Hamad Naeem

ORCID: 0000-0003-1511-218X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Underwater Vehicles and Communication Systems
  • Anomaly Detection Techniques and Applications
  • Energy Harvesting in Wireless Networks
  • Digital and Cyber Forensics
  • Software Testing and Debugging Techniques
  • Software Engineering Research
  • Water Quality Monitoring Technologies
  • COVID-19 diagnosis using AI
  • AI in cancer detection
  • Adversarial Robustness in Machine Learning
  • Impact of Light on Environment and Health
  • Advanced Image and Video Retrieval Techniques
  • Remote Sensing and LiDAR Applications
  • Cybercrime and Law Enforcement Studies
  • Software Reliability and Analysis Research
  • Advanced Neural Network Applications
  • Educational Technology and Assessment
  • Video Surveillance and Tracking Methods
  • Energy Efficient Wireless Sensor Networks
  • Software System Performance and Reliability
  • Remote-Sensing Image Classification
  • Radiomics and Machine Learning in Medical Imaging
  • Smart Systems and Machine Learning

King Faisal University
2023-2025

University of Hradec Králové
2024

Zhoukou Normal University
2021-2023

Neijiang Normal University
2020-2021

Sichuan University
2017-2019

Chengdu University
2018-2019

Southeast University
2017

Nanjing University of Science and Technology
2017

PRG S&Tech (South Korea)
2017

Chongqing University
2015-2017

The IoT (Internet of Things) connect systems, applications, data storage, and services that may be a new gateway for cyber-attacks as they continuously offer in the organization. Currently, software piracy malware attacks are high risks to compromise security IoT. These threats steal important information causes economic reputational damages. In this paper, we have proposed combined deep learning approach detect pirated malware-infected files across network. TensorFlow neural network is...

10.1109/access.2019.2937347 article EN cc-by IEEE Access 2019-01-01

The integration of renewable energy resources into smart grids has become increasingly important to address the challenges managing and forecasting production in fourth revolution. To this end, artificial intelligence (AI) emerged as a powerful tool for improving control management. This study investigates application machine learning techniques, specifically ARIMA (auto-regressive integrated moving average) Bi-LSTM (bidirectional long short-term memory) models, predicting solar power next...

10.3390/su15118555 article EN Sustainability 2023-05-25

Abstract The most advanced power grid design, known as a ‘smart grid’, integrates information and communication technology (ICT) with conventional system to enable remote management of electricity distribution. intelligent cyber‐physical architecture enables bidirectional, real‐time data sharing between suppliers consumers through smart meters metering infrastructure (AMI). Data protection issues, such tampering, firmware exploitation, the leakage sensitive arise due grid's substantial...

10.1111/exsy.13556 article EN cc-by-nc-nd Expert Systems 2024-02-12

Android has become the leading mobile ecosystem because of its accessibility and adaptability. It also primary target widespread malicious apps. This situation needs immediate implementation an effective malware detection system. In this study, explainable system was proposed using transfer learning visual features. For detection, our technique leverages both textual First, a pre-trained model called Bidirectional Encoder Representations from Transformers (BERT) designed to extract trained...

10.3390/s22186766 article EN cc-by Sensors 2022-09-07

Facial Emotion Recognition is considered very significant for Human Computer Interaction (HCI) and they play a vital role in everyday human life. In recent years Convolutional Neural Network (CNNs) has become popular among researcher image analysis, because CNNs have generated remarkable results. However, needs lot of data to train from scratch. This problem been addressed by several researchers who trained with millions images, this training knowledge can also be used different task which...

10.1109/iccit-144147971.2020.9213757 article EN 2020 International Conference on Computing and Information Technology (ICCIT-1441) 2020-09-09

Recently a huge trend on the internet of things (IoT) and an exponential increase in automated tools are helping malware producers to target IoT devices. The traditional security solutions against infeasible due low computing power for large-scale data environment. number their variants increasing continuous attacks. Consequently, performance improvement analysis is critical requirement stop rapid expansion malicious attacks To solve this problem, paper proposed novel framework classifying...

10.1109/icaibd.2018.8396202 article EN 2018-05-01

During the course of ubiquitous data monitoring in underwater environment, achieving sustainable communication links among sensor nodes with astute link quality seems an ordeal challenge. Energy utilization has a direct impact because all active devices are battery dependent and no charging or replacement actions can be made when cost- effective packet delivery been set as benchmark. Hop inspection selection Shrewd through resurrecting factor have nothing short bleak challenge, only possible...

10.3390/smartcities3010005 article EN cc-by Smart Cities 2020-02-26

The selection of optimal relay node ever remains a stern challenge for underwater routing. Due to rigid and uncouth environment, the acoustic channel faces inevitable masses that tarnish transmission cycle. None protocols can cover all routing issues; therefore, designing protocol demands cognitive coverage cannot be accomplished without meticulous research. An angle-based shrewd technique is being adopted improve data packet delivery, as well revitalize network lifespan. From source...

10.1155/2020/9625974 article EN cc-by Wireless Communications and Mobile Computing 2020-03-10

Automated malware detection is a prominent issue in the world of network security because rising number and complexity threats. It time-consuming resource intensive to manually analyze all files an application using traditional methods. Polymorphism code obfuscation were created by authors bypass standard signature-based methods used antivirus vendors. Malware deep learning (DL) approaches has recently been implemented effort address this problem. This study compares IoT device three current...

10.1155/2022/7671967 article EN cc-by Computational Intelligence and Neuroscience 2022-07-15

Malicious attacks to software applications are on the rise as more people use Internet of things (IoT) devices and high-speed internet. When a system crash happens caused by malicious action, malware imaging method can examine application. In this study, we present novel classification that captures suspected operations in variety discrete size image features, allowing us identify such IoT device families. To decrease deep neural network training time, essential local global features...

10.1142/s0218126622503029 article EN Journal of Circuits Systems and Computers 2022-06-17

Android malware detection remains a critical issue for mobile security. Cybercriminals target since it is the most popular smartphone operating system (OS). Malware detection, analysis, and classification have become diverse research areas. This paper presents smart sensing model based on large language models (LLMs) developing classifying network traffic-based malware. The traffic that constantly connects apps may contain harmful components damage these apps. However, one of main challenges...

10.3390/s25010202 article EN cc-by Sensors 2025-01-01

Building detection in satellite images has been considered an essential field of research remote sensing and computer vision. There are currently numerous techniques algorithms used to achieve building performance. Different have proposed extract objects from high-resolution with standard contrast. However, low-contrast predict symmetrical findings as past studies using normal contrast is a challenging task may play integral role wide range applications. Having received significant attention...

10.3390/sym11010003 article EN Symmetry 2018-12-21

The advances in underwater sensor communication has become imperative getting up-to-date information about happenings, especially when world already faced the calamity like Tsunami. environment possessed freak and unpredictable movements which becomes more harsh time to time. nodes deployed under such juncture are main source of fact, facing numerous challenges. These mainly energy-constrained rely on limited battery source. Due most intricated routing architecture, biggest detriment is...

10.1109/access.2020.3022565 article EN cc-by IEEE Access 2020-01-01

The accomplishment of sustainable communication among source and destination sink node is a rigors challenge even establishing bodacious link between these nodes nothing short miracle because data routes are governed by the underwater environment. Energy consumption has significant influence as all active devices rely on battery. As cost-effective packet transmission established norm, no charging or replacement can be achieved. Hop evaluation shrewd connection discovery way resurrecting...

10.18196/jrc.1535 article EN Journal of Robotics and Control (JRC) 2020-01-01

Recent internet development is helping malware researchers to generate malicious code variants through automated tools.Due this reason, the number of increasing day by day.Consequently, performance improvement in analysis critical requirement stop rapid expansion malware.The existing research proved that similarities among could be used for detection and family classification.In paper, a Cross-Platform Malware Variant Classification System (CP-MVCS) proposed converted binary into grayscale...

10.3837/tiis.2019.07.023 article EN KSII Transactions on Internet and Information Systems 2019-07-31

Software similarity in different programming codes is a rapidly evolving field because of its numerous applications software development, cloning, plagiarism, and forensics. Currently, researchers developers search cross-language open-source repositories for similar variety reasons, such as reusing code, analyzing implementations, looking better application. However, it challenging task each language has unique syntax semantic structure. In this paper, novel tool called Cross-Language...

10.1002/int.22813 article EN International Journal of Intelligent Systems 2022-01-09

The underwater Internet of Things (UIoT) and remote sensing are significant for biodiversity preservation, environmental protection, national security, disaster assistance, technological innovation. Assigning tasks to autonomous vehicles (AUVs) is a fundamental challenge in technology exploration. Remote AUVs vital pollution detection, prevention, marine observation, ocean monitoring. This work presents an optimized network connectivity using multi-attribute decision-making approach IoT...

10.3389/fmars.2024.1468481 article EN cc-by Frontiers in Marine Science 2024-09-19
Coming Soon ...