scispace - formally typeset
A

Aneeqa Ijaz

Researcher at University of Oklahoma

Publications -  15
Citations -  128

Aneeqa Ijaz is an academic researcher from University of Oklahoma. The author has contributed to research in topics: Computer science & Alice and Bob. The author has an hindex of 4, co-authored 9 publications receiving 44 citations. Previous affiliations of Aneeqa Ijaz include Information Technology University & University of the Sciences.

Papers
More filters
Journal ArticleDOI

Coverage and Rate Analysis for Downlink HetNets Using Modified Reverse Frequency Allocation Scheme

TL;DR: This paper presents a novel interference mitigation technique known as reverse frequency allocation (RFA), which provides an efficient resource allocation compared with the other state-of-the-art techniques.
Journal ArticleDOI

Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security.

TL;DR: A systematic evaluation of literature of cloud-hosted ML/DL models along both the important dimensions—attacks and defenses—related to their security reveals that there is an increasing interest from the research community on the perspective of attacking and defending different attacks on Machine Learning as a Service platforms.
Journal ArticleDOI

Towards using cough for respiratory disease diagnosis by leveraging Artificial Intelligence: A survey

TL;DR: In this article , a comprehensive overview of the data-driven ML/DL detection and preliminary diagnosis frameworks, along with a detailed list of significant features is presented. And the authors investigate the mechanism that causes cough and the latent cough features of the respiratory modalities.
Journal ArticleDOI

Communication Requirements in 5G-Enabled Healthcare Applications: Review and Considerations

TL;DR: The requirements for communication key performance indicators in relevant healthcare use cases, including remote robotic-assisted surgery, connected ambulance, wearable and implantable devices, and service robotics for assisted living are reviewed, with a focus on quantitative requirements.
Journal ArticleDOI

On Safeguarding Visible Light Communication Systems Against Attacks by Active Adversaries

TL;DR: Simulation results show that: i) for OMA VLC, authentication becomes more effective as Eve’s distance to Bob becomes more dissimilar to Alice's distance toBob; ii) for NOMA V LC, the average decoding error probability increases approximately logarithmically with the increase in the interference power of Eve.