Abdul Razaque Data-verified
Affiliation confirmed via AI analysis of OpenAlex, ORCID, and web sources.
Professor
faculty
Research Areas
Links
Biography and Research Information
OverviewAI-generated summary
Abdul Razaque's research focuses on the application of advanced computational methods, including deep learning and machine learning algorithms, to address challenges in diverse fields. His work investigates the use of artificial intelligence for tasks such as unmanned aerial vehicle detection, remote sensing image classification, and cyberbullying detection on social media. He has also explored the integration of artificial intelligence in diagnosing diseases, as indicated by his work on AI methods for Alzheimer's disease diagnosis using neuroimaging and sensor data.
Razaque's research interests extend to network security and the Internet of Things (IoT), with publications addressing DDoS detection in 5G-enabled IoT networks and energy-efficient cloud solutions for IoT. His work also touches upon emerging technologies like blockchain in the context of the Internet of Vehicles. His scholarship metrics include an h-index of 30, 249 total publications, and 3,209 total citations, designating him as a highly cited researcher.
Metrics
- h-index: 28
- Publications: 224
- Citations: 2,919
Selected Publications
-
Comprehensive analysis of Li-Fi technology: positioning algorithms, security vulnerabilities, and future IoT applications (2025)
-
Blockchain-Enabled Smart Contracts and Prioritized Delegated Proof-of-Stake Paradigm for Secure and Scalable Electronic Voting Systems (2025)
-
Enhancing Pharmaceutical Supply Chain Transparency and Security with Blockchain and Big Data Integration (2025)
-
A reinforcement learning and predictive analytics approach for enhancing credit assessment in manufacturing (2025)
-
Review of malicious code detection in data mining applications: challenges, algorithms, and future direction (2025)
-
Advanced Segmentation of Gastrointestinal (GI) Cancer Disease Using a Novel U-MaskNet Model (2024)
-
Comparative analysis of machine learning and deep learning models for improved cancer detection: A comprehensive review of recent advancements in diagnostic techniques (2024)
-
A depth analysis of recent innovations in non-invasive techniques using artificial intelligence approach for cancer prediction (2024)
-
Designing an Intelligent Scoring System for Crediting Manufacturers and Importers of Goods in Industry 4.0 (2024)
-
Blockchain-enabled heterogeneous 6G supported secure vehicular management system over cloud edge computing (2024)
-
A review of artificial intelligence methods for Alzheimer's disease diagnosis: Insights from neuroimaging to sensor data analysis (2024)
-
Deep learning for unmanned aerial vehicles detection: A review (2024)
-
Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology (2023)
-
Developing Robotic Process Automation to Efficiently Integrate Long-Term Business Process Management (2023)
-
Quantum communication networks: Design, reliability, and security (2023)
Collaboration Network
Top Collaborators
- Deep learning for unmanned aerial vehicles detection: A review
- Improved Support Vector Machine Enabled Radial Basis Function and Linear Variants for Remote Sensing Image Classification
- A Multichannel Deep Learning Framework for Cyberbullying Detection on Social Media
- Energy-efficient and secure mobile fog-based cloud for the Internet of Things
- Detection of Unauthorized Unmanned Aerial Vehicles Using YOLOv5 and Transfer Learning
Showing 5 of 23 shared publications
- Deep learning for unmanned aerial vehicles detection: A review
- Improved Support Vector Machine Enabled Radial Basis Function and Linear Variants for Remote Sensing Image Classification
- A Multichannel Deep Learning Framework for Cyberbullying Detection on Social Media
- Energy-efficient and secure mobile fog-based cloud for the Internet of Things
- Detection of Unauthorized Unmanned Aerial Vehicles Using YOLOv5 and Transfer Learning
Showing 5 of 20 shared publications
- Detection of Unauthorized Unmanned Aerial Vehicles Using YOLOv5 and Transfer Learning
- Credit Card-Not-Present Fraud Detection and Prevention Using Big Data Analytics Algorithms
- Big Data Handling Approach for Unauthorized Cloud Computing Access
- Blockchain-Enabled Deep Recurrent Neural Network Model for Clickbait Detection
- Clickbait Detection Using Deep Recurrent Neural Network
Showing 5 of 12 shared publications
- The Role of Cutting-Edge Technologies in Industry 4.0
- A comprehensive review on blockchains for Internet of Vehicles: Challenges and directions
- Light Weight Authentication Scheme for Smart Home IoT Devices
- A Mobility-Aware Human-Centric Cyber–Physical System for Efficient and Secure Smart Healthcare
- Enhancing the Performance of Lightweight Configurable PUF for Robust IoT Hardware-Assisted Security
