default search action
Parvez Faruki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Parvez Faruki, Rati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun, Rajendra Pamula:
A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks. Inf. 14(7): 374 (2023) - [j10]Rati Bhan, Rajendra Pamula, Parvez Faruki, Jyoti Gajrani:
Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network. J. Supercomput. 79(14): 16233-16274 (2023) - [c18]Hema Dhadhal, Paresh P. Kotak, Parvez Faruki, Atul Gonsai, Sajal Bhatia:
Towards Learning Based Detection and Mitigation of DDoS Attacks in Software Defined Networks. SIN 2023: 1-6 - 2022
- [j9]Mohit Singh, Vijay Laxmi, Parvez Faruki:
Dense spatially-weighted attentive residual-haze network for image dehazing. Appl. Intell. 52(12): 13855-13869 (2022) - [j8]Mohamed A. El-Zawawy, Parvez Faruki, Mauro Conti:
Formal model for inter-component communication and its security in android. Computing 104(8): 1839-1865 (2022) - [j7]Mohit Singh, Vijay Laxmi, Parvez Faruki:
Visibility enhancement and dehazing: Research contribution challenges and direction. Comput. Sci. Rev. 44: 100473 (2022) - [j6]Vinesh Kumar Jain, Arka Prokash Mazumdar, Parvez Faruki, Mahesh Chandra Govil:
Congestion control in Internet of Things: Classification, challenges, and future directions. Sustain. Comput. Informatics Syst. 35: 100678 (2022) - 2020
- [j5]Jay Dave, Avijit Dutta, Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur:
Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage. Autom. Control. Comput. Sci. 54(4): 358-370 (2020) - [j4]Jay Dave, Parvez Faruki, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mauro Conti:
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage. Comput. Commun. 154: 148-159 (2020) - [c17]Tanya Gera, Jaiteg Singh, Deepak Thakur, Parvez Faruki:
A Semi-automated Approach for Identification of Trends in Android Ransomware Literature. MLN 2020: 265-283
2010 – 2019
- 2019
- [j3]Nadia Chaabouni, Mohamed Mosbah, Akka Zemmari, Cyrille Sauvignac, Parvez Faruki:
Network Intrusion Detection for IoT Security Based on Learning Techniques. IEEE Commun. Surv. Tutorials 21(3): 2671-2701 (2019) - [e1]Sukumar Nandi, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki:
Security and Privacy - Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers. Communications in Computer and Information Science 939, Springer 2019, ISBN 978-981-13-7560-6 [contents] - 2018
- [c16]Jay Dave, Vijay Laxmi, Parvez Faruki, Manoj Singh Gaur, Bhavya Shah:
Bloom Filter Based Privacy Preserving Deduplication System. ISEA-ISAP 2018: 17-34 - [c15]Parvez Faruki, Bharat Buddhadev, Bhavya Shah, Akka Zemmari, Vijay Laxmi, Manoj Singh Gaur:
DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks. ISEA-ISAP 2018: 125-139 - 2017
- [c14]Jay Dave, Shweta Saharan, Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur:
Secure Random Encryption for Deduplicated Storage. ICISS 2017: 164-176 - [c13]Jay Dave, Parvez Faruki, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur:
Secure and efficient proof of ownership for deduplicated cloud storage. SIN 2017: 19-26 - 2016
- [c12]Lovely Sinha, Shweta Bhandari, Parvez Faruki, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti:
FlowMine: Android app analysis via data flow. CCNC 2016: 435-441 - [c11]Parvez Faruki, Akka Zemmari, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti:
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers. DSN Workshops 2016: 60-65 - [c10]Bharat Buddhdev, Parvez Faruki, Manoj Singh Gaur, Vijay Laxmi:
Android component vulnerabities: Proof of concepts and mitigation. ICOIN 2016: 17-22 - [p1]Parvez Faruki, Shweta Bhandari, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti:
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis. Recent Advances in Computational Intelligence in Defense and Security 2016: 519-552 - [i1]Parvez Faruki, Hossein Fereidooni, Vijay Laxmi, Mauro Conti, Manoj Singh Gaur:
Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions. CoRR abs/1611.10231 (2016) - 2015
- [j2]Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan:
Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Commun. Surv. Tutorials 17(2): 998-1022 (2015) - [j1]Parvez Faruki, Vijay Laxmi, Ammar Bharmal, Manoj Singh Gaur, Vijay Ganmoor:
AndroSimilar: Robust signature for detecting variants of Android malware. J. Inf. Secur. Appl. 22: 66-80 (2015) - 2014
- [c9]Parvez Faruki, Vijay Kumar, Ammar Bharmal, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti:
Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps. SecureComm (1) 2014: 556-560 - [c8]Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan:
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation. TrustCom 2014: 414-421 - 2013
- [c7]Parvez Faruki, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Ammar Bharmal:
DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets. ADCONS 2013: 247-252 - [c6]P. Vinod, Vijay Laxmi, Manoj Singh Gaur, Smita Naval, Parvez Faruki:
MCF: MultiComponent Features for Malware Analysis. AINA Workshops 2013: 1076-1081 - [c5]Parvez Faruki, Vijay Ganmoor, Vijay Laxmi, Manoj Singh Gaur, Ammar Bharmal:
AndroSimilar: robust statistical feature signature for Android malware detection. SIN 2013: 152-159 - [c4]Vijay Laxmi, Deepanshu Mehta, Manoj Singh Gaur, Parvez Faruki, Chhagan Lal:
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks. SIN 2013: 189-195 - 2012
- [c3]Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur, P. Vinod:
Behavioural detection with API call-grams to identify malicious PE files. SECURIT 2012: 85-91 - [c2]Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur, P. Vinod:
Mining control flow graph as API call-grams to detect portable executable malware. SIN 2012: 130-137 - 2011
- [c1]Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki, Smita Naval:
PEAL - Packed Executable AnaLysis. ADCONS 2011: 237-243
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint