Author
Contributions by role
Author 6
Fida Muhammad Khan
Department of Computer Science, Qurtuba University of Science and Information Technology, 25000, Peshawar, Pakistan
Summary
Fida Muhammad Khan is currently pursuing a Ph.D. in Computer Science at Qurtuba University of Science and Information Technology, Peshawar, Pakistan. He did his MS in Computer Science at the University of Science and Technology, Bannu, Pakistan. His research interests include Data Mining, Cybersecurity, IoT, Machine Learning, Deep Learning, and Natural Language Processing (NLP).
Edited Journals
ICCK Contributions

Open Access | Research Article | 21 June 2024
Comparison of Machine Learning and Deep Learning Models for Part-of-Speech Tagging
ICCK Transactions on Advanced Computing and Systems | Volume 1, Issue 2: 106-116, 2024 | DOI: 10.62762/TACS.2024.493945
Abstract
The process of assigning grammatical categories, such as ``Noun'' and ``Verb,'' to every word in a text corpus is known as part-of-speech (POS) tagging. This technique is widely used in applications like sentiment analysis, machine translation, and other linguistic and computational tasks. However, the unique features of the Pashto language and its limited resources present significant challenges for POS tagging. This study explores the critical role of POS tagging in the Pashto language by employing six popular deep-learning and machine-learning techniques. Experimental results demonstrate machine learning methods' effectiveness in capturing Pashto text's grammatical patterns. The evaluatio... More >

Graphical Abstract
Comparison of Machine Learning and Deep Learning Models for Part-of-Speech Tagging

Open Access | Research Article | 26 May 2024
Comparing Fine-Tuned RoBERTa with Traditional Machine Learning Models for Stance Detection in Political Tweets
ICCK Transactions on Advanced Computing and Systems | Volume 1, Issue 2: 78-96, 2024 | DOI: 10.62762/TACS.2024.928069
Abstract
Stance detection identifies a text’s position or attitude toward a given subject. A major challenge in Roman Urdu is the lack of a publicly available dataset for political stance detection. To address this gap, we constructed a high-quality dataset of 8,374 political tweets and comments using the Twitter API, annotated with stance labels: agree, disagree, and unrelated. The dataset captures diverse political viewpoints and user interactions. For feature representation, we employed TF-IDF due to its effectiveness in handling high-dimensional, context-sensitive Roman Urdu text. Several machine learning classifiers were evaluated, with Random Forest achieving the highest accuracy of 95%. Addi... More >

Graphical Abstract
Comparing Fine-Tuned RoBERTa with Traditional Machine Learning Models for Stance Detection in Political Tweets

Research Article | 19 May 2025
Optimizing Cloud Security with a Hybrid BiLSTM-BiGRU Model for Efficient Intrusion Detection
ICCK Transactions on Sensing, Communication, and Control | Volume 2, Issue 2: 106-121, 2025 | DOI: 10.62762/TSCC.2024.433246
Abstract
To address evolving security challenges in cloud computing, this study proposes a hybrid deep learning architecture integrating Bidirectional Long Short-Term Memory (BiLSTM) and Bidirectional Gated Recurrent Units (BiGRU) for cloud intrusion detection. The BiLSTM-BiGRU model synergizes BiLSTM's long-term dependency modeling with BiGRU's efficient gating mechanisms, achieving a detection accuracy of 96.7% on the CIC-IDS 2018 dataset. It outperforms CNN-LSTM baselines by 2.2% accuracy, 3.3% precision, 3.6% recall, and 3.6% F1-score while maintaining 0.03% false positive rate. The architecture demonstrates operational efficiency through 20% reduced computational latency and 15% lower memory foo... More >

Graphical Abstract
Optimizing Cloud Security with a Hybrid BiLSTM-BiGRU Model for Efficient Intrusion Detection

Open Access | Research Article | 31 March 2024
Enhancing Authentication Security in Internet of Vehicles: A Blockchain-Driven Approach for Trustworthy Communication
ICCK Transactions on Advanced Computing and Systems | Volume 1, Issue 1: 48-62, 2024 | DOI: 10.62762/TACS.2024.835144
Abstract
The Internet of Vehicles (IoVs) is an emerging technology that enhances transportation systems by enabling interactions between vehicles, infrastructure, and other entities. Securing IoV networks from cyber threats like eavesdropping, data tampering, and intrusions is a major challenge. This research presents a Blockchain-Enabled Secure Authentication Protocol for IoVs (BESA-IOV), which leverages blockchain’s decentralized and tamper-resistant nature for secure communication in vehicular networks. By utilizing ECC-based lightweight cryptography and blockchain-based public key management, it ensures strong authentication, confidentiality, and integrity. The results show that BESA-IOV signif... More >

Graphical Abstract
Enhancing Authentication Security in Internet of Vehicles: A Blockchain-Driven Approach for Trustworthy Communication

Open Access | Research Article | 29 March 2024
ViTDroid and Hybrid Models for Effective Android and IoT Malware Detection
ICCK Transactions on Advanced Computing and Systems | Volume 1, Issue 1: 32-47, 2024 | DOI: 10.62762/TACS.2024.521915
Abstract
This paper introduces ViTDroid, a novel hybrid model that combines Vision Transformers (ViTs) and recurrent neural networks (RNNs) to enhance Android and IoT malware detection. ViTDroid addresses critical challenges by leveraging ViTs to capture global spatial dependencies and RNNs (LSTM and GRU) to model temporal patterns, enabling comprehensive analysis of complex malware behaviors. Additionally, the model integrates explainability tools, such as LIME and SHAP, to enhance transparency and trustworthiness, essential for real-world cybersecurity applications. The study evaluates ViTDroid's performance against conventional models, including RNN, LSTM, and GRU, using accuracy, precision, recal... More >

Graphical Abstract
ViTDroid and Hybrid Models for Effective Android and IoT Malware Detection
1 2