default search action
Aaisha Makkar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Durgesh Srivastava, Rajeshwar Singh, Chinmay Chakraborty, Sunil Kr Maakar, Aaisha Makkar, Deepak Sinwar:
A framework for detection of cyber attacks by the classification of intrusion detection datasets. Microprocess. Microsystems 105: 104964 (2024) - [e3]KC Santosh, Aaisha Makkar, Myra Conway, Ashutosh Kumar Singh, Antoine Vacavant, Anas Abou El Kalam, Mohamed-Rafik Bouguelia, Ravindra S. Hegadi:
Recent Trends in Image Processing and Pattern Recognition - 6th International Conference, RTIP2R 2023, Derby, UK, December 7-8, 2023, Revised Selected Papers, Part I. Communications in Computer and Information Science 2026, Springer 2024, ISBN 978-3-031-53081-4 [contents] - [e2]KC Santosh, Aaisha Makkar, Myra Conway, Ashutosh Kumar Singh, Antoine Vacavant, Anas Abou El Kalam, Mohamed-Rafik Bouguelia, Ravindra S. Hegadi:
Recent Trends in Image Processing and Pattern Recognition - 6th International Conference, RTIP2R 2023, Derby, UK, December 7-8, 2023, Revised Selected Papers, Part II. Communications in Computer and Information Science 2027, Springer 2024, ISBN 978-3-031-53084-5 [contents] - [i2]Kishu Gupta, Deepika Saxena, Pooja Rani, Jitendra Kumar, Aaisha Makkar, Ashutosh Kumar Singh, Chung-Nan Lee:
An Intelligent Quantum Cyber-Security Framework for Healthcare Data Management. CoRR abs/2410.03217 (2024) - [i1]Kishu Gupta, Vinaytosh Mishra, Aaisha Makkar:
A Global Cybersecurity Standardization Framework for Healthcare Informatics. CoRR abs/2410.05333 (2024) - 2023
- [j13]Aaisha Makkar, Uttam Ghosh, Pradip Kumar Sharma, Amir Javed:
A Fuzzy-Based Approach to Enhance Cyber Defence Security for Next-Generation IoT. IEEE Internet Things J. 10(3): 2079-2086 (2023) - [j12]Aaisha Makkar, KC Santosh:
SecureFed: federated learning empowered medical imaging technique to analyze lung abnormalities in chest X-rays. Int. J. Mach. Learn. Cybern. 14(8): 2659-2670 (2023) - [c13]Shivani Gaba, Anushka Nehra, Ishan Budhiraja, Vimal Kumar, Aaisha Makkar:
An Optimized Approach for Intrusion Detection in Internet of Softwarized Things. ICC Workshops 2023: 648-653 - [c12]Muntazir Mehdi, Aaisha Makkar, Myra Conway, Lakshit Sama:
Preserving Accuracy in Federated Learning via Equitable Model and Efficient Aggregation. RTIP2R (1) 2023: 76-88 - [c11]Nahid Sami, Aaisha Makkar, Farid Meziane, Myra Conway:
Exploring Imaging Biomarkers for Early Detection of Alzheimer's Disease Using Deep Learning: A Comprehensive Analysis. RTIP2R (2) 2023: 197-206 - [e1]KC Santosh, Ayush Goyal, Djamila Aouada, Aaisha Makkar, Yao-Yi Chiang, Satish Kumar Singh:
Recent Trends in Image Processing and Pattern Recognition - 5th International Conference, RTIP2R 2022, Kingsville, TX, USA, December 1-2, 2022, Revised Selected Papers. Communications in Computer and Information Science 1704, Springer 2023, ISBN 978-3-031-23598-6 [contents] - 2022
- [j11]Aaisha Makkar, Uttam Ghosh, Danda B. Rawat, Jemal H. Abawajy:
FedLearnSP: Preserving Privacy and Security Using Federated Learning and Edge Computing. IEEE Consumer Electron. Mag. 11(2): 21-27 (2022) - [j10]Rishabh Gupta, Deepika Saxena, Ishu Gupta, Aaisha Makkar, Ashutosh Kumar Singh:
Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications. IEEE Netw. Lett. 4(4): 174-178 (2022) - [j9]Aaisha Makkar, Jong Hyuk Park:
SecureCPS: Cognitive inspired framework for detection of cyber attacks in cyber-physical systems. Inf. Process. Manag. 59(3): 102914 (2022) - [j8]Aaisha Makkar, Tae Woo Kim, Ashutosh Kumar Singh, Jungho Kang, Jong Hyuk Park:
SecureIIoT Environment: Federated Learning Empowered Approach for Securing IIoT From Data Breach. IEEE Trans. Ind. Informatics 18(9): 6406-6414 (2022) - [c10]Shivani Gaba, Ishan Budhiraja, Aaisha Makkar, Deepak Garg:
Machine Learning for Detecting Security Attacks on Blockchain using Software Defined Networking. ICC Workshops 2022: 260-264 - [c9]Afia Farjana, Aaisha Makkar:
Federated Learning for Lung Sound Analysis. RTIP2R 2022: 120-134 - [c8]Shivani Gaba, Ishan Budhiraja, Vimal Kumar, Aaisha Makkar:
Federated Learning Based Secured Computational Offloading in Cyber-Physical IoST Systems. RTIP2R 2022: 344-355 - 2021
- [j7]Aaisha Makkar, Neeraj Kumar:
PROTECTOR: An optimized deep learning-based framework for image spam detection and prevention. Future Gener. Comput. Syst. 125: 41-58 (2021) - [j6]Abdul Basit Darem, Jemal H. Abawajy, Aaisha Makkar, Asma Alhashmi, Sultan Munadi Alanazi:
Visualization and deep-learning-based malware variant detection using OpCode-level features. Future Gener. Comput. Syst. 125: 314-323 (2021) - [j5]Aaisha Makkar, Sahil Garg, Neeraj Kumar, M. Shamim Hossain, Ahmed Ghoneim, Mubarak Alrashoud:
An Efficient Spam Detection Technique for IoT Devices Using Machine Learning. IEEE Trans. Ind. Informatics 17(2): 903-912 (2021) - [c7]Lakshit Sama, Aaisha Makkar, Polemoni Prokshitha, Devansh Dhaloria, Bhav Kirti Sharma:
AI based management of Food Wastage. ISIC 2021: 467-475 - 2020
- [j4]Aaisha Makkar, Neeraj Kumar:
An efficient deep learning-based scheme for web spam detection in IoT environment. Future Gener. Comput. Syst. 108: 467-487 (2020) - [j3]Aaisha Makkar, Neeraj Kumar, Albert Y. Zomaya, Shalini Dhiman:
SPAMI: A cognitive spam protector for advertisement malicious images. Inf. Sci. 540: 17-37 (2020) - [c6]Lakshit Sama, Aaisha Makkar, Satyam Kumar Mishra, Yash Samdani:
DIADL: An Energy Efficient Framework for Detecting Intrusion Attack Using Deep LearnIing. ICCMS 2020: 138-142 - [c5]Aaisha Makkar, Neeraj Kumar, Lakshit Sama, Satyam Kumar Mishra, Yash Samdani:
An Intelligent Phishing Detection Scheme Using Machine Learning. ICMC 2020: 151-165
2010 – 2019
- 2019
- [j2]Aaisha Makkar, Neeraj Kumar:
Cognitive spammer: A Framework for PageRank analysis with Split by Over-sampling and Train by Under-fitting. Future Gener. Comput. Syst. 90: 381-404 (2019) - [c4]Aaisha Makkar, Neeraj Kumar, Mohsen Guizani:
The Power of AI in IoT : Cognitive IoT-based Scheme for Web Spam Detection. SSCI 2019: 3132-3138 - 2018
- [j1]Aaisha Makkar, Neeraj Kumar:
User behavior analysis-based smart energy management for webpage ranking: Learning automata-based solution. Sustain. Comput. Informatics Syst. 20: 174-191 (2018) - [c3]Aaisha Makkar, Neeraj Kumar, Mohammad S. Obaidat, Kuei-Fang Hsiao:
QAIR: Quality Assessment Scheme for Information Retrieval in IoT Infrastructures. GLOBECOM 2018: 1-6 - [c2]Aaisha Makkar, Mohammad S. Obaidat, Neeraj Kumar:
FS2RNN: Feature Selection Scheme for Web Spam Detection Using Recurrent Neural Networks. GLOBECOM 2018: 1-6 - 2016
- [c1]Aaisha Makkar, Shivani Goel:
Spammer Classification Using Ensemble Methods over Content-Based Features. SocProS (2) 2016: 1-9
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint