Search Results - "Janjua, Muhammad Umar"
-
1
Formal Modeling and Verification of a Blockchain-Based Crowdsourcing Consensus Protocol
Published in IEEE access (2022)“…Crowdsourcing is an effective technique that allows humans to solve complex problems that are hard to accomplish by automated tools. Some significant…”
Get full text
Journal Article -
2
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published in IEEE open journal of the Computer Society (2024)“…Blockchain technology enables users to control and record their cryptocurrency transactions through the use of digital wallets. As the use of blockchain…”
Get full text
Journal Article -
3
Detailed analysis of Ethereum network on transaction behavior, community structure and link prediction
Published in PeerJ. Computer science (10-12-2021)“…Ethereum, the second-largest cryptocurrency after Bitcoin, has attracted wide attention in the last few years and accumulated significant transaction records…”
Get full text
Journal Article -
4
LoRaDRL: Deep Reinforcement Learning Based Adaptive PHY Layer Transmission Parameters Selection for LoRaWAN
Published in 2020 IEEE 45th Conference on Local Computer Networks (LCN) (16-11-2020)“…The performance of densely-deployed low-power wide-area networks (LPWANs) can significantly deteriorate due to packets collisions, and one of the main reasons…”
Get full text
Conference Proceeding -
5
Making federated learning robust to adversarial attacks by learning data and model association
Published in Computers & security (01-10-2022)Get full text
Journal Article -
6
Formal verification of fraud-resilience in a crowdsourcing consensus protocol
Published in Computers & security (01-08-2023)“…•A Trust and Transactions Chain consensus protocol is proposed for a blockchain-based crowdsourcing system.•Communicating Sequential Programs language is…”
Get full text
Journal Article -
7
Formal verification of persistence and liveness in the trust-based blockchain crowdsourcing consensus protocol
Published in Computer communications (01-08-2022)“…Crowdsourcing is a potential computing paradigm that exploits collective human intelligence to solve complex tasks, but it suffers from various safety and…”
Get full text
Journal Article -
8
Using Blockchain to Rein in the New Post-Truth World and Check the Spread of Fake News
Published in IT professional (01-07-2019)“…In recent years, “fake news” has become a global issue that raises unprecedented challenges for human society and democracy. This problem has arisen due to the…”
Get full text
Journal Article -
9
A compliance-based ranking of certificate authorities using probabilistic approaches
Published in International journal of information security (01-08-2024)“…The security of the global Certification Authority (CA) system has recently been compromised as a result of attacks on the Public Key Infrastructure (PKI)…”
Get full text
Journal Article -
10
ProofChain: An X.509-compatible blockchain-based PKI framework with decentralized trust
Published in Computer networks (Amsterdam, Netherlands : 1999) (04-08-2022)“…Public Key Infrastructure (PKI) is the most widely accepted cryptography protocol to enable secure communication over the web. PKI comprises digital…”
Get full text
Journal Article -
11
EthReview: An Ethereum-based Product Review System for Mitigating Rating Frauds
Published in Computers & security (01-01-2021)“…On an e-commerce platform, a buyer‘s decision about the purchase of products is highly dependent on the existing reviews of that product. These reviews provide…”
Get full text
Journal Article -
12
Predicting functional roles of Ethereum blockchain addresses
Published in Peer-to-peer networking and applications (01-11-2023)“…Ethereum is one of the largest blockchain programming platforms. Users in Ethereum are identified using public-private key addresses, which are difficult to…”
Get full text
Journal Article -
13
Tracking adoption of revocation and cryptographic features in X.509 certificates
Published in International journal of information security (01-06-2022)“…SSL certificates hold immense importance when it comes to the security of the WebPKI. The trust in these certificates is driven by the strength of their…”
Get full text
Journal Article -
14
Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning
Published in IEEE transactions on artificial intelligence (01-04-2022)“…Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to its ability to achieve high performance in a range of environments…”
Get full text
Journal Article -
15
Intelligent Resource Allocation in Dense LoRa Networks using Deep Reinforcement Learning
Published 22-12-2020“…The anticipated increase in the count of IoT devices in the coming years motivates the development of efficient algorithms that can help in their effective…”
Get full text
Journal Article -
16
Using Blockchain to Rein in The New Post-Truth World and Check The Spread of Fake News
Published 28-03-2019“…In recent years, `fake news' has become a global issue that raises unprecedented challenges for human society and democracy. This problem has arisen due to the…”
Get full text
Journal Article -
17
Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning
Published 27-01-2020“…Deep Reinforcement Learning (DRL) has numerous applications in the real world thanks to its outstanding ability in quickly adapting to the surrounding…”
Get full text
Journal Article