Author
Contributions by role
Author 6
Zeeshan Ali Haider
Department of Computer Science, Qurtuba University of Science & Information Technology, 25000 Peshawar, Pakistan
Summary
Edited Journals
ICCK Contributions

Research Article | 23 July 2025
Optimizing Collaborative Task Allocation in Internet of Vehicles (IoV) through Blockchain-Enabled Incentive Mechanisms
ICCK Transactions on Sensing, Communication, and Control | Volume 2, Issue 3: 147-167, 2025 | DOI: 10.62762/TSCC.2025.962030
Abstract
The Internet of Vehicles (IoV) is a core component of smart transportation systems, making it feasible to exchange information among vehicles, infrastructure, and central systems in real time. However, the effective use of resources and the efficient distribution of tasks in these dynamic environments is a challenging task. This paper presents a blockchain-based collaborative task allocation framework method that can solve these problems by using a greedy algorithm for general task allocation and adopting a dynamic collaboration scheduling algorithm for emergent tasks. Employing the blockchain-based reward mechanism, the transparency, fairness, and security in dynamic mobile crowdsensing (MC... More >

Graphical Abstract
Optimizing Collaborative Task Allocation in Internet of Vehicles (IoV) through Blockchain-Enabled Incentive Mechanisms

Open Access | Research Article | 27 November 2024
Advanced Hyperelliptic Curve-Based Authentication Protocols for Secure Internet of Drones Communication
ICCK Transactions on Advanced Computing and Systems | Volume 1, Issue 4: 1-16, 2024 | DOI: 10.62762/TACS.2024.926789
Abstract
The concept of an Internet of Drones (IoD) is becoming increasingly important in various domains, including surveillance and logistics. Effective communication between the interconnected systems is the essence of the Internet of Drones, however, due to the resource constraints of drones and the dynamic nature of the operating environment, security of communication within IoD networks is indeed the top priority. Considering these challenges on the part of IoD communication, a novel Hyperelliptic Curve Cryptography (HECC)-based authentication protocol is proposed in this paper to secure the data exchange between two drones and to ensure efficient communication. The proposed HECC protocol is co... More >

Graphical Abstract
Advanced Hyperelliptic Curve-Based Authentication Protocols for Secure Internet of Drones Communication

Research Article | 19 May 2025
Optimizing Cloud Security with a Hybrid BiLSTM-BiGRU Model for Efficient Intrusion Detection
ICCK Transactions on Sensing, Communication, and Control | Volume 2, Issue 2: 106-121, 2025 | DOI: 10.62762/TSCC.2024.433246
Abstract
To address evolving security challenges in cloud computing, this study proposes a hybrid deep learning architecture integrating Bidirectional Long Short-Term Memory (BiLSTM) and Bidirectional Gated Recurrent Units (BiGRU) for cloud intrusion detection. The BiLSTM-BiGRU model synergizes BiLSTM's long-term dependency modeling with BiGRU's efficient gating mechanisms, achieving a detection accuracy of 96.7% on the CIC-IDS 2018 dataset. It outperforms CNN-LSTM baselines by 2.2% accuracy, 3.3% precision, 3.6% recall, and 3.6% F1-score while maintaining 0.03% false positive rate. The architecture demonstrates operational efficiency through 20% reduced computational latency and 15% lower memory foo... More >

Graphical Abstract
Optimizing Cloud Security with a Hybrid BiLSTM-BiGRU Model for Efficient Intrusion Detection

Open Access | Research Article | 31 March 2024
Enhancing Authentication Security in Internet of Vehicles: A Blockchain-Driven Approach for Trustworthy Communication
ICCK Transactions on Advanced Computing and Systems | Volume 1, Issue 1: 48-62, 2024 | DOI: 10.62762/TACS.2024.835144
Abstract
The Internet of Vehicles (IoVs) is an emerging technology that enhances transportation systems by enabling interactions between vehicles, infrastructure, and other entities. Securing IoV networks from cyber threats like eavesdropping, data tampering, and intrusions is a major challenge. This research presents a Blockchain-Enabled Secure Authentication Protocol for IoVs (BESA-IOV), which leverages blockchain’s decentralized and tamper-resistant nature for secure communication in vehicular networks. By utilizing ECC-based lightweight cryptography and blockchain-based public key management, it ensures strong authentication, confidentiality, and integrity. The results show that BESA-IOV signif... More >

Graphical Abstract
Enhancing Authentication Security in Internet of Vehicles: A Blockchain-Driven Approach for Trustworthy Communication

Open Access | Research Article | 29 March 2024
ViTDroid and Hybrid Models for Effective Android and IoT Malware Detection
ICCK Transactions on Advanced Computing and Systems | Volume 1, Issue 1: 32-47, 2024 | DOI: 10.62762/TACS.2024.521915
Abstract
This paper introduces ViTDroid, a novel hybrid model that combines Vision Transformers (ViTs) and recurrent neural networks (RNNs) to enhance Android and IoT malware detection. ViTDroid addresses critical challenges by leveraging ViTs to capture global spatial dependencies and RNNs (LSTM and GRU) to model temporal patterns, enabling comprehensive analysis of complex malware behaviors. Additionally, the model integrates explainability tools, such as LIME and SHAP, to enhance transparency and trustworthiness, essential for real-world cybersecurity applications. The study evaluates ViTDroid's performance against conventional models, including RNN, LSTM, and GRU, using accuracy, precision, recal... More >

Graphical Abstract
ViTDroid and Hybrid Models for Effective Android and IoT Malware Detection
1 2