default search action
Thar Baker
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j147]Sara Afzal, Muhammad Asim, Mirza Omer Beg, Thar Baker, Ali Ismail Awad, Nouman Shamim:
Context-aware embeddings for robust multiclass fraudulent URL detection in online social platforms. Comput. Electr. Eng. 119: 109494 (2024) - [j146]Zheng Zhang, Jingfeng Xue, Thar Baker, Tian Chen, Yu-an Tan, Yuanzhang Li:
COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module. Comput. Secur. 146: 104038 (2024) - [j145]Yuanzhang Li, Tianchi Sha, Thar Baker, Xiao Yu, Zhiwei Shi, Sikang Hu:
Adaptive vertical federated learning via feature map transferring in mobile edge computing. Computing 106(4): 1081-1097 (2024) - [j144]Thar Baker, Zaher Al Aghbari, Ahmed M. Khedr, Naveed Ahmed, Shini Girija:
EDITORS: Energy-aware Dynamic Task Offloading using Deep Reinforcement Transfer Learning in SDN-enabled Edge Nodes. Internet Things 25: 101118 (2024) - [j143]Tianwei Lei, Jingfeng Xue, Yong Wang, Thar Baker, Zequn Niu:
An empirical study of problems and evaluation of IoT malware classification label sources. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101898 (2024) - [j142]Jie Yang, Thar Baker, Sukhpal Singh Gill, Xiaochuan Yang, Weifeng Han, Yuanzhang Li:
A federated learning attack method based on edge collaboration via cloud. Softw. Pract. Exp. 54(7): 1257-1274 (2024) - [j141]Thar Baker, Tong Li, Jingyu Jia, Baolei Zhang, Chang Tan, Albert Y. Zomaya:
Poison-Tolerant Collaborative Filtering Against Poisoning Attacks on Recommender Systems. IEEE Trans. Dependable Secur. Comput. 21(5): 4589-4599 (2024) - [j140]Yunzhe Tian, Dongyue Xu, Endong Tong, Rui Sun, Kang Chen, Yike Li, Thar Baker, Wenjia Niu, Jiqiang Liu:
Toward Learning Model-Agnostic Explanations for Deep Learning-Based Signal Modulation Classifiers. IEEE Trans. Reliab. 73(3): 1529-1543 (2024) - [c68]Zheng Zhang, Jingfeng Xue, Thar Baker, Tian Chen, Yuhang Zhao, Weizhi Meng:
FMC-CEE: A Collaborative Execution Environment with Flash Memory Controllers in IoT. PerCom Workshops 2024: 88-93 - 2023
- [j139]Mamoun Alazab, Latif U. Khan, Srinivas Koppu, Swarna Priya Ramu, Iyapparaja Meenakshisundaram, M. Parimala Boobalan, Thar Baker, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu, Ahamed Aljuhani:
Digital Twins for Healthcare 4.0 - Recent Advances, Architecture, and Open Challenges. IEEE Consumer Electron. Mag. 12(6): 29-37 (2023) - [j138]Yuan Cheng, Baojiang Cui, Chen Chen, Thar Baker, Tao Qi:
Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network. Comput. Commun. 197: 267-275 (2023) - [j137]Xin Wang, Peng Jiang, Thar Baker, Tielei Li, Liehuang Zhu:
Enabling privacy and leakage resistance for dynamic blockchain-based access control systems. Comput. Stand. Interfaces 84: 103690 (2023) - [j136]Jie Yang, Jun Zheng, Thar Baker, Shuai Tang, Yu-an Tan, Quanxin Zhang:
Clean-label poisoning attacks on federated learning for IoT. Expert Syst. J. Knowl. Eng. 40(5) (2023) - [j135]Junbao Chen, Jingfeng Xue, Yong Wang, Lu Huang, Thar Baker, Zhixiong Zhou:
Privacy-Preserving and Traceable Federated Learning for data sharing in industrial IoT applications. Expert Syst. Appl. 213(Part): 119036 (2023) - [j134]Ruqayah Al-Ani, Thar Baker, Bo Zhou, Qi Shi:
Privacy and safety improvement of VANET data via a safety-related privacy scheme. Int. J. Inf. Sec. 22(4): 763-783 (2023) - [j133]Wenjun Song, Mengqi Liu, Thar Baker, Qikun Zhang, Yu-an Tan:
A group key exchange and secure data sharing based on privacy protection for federated learning in edge-cloud collaborative computing environment. Int. J. Netw. Manag. 33(5) (2023) - [j132]Shini Girija, Thar Baker, Naveed Ahmed, Ahmed M. Khedr, Zaher Al Aghbari, Ashish Jha, Konstantin Sobolev, Salman Ahmadi-Asl, Anh Huy Phan:
Attribute recognition for person re-identification using federated learning at all-in-edge. Internet Things 22: 100793 (2023) - [j131]Naveed Ahmed, Thar Baker, Zaher Al Aghbari, Ahmed Khedr:
PRYORTIE: Public on-demand smart transportation service via a scalable fog-based platform. Intell. Syst. Appl. 18: 200228 (2023) - [j130]Abdul Rehman Javed, Mirza Omer Beg, Muhammad Asim, Thar Baker, Ali Hilal Al-Bayatti:
AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes. J. Ambient Intell. Humaniz. Comput. 14(5): 4869-4882 (2023) - [j129]Thippa Reddy Gadekallu, Neeraj Kumar, Thar Baker, Natarajan Deepa, Prabadevi Boopathy, Praveen Kumar Reddy Maddikunta:
Moth-Flame Optimization based ensemble classification for intrusion detection in intelligent transport system for smart cities. Microprocess. Microsystems 103: 104935 (2023) - [j128]Nouman Shamim, Muhammad Asim, Thar Baker, Ali Ismail Awad:
Efficient Approach for Anomaly Detection in IoT Using System Calls. Sensors 23(2): 652 (2023) - [j127]Syed Luqman Shah, Ziaul Haq Abbas, Ghulam Abbas, Fazal Muhammad, Aseel Hussien, Thar Baker:
An Innovative Clustering Hierarchical Protocol for Data Collection from Remote Wireless Sensor Networks Based Internet of Things Applications. Sensors 23(12): 5728 (2023) - [j126]Tong Chen, Jiqiang Liu, Thar Baker, Yalun Wu, Yingxiao Xiang, Yike Li, Wenjia Niu, Endong Tong, Albert Y. Zomaya:
A Mutual Information-Based Assessment of Reverse Engineering on Rewards of Reinforcement Learning. IEEE Trans. Artif. Intell. 4(5): 1089-1100 (2023) - [j125]Yajie Wang, Yu-an Tan, Thar Baker, Neeraj Kumar, Quanxin Zhang:
Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things. IEEE Trans. Ind. Informatics 19(6): 7480-7488 (2023) - [j124]Chen Liang, Thar Baker, Yuanzhang Li, Raheel Nawaz, Yu-an Tan:
Building Covert Timing Channel of the IoT-Enabled MTS Based on Multi-Stage Verification. IEEE Trans. Intell. Transp. Syst. 24(2): 2578-2595 (2023) - [j123]Xuan Pan, Xiangrui Cai, Kehui Song, Thar Baker, Thippa Reddy Gadekallu, Xiaojie Yuan:
Location Recommendation Based on Mobility Graph With Individual and Group Influences. IEEE Trans. Intell. Transp. Syst. 24(8): 8409-8420 (2023) - [j122]Xianduo Li, Xiaoli Gong, Dong Wang, Jin Zhang, Thar Baker, Jin Zhou, Tingjuan Lu:
