Visible to the public Biblio

Filters: Author is Asif, Muhammad  [Clear All Filters]
2023-06-29
Abbas, Qamber, Zeshan, Muhammad Umar, Asif, Muhammad.  2022.  A CNN-RNN Based Fake News Detection Model Using Deep Learning. 2022 International Seminar on Computer Science and Engineering Technology (SCSET). :40–45.

False news has become widespread in the last decade in political, economic, and social dimensions. This has been aided by the deep entrenchment of social media networking in these dimensions. Facebook and Twitter have been known to influence the behavior of people significantly. People rely on news/information posted on their favorite social media sites to make purchase decisions. Also, news posted on mainstream and social media platforms has a significant impact on a particular country’s economic stability and social tranquility. Therefore, there is a need to develop a deceptive system that evaluates the news to avoid the repercussions resulting from the rapid dispersion of fake news on social media platforms and other online platforms. To achieve this, the proposed system uses the preprocessing stage results to assign specific vectors to words. Each vector assigned to a word represents an intrinsic characteristic of the word. The resulting word vectors are then applied to RNN models before proceeding to the LSTM model. The output of the LSTM is used to determine whether the news article/piece is fake or otherwise.

2022-05-20
Zahra, Ayima, Asif, Muhammad, Nagra, Arfan Ali, Azeem, Muhammad, Gilani, Syed A..  2021.  Vulnerabilities and Security Threats for IoT in Transportation and Fleet Management. 2021 4th International Conference on Computing Information Sciences (ICCIS). :1–5.
The fields of transportation and fleet management have been evolving at a rapid pace and most of these changes are due to numerous incremental developments in the area. However, a comprehensive study that critically compares and contrasts all the existing techniques and methodologies in the area is still missing. This paper presents a comparative analysis of the vulnerabilities and security threats for IoT and their mitigation strategies in the context of transportation and fleet management. Moreover, we attempt to classify the existing strategies based on their underlying principles.
2020-01-21
Bin Ahmad, Maaz, Asif, Muhammad, Saad, Afshan, Wahab, Abdul.  2019.  Cloud Computing: A Paradigm of More Insider Threats. 2019 4th International Conference on Information Systems Engineering (ICISE). :103–108.
Insider threats are one of the most challenging issues in the world of computer networks. Now a day, most of the companies are relying on cloud services to get scalable data services and to reduce cost. The inclusion of cloud environment has spread the canvas for insider threats because cloud service providers are also there in addition to the organization that outsourced for cloud services. In this paper, multiple existing approaches to handle the insider threats in cloud environment have been investigated and analyzed thoroughly. The comparison of these techniques depicts which better approaches in the paradigm of cloud computing exist.