227384 article EN cc-by-nc-nd IEEE Access 2022-01-01

Extensive studies have indicated that fake news has become one of the major threats to our social system (e.g., influencing public opinion, financial markets, journalism, and health system), its impact cannot be understated, particularly in current socially digitally connected society. In past years, this problem been investigated from different perspectives various disciplines, such as computer science, political information linguistics. Even though efforts proposed many helpful solutions,...

10.1109/tcss.2023.3322160 article EN IEEE Transactions on Computational Social Systems 2023-10-16

With phishing emails being a major problem worldwide which is only getting larger by the year, there needs to exist solutions combat them as they can cause tremendous harm society. This research aims compare numerous machine learning models and transformers for multilingual spam detection using English, French, Russian emails. We evaluate accuracy two of three experiments have nearly balanced test data. Our results show that, on average, XLM-Roberta performs best out all tested in terms accuracy.

10.1109/pst58708.2023.10320177 article EN 2023-08-21
Coming Soon ...