ABM-SpConv-SIMD: Accelerating Convolutional Neural Network Inference for Industrial IoT Applications on Edge Devices. IEEE Trans. Netw. Sci. Eng. 10(5): 3071-3085 (2023) - [j121]Yingnan Zhou, Xue Hu, Sihan Xu, Yan Jia, Yuhao Liu, Junyong Wang, Guangquan Xu, Wei Wang, Shaoying Liu, Thar Baker:
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters. IEEE Trans. Software Eng. 49(10): 4624-4638 (2023) - [c67]Deema Abdal Hafeth, Gokul Lal, Mohammed Al-Khafajiy, Thar Baker, Stefanos D. Kollias:
Cloud-IoT Application for Scene Understanding in Assisted Living: Unleashing the Potential of Image Captioning and Large Language Model (ChatGPT). DeSE 2023: 150-155 - [c66]Mohammed Al-Khafajiy, Ghaith Al-Tameemi, Thar Baker:
DDoS-FOCUS: A Distributed DoS Attacks Mitigation using Deep Learning Approach for a Secure IoT Network. EDGE 2023: 393-399 - [c65]Mohammed M. Alani, Thar Baker:
A Survey of Smart Grid Intrusion Detection Datasets. Intelligent Environments (Workshops) 2023: 5-13 - [i3]Ashish Jha, Dimitrii Ermilov, Konstantin Sobolev, Anh Huy Phan, Salman Ahmadi-Asl, Naveed Ahmed, Imran N. Junejo, Zaher Al Aghbari, Thar Baker, Ahmed Mohamed Khedr, Andrzej Cichocki:
Lightweight Attribute Localizing Models for Pedestrian Attribute Recognition. CoRR abs/2306.09822 (2023) - 2022
- [j120]Muhammad Rizwan, Aysha Shabbir, Abdul Rehman Javed, Maryam Shabbir, Thar Baker, Dhiya Al-Jumeily:
Brain Tumor and Glioma Grade Classification Using Gaussian Convolutional Neural Network. IEEE Access 10: 29731-29740 (2022) - [j119]Sagnik Sarkar, Shaashwat Agrawal, Thar Baker, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu:
Catalysis of neural activation functions: Adaptive feed-forward training for big data applications. Appl. Intell. 52(12): 13364-13383 (2022) - [j118]Bing Jia, Hao Gong, Zhaopeng Zong, Tao Zhou, Thar Baker, Ahmed Al-Shamma'a, Yan Jia:
An incentive mechanism in expert-decision-based crowdsensing networks. Appl. Soft Comput. 122: 108834 (2022) - [j117]Hao Peng, Zhe Kan, Can Liu, Thar Baker, Dandan Zhao:
Risk Assessment of CPS Composed of Edge Consumer Electronics Under Intentional Attack. IEEE Consumer Electron. Mag. 11(2): 36-41 (2022) - [j116]Bashar Al-Shboul, Abdullateef Rabab'ah, Mahmoud Al-Ayyoub, Yaser Jararweh, Thar Baker:
Social Network Analysis of the Panama Papers Concentrating on the MENA Region. Comput. J. 65(9): 2493-2505 (2022) - [j115]Jingbin Liu, Bing Jia, Lei Guo, Baoqi Huang, Lei Wang, Thar Baker:
CTSLoc: an indoor localization method based on CNN by using time-series RSSI. Clust. Comput. 25(4): 2573-2584 (2022) - [j114]Thar Baker, Muhammad Asim, Hezekiah Samwini, Nauman Shamim, Mohammed M. Alani, Rajkumar Buyya:
A blockchain-based Fog-oriented lightweight framework for smart public vehicular transportation systems. Comput. Networks 203: 108676 (2022) - [j113]Bing Jia, Jingbin Liu, Tao Feng, Baoqi Huang, Thar Baker, Hissam Tawfik:
TTSL: An indoor localization method based on Temporal Convolutional Network using time-series RSSI. Comput. Commun. 193: 293-301 (2022) - [j112]Sadiq H. Abdulhussain, Basheera M. Mahmmod, Thar Baker, Dhiya Al-Jumeily:
Fast and accurate computation of high-order Tchebichef polynomials. Concurr. Comput. Pract. Exp. 34(27) (2022) - [j111]Shatha Ghareeb, Abir Jaafar Hussain, Dhiya Al-Jumeily, Wasiq Khan, Rawaa Al-Jumeily, Thar Baker, Ahmed Al-Shamma'a, Mohammed Khalaf:
Evaluating student levelling based on machine learning model's performance. Discov. Internet Things 2(1) (2022) - [j110]Ahmed S. Alfakeeh, Ali H. Al-Bayatti, François Siewe, Thar Baker:
Agent-based negotiation approach for feature interactions in smart home systems using calculus of the context-aware ambient. Trans. Emerg. Telecommun. Technol. 33(2) (2022) - [j109]Ayesha Qamar, Muhammad Asim, Zakaria Maamar, Saad Saeed, Thar Baker:
A Quality-of-Things model for assessing the Internet-of-Things' nonfunctional properties. Trans. Emerg. Telecommun. Technol. 33(8) (2022) - [j108]Sukhpal Singh Gill, Minxian Xu, Carlo Ottaviani, Panos Patros, Rami Bahsoon, Arash Shaghaghi, Muhammed Golec, Vlado Stankovski, Huaming Wu, Ajith Abraham, Manmeet Singh, Harshit Mehta, Soumya K. Ghosh, Thar Baker, Ajith Kumar Parlikad, Hanan Lutfiyya, Salil S. Kanhere, Rizos Sakellariou, Schahram Dustdar, Omer F. Rana, Ivona Brandic, Steve Uhlig:
AI for next generation computing: Emerging trends and future directions. Internet Things 19: 100514 (2022) - [j107]Yachao Yuan, Yali Yuan, Parisa Memarmoshrefi, Thar Baker, Dieter Hogrefe:
LbSP: Load-Balanced Secure and Private Autonomous Electric Vehicle Charging Framework With Online Price Optimization. IEEE Internet Things J. 9(17): 15685-15696 (2022) - [j106]Thar Baker, Chen Liang, Yuanzhang Li:
A Reliable Covert Channel for Stealthy Data Transmission for Internet-of-Underwater-Things. IEEE Internet Things Mag. 5(4): 42-46 (2022) - [j105]Faisal Shahzad, Abdul Mannan, Abdul Rehman Javed, Ahmad S. Almadhor, Thar Baker, Dhiya Al-Jumeily:
Cloud-based multiclass anomaly detection and categorization using ensemble learning. J. Cloud Comput. 11: 74 (2022) - [j104]Junyong Wang, Thar Baker, Yingnan Zhou, Ali Ismail Awad, Bin Wang, Yongsheng Zhu:
Automatic mapping of configuration options in software using static analysis. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 10044-10055 (2022) - [j103]Haoran Ni, Zehua Guo, Changlin Li, Songshi Dou, Chao Yao, Thar Baker:
Network Coding-based Resilient Routing for Maintaining Data Security and Availability in Software-Defined Networks. J. Netw. Comput. Appl. 205: 103372 (2022) - [j102]Umer Farooq, Noshina Tariq, Muhammad Asim, Thar Baker, Ahmed Al-Shamma'a:
Machine learning and the Internet of Things security: Solutions and open challenges. J. Parallel Distributed Comput. 162: 89-104 (2022) - [j101]Abdul Rehman Javed, Muhammad Abul Hassan, Faisal Shahzad, Waqas Ahmed, Saurabh Singh, Thar Baker, Thippa Reddy Gadekallu:
