Privacy-preserving in Blockchain-based Federated Learning systems KM Sameera, S Nicolazzo, M Arazzi, A Nocera, RR KA, P Vinod, M Conti Computer Communications, 2024 | 25 | 2024 |
A secure authentication infrastructure for IoT enabled smart mobile devices–an initial prototype KAR Rehiman, S Veni Indian journal of science and technology 9 (9), 0974-6846, 2016 | 21 | 2016 |
A trust management model for sensor enabled mobile devices in IoT KAR Rehiman, S Veni 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics …, 2017 | 15 | 2017 |
Security, privacy and trust for smart mobile devices in internet of things—A literature study R Rehiman, S Veni IJARCET 4 (5), 1775-9, 2015 | 11 | 2015 |
Deep learning fusion for effective malware detection: leveraging visual features JA Johny, KA Asmitha, P Vinod, G Radhamani, KAR Rehiman, M Conti Cluster Computing 28 (2), 135, 2025 | 5 | 2025 |
A privacy preservation framework using integration of blockchain and federated learning KM Sameera, KA Rafidha Rehiman, P Vinod SN Computer Science 4 (6), 703, 2023 | 4 | 2023 |
Deep learning vs. adversarial noise: a battle in malware image analysis KA Asmitha, V Puthuvath, KA Rafidha Rehiman, SL Ananth Cluster Computing 27 (7), 9191-9220, 2024 | 3 | 2024 |
Blockchain federated learning framework for privacy-preservation KM Sameera, P Vinod, KAR Rehiman, PN Jifhna, S Sebastian International conference on advancements in smart computing and information …, 2022 | 3 | 2022 |
Android malware defense through a hybrid multi-modal approach KA Asmitha, P Vinod, RR KA, N Raveendran, M Conti Journal of Network and Computer Applications 233, 104035, 2025 | 2 | 2025 |
Lfgurad: A defense against label flipping attack in federated learning for vehicular network KM Sameera, P Vinod, RR KA, M Conti Computer Networks 254, 110768, 2024 | 2 | 2024 |
OSTIS: A novel organization-specific threat intelligence system DR Arikkat, P Vinod, RR KA, S Nicolazzo, A Nocera, G Timpau, M Conti Computers & Security 145, 103990, 2024 | 2 | 2024 |
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks? DR Arikkat, A Di Sorbo, CA Visaggio, M Conti arXiv preprint arXiv:2306.16087, 2023 | 2 | 2023 |
EXAM: Explainable models for analyzing malicious android applications KA Asmitha, P Vinod, KAR Rehiman, RP Verma, R Kumar, S Kumari, ... International Conference on Advancements in Smart Computing and Information …, 2022 | 2 | 2022 |
Multi-domain network traffic analysis using machine learning and deep learning techniques D Arikkat, RR KA, Vinod, SY Yerima, Manoja, Pooja, S Sekhar, S James, ... Proceedings of the 2022 Fourteenth International Conference on Contemporary …, 2022 | 2 | 2022 |
A language identification and conversion system for Malayalam to ensure security KA Rafidha Rehiman, AS Keerthy, KS Lakshmi, A Sreekumar 3rd National Conference on Indian Language Computing (NCILC 2013), 2013 | 2 | 2013 |
Using neural network classifiers for predicting the Melting Point of Drug–Like compounds KA Rafidha Rahiman, K Balakrishnan, KB Sherly Proceedings of national conference on Soft Computing, 2010 | 2 | 2010 |
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis DR Arikkat, P Vinod, KA Rafidha Rehiman, RA Rasheed, M Conti Journal of Network and Systems Management 32 (4), 88, 2024 | 1 | 2024 |
SoK: Visualization-based Malware Detection Techniques M Brosolo, V Puthuvath, A Ka, R Rehiman, M Conti Proceedings of the 19th International Conference on Availability …, 2024 | 1 | 2024 |
CyTIE: Cyber Threat Intelligence Extraction with Named Entity Recognition PC Aravind, DR Arikkat, AS Krishnan, B Tesneem, A Sebastian, MJ Dev, ... International Conference on Advancements in Smart Computing and Information …, 2023 | 1 | 2023 |
SecDefender:: Detecting low-quality models in multidomain federated learning systems S KM, A Sgueglia, V P, RR KA, CA Visaggio, A Di Sorbo, M Conti | | 2025 |