default search action
Rabia Latif
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Tajwar Mehmood, Seemab Latif, Rabia Latif, Hammad Majeed, Asad Waqar Malik:
DRIFTNET-EnVACK: Adaptive Drift Detection in Cloud Data Streams With Ensemble Variational Auto-Encoder Featuring Contextual Network. IEEE Access 12: 80020-80034 (2024) - [j23]Tajwar Mehmood, Seemab Latif, Nor Shahida Mohd Jamail, Asad Malik, Rabia Latif:
LSTMDD: an optimized LSTM-based drift detector for concept drift in dynamic cloud computing. PeerJ Comput. Sci. 10: e1827 (2024) - [i3]Huma Ameer, Seemab Latif, Rabia Latif:
Optimizing Multi-Stuttered Speech Classification: Leveraging Whisper's Encoder for Efficient Parameter Reduction in Automated Assessment. CoRR abs/2406.05784 (2024) - [i2]Faiza Qamar, Seemab Latif, Rabia Latif:
A Benchmark Dataset with Larger Context for Non-Factoid Question Answering over Islamic Text. CoRR abs/2409.09844 (2024) - 2023
- [j22]Rabia Khan, Naima Iltaf, Rabia Latif, Nor Shahida Mohd Jamail:
CrossDomain Recommendation Based on MetaData Using Graph Convolution Networks. IEEE Access 11: 90724-90738 (2023) - [j21]Wajid Ali, Congxu Zhu, Rabia Latif, Muhammad Asim, Muhammad Usman Tariq:
Image Encryption Scheme Based on Orbital Shift Pixels Shuffling with ILM Chaotic System. Entropy 25(5): 787 (2023) - [j20]Zoya, Seemab Latif, Rabia Latif, Hammad Majeed, Nor Shahida Mohd Jamail:
Assessing Urdu Language Processing Tools via Statistical and Outlier Detection Methods on Urdu Tweets. ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(10): 234:1-234:31 (2023) - [c11]Sara Ahmed AlAnsary, Rabia Latif, Tanzila Saba:
Multi Factor Authentication as a Service (MFAaaS) for Federated Cloud Environments. ICR 2023: 225-236 - [i1]Huma Ameer, Seemab Latif, Rabia Latif, Sana Mukhtar:
Whisper in Focus: Enhancing Stuttered Speech Classification with Encoder Layer Optimization. CoRR abs/2311.05203 (2023) - 2022
- [j19]Rabia Latif:
ConTrust: A Novel Context-Dependent Trust Management Model in Social Internet of Things. IEEE Access 10: 46526-46537 (2022) - [j18]Muhammad Awais, Shahzaib Tahir, Fawad Khan, Hasan Tahir, Ruhma Tahir, Rabia Latif, Mir Yasir Umair:
A novel searchable encryption scheme to reduce the access pattern leakage. Future Gener. Comput. Syst. 133: 338-350 (2022) - [j17]Bello Musa Yakubu, Rabia Latif, Aisha Yakubu, Majid Iqbal Khan, Auwal Ibrahim Magashi:
RiceChain: secure and traceable rice supply chain framework using blockchain technology. PeerJ Comput. Sci. 8: e801 (2022) - 2021
- [j16]Tanzila Saba, Amjad Rehman, Rabia Latif, Suliman Mohamed Fati, Mudassar Raza, Muhammad Sharif:
Suspicious Activity Recognition Using Proposed Deep L4-Branched-Actionnet With Entropy Coded Ant Colony System Optimization. IEEE Access 9: 89181-89197 (2021) - [j15]Zoya, Seemab Latif, Faisal Shafait, Rabia Latif:
Analyzing LDA and NMF Topic Models for Urdu Tweets via Automatic Labeling. IEEE Access 9: 127531-127547 (2021) - [j14]Rida Nasir, Mehreen Afzal, Rabia Latif, Waseem Iqbal:
Behavioral Based Insider Threat Detection Using Deep Learning. IEEE Access 9: 143266-143274 (2021) - [j13]Muhammad Waleed, Rabia Latif, Bello Musa Yakubu, Majid Iqbal Khan, Seemab Latif:
T-Smart: Trust Model for Blockchain Based Smart Marketplace. J. Theor. Appl. Electron. Commer. Res. 16(6): 2405-2423 (2021) - [j12]Rabia Latif, Syeda Hadia Afzaal, Seemab Latif:
A novel cloud management framework for trust establishment and evaluation in a federated cloud environment. J. Supercomput. 77(11): 12537-12560 (2021) - [c10]Najam Arif, Seemab Latif, Rabia Latif:
Question Classification Using Universal Sentence Encoder and Deep Contextualized Transformer. DeSE 2021: 206-211 - 2020
- [j11]Ahmed Yar Khan, Rabia Latif, Seemab Latif, Shahzaib Tahir, Gohar Batool, Tanzila Saba:
Malicious Insider Attack Detection in IoTs Using Data Analytics. IEEE Access 8: 11743-11753 (2020) - [j10]Anum Sajjad, Mehreen Afzal, Mian Muhammad Waseem Iqbal, Haider Abbas, Rabia Latif, Rana Aamir Raza:
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols. IEEE Access 8: 139903-139917 (2020) - [j9]Naveeda Ashraf, Ashraf Masood, Haider Abbas, Rabia Latif, Narmeen Shafqat:
Analytical study of hardware-rooted security standards and their implementation techniques in mobile. Telecommun. Syst. 74(3): 379-403 (2020) - [c9]Akash Gerard, Rabia Latif, Waseem Iqbal, Naqash Gerard, Ahmed Husnain Johar, Umer Asghar:
Detection and Prevention of a Malicious Activity in Industrial Federated Cloud Computing Paradigm. AHFE (1) 2020: 393-399 - [c8]Naila Amir, Rabia Latif, Narmeen Shafqat, Seemab Latif:
Crowdsourcing Cybercrimes through Online Resources. DeSE 2020: 158-163 - [c7]Akash Gerard, Rabia Latif, Seemab Latif, Waseem Iqbal, Tanzila Saba, Naqash Gerard:
MAD-Malicious Activity Detection Framework in Federated Cloud Computing. DeSE 2020: 273-278 - [c6]Seemab Latif, Sarmad Bashir, Mir Muntasar Ali Agha, Rabia Latif:
Backward-Forward Sequence Generative Network for Multiple Lexical Constraints. AIAI (2) 2020: 39-50
2010 – 2019
- 2018
- [j8]Amman Durrani, Seemab Latif, Rabia Latif, Haider Abbas:
Detection of Denial of Service (DoS) Attack in Vehicular Ad Hoc Networks: A Systematic Literature Review. Ad Hoc Sens. Wirel. Networks 42(1-2): 35-61 (2018) - [j7]Afsheen Ahmed, Rabia Latif, Seemab Latif, Haider Abbas, Farrukh Aslam Khan:
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review. Multim. Tools Appl. 77(17): 21947-21965 (2018) - [c5]Adeel Shah, Haider Abbas, Mian Muhammad Waseem Iqbal, Rabia Latif:
Enhancing E-Healthcare Privacy Preservation Framework through L-Diversity. IWCMC 2018: 394-399 - 2017
- [j6]Nazish Yaqoob, Seemab Latif, Rabia Latif, Haider Abbas, Asif Yaseen:
An Adaptive Rule-Based Approach to Resolving Real-Time VoIP Wholesale Billing Disputes. J. Inf. Sci. Eng. 33(6): 1433-1446 (2017) - 2016
- [j5]Haider Abbas, Rabia Latif, Seemab Latif, Ashraf Masood:
Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems. Ann. des Télécommunications 71(9-10): 477-487 (2016) - [j4]Rabia Latif, Haider Abbas, Seemab Latif:
Distributed denial of service (DDoS) attack detection using data mining approach in cloud-assisted wireless body area networks. Int. J. Ad Hoc Ubiquitous Comput. 23(1/2): 24-35 (2016) - [j3]Rabia Latif, Haider Abbas, Seemab Latif, Ashraf Masood:
Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment. J. Medical Syst. 40(7): 161:1-161:13 (2016) - 2015
- [j2]Rabia Latif, Haider Abbas, Seemab Latif, Ashraf Masood:
EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network. Mob. Inf. Syst. 2015: 260594:1-260594:13 (2015) - [c4]Seemab Latif, Rabbia Tariq, Shehla Tariq, Rabia Latif:
Designing an Assistive Learning Aid for Writing Acquisition: A Challenge for Children with Dyslexia. AAATE Conf. 2015: 180-188 - 2014
- [j1]Rabia Latif, Haider Abbas, Saïd Assar:
Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: A Systematic Literature Review. J. Medical Syst. 38(11): 128 (2014) - [c3]Rabia Latif, Haider Abbas, Saïd Assar, Seemab Latif:
Analyzing Feasibility for Deploying Very Fast Decision Tree for DDoS Attack Detection in Cloud-Assisted WBAN. ICIC (1) 2014: 507-519 - 2012
- [c2]Rabia Latif, Asad Raza:
A Boundary Node Detection Based Solution for Minimizing the Effects of Nodes Distribution over Key Exchange in Group Based WSN. NBiS 2012: 194-199
2000 – 2009
- 2009
- [c1]Rabia Latif, Mukhtar Hussain:
Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs). ISA 2009: 732-740
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-14 23:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint