Theo dõi
rafidha rehiman k a
rafidha rehiman k a
Assistant Professor, Department of Computer Applications, CUSAT
Email được xác minh tại cusat.ac.in
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Privacy-preserving in Blockchain-based Federated Learning systems
KM Sameera, S Nicolazzo, M Arazzi, A Nocera, RR KA, P Vinod, M Conti
Computer Communications, 2024
252024
A secure authentication infrastructure for IoT enabled smart mobile devices–an initial prototype
KAR Rehiman, S Veni
Indian journal of science and technology 9 (9), 0974-6846, 2016
212016
A trust management model for sensor enabled mobile devices in IoT
KAR Rehiman, S Veni
2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics …, 2017
152017
Security, privacy and trust for smart mobile devices in internet of things—A literature study
R Rehiman, S Veni
IJARCET 4 (5), 1775-9, 2015
112015
Deep learning fusion for effective malware detection: leveraging visual features
JA Johny, KA Asmitha, P Vinod, G Radhamani, KAR Rehiman, M Conti
Cluster Computing 28 (2), 135, 2025
52025
A privacy preservation framework using integration of blockchain and federated learning
KM Sameera, KA Rafidha Rehiman, P Vinod
SN Computer Science 4 (6), 703, 2023
42023
Deep learning vs. adversarial noise: a battle in malware image analysis
KA Asmitha, V Puthuvath, KA Rafidha Rehiman, SL Ananth
Cluster Computing 27 (7), 9191-9220, 2024
32024
Blockchain federated learning framework for privacy-preservation
KM Sameera, P Vinod, KAR Rehiman, PN Jifhna, S Sebastian
International conference on advancements in smart computing and information …, 2022
32022
Android malware defense through a hybrid multi-modal approach
KA Asmitha, P Vinod, RR KA, N Raveendran, M Conti
Journal of Network and Computer Applications 233, 104035, 2025
22025
Lfgurad: A defense against label flipping attack in federated learning for vehicular network
KM Sameera, P Vinod, RR KA, M Conti
Computer Networks 254, 110768, 2024
22024
OSTIS: A novel organization-specific threat intelligence system
DR Arikkat, P Vinod, RR KA, S Nicolazzo, A Nocera, G Timpau, M Conti
Computers & Security 145, 103990, 2024
22024
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?
DR Arikkat, A Di Sorbo, CA Visaggio, M Conti
arXiv preprint arXiv:2306.16087, 2023
22023
EXAM: Explainable models for analyzing malicious android applications
KA Asmitha, P Vinod, KAR Rehiman, RP Verma, R Kumar, S Kumari, ...
International Conference on Advancements in Smart Computing and Information …, 2022
22022
Multi-domain network traffic analysis using machine learning and deep learning techniques
D Arikkat, RR KA, Vinod, SY Yerima, Manoja, Pooja, S Sekhar, S James, ...
Proceedings of the 2022 Fourteenth International Conference on Contemporary …, 2022
22022
A language identification and conversion system for Malayalam to ensure security
KA Rafidha Rehiman, AS Keerthy, KS Lakshmi, A Sreekumar
3rd National Conference on Indian Language Computing (NCILC 2013), 2013
22013
Using neural network classifiers for predicting the Melting Point of Drug–Like compounds
KA Rafidha Rahiman, K Balakrishnan, KB Sherly
Proceedings of national conference on Soft Computing, 2010
22010
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis
DR Arikkat, P Vinod, KA Rafidha Rehiman, RA Rasheed, M Conti
Journal of Network and Systems Management 32 (4), 88, 2024
12024
SoK: Visualization-based Malware Detection Techniques
M Brosolo, V Puthuvath, A Ka, R Rehiman, M Conti
Proceedings of the 19th International Conference on Availability …, 2024
12024
CyTIE: Cyber Threat Intelligence Extraction with Named Entity Recognition
PC Aravind, DR Arikkat, AS Krishnan, B Tesneem, A Sebastian, MJ Dev, ...
International Conference on Advancements in Smart Computing and Information …, 2023
12023
SecDefender:: Detecting low-quality models in multidomain federated learning systems
S KM, A Sgueglia, V P, RR KA, CA Visaggio, A Di Sorbo, M Conti
2025
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20