Integration of Blockchain Technology and Federated Learning in Vehicular (IoT) Networks: A Comprehensive Survey. Sensors 22(12): 4394 (2022) - [j100]Umer Farooq, Muhammad Asim, Noshina Tariq, Thar Baker, Ali Ismail Awad:
Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security. Sensors 22(12): 4539 (2022) - [j99]Mujtaba Ghous, Ahmad Kamal Hassan, Ziaul Haq Abbas, Ghulam Abbas, Aseel Hussien, Thar Baker:
Cooperative Power-Domain NOMA Systems: An Overview. Sensors 22(24): 9652 (2022) - [j98]Yike Li, Wenjia Niu, Yunzhe Tian, Tong Chen, Zhiqiang Xie, Yalun Wu, Yingxiao Xiang, Endong Tong, Thar Baker, Jiqiang Liu:
Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation. IEEE Trans. Green Commun. Netw. 6(3): 1448-1458 (2022) - [j97]Boyu Hou, Jiqiang Gao, Xiaojie Guo, Thar Baker, Ying Zhang, Yanlong Wen, Zheli Liu:
Mitigating the Backdoor Attack by Federated Filters for Industrial IoT Applications. IEEE Trans. Ind. Informatics 18(5): 3562-3571 (2022) - [j96]Jiqiang Gao, Baolei Zhang, Xiaojie Guo, Thar Baker, Min Li, Zheli Liu:
Secure Partial Aggregation: Making Federated Learning More Robust for Industry 4.0 Applications. IEEE Trans. Ind. Informatics 18(9): 6340-6348 (2022) - [j95]Muneeba Nasir, Abdul Rehman Javed, Muhammad Adnan Tariq, Muhammad Asim, Thar Baker:
Feature engineering and deep learning-based intrusion detection framework for securing edge IoT. J. Supercomput. 78(6): 8852-8866 (2022) - [j94]Yali Yuan, Chencheng Liang, Xu Chen, Thar Baker, Xiaoming Fu:
Adaptive Fuzzy Game-Based Energy-Efficient Localization in 3D Underwater Sensor Networks. ACM Trans. Internet Techn. 22(2): 29:1-29:20 (2022) - [d1]Rawaa Al-Jumeily, Sulaf Assi, Hoshang Kolivand, Abdullah Al-Hamid, Thar Baker, Dhiya Al-Jumeily:
Level 6 students' performance in mathematics at a school. IEEE DataPort, 2022 - [i2]Sukhpal Singh Gill, Minxian Xu, Carlo Ottaviani, Panos Patros, Rami Bahsoon, Arash Shaghaghi, Muhammed Golec, Vlado Stankovski, Huaming Wu, Ajith Abraham, Manmeet Singh, Harshit Mehta, Soumya K. Ghosh, Thar Baker, Ajith Kumar Parlikad, Hanan Lutfiyya, Salil S. Kanhere, Rizos Sakellariou, Schahram Dustdar, Omer F. Rana, Ivona Brandic, Steve Uhlig:
AI for Next Generation Computing: Emerging Trends and Future Directions. CoRR abs/2203.04159 (2022) - 2021
- [j93]Penghao Sun, Zehua Guo, Julong Lan, Junfei Li, Yuxiang Hu, Thar Baker:
ScaleDRL: A Scalable Deep Reinforcement Learning Approach for Traffic Engineering in SDN with Pinning Control. Comput. Networks 190: 107891 (2021) - [j92]Peizhuang Cong, Yuchao Zhang, Zheli Liu, Thar Baker, Hissam Tawfik, Wendong Wang, Ke Xu, Ruidong Li, Fuliang Li:
A deep reinforcement learning-based multi-optimality routing scheme for dynamic IoT networks. Comput. Networks 192: 108057 (2021) - [j91]Ahmed Nawaz Khan, Muhammad Adnan Tariq, Muhammad Asim, Zakaria Maamar, Thar Baker:
Congestion avoidance in wireless sensor network using software defined network. Computing 103(11): 2573-2596 (2021) - [j90]Slim Kallel, Zakaria Maamar, Mohamed Sellami, Noura Faci, Ahmed Ben Arab, Walid Gaaloul, Thar Baker:
Restriction-based fragmentation of business processes over the cloud. Concurr. Comput. Pract. Exp. 33(7): 1 (2021) - [j89]Yi-xi Xie, Li-xin Ji, Ling-shu Li, Zehua Guo, Thar Baker:
An adaptive defense mechanism to prevent advanced persistent threats. Connect. Sci. 33(2): 359-379 (2021) - [j88]Temur ul Hassan, Muhammad Asim, Thar Baker, Jawad Hassan, Noshina Tariq:
CTrust-RPL: A control layer-based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks-based Internet of Things applications. Trans. Emerg. Telecommun. Technol. 32(3) (2021) - [j87]Yachao Yuan, Yali Yuan, Thar Baker, Lutz Maria Kolbe, Dieter Hogrefe:
FedRD: Privacy-preserving adaptive Federated learning framework for intelligent hazardous Road Damage detection and warning. Future Gener. Comput. Syst. 125: 385-398 (2021) - [j86]Khalifa Al-Room, Farkhund Iqbal, Thar Baker, Babar Shah, Benjamin Yankson, Áine MacDermott, Patrick C. K. Hung:
Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models. Int. J. Digit. Crime Forensics 13(1): 1-25 (2021) - [j85]Zakaria Maamar, Noura Faci, Emir Ugljanin, Thar Baker, Vanilson Arruda Burégio:
Towards a cell-inspired approach for a sustainable internet-of-things. Internet Things 14: 100400 (2021) - [j84]Dongjie Zhu, Yundong Sun, Haiwen Du, Ning Cao, Thar Baker, Gautam Srivastava:
HUNA: A Method of Hierarchical Unsupervised Network Alignment for IoT. IEEE Internet Things J. 8(5): 3201-3210 (2021) - [j83]Yachao Yuan, Md. Saiful Islam, Yali Yuan, Shengjin Wang, Thar Baker, Lutz Maria Kolbe:
EcRD: Edge-Cloud Computing Framework for Smart Road Damage Detection and Warning. IEEE Internet Things J. 8(16): 12734-12747 (2021) - [j82]Sara Afzal, Muhammad Asim, Abdul Rehman Javed, Mirza Omer Beg, Thar Baker:
URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models. J. Netw. Syst. Manag. 29(3): 21 (2021) - [j81]Thar Baker, Zehua Guo, Ali Ismail Awad, Shangguang Wang, Benjamin C. M. Fung:
Enabling Technologies for Energy Cloud. J. Parallel Distributed Comput. 152: 108-110 (2021) - [j80]Khaled Alwasel, Devki Nandan Jha, Fawzy Habeeb, Umit Demirbaga, Omer F. Rana, Thar Baker, Scharam Dustdar, Massimo Villari, Philip James, Ellis Solaiman, Rajiv Ranjan:
IoTSim-Osmosis: A framework for modeling and simulating IoT applications over an edge-cloud continuum. J. Syst. Archit. 116: 101956 (2021) - [j79]Abdullah Numani, Zaiwar Ali, Ziaul Haq Abbas, Ghulam Abbas, Thar Baker, Dhiya Al-Jumeily:
Smart Application Division and Time Allocation Policy for Computational Offloading in Wireless Powered Mobile Edge Computing. Mob. Inf. Syst. 2021: 9993946:1-9993946:13 (2021) - [j78]Shadi AlZu'bi, Bilal Hawashin, Ala Mughaid, Thar Baker:
Efficient 3D medical image segmentation algorithm over a secured multimedia network. Multim. Tools Appl. 80(11): 16887-16905 (2021) - [j77]Fares Yousefi, Hoshang Kolivand, Thar Baker:
