scispace - formally typeset
Search or ask a question
Institution

National University of Computer and Emerging Sciences

EducationIslamabad, Pakistan
About: National University of Computer and Emerging Sciences is a education organization based out in Islamabad, Pakistan. It is known for research contribution in the topics: Computer science & The Internet. The organization has 1506 authors who have published 2438 publications receiving 26786 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A novel hybrid approach to detect android malware, wherein static features in conjunction with dynamic features of smart phone applications are employed and it is revealed that the proposed set of features has successfully detected malware threats with 97% F-measure results.
Abstract: Smart phones are an integral component of the mobile edge computing (MEC) framework. Securing the data stored on mobile devices is very crucial for ensuring the smooth operations of cloud services. A growing number of malicious Android applications demand an in-depth investigation to dissect their malicious intent to design effective malware detection techniques. The contemporary state-of-the-art model suggests that hybrid features based on machine learning (ML) techniques could play a significant role in android malware detection. The selection of application’s features plays a very crucial role to capture the appropriate behavioural patterns of malware instances for a useful classification of mobile applications. In this study, we propose a novel hybrid approach to detect android malware, wherein static features in conjunction with dynamic features of smart phone applications are employed. We collect these hybrid features using permissions, intents, and run-time features (such as information leakage, cryptography’s exploitation, and network manipulations) to analyse the effectiveness of the employed techniques for malware detection. We conduct experiments using over 5,000 real-world applications. The outcomes of the study reveal that the proposed set of features has successfully detected malware threats with 97% F-measure results.

11 citations

Journal ArticleDOI
TL;DR: In this paper, anisotropic stellar spheres in the framework of modified f ( R, G ) gravity were reviewed and the credibility of the presented model has been confirmed by observing the evolution of some physical aspects and it is concluded that the system is free from all singularities and is physically stable.

11 citations

01 Jan 2010
TL;DR: Results from experimentation suggest that the modied PSO with complete random initialization shows promise and has potential for improve- ment, particularly very good atnding the exact optimum.
Abstract: In this study we describe a method for extending particle swarm optimiza- tion. We have presented a novel approach for avoiding premature convergence to local minima by the introduction of diversity in the swarm. The swarm is made more diverse and is encouraged to explore by employing a mechanism which allows each particle to use a different equation to update its velocity. This equation is also continuously evolved through the use of genetic programming to ensure adaptability. We compare two vari- ations of our algorithm, one utilizing random initialization while in the second one we utilize partial non-random initalization which forces some particles to use the standard PSO velocity update equation. Results from experimentation suggest that the modied PSO with complete random initialization shows promise and has potential for improve- ment. It is particularly very good atnding the exact optimum.

11 citations

Journal ArticleDOI
TL;DR: In this paper, the authors presented an overview of the available literature associated with big data, its insights, and analytics, which can help practitioners and researchers to devise new solutions for early care in healthcare and in cardiology.
Abstract: Healthcare system facilitates the treatment of patients with the support of wearable, smart, and handheld devices, as well as many other devices These devices are producing a huge bulk of data that need to be moulded for extracting meaningful insights from them for the useful use of researchers and practitioners Various approaches, methods, and tools are in use for doing so and to extract meaningful information in the field of healthcare This information is being used as evidence to further analyze the data for the early care of patient and to devise treatment Early care and treatment can facilitate healthcare and the treatment of the patient and can have immense potentiality of dropping the care cost and quality refining of care and can decrease waste and chances of error To facilitate healthcare in general and cardiology in specific, the proposed study presents an overview of the available literature associated with big data, its insights, and analytics The presented report will help practitioners and researchers to devise new solutions for early care in healthcare and in cardiology

11 citations

Journal ArticleDOI
TL;DR: This work proposed a scheme to select the optimized values for control parameters of linear fractional transform to achieve an S-box with non-linearity of 112.
Abstract: The strength of cryptography encryption is strongly depended upon the substitution box (S-box), hence highly non-linear S-box is appreciated in cryptography. In this work, we proposed a scheme to select the optimized values for control parameters (a, b, c, d) of linear fractional transform (LFT) to achieve an S-box with non-linearity of 112. For dynamic parameter values, we used location of chaotic sequences. The proposed s-box tested on different criteria such as non-linearity method (NL), probability methods (linear approximation (LP), differential approximation (DP), strictly avalanche criteria (SAC) and bit independence criteria (BIC). Our result shows that proposed s-box achieves better or equal to cryptographic strength as compared with state-of-the-art techniques. Moreover, we tested the proposed s-box based encryption method in recommendation system scenario with the idea of text-to-image conversion. The statistical analysis of this image encryption shows the bright prospects of the proposed method.

11 citations


Authors

Showing all 1515 results

NameH-indexPapersCitations
Muhammad Shoaib97133347617
Muhammad Usman61120324848
Muhammad Saleem60101718396
Abdul Hameed5250714985
Muhammad Javaid483448765
Muhammad Umar452285851
Muhammad Adnan383815326
JingTao Yao371294374
Amine Bermak374415162
Nadeem A. Khan341664745
Majid Khan332303818
Tariq Shah321953131
Muhammad Shahzad312284323
Maurizio Repetto302523163
Tariq Mahmood30933772
Network Information
Related Institutions (5)
COMSATS Institute of Information Technology
21.2K papers, 340.9K citations

91% related

Information Technology University
13K papers, 236.4K citations

85% related

Quaid-i-Azam University
16.8K papers, 381.6K citations

82% related

Sharif University of Technology
31.3K papers, 526.8K citations

82% related

Iran University of Science and Technology
24.9K papers, 372K citations

81% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20235
202221
2021389
2020338
2019266
2018178