Currently viewing:
-
Adaptive Quantum-Augmented Security Framework for Vehicle-to-Everything (AQAS-V2X) Communication
Alqahtani, T., Sharma, P. K., Leontidis, G.
Contributions to Conferences: Papers
-
Multivariate Time Series Anomaly Detection Using Learnable Spatial-Temporal Graph Ordinary Differential Equations Network
He, S., Guo, Q., Feng, K., Liang, D., Xie, K., Sharma, P. K.
IEEE Transactions on Dependable and Secure Computing
Contributions to Journals: Articles
-
SoK: Towards Privacy-Centric Collaborative Machine Learning—A Classification Framework for Privacy Solutions
Boar, P. E., Akram, R. N., Li, W., Sharma, P. K.
SN Computer Science
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1007/s42979-025-04482-4
-
Deep learning-based prediction of reflection attacks using NetFlow data
Chuah, E., Jhumka, A., Ayesh, A.
Computers & Security, vol. 156, 104527
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1016/j.cose.2025.104527
- Open Access
-
http://aura.abdn.ac.uk/bitstreams/8168cf8e-fc2f-49a4-9bbe-c9e1bee33713/download
-
http://aura.abdn.ac.uk/bitstreams/129376c3-4a59-4a88-be7c-071c6b238c63/download
-
An Unsupervised Malicious Web Request Detection based on Transformer and Contrastive Learning
He, S., Zhang, Y., Liang, D., Sharma, P.
IEEE Transactions on Network and Service Management, vol. 22, no. 4, pp. 3281-3294
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1109/TNSM.2025.3563089
- Open Access
-
http://aura.abdn.ac.uk/bitstreams/fe514001-ae36-437b-8528-70e3b15f05af/download
- Additional Links
-
View publication in Scopus
-
GpDB: A Graph Partition Based Storage Strategy for DAG-Blockchain in Edge-Cloud IIoT
Liao, Z., Cheng, S., Zhang, J., Wu, W., Sharma, P. K.
IEEE Transactions on Industrial Informatics, vol. 21, no. 8, pp. 5790-5798
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1109/TII.2022.3162201
- Additional Links
-
View publication in Scopus
-
Can Image Quality Assessment Help Medical Image Segmentation?
Lawal, M., Sharma, P., Murchie, P., Yi, D.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
-
Deep learning‑based prediction of major page faults in cluster systems
Chuah, E., Jhumka, A., Narasimhamurthy, S., Ayesh, A.
CCF Transactions on High Performance Computing
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1007/s42514-025-00233-2
- Open Access
-
http://aura.abdn.ac.uk/bitstreams/87676e03-9d18-4eff-8d31-dc51eeefe396/download
-
A systematic literature review of log-correlation tools for cyberattack detection and prediction in large networks
Chuah, E., Kalutarage, H., Tasdemir, K., Abrham, A., Maple, C.
Journal of Information Security and Applications, vol. 92, 104096
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1016/j.jisa.2025.104096
-
Minecrafter: A secure and decentralized consensus protocol for blockchain-enabled vaccine supply chain
Maloth, S., Hada, N. S., Jatoth, C., Gupta, N., Fiore, U., Sharma, P. K.
Peer-to-Peer Networking and Applications, vol. 18, no. 4, 168
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1007/s12083-025-01980-3
- Additional Links
-
View publication in Scopus