SaS-BCI: a new strategy to predict image memorability and use mental imagery as a brain-based biometric authentication. Neural Comput. Appl. 33(9): 4283-4297 (2021) - [j76]Noshina Tariq, Muhammad Asim, Farrukh Aslam Khan, Thar Baker, Umair Khalid, Abdelouahid Derhab:
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things. Sensors 21(1): 23 (2021) - [j75]Mujtaba Ghous, Ziaul Haq Abbas, Ahmad Kamal Hassan, Ghulam Abbas, Thar Baker, Dhiya Al-Jumeily:
Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network. Sensors 21(12): 4180 (2021) - [j74]Thar Baker, Dhiya Al-Jumeily, Zakaria Maamar, Zahir Tari:
Semantic eSystems: Engineering methods, techniques, and tools. Softw. Pract. Exp. 51(3): 487-488 (2021) - [j73]Rakan Aldmour, Sufian Yousef, Thar Baker, Elhadj Benkhelifa:
An approach for offloading in mobile cloud computing to optimize power consumption and processing time. Sustain. Comput. Informatics Syst. 31: 100562 (2021) - [j72]Fanyu Bu, Chengsheng Hu, Qingchen Zhang, Changchuan Bai, Laurence T. Yang, Thar Baker:
A Cloud-Edge-Aided Incremental High-Order Possibilistic c-Means Algorithm for Medical Data Clustering. IEEE Trans. Fuzzy Syst. 29(1): 148-155 (2021) - [j71]Endong Tong, Wenjia Niu, Yunzhe Tian, Jiqiang Liu, Thar Baker, Sandeep Verma, Zheli Liu:
A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things. IEEE Trans. Green Commun. Netw. 5(2): 645-657 (2021) - [j70]Xiaojie Guo, Zheli Liu, Jin Li, Jiqiang Gao, Boyu Hou, Changyu Dong, Thar Baker:
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning. IEEE Trans. Inf. Forensics Secur. 16: 1736-1751 (2021) - [j69]Yu Zhang, Yani Ge, Peiran Yu, Jianzhong Zhang, Yongzheng Zhang, Thar Baker:
A Novel Method to Prevent Misconfigurations of Industrial Automation and Control Systems. IEEE Trans. Ind. Informatics 17(6): 4210-4218 (2021) - [j68]Haoyu Ma, Jianwen Tian, Kefan Qiu, David Lo, Debin Gao, Daoyuan Wu, Chunfu Jia, Thar Baker:
Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems. IEEE Trans. Ind. Informatics 17(8): 5840-5850 (2021) - [j67]Kaihao Lou, Yongjian Yang, En Wang, Zheli Liu, Thar Baker, Ali Kashif Bashir:
Reinforcement Learning Based Advertising Strategy Using Crowdsensing Vehicular Data. IEEE Trans. Intell. Transp. Syst. 22(7): 4635-4647 (2021) - [j66]Natarajan Deepa, B. Prabadevi, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu, Thar Baker, Muhammad Ajmal Khan, Usman Tariq:
An AI-based intelligent system for healthcare analysis using Ridge-Adaline Stochastic Gradient Descent Classifier. J. Supercomput. 77(2): 1998-2017 (2021) - [j65]Mohammed Al-Khafajiy, Safa Otoum, Thar Baker, Muhammad Asim, Zakaria Maamar, Moayad Aloqaily, Mark Taylor, Martin Randles:
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model. ACM Trans. Internet Techn. 21(3): 54:1-54:23 (2021) - [j64]Phillip Kendrick, Thar Baker, Zakaria Maamar, Abir Hussain, Rajkumar Buyya, Dhiya Al-Jumeily:
An Efficient Multi-Cloud Service Composition Using a Distributed Multiagent-Based, Memory-Driven Approach. IEEE Trans. Sustain. Comput. 6(3): 358-369 (2021) - [c64]Naveed Ahmed, Thar Baker, Zaher Al Aghbari, Ahmed M. Khedr:
A Distributed Fog-based Vehicular Navigation System for Efficient Transportation. DeSE 2021: 246-251 - [c63]Ghaith Al-Tameemi, James Xue, Suraj Ajit, Triantafyllos Kanakis, Israa Hadi, Thar Baker, Mohammed Al-Khafajiy, Rawaa Al-Jumeily:
A Deep Neural Network-Based Prediction Model for Students' Academic Performance. DeSE 2021: 364-369 - [c62]Ali Salam Al-Jaberi, Ali Mohsin Al-Juboori, Rawaa Al-Jumeily, Mohammed Al-Khafajiy, Thar Baker:
Palm Vein Based Authentication System by Using Convolution Neural Network. DeSE 2021: 370-375 - [c61]Hafed Zarzour, Faiz Maazouzi, Mohammad Al-Zinati, Yaser Jararweh, Thar Baker:
An Efficient Recommender System Based on Collaborative Filtering Recommendation and Cluster Ensemble. SNAMS 2021: 1-6 - 2020
- [j63]G. Thippa Reddy, M. Praveen Kumar Reddy, Kuruva Lakshmanna, Rajesh Kaluri, Dharmendra Singh Rajput, Gautam Srivastava, Thar Baker:
Analysis of Dimensionality Reduction Techniques on Big Data. IEEE Access 8: 54776-54788 (2020) - [j62]Mohammed Khalaf, Haya Alaskar, Abir Jaafar Hussain, Thar Baker, Zakaria Maamar, Rajkumar Buyya, Panos Liatsis, Wasiq Khan, Hissam Tawfik, Dhiya Al-Jumeily:
IoT-Enabled Flood Severity Prediction via Ensemble Machine Learning Models. IEEE Access 8: 70375-70386 (2020) - [j61]Belal Ali Al-Maytami, Pingzhi Fan, Abir Jaafar Hussain, Thar Baker, Panos Liatsis:
An efficient queries processing model based on Multi Broadcast Searchable Keywords Encryption (MBSKE). Ad Hoc Networks 98 (2020) - [j60]Abd Ullah Khan, Ghulam Abbas, Ziaul Haq Abbas, Thar Baker, Muhammad Waqas:
Spectrum efficiency in CRNs using hybrid dynamic channel reservation and enhanced dynamic spectrum access. Ad Hoc Networks 107: 102246 (2020) - [j59]Zakaria Maamar, Muhammad Asim, Khouloud Boukadi, Thar Baker, Saad Saeed, Ikbel Guidara, Fadwa Yahya, Emir Ugljanin, Djamal Benslimane:
Towards a Quality-of-Thing based approach for assigning things to federations. Clust. Comput. 23(3): 1589-1602 (2020) - [j58]Umair Khalid, Muhammad Asim, Thar Baker, Patrick C. K. Hung, Muhammad Adnan Tariq, Laura Rafferty:
A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Clust. Comput. 23(3): 2067-2087 (2020) - [j57]Quanxin Zhang, Yuhang Zhao, Yajie Wang, Thar Baker, Jian Zhang, Jingjing Hu:
Towards cross-task universal perturbation against black-box object detectors in autonomous driving. Comput. Networks 180: 107388 (2020) - [j56]Sayed Najmuddin, Muhammad Asim, Kashif Munir, Thar Baker, Zehua Guo, Rajiv Ranjan:
A BBR-based congestion control for delay-sensitive real-time applications. Computing 102(12): 2541-2563 (2020) - [j55]Wendi Feng, Chuanchang Liu, Zehua Guo, Thar Baker, Gang Wang, Meng Wang, Bo Cheng, Junliang Chen:
MobiGyges: A mobile hidden volume for preventing data loss, improving storage utilization, and avoiding device reboot. Future Gener. Comput. Syst. 109: 158-171 (2020) - [j54]Yawen Wang, Yunfei Guo, Zehua Guo, Thar Baker, Wenyan Liu:
CLOSURE: A cloud scientific workflow scheduling algorithm based on attack-defense game model. Future Gener. Comput. Syst. 111: 460-474 (2020) - [j53]Jianjian Ai, Hongchang Chen, Zehua Guo, Guozhen Cheng, Thar Baker:
Mitigating malicious packets attack via vulnerability-aware heterogeneous network devices assignment. Future Gener. Comput. Syst. 111: 841-852 (2020) - [j52]Abdul Rehman Javed, Muhammad Usman Sarwar, Mirza Omer Beg, Muhammad Asim, Thar Baker, Hissam Tawfik:
A collaborative healthcare framework for shared healthcare plan with ambient intelligence. Hum. centric Comput. Inf. Sci. 10: 40 (2020) - [j51]Áine MacDermott, Thar Baker, Paul Buck, Farkhund Iqbal, Qi Shi:
The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics. Int. J. Digit. Crime Forensics 12(1): 1-13 (2020) - [j50]Wasiq Khan, Abir Jaafar Hussain, Haya Alaskar, Thar Baker, Fawaz Ghali, Dhiya Al-Jumeily, Ahmed Al-Shamma'a:
Prediction of Flood Severity Level via Processing IoT Sensor Data Using a Data Science Approach. IEEE Internet Things Mag. 3(4): 10-15 (2020) - [j49]Mohammad Hammoudeh, John Pimlott, Sana Belguith, Gregory Epiphaniou, Thar Baker, A. S. M. Kayes, Bamidele Adebisi, Ahcène Bounceur:
Network Traffic Analysis for Threat Detection in the Internet of Things. IEEE Internet Things Mag. 3(4): 40-45 (2020) - [j48]Quanyu Zhao, Siyi Chen, Zheli Liu, Thar Baker, Yuan Zhang:
Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Inf. Process. Manag. 57(6): 102355 (2020) - [j47]Moayad Aloqaily, Thar Baker, Ammar Rayes, Yaser Jararweh, Ismaeel Al Ridhawi:
Editorial. Internet Technol. Lett. 3(6) (2020) - [j46]Mohammed Al-Khafajiy, Thar Baker, Muhammad Asim, Zehua Guo, Rajiv Ranjan, Antonella Longo, Deepak Puthal, Mark Taylor:
COMITMENT: A Fog Computing Trust Management Approach. J. Parallel Distributed Comput. 137: 1-16 (2020) - [j45]Mohamed Alloghani, Ahmed J. Aljaaf, Abir Hussain, Thar Baker, Jamila Mustafina, Dhiya Al-Jumeily, Mohammed Khalaf:
Correction to: Implementation of machine learning algorithms to create diabetic patient re-admission profiles. BMC Medical Informatics Decis. Mak. 20(1): 93 (2020) - [j44]Zaynab Ahmed, Abir Jaafar Hussain, Wasiq Khan, Thar Baker, Haya Al-Askar, Janet Lunn, Raghad Al-Shabandar, Dhiya Al-Jumeily, Panos Liatsis:
Lossy and Lossless Video Frame Compression: A Novel Approach for High-Temporal Video Data Analytics. Remote. Sens. 12(6): 1004 (2020) - [j43]Ghulam Abbas, Ziaul Haq Abbas, Shahab Haider, Thar Baker, Saadi Boudjit, Fazal Muhammad:
PDMAC: A Priority-Based Enhanced TDMA Protocol for Warning Message Dissemination in VANETs. Sensors 20(1): 45 (2020) - [j42]Thar Baker, Muhammad Asim, Áine MacDermott, Farkhund Iqbal, Faouzi Kamoun, Babar Shah, Omar Alfandi, Mohammad Hammoudeh:
A secure fog-based platform for SCADA-based IoT critical infrastructure. Softw. Pract. Exp. 50(5): 503-518 (2020) - [j41]Ismaeel Al Ridhawi, Yehia Kotb, Moayad Aloqaily, Yaser Jararweh, Thar Baker:
A Profitable and Energy-Efficient Cooperative Fog Solution for IoT Services. IEEE Trans. Ind. Informatics 16(5): 3578-3586 (2020) - [j40]Fatemeh Safara, Alireza Souri, Thar Baker, Ismaeel Al Ridhawi, Moayad Aloqaily:
PriNergy: a priority-based energy-efficient routing method for IoT systems. J. Supercomput. 76(11): 8609-8626 (2020) - [j39]Yanyu Huang, Bo Li, Zheli Liu, Jin Li, Siu-Ming Yiu, Thar Baker, Brij B. Gupta:
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment. IEEE Trans. Serv. Comput. 13(4): 602-612 (2020) - [j38]Muhammad Saleem Khan, Sobia Jangsher, Moayad Aloqaily, Yaser Jararweh, Thar Baker:
EPS-TRA: Energy Efficient Peer Selection and Time Switching Ratio Allocation for SWIPT-Enabled D2D Communication. IEEE Trans. Sustain. Comput. 5(3): 428-437 (2020) - [c60]Zakaria Maamar, Mohamed Sellami, Thar Baker, Said Elnaffar, Maj Alshibly:
Atomicity in the Internet of Transactional Things (Io2T). AINA Workshops 2020: 46-55 - [c59]Bing Jia, Zhaopeng Zong, Baoqi Huang, Thar Baker:
A DNN-based WiFi-RSSI Indoor Localization Method in IoT. ChinaCom 2020: 200-211 - [c58]Ahmad Zia Ul-Saufie, Dhiya Al-Jumeily, Abir Hussain, Muqhlisah Muhamad, Jamila Mustafina, Fawaz Ghali, Thar Baker:
Novel Approach to Predict Ground-Level Ozone Concentration Using S-estimation and MM-Estimimation. IJCNN 2020: 1-5 - [c57]Faouzi Kamoun, Farkhund Iqbal, Mohamed Amir Esseghir, Thar Baker:
AI and machine learning: A mixed blessing for cybersecurity. ISNCC 2020: 1-7 - [c56]Ruqayah Al-Ani, Bo Zhou, Qi Shi, Thar Baker, Mohamed Abdlhamed:
Adjusted Location Privacy Scheme for VANET Safety Applications. NOMS 2020: 1-4 - [p4]Mohamed Alloghani, Thar Baker, Dhiya Al-Jumeily, Abir Hussain, Jamila Mustafina, Ahmed J. Aljaaf:
A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems. Handbook of Computer Networks and Cyber Security 2020: 585-608 - [p3]Mohamed Alloghani, Dhiya Al-Jumeily, Abir Hussain, Jamila Mustafina, Thar Baker, Ahmed J. Aljaaf:
Implementation of Machine Learning and Data Mining to Improve Cybersecurity and Limit Vulnerabilities to Cyber Attacks. Nature-Inspired Computation in Data Mining and Machine Learning 2020: 47-76 - [p2]Mohamed Alloghani, Thar Baker, Dhiya Al-Jumeily, Abir Hussain, Jamila Mustafina, Ahmed J. Aljaaf:
Prospects of Machine and Deep Learning in Analysis of Vital Signs for the Improvement of Healthcare Services. Nature-Inspired Computation in Data Mining and Machine Learning 2020: 113-136 - [i1]Wendi Feng, Chuanchang Liu, Zehua Guo, Thar Baker, Gang Wang, Meng Wang, Bo Cheng, Junliang Chen:
MobiGyges: A mobile hidden volume for preventing data loss, improving storage utilization, and avoiding device reboot. CoRR abs/2004.10849 (2020)
2010 – 2019
- 2019
- [j37]Changhe Yu, Julong Lan, Zehua Guo, Yuxiang Hu, Thar Baker:
An Adaptive and Lightweight Update Mechanism for SDN. IEEE Access 7: 12914-12927 (2019) - [j36]Basheera M. Mahmmod, Abd. Rahman bin Ramli, Thar Baker, Feras N. Al-Obeidat, Sadiq H. Abdulhussain, Wissam A. Jassim:
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials. IEEE Access 7: 103485-103504 (2019) - [j35]Mostafa Ghobaei-Arani, Alireza Souri, Thar Baker, Aseel Hussien:
ControCity: An Autonomous Approach for Controlling Elasticity Using Buffer Management in Cloud Computing Environment. IEEE Access 7: 106912-106924 (2019) - [j34]Zaiwar Ali, Lei Jiao, Thar Baker, Ghulam Abbas, Ziaul Haq Abbas, Sadia Khaf:
A Deep Learning Approach for Energy Efficient Computational Offloading in Mobile Edge Computing. IEEE Access 7: 149623-149633 (2019) - [j33]Belal Ali Al-Maytami, Pingzhi Fan, Abir Hussain, Thar Baker, Panos Liatsis:
A Task Scheduling Algorithm With Improved Makespan Based on Prediction of Tasks Computation Time algorithm for Cloud Computing. IEEE Access 7: 160916-160926 (2019) - [j32]Zakaria Maamar, Thar Baker, Noura Faci, Mohammed Al-Khafajiy, Emir Ugljanin, Yacine Atif, Mohamed Sellami:
Weaving cognition into the internet-of-things: Application to water leaks. Cogn. Syst. Res. 56: 233-245 (2019) - [j31]Zakaria Maamar, Thar Baker, Noura Faci, Mohammed Al-Khafajiy, Emir Ugljanin, Yacine Atif, Mohamed Sellami:
Corrigendum to "Weaving cognition into the internet-of-things: Application to water leaks" [Cogn. Syst. Res. 56 (2019) 233-245]. Cogn. Syst. Res. 58: 54 (2019) - [j30]Shahab Haider, Ghulam Abbas, Ziaul Haq Abbas, Thar Baker:
DABFS: A robust routing protocol for warning messages dissemination in VANETs. Comput. Commun. 147: 21-34 (2019) - [j29]Saad Saeed, Muhammad Asim, Thar Baker, Zakaria Maamar:
A location-sensitive and network-aware broker for recommending Web services. Computing 101(5): 455-475 (2019) - [j28]Mohammed Al-Khafajiy, Thar Baker, Hilal Al-Libawy, Zakaria Maamar, Moayad Aloqaily, Yaser Jararweh:
Improving fog computing performance via Fog-2-Fog collaboration. Future Gener. Comput. Syst. 100: 266-280 (2019) - [j27]Aaron Boddy, William Hurst, Michael Mackay, Abdennour El Rhalibi, Thar Baker, Casimiro Aday Curbelo Montañez:
An Investigation into Healthcare-Data Patterns. Future Internet 11(2): 30 (2019) - [j26]Yehia Kotb, Ismaeel Al Ridhawi, Moayad Aloqaily, Thar Baker, Yaser Jararweh, Hissam Tawfik:
Cloud-Based Multi-Agent Cooperation for IoT Devices Using Workflow-Nets. J. Grid Comput. 17(4): 625-650 (2019) - [j25]Farkhund Iqbal, Benjamin Yankson, Maryam A. AlYammahi, Naeema AlMansoori, Suaad Mohammed Qayed, Babar Shah, Thar Baker:
Drone forensics: examination and analysis. Int. J. Electron. Secur. Digit. Forensics 11(3): 245-264 (2019) - [j24]Khouloud Boukadi, Noura Faci, Zakaria Maamar, Emir Ugljanin, Mohamed Sellami, Thar Baker, Mohammed Al-Khafajiy:
Norm-based and commitment-driven agentification of the Internet of Things. Internet Things 6 (2019) - [j23]Khouloud Boukadi, Noura Faci, Zakaria Maamar, Emir Ugljanin, Mohamed Sellami, Thar Baker, Mohammed Al-Khafajiy:
Corrigendum to Norm-based and commitment-driven agentification of the Internet of Things [Internet of Things volume 6 (2019) 100042]. Internet Things 7 (2019) - [j22]Mohamed Alloghani, Mohammed M. Alani, Dhiya Al-Jumeily, Thar Baker, Jamila Mustafina, Abir Hussain, Ahmed J. Aljaaf:
A systematic review on the status and progress of homomorphic encryption technologies. J. Inf. Secur. Appl. 48 (2019) - [j21]Sohail Abbas, Madjid Merabti, Kashif Kifayat, Thar Baker:
Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks. KSII Trans. Internet Inf. Syst. 13(12): 6214-6242 (2019) - [j20]Zakaria Maamar, Ejub Kajan, Muhammad Asim, Thar Baker Shamsa:
Open challenges in vetting the internet-of-things. Internet Technol. Lett. 2(5) (2019) - [j19]Noshina Tariq, Muhammad Asim, Zakaria Maamar, Muhammad Zubair Farooqi, Noura Faci, Thar Baker:
A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT. J. Parallel Distributed Comput. 134: 198-206 (2019) - [j18]Nadeem Abbas, Muhammad Asim, Noshina Tariq, Thar Baker, Sohail Abbas:
A Mechanism for Securing IoT-enabled Applications at the Fog Layer. J. Sens. Actuator Networks 8(1): 16 (2019) - [j17]Mohamed Alloghani, Ahmed J. Aljaaf, Abir Hussain, Thar Baker, Jamila Mustafina, Dhiya Al-Jumeily, Mohammed Khalaf:
Implementation of machine learning algorithms to create diabetic patient re-admission profiles. BMC Medical Informatics Decis. Mak. 19-S(9): 253 (2019) - [j16]Mohammed Al-Khafajiy, Hoshang Kolivand, Thar Baker, David Tully, Atif Waraich:
Smart hospital emergency system - Via mobile-based requesting services. Multim. Tools Appl. 78(14): 20087-20111 (2019) - [j15]Mohammed Al-Khafajiy, Thar Baker, Carl Chalmers, Muhammad Asim, Hoshang Kolivand, Muhammad Fahim, Atif Waraich:
Remote health monitoring of elderly through wearable sensors. Multim. Tools Appl. 78(17): 24681-24706 (2019) - [j14]Noshina Tariq, Muhammad Asim, Feras N. Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir:
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey. Sensors 19(8): 1788 (2019) - [c55]Mohammed Al-Khafajiy, Thar Baker, Atif Waraich, Omar Alfandi, Aseel Hussien:
Enabling High Performance Fog Computing through Fog-2-Fog Coordination Model. AICCSA 2019: 1-6 - [c54]Hiba Alsmadi, Ahmed J. Aljaaf, Abir Jaafar Hussain, Jamila Mustafina, Rawaa Al-Jumeily, Thar Baker, Conor Mallucci:
An Insight into ICP Monitoring of Patients with Hydrocephalus using Data Science Approach. AICCSA 2019: 1-2 - [c53]Mohammed Al-Khafajiy, Shatha Ghareeb, Rawaa Al-Jumeily, Rusul Almurshedi, Aseel Hussien, Thar Baker, Yaser Jararweh:
A Holistic Study on Emerging IoT Networking Paradigms. DeSE 2019: 943-949 - [c52]Wasiq Khan, Abir Hussain, Bilal Muhammed Khan, Raheel Nawaz, Thar Baker:
Novel Framework for Outdoor Mobility Assistance and Auditory Display for Visually Impaired People. DeSE 2019: 984-989 - [c51]Aseel Hussien, Matthew Tucker, Alison J. Cotgrave, Mohammed Al-Khafajiy, Thar Baker Shamsa:
Optimizing Project Delivery through Augmented Reality and Agile Methodologies. DeSE 2019: 1006-1013 - [c50]Javier de Arquer Rilo, Abir Hussain, May Al Taei, Thar Baker, Dhiya Al-Jumeily:
Dynamic Neural Network for Business and Market Analysis. ICIC (1) 2019: 77-87 - [c49]Zakaria Maamar, Saoussen Cheikhrouhou, Muhammad Asim, Ayesha Qamar, Thar Baker, Emir Ugljanin:
Towards a Resource-aware Thing Composition Approach. HPCS 2019: 803-809 - [c48]Sadiq H. Abdulhussain, Abd. Rahman Ramli, Basheera M. Mahmmod, M. Iqbal Saripan, S. A. R. Al-Haddad, Thar Baker, Wameedh Nazar Flayyih, Wissam A. Jassim:
A Fast Feature Extraction Algorithm for Image and Video Processing. IJCNN 2019: 1-8 - [c47]Jianjian Ai, Hongchang Chen, Zehua Guo, Guozhen Cheng, Thar Baker:
Improving Resiliency of Software-Defined Networks with Network Coding-based Multipath Routing. ISCC 2019: 1-6 - [c46]Wendi Feng, Chuanchang Liu, Zehua Guo, Thar Baker, Bo Cheng, Junliang Chen:
Data Loss Prevention and Storage Utilization Improvement of the Hidden Volume on Mobile Devices. ISCC 2019: 1-6 - [c45]Zakaria Maamar, Thar Baker, Noura Faci, Emir Ugljanin, Mohammed Al-Khafajiy, Vanilson Arruda Burégio:
Towards a seamless coordination of cloud and fog: illustration through the internet-of-things. SAC 2019: 2008-2015 - [c44]Ali Saeed Dayem Alfoudi, S. H. Shah Newaz, Rudy Ramlie, Gyu Myoung Lee, Thar Baker:
Seamless Mobility Management in Heterogeneous 5G Networks: A Coordination Approach among Distributed SDN Controllers. VTC Spring 2019: 1-6 - 2018
- [j13]Tao Hu, Zehua Guo, Peng Yi, Thar Baker, Julong Lan:
Multi-controller Based Software-Defined Networking: A Survey. IEEE Access 6: 15980-15996 (2018) - [j12]Ibrahim Ghafir, Vaclav Prenosil, Mohammad Hammoudeh, Thar Baker, Sohail Jabbar, Shehzad Khalid, Sardar F. Jaf:
BotDet: A System for Real Time Botnet Command and Control Traffic Detection. IEEE Access 6: 38947-38958 (2018) - [j11]Thar Baker, Emir Ugljanin, Noura Faci, Mohamed Sellami, Zakaria Maamar, Ejub Kajan:
Everything as a resource: Foundations and illustration through Internet-of-things. Comput. Ind. 94: 62-74 (2018) - [j10]Zakaria Maamar, Thar Baker, Mohamed Sellami, Muhammad Asim, Emir Ugljanin, Noura Faci:
Cloud vs edge: Who serves the Internet-of-Things better? Internet Technol. Lett. 1(5) (2018) - [j9]Muhammad Fahim, Thar Baker, Asad Masood Khattak, Babar Shah, Saiqa Aleem, Francis Chow:
Context Mining of Sedentary Behaviour for Promoting Self-Awareness Using a Smartphone. Sensors 18(3): 874 (2018) - [j8]Soraia Oueida, Yehia Kotb, Moayad Aloqaily, Yaser Jararweh, Thar Baker:
An Edge Computing Based Smart Healthcare Framework for Resource Management. Sensors 18(12): 4307 (2018) - [j7]Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Thar Baker, Qi Shi, Brett Lempereur:
Security policy monitoring of BPMN-based service compositions. J. Softw. Evol. Process. 30(9) (2018) - [j6]Thar Baker, Bandar Aldawsari, Muhammad Asim, Hissam Tawfik, Zakaria Maamar, Rajkumar Buyya:
Cloud-SEnergy: A bin-packing based multi-cloud service broker for energy efficient composition and execution of data-intensive applications. Sustain. Comput. Informatics Syst. 19: 242-252 (2018) - [j5]Ibrahim Ghafir, Jibran Saleem, Mohammad Hammoudeh, Hanan Faour, Vaclav Prenosil, Sardar F. Jaf, Sohail Jabbar, Thar Baker:
Security threats to critical infrastructure: the human factor. J. Supercomput. 74(10): 4986-5002 (2018) - [c43]Mohammed Dighriri, Ali Saeed Dayem Alfoudi, Gyu Myoung Lee, Thar Baker, Rubem Pereira:
Resource Allocation Scheme in 5G Network Slices. AINA Workshops 2018: 275-280 - [c42]Raghad Al-Shabandar, Abir Hussain, Robert Keight, Andy Laws, Thar Baker:
The Application of Gaussian Mixture Models for the Identification of At-Risk Learners in Massive Open Online Courses. CEC 2018: 1-8 - [c41]Ahmed J. Aljaaf, Dhiya Al-Jumeily, Hussein M. Haglan, Mohamed Alloghani, Thar Baker, Abir Jaafar Hussain, Jamila Mustafina:
Early Prediction of Chronic Kidney Disease Using Machine Learning Supported by Predictive Analytics. CEC 2018: 1-9 - [c40]Adnan Amin, Babar Shah, Asad Masood Khattak, Thar Baker, Hamood ur Rahman Durani, Sajid Anwar:
Just-in-time Customer Churn Prediction: With and Without Data Transformation. CEC 2018: 1-6 - [c39]Mohammed Khalaf, Abir Jaafar Hussain, Dhiya Al-Jumeily, Thar Baker, Robert Keight, Paulo Lisboa, Paul Fergus, Ala S. Al Kafri:
A Data Science Methodology Based on Machine Learning Algorithms for Flood Severity Prediction. CEC 2018: 1-8 - [c38]Mohamed Mahyoub, Martin Randles, Thar Baker, Po Yang:
Comparison Analysis of Machine Learning Algorithms to Rank Alzheimer's Disease Risk Factors by Importance. DeSE 2018: 1-11 - [c37]Ahmed J. Aljaaf, Dhiya Al-Jumeily, Thaaer kh. Asman, Abir Jaafar Hussain, Thar Baker, Mohamed Alloghani, Jamila Mustafina:
H-Diary: Mobile Application for Headache Diary and Remote Patient Monitoring. DeSE 2018: 18-22 - [c36]Mohammed Al-Khafajiy, Thar Baker, Hilal Al-Libawy, Atif Waraich, Carl Chalmers, Omar Alfandi:
Fog Computing Framework for Internet of Things Applications. DeSE 2018: 71-77 - [c35]Abir Jaafar Hussain, Deimante Marcinonyte Marcinonyte, Farkhund Iqbal, Hissam Tawfik, Thar Baker, Dhiya Al-Jumeily:
Smart Home Systems Security. HPCC/SmartCity/DSS 2018: 1422-1428 - [c34]Mohamed Mahyoub, Martin Randles, Thar Baker, Po Yang:
Effective Use of Data Science Toward Early Prediction of Alzheimer's Disease. HPCC/SmartCity/DSS 2018: 1455-1461 - [c33]Mohammed Al-Khafajiy, Lee Webster, Thar Baker, Atif Waraich:
Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcare. ICFNDS 2018: 9:1-9:7 - [c32]Abeer Abdullah Alsadhan, Abir Hussain, Thar Baker, Omar Alfandi:
Detecting Distributed Denial of Service Attacks in Neighbour Discovery Protocol Using Machine Learning Algorithm Based on Streams Representation. ICIC (3) 2018: 551-563 - [c31]Thar Baker, José M. García-Campos, Daniel Gutiérrez-Reina, Sergio L. Toral Marín, Hissam Tawfik, Dhiya Al-Jumeily, Abir Hussain:
GreeAODV: An Energy Efficient Routing Protocol for Vehicular Ad Hoc Networks. ICIC (3) 2018: 670-681 - [c30]Rounaq Abbas, Abir Jaafar Hussain, Dhiya Al-Jumeily, Thar Baker, Asad Masood Khattak:
