Personal information

Information Security, Malware Detection , Vulnerability Detection, Software Maintenence, Software Reuse, Code Clone Detection
Pakistan, China

Biography

Postdoc Research Associate at SnT - University of Luxembourg
PhD (Software Engineering) from Tsinghua University China.
.....
Lead the following projects at Key Laboratory of Information System Security, School of Software, Tsinghua University, Beijing, China.
1. Code Clone Detection
2. Cybersecurity Benchmark Creation
3. Source Code Vulnerability Detection
4. Android Malware Detection at Source Code Level

Activities

Education and qualifications (1)

Tsinghua University: Beijing, Beijing, CN

2015-08 to 2020-06 | PhD (Software Engineering)
Education
Source: Self-asserted source
Dr. Junaid Akram

Professional activities (4)

WILEY: NJ, NJ, US

Reviewer (Software: Practice and Experience)
Service
Source: Self-asserted source
Dr. Junaid Akram

Science Publishing Group: New York, US

Reviewer (American Journal of Software Engineering and Applications)
Service
Source: Self-asserted source
Dr. Junaid Akram

International Association of Engineers: Hong Kong, Hong Kong, CN

2018 to present
Membership
Source: Self-asserted source
Dr. Junaid Akram

IEEE Computer Society: Washington D.C., District of Columbia, US

2017 to present
Membership
Source: Self-asserted source
Dr. Junaid Akram

Funding (1)

Vulnerability Detection

2016 to 2020 | Grant
Ministry of Science and Technology (Beijing, CN)
Source: Self-asserted source
Dr. Junaid Akram

Works (12)

DroidSD: An Efficient Indexed Based Android Applications Similarity Detection Tool

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING
2020 | Journal article
Source: Self-asserted source
Dr. Junaid Akram

MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning

IEEE Transactions on Computers
2020 | Journal article
Source: Self-asserted source
Dr. Junaid Akram

IBFET: Index‐based features extraction technique for scalable code clone detection at file level granularity

Software: Practice and Experience
2020-01 | Journal article
Part of ISSN: 0038-0644
Part of ISSN: 1097-024X
Source: Self-asserted source
Dr. Junaid Akram

How to build a vulnerability benchmark to overcome cyber security attacks

IET Information Security
2020-01-01 | Journal article
Part of ISSN: 1751-8709
Part of ISSN: 1751-8717
Source: Self-asserted source
Dr. Junaid Akram

DroidMD: An Efficient and Scalable Android Malware Detection Approach at Source Code Level

International Journal of Information and Computer Security
2019 | Journal article
Part of ISSN: 1744-1765
Part of ISSN: 1744-1773
Source: Self-asserted source
Dr. Junaid Akram

An RSA Based Authentication System for Smart IoT Environment

2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
2019-08 | Conference paper
Part of ISBN: 9781728120584
Source: Self-asserted source
Dr. Junaid Akram

An Integrated Software Vulnerability Discovery Model based on Artificial Neural Network

Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering
2019-07-10 | Conference paper
Source: Self-asserted source
Dr. Junaid Akram
grade
Preferred source (of 2)‎

VCIPR: Vulnerable Code is Identifiable When a Patch is Released (Hacker's Perspective)

2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST)
2019-04 | Conference paper
Source: Self-asserted source
Dr. Junaid Akram

DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level

2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)
2018-07 | Conference paper
Source: Self-asserted source
Dr. Junaid Akram

DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code

Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering
2018-07-01 | Conference paper
Source: Self-asserted source
Dr. Junaid Akram

Cognitive Effects of Visualization on Learning Data Structure and Algorithms

The Third International Conference on Digital Enterprise and Information Systems (DEIS2015)
2015 | Conference paper
Source: Self-asserted source
Dr. Junaid Akram

DATA STRUCTURE AND ALGORITHM: A VISUALIZED WEB BASED COURSEWARE IMPROVES COGNITIVE LEARNING

International Journal of Digital Information and Wireless Communications
2015 | Journal article
Part of ISSN: 2225-658X
Source: Self-asserted source
Dr. Junaid Akram