Sidra Abbas

Sidra Abbas
  • BSCS
  • Research Assistant at COMSATS University Islamabad

About

55
Publications
16,470
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,183
Citations
Introduction
Federated Healthcare, XAI, Cyber Security
Current institution
COMSATS University Islamabad
Current position
  • Research Assistant

Publications

Publications (55)
Article
Full-text available
GPS spoofing presents a significant threat to small Unmanned Aerial Vehicles (UAVs) by manipulating navigation systems, potentially causing safety risks, privacy violations, and mission disruptions. Effective countermeasures include secure GPS signal authentication, anti-spoofing technologies, and continuous monitoring to detect and respond to such...
Article
Full-text available
Autism Spectrum Disorder (ASD) is a complex neurodevelopmental condition marked by difficulties in social skills, repetitive behaviours, and communication. Early and accurate diagnosis is essential for effective intervention and support. This paper proposes a secure and privacy-preserving framework for diagnosing ASD by integrating multimodal kinem...
Article
Full-text available
Suspicious Human activity recognition (SHAR) is crucial for improving surveillance and security systems by recognizing and reducing possible hazards in different situations. This study focuses on the task of precisely identifying potentially suspicious human behaviour by utilizing an innovative approach that harnesses advanced deep learning methods...
Article
Full-text available
Adversarial malware poses novel threats to smart devices since they grow progressively integrated into daily life, highlighting their potential weaknesses and importance. Several Machine Learning (ML) based methods, such as Intrusion Detection Systems (IDSs), Malware Detection Systems (MDSs), and Device Identification Systems (DISs), have been used...
Article
As more aerial imagery becomes readily available, massive volumes of data are being gathered constantly. Several groups can benefit from the data provided by this geographical imagery. However, it is time-consuming to manually analyze each image to gain information on land cover. This research suggests using deep learning methods for precise and ra...
Article
The statewide consumer transportation demand model analyzes consumers’ transportation needs and preferences within a particular state. It involves collecting and analyzing data on travel behavior, such as trip purpose, mode choice, and travel patterns, and using this information to create models that predict future travel demand. Naturalistic resea...
Article
Full-text available
Based on the development needs of Industry 5.0, Advanced On-orbit Systems (AOS) can be integrated with terrestrial 5G networks, with large-scale IoT links as well as with flexible deployment and resource optimization, enabling efficient transmission of multiple types of industrial data, human-machine collaboration, and improving the flexibility, in...
Article
Full-text available
The evolution of smartphones made people more dependent on them since they save their data on smartphones for convenience. This convenience aroused threats to the stored data through cyber attacks. Smartphones consist of various hardware sensors, including a magnetometer, an accelerometer, and a gyroscope, which can be vulnerable to cyberattacks su...
Article
Full-text available
The rapid growth of Internet of Things (IoT) devices has changed human interactions with the environment. IoT networks require specialized defense strategies distinct from traditional corporate contexts. Security measures such as anti-malware software, firewalls, authentication protocols, and encryption techniques are established but face limitatio...
Article
Thermal comfort is a crucial element of smart buildings that assists in improving, analyzing, and realizing intelligent structures. Energy consumption forecasts for such smart buildings are crucial owing to the intricate decision-making processes surrounding resource efficiency. Machine learning (ML) techniques are employed to estimate energy consu...
Article
Full-text available
As cardiovascular disorders are prevalent, there is a growing demand for reliable and precise diagnostic methods within this domain. Audio signal-based heart disease detection is a promising area of research that leverages sound signals generated by the heart to identify and diagnose cardiovascular disorders. Machine learning (ML) and deep learning...
Article
Full-text available
The Internet of Things (IoT), considered an intriguing technology with substantial potential for tackling many societal concerns, has been developing into a significant component of the future. The foundation of IoT is the capacity to manipulate and track material objects over the Internet. The IoT network infrastructure is more vulnerable to attac...
Article
Full-text available
Smartwatches with cutting-edge sensors are becoming commonplace in our daily lives. Despite their widespread use, it can be challenging to interpret accelerometer and gyroscope data efficiently for Human Activity Recognition (HAR). An effective remedy is the incorporation of active learning strategies. This study explores this junction, intending t...
Article
Full-text available
This research explores how technology can be used to understand and identify activities among elderly individuals. By utilizing HAR70+ data and applying methods like Active Learning (AL), Machine Learning (ML), and Deep Learning (DL), this research aims to predict various activities performed by older adults. Moreover, the study leverages the HAR70...
Article
Full-text available
This research delves into applying active and machine learning techniques to predict student anxiety. This research explores how these technologies can be explored to understand and predict student anxiety levels. This study utilizes active learning strategies to increase the effectiveness of machine learning models in predicting anxiety levels amo...
Article
Full-text available
One of the main causes of death from cardiovascular diseases is Myocardial Infarction (MI), which is brought on by coronary artery problems. Myocardial infarction is a pathological condition resulting from an anatomical issue with the Left Ventricle (LV). MI is a potentially fatal cardiac disease for which prompt medical attention can lower the fat...
Article
Full-text available
The increasing occurrence of Hypertension highlights the need for advanced predictive tools in healthcare. This research proposes a novel approach that combines machine and deep learning for new feature generation and hypertension prediction. We explore machine learning-based models: Random Forest (RF), Logistic Regression (LR), Decision Tree (DT),...
Article
Full-text available
The widespread use of smartphones has brought convenience and connectivity to the fingertips of the masses. As a result, this has paved the way for potential security vulnerabilities concerning sensitive data, particularly by exploiting side-channel attacks. When typing on a smartphone’s keyboard, its vibrations can be misused to discern the entere...
Article
Full-text available
Darknet refers to a significant portion of the internet that is hidden and not indexed by traditional search engines. It is often associated with illicit activities such as the trafficking of illicit goods, such as drugs, weapons, and stolen data. To keep our online cyber spaces safe in this era of rapid technological advancement and global connect...
Article
Full-text available
Cardiac disease is a chronic condition that impairs the heart’s functionality. It includes conditions such as coronary artery disease, heart failure, arrhythmias, and valvular heart disease. These conditions can lead to serious complications and even be life-threatening if not detected and managed in time. Researchers have utilized Machine Learning...
Article
With the wide deployment of the Internet of Things (IoT), large volumes of incomplete multiview data that violates data integrity is generated by various applications, which inevitably produces negative impacts on the quality of service (QoS) of IoT systems. Incomplete multiview clustering (IMC), as an essential technique of data processing, has th...
Article
Full-text available
Contemporary advancements in wearable equipment have generated interest in continuously observing stress utilizing various physiological indicators. Early stress detection can improve healthcare by lessening the negative effects of chronic stress. Machine learning (ML) methodologies have been modified for healthcare equipment to monitor user health...
Article
Full-text available
A medical disorder known as diabetic retinopathy (DR) affects people who suffer from diabetes. Many people are visually impaired due to DR. Primary cause of DR in patients is high blood sugar, and it affects blood vessels available in the retinal cell. The recent advancement in deep learning and computer vision methods, and their automation applica...
Article
Full-text available
Image processing has enabled faster and more accurate image classification. It has been of great benefit to the health industry. Manually examining medical images like MRI and X-rays can be very time-consuming, more prone to human error, and way more costly. One such examination is the Pap smear exam, where the cervical cells are examined in labora...
Article
Full-text available
Dementia is increasing day-by-day in older adults. Many of them are spending their life joyfully due to smart home technologies. Smart homes contain several smart devices which can support living at home. Automated assessment of smart home residents is a significant aspect of smart home technology. Detecting dementia in older adults in the early st...
Article
Full-text available
There is an exponential rise in the use of smartphones in government and private institutions due to business dependencies such as communication, virtual meetings, and access to global information. These smartphones are an attractive target for cybercriminals and are one of the leading causes of cyber espionage and sabotage. A large number of sophi...
Article
Full-text available
The healthcare industry has recently shown much interest in the Internet of Things (IoT). The Internet of Medical Things (IoMT) is a component of the IoTs in which medical appliances transmit information to communicate critical information. The growth of the IoMT has been facilitated by the inclusion of medical equipment in the IoT. These developme...
Article
Full-text available
With the most recent developments in wearable technology, the possibility of continually monitoring stress using various physiological factors has attracted much attention. By reducing the detrimental effects of chronic stress, early diagnosis of stress can enhance healthcare. Machine Learning (ML) models are trained for healthcare systems to track...
Article
Full-text available
Over time, the amount of textual data has increased drastically, especially due to the publication of articles. As a consequence, there has been a rise in anonymous content. Research is being conducted to determine alternative methods for identifying unknown text authors. To this end, a system has to be developed to accurately determine the author...
Article
Full-text available
Drug-drug interaction (DDI) is a significant public health issue that accounts for 30% of unanticipated clinically hazardous medication events. The past decade has seen an evolution in informatics-based research for DDI signal identification. This paper aims to create an ensemble stacking machine learning (ML) approach capable of accurately predict...
Article
Full-text available
The advancement of the communications system has resulted in the rise of the Internet of Things (IoT), which has increased the importance of cybersecurity research. IoT, which incorporates a range of gadgets into networks to offer complex and intelligent services, must maintain user privacy and deal with attacks such as spoofing, denial of service...
Article
The increasing popularity of mobile phones has led to an abundance of online reviews, making it challenging for consumers to make well-informed purchasing decisions. This study proposes a novel recommendation system-based mobile phone rating classification approach using federated learning and Term Frequency-Inverse Document Frequency (TF-IDF) feat...
Article
Product reviews are critical in informing customers about products and services and are crucial to customer inclinations and business success. Active learning enables Artificial Intelligence (AI) algorithms to learn more efficiently by actively selecting the most informative data samples for training. This study proposes a state-of-the-art approach...
Article
Full-text available
The increasing demand for mobile phones has resulted in abundant online reviews, making it challenging for consumers to make informed purchasing decisions.In this study, we propose Graph Neural Network (GNN) models to classify mobile phone ratings using Term Frequency-Inverse Document Frequency (TF-IDF) features. We collected a dataset of over 13,0...
Article
Full-text available
Energy providers and the power grid are severely harmed by electricity theft, which also causes economic and non-technical losses. Energy theft causes a decline in power quality and overall profitability. Smart grids may address the problem of power theft by merging data and energy flow. The analysis of smart grid data helps to find power theft. Th...
Article
Full-text available
With the prevalence of cognitive diseases, the health industry is facing newer challenges since cognitive health deteriorates gradually over time, and clear signs and symptoms appear when it is too late. Smart homes and the IoT (Internet of Things) have given hope to the health industry to monitor and manage the elderly and the less-abled in the co...
Article
Full-text available
Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. Similarly, deep learning offers enormous benefits for text classification since they execute highly accurately wit...
Article
Full-text available
The network intrusion detection system (NIDs) is a significant research milestone in information security. NIDs can scan and analyze the network to detect an attack or anomaly, which may be a continuing intrusion or perhaps an intrusion that has just occurred. During the pandemic, cybercriminals realized that home networks lurked with vulnerabiliti...
Article
Full-text available
With the quick evolution of medical technology, the era of big data in medicine is quickly approaching. The analysis and mining of these data significantly influence the prediction, monitoring, diagnosis, and treatment of tumor disorders. Since it has a wide range of traits, a low survival rate, and an aggressive nature, brain tumor is regarded as...
Article
Full-text available
Recent articles reported a massive increase in frustration among weak students due to the outbreak of COVID-19 and Massive Open Online Courses (MOOCs). These students need to be evaluated to detect possible psychological counseling and extra attention. On the one hand, the literature reports many optimization techniques focusing on existing student...
Article
Full-text available
Advancements in health monitoring using smartphone sensor technologies have made it possible to quantify the functional performance and deviations in an individual’s routine. Falling and drowning are significant unnatural causes of silent accidental deaths, which require an ambient approach to be detected. This paper presents the novel ambient assi...
Article
Full-text available
Artificial intelligence (AI) techniques implemented at a large scale in intelligent transport systems (ITS), have considerably enhanced the vehicles' autonomous behaviour in making independent decisions about cyber threats, attacks, and faults. While, AI techniques are based on data sharing among the vehicles, it is important to note that sensitive...
Article
Full-text available
Breast cancer incidence has been rising steadily during the past few decades. It is the second leading cause of death in women. If it is diagnosed early, there is a good possibility of recovery. Mammography is proven to be an excellent screening technique for breast tumor diagnosis, but its detection and classification in mammograms remain a signif...
Article
Full-text available
Cervical malignant growth is the fourth most typical reason for disease demise in women around the globe. Cervical cancer growth is related to human papillomavirus (HPV) contamination. Early screening made cervical cancer a preventable disease that results in minimizing the global burden of cervical cancer. In developing countries, women do not app...
Article
Full-text available
In Internet of Things (IoT)-based network systems (IoT-net), intrusion detection systems (IDS) play a significant role to maintain patient health records (PHR) in e-healthcare. IoT-net is a massive technology with security threats on the network layer, as it is considered the most common source for communication and data storage platforms. The secu...
Article
Wireless Sensor Networks (WSNs) are comprised of multiple sensor nodes deployed in an ad-hoc manner to sense or observe physical phenomena by collecting real-time data. These sensor nodes are battery-enabled with limited energy constraints affecting network lifetime. Energy conservation of these nodes is vital in designing a routing protocol to max...
Article
The Internet of Things (IoT) provides smart solutions for future urban communities to address key benefits with the least human intercession. A smart home offers the necessary capabilities to promote efficiency and sustainability to a resident with their healthcare-related, social, and emotional needs. In particular, it provides an opportunity to a...
Article
Full-text available
The key characteristic of smart cities (ie, connectivity and intelligence) has enabled connected vehicles to work together to accomplish complex jobs that they are unable to perform individually. Connectivity not only being an inevitable blessing but also poses growing cybersecurity challenges for connected vehicles. The overall risk of connected v...

Network

Cited By