Showing 5 of 11 shared publications
- Improved Support Vector Machine Enabled Radial Basis Function and Linear Variants for Remote Sensing Image Classification
- DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network
- Energy-efficient and secure mobile fog-based cloud for the Internet of Things
- Efficient and reliable forensics using intelligent edge computing
- Credit Card-Not-Present Fraud Detection and Prevention Using Big Data Analytics Algorithms
Showing 5 of 9 shared publications
- A review of artificial intelligence methods for Alzheimer's disease diagnosis: Insights from neuroimaging to sensor data analysis
- Comparative analysis of machine learning and deep learning models for improved cancer detection: A comprehensive review of recent advancements in diagnostic techniques
- Blockchain-enabled heterogeneous 6G supported secure vehicular management system over cloud edge computing
- Developing Robotic Process Automation to Efficiently Integrate Long-Term Business Process Management
- Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology
Showing 5 of 9 shared publications
- Credit Card-Not-Present Fraud Detection and Prevention Using Big Data Analytics Algorithms
- Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology
- Review of malicious code detection in data mining applications: challenges, algorithms, and future direction
- Comprehensive analysis of Li-Fi technology: positioning algorithms, security vulnerabilities, and future IoT applications
- Quality of Service Generalization using Parallel Turing Integration Paradigm to Support Machine Learning
Showing 5 of 7 shared publications
- Improved Support Vector Machine Enabled Radial Basis Function and Linear Variants for Remote Sensing Image Classification
- Credit Card-Not-Present Fraud Detection and Prevention Using Big Data Analytics Algorithms
- Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
- Privacy preservation Models for Third-Party Auditor over Cloud Computing: a Survey
- Quality of Service Generalization using Parallel Turing Integration Paradigm to Support Machine Learning
Showing 5 of 6 shared publications
- Deep learning for unmanned aerial vehicles detection: A review
- Energy-efficient and secure mobile fog-based cloud for the Internet of Things
- A Mobility-Aware Human-Centric Cyber–Physical System for Efficient and Secure Smart Healthcare
- Avoidance of Cybersecurity Threats with the Deployment of a Web-Based Blockchain-Enabled Cybersecurity Awareness System
- Blockchain-Enabled Deep Recurrent Neural Network Model for Clickbait Detection
Showing 5 of 6 shared publications
- Credit Card-Not-Present Fraud Detection and Prevention Using Big Data Analytics Algorithms
- Blockchain-enabled heterogeneous 6G supported secure vehicular management system over cloud edge computing
- Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology
- Quality of Service Generalization using Parallel Turing Integration Paradigm to Support Machine Learning
- Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things
Showing 5 of 6 shared publications
- DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network
- Energy-efficient and secure mobile fog-based cloud for the Internet of Things
- Efficient and reliable forensics using intelligent edge computing
- Hybrid energy-efficient algorithm for efficient Internet of Things deployment
- A blockchain-enabled framework for securing connected consumer electronics against wireless attacks
- Credit Card-Not-Present Fraud Detection and Prevention Using Big Data Analytics Algorithms
- Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology
- Influence of COVID-19 Epidemic on Dark Web Contents
- Quality of Service Generalization using Parallel Turing Integration Paradigm to Support Machine Learning
- Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things
- The Role of Cutting-Edge Technologies in Industry 4.0
- Light Weight Authentication Scheme for Smart Home IoT Devices
- Credit Card-Not-Present Fraud Detection and Prevention Using Big Data Analytics Algorithms
- Quality of Service Generalization using Parallel Turing Integration Paradigm to Support Machine Learning
- Credit Card-Not-Present Fraud Detection and Prevention Using Big Data Analytics Algorithms
- Quantum communication networks: Design, reliability, and security
- Quality of Service Generalization using Parallel Turing Integration Paradigm to Support Machine Learning
- Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things
- Avoidance of Cybersecurity Threats with the Deployment of a Web-Based Blockchain-Enabled Cybersecurity Awareness System
- Blockchain-Enabled Transaction Scanning Method for Money Laundering Detection
- Avoidance of Cybersecurity Threats with the Deployment of a Web-based Blockchain-Enabled Cybersecurity Awareness Model
Similar Researchers
Based on overlapping research topics