Classification of Foetal Distress and Hypoxia Using Machine Learning Approaches. ICIC (3) 2018: 767-776 - [c29]Noura Faci, Zakaria Maamar, Thar Baker, Emir Ugljanin, Mohamed Sellami:
In Situ Mutation for Active Things in the IoT Context. ICSOFT 2018: 759-766 - [c28]Zakaria Maamar, Thar Baker, Noura Faci, Emir Ugljanin, Yacine Atif, Mohammed Al-Khafajiy, Mohamed Sellami:
Cognitive Computing Meets the Internet of Things. ICSOFT 2018: 775-780 - [c27]Zakaria Maamar, Khouloud Boukadi, Emir Ugljanin, Thar Baker, Muhammad Asim, Mohammed Al-Khafajiy, Djamal Benslimane, Hasna El Alaoui El Abdallaoui:
Thing Federation as a Service: Foundations and Demonstration. MEDI 2018: 184-197 - [c26]Áine MacDermott, Thar Baker, Qi Shi:
Iot Forensics: Challenges for the Ioa Era. NTMS 2018: 1-5 - [c25]Zakaria Maamar, Noura Faci, Khouloud Boukadi, Emir Ugljanin, Mohamed Sellami, Thar Baker, Rafael Angarita:
How to agentify the Internet-of-Things? RCIS 2018: 1-6 - [c24]Mohamed Alloghani, Dhiya Al-Jumeily, Thar Baker, Abir Hussain, Jamila Mustafina, Ahmed J. Aljaaf:
Applications of Machine Learning Techniques for Software Engineering Learning and Early Prediction of Students' Performance. SCDS 2018: 246-258 - [c23]Mohammed Al-Khafajiy, Thar Baker, Atif Waraich, Dhiya Al-Jumeily, Abir Hussain:
IoT-Fog Optimal Workload via Fog Offloading. UCC Companion 2018: 359-364 - [p1]Mohammed Dighriri, Gyu Myoung Lee, Thar Baker:
Big Data Environment for Smart Healthcare Applications Over 5G Mobile Network. Applications of Big Data Analytics 2018: 1-29 - 2017
- [j4]Thar Baker, Muhammad Asim, Hissam Tawfik, Bandar Aldawsari, Rajkumar Buyya:
An energy-aware service composition algorithm for multiple cloud-based IoT applications. J. Netw. Comput. Appl. 89: 96-108 (2017) - [c22]Mohammed Dighriri, Ali Saeed Dayem Alfoudi, Gyu Myoung Lee, Thar Baker, Rubem Pereira:
Comparison Data Traffic Scheduling Techniques for Classifying QoS over 5G Mobile Networks. AINA Workshops 2017: 492-497 - [c21]Muhammad Fahim, Thar Baker, Asad Masood Khattak, Omar Alfandi:
Alert me: Enhancing active lifestyle via observing sedentary behavior using mobile sensing systems. Healthcom 2017: 1-4 - 2016
- [c20]Dua'a Abu Hamdi, Farkhund Iqbal, Thar Baker, Babar Shah:
Multimedia File Signature Analysis for Smartphone Forensics. DeSE 2016: 130-137 - [c19]Mohammed Dighriri, Ali Saeed Dayem Alfoudi, Gyu Myoung Lee, Thar Baker:
Data Traffic Model in Machine to Machine Communications over 5G Network Slicing. DeSE 2016: 239-244 - [c18]Muhammad Fahim, Asad Masood Khattak, Thar Baker, Francis Chow, Babar Shah:
Micro-context recognition of sedentary behaviour using smartphone. DICTAP 2016: 30-34 - [c17]Sultan Al Sharif, Mohamed Al Ali, N. Al Reqabi, Farkhund Iqbal, Thar Baker, Andrew Marrington:
Magec: An Image Searching Tool for Detecting Forged Images in Forensic Investigation. NTMS 2016: 1-6 - [c16]Sultan Al Sharif, Farkhund Iqbal, Thar Baker, A. Khattack:
White-Hat Hacking Framework for Promoting Security Awareness. NTMS 2016: 1-6 - 2015
- [j3]Thar Baker, Bandar Aldawsari, Hissam Tawfik, David C. Reid, Yanik Ngoko:
GreeDi: An energy efficient routing algorithm for big data on cloud. Ad Hoc Networks 35: 83-96 (2015) - [c15]Bandar Aldawsari, Thar Baker, David England:
Towards a Holistic Multi-cloud Brokerage System: Taxonomy, Survey, and Future Directions. CIT/IUCC/DASC/PICom 2015: 1467-1472 - [c14]Thar Baker, Michael Mackay, Amjad Shaheed, Bandar Aldawsari:
Security-Oriented Cloud Platform for SOA-Based SCADA. CCGRID 2015: 961-970 - [c13]Bandar Aldawsari, Thar Baker, David England:
Towards a holistic brokerage system for multi-cloud environment. ICITST 2015: 249-255 - 2013
- [j2]Thar Baker, Michael Mackay, Martin Randles, Azzelarabe Taleb-Bendiab:
Intention-oriented programming support for runtime adaptive autonomic cloud-based applications. Comput. Electr. Eng. 39(7): 2400-2412 (2013) - [c12]Thar Baker, Yanik Ngoko, Rafael Tolosana-Calasanz, Omer F. Rana, Martin Randles:
Energy Efficient Cloud Computing Environment via Autonomic Meta-director Framework. DeSE 2013: 198-203 - [c11]Thar Baker, Omer F. Rana, Radu Calinescu, Rafael Tolosana-Calasanz, José Ángel Bañares:
Towards Autonomic Cloud Services Engineering via Intention Workflow Model. GECON 2013: 212-227 - [c10]Yasir Karam, Thar Baker, Azzelarabe Taleb-Bendiab:
Support for self-optimized organizational patterns in socio-driven elastic clouds. SysCon 2013: 235-243 - 2012
- [j1]Michael Mackay, Thar Baker, Adil Al-Yasiri:
Security-oriented cloud computing platform for critical infrastructures. Comput. Law Secur. Rev. 28(6): 679-686 (2012) - [c9]Thar Baker, Martin Randles, A. Taleb-Bendiab:
Towards the Automated Engineering of Dependable Adaptive Services. CCGRID 2012: 823-828 - [c8]Yasir Karam, Thar Baker, Azzelarabe Taleb-Bendiab:
Security Support for Intention Driven Elastic Cloud Computing. EMS 2012: 67-73 - [c7]Thar Baker, Azzelarabe Taleb-Bendiab, Martin Randles, Aseel Hussien:
Understanding Elasticity of Cloud Services Compositions. UCC 2012: 231-232 - 2011
- [c6]Thar Baker, Michael Mackay, Martin Randles:
Eternal Cloud Computation Application Development. DeSE 2011: 392-397 - 2010
- [c5]Thar Baker, Azzelarabe Taleb-Bendiab, Dhiya Al-Jumeily:
Assurance Support for Full Adaptive Service Based Applications. UKSim 2010: 179-185
2000 – 2009
- 2009
- [c4]Thar Baker, A. Taleb-Bendiab, Martin Randles:
Auditable Intention-Oriented Web Applications using PAA Auditing/Accounting Paradigm. TAMoCo 2009: 61-70 - [c3]Thar Baker, Azzelarabe Taleb-Bendiab, Dhiya Al-Jumeily:
Process-Oriented E-government Application Development. UKSim 2009: 628-633 - 2008
- [c2]Thar Baker, A. Taleb-Bendiab, Martin Randles:
Support for M-Commerce Software Autonomy. TAMoCo 2008: 165-176 - 2007
- [c1]A. Taleb-Bendiab, Philip Miseldine, Martin Randles, Thar Baker:
Programming Support and Governance for Process-Oriented Software Autonomy. WEBIST (Selected Papers) 2007: 3-18
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint