Farkhund Iqbal
Applied Filters
- Farkhund Iqbal
- AuthorRemove filter
People
Colleagues
- Farkhund Iqbal (43)
- Benjamin C. M. Fung (14)
- Mourad Debbabi (8)
- Patrick C K Hung (5)
- Muhammad Umair Shah (4)
- Áine MacDermott (3)
- Abdul Rehman Javed (3)
- Andrew Marrington (3)
- Babar Shah (3)
- Khalil Al-Hussaeni (3)
- Umair Rehman (3)
- Elias Bou-Harb (2)
- Hamad Binsalleeh (2)
- Ibrahim Moussa Baggili (2)
- Junqiang Liu (2)
- Liaquat A Khan (2)
- Mohammed Hussain (2)
- Rachid Hadjidj (2)
- Thar Baker (2)
- Zunera Jalil (2)
Publication
Journal/Magazine Names
- Digital Investigation: The International Journal of Digital Forensics & Incident Response (7)
- ACM Transactions on Asian and Low-Resource Language Information Processing (3)
- International Journal of Digital Crime and Forensics (3)
- Computers and Security (2)
- Information Sciences: an International Journal (2)
- ACM Transactions on Knowledge Discovery from Data (1)
- Computer Networks: The International Journal of Computer and Telecommunications Networking (1)
- Electronic Commerce Research and Applications (1)
- Information Systems Frontiers (1)
- International Journal of Electronic Security and Digital Forensics (1)
- Knowledge and Information Systems (1)
- Neural Computing and Applications (1)
- Personal and Ubiquitous Computing (1)
- Scientific Programming (1)
- Security and Communication Networks (1)
- The Journal of Supercomputing (1)
- Transactions on Emerging Telecommunications Technologies (1)
Proceedings/Book Names
- ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and Security (2)
- ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security (1)
- ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security (1)
- ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security (1)
- ASONAM '13: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (1)
- HCI in Games: Experience Design and Game Mechanics (1)
- Human-Computer Interaction (1)
- ICPADS '15: Proceedings of the 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS) (1)
- SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing (1)
- Service-Oriented Computing – ICSOC 2021 Workshops (1)
- Theory and Applications of Models of Computation (1)
- WI-IAT '12: Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01 (1)
Publisher
- Association for Computing Machinery (12)
- Elsevier Science Publishers B. V. (8)
- Springer-Verlag (7)
- IGI Global (3)
- Elsevier Advanced Technology Publications (2)
- Elsevier Science Inc. (2)
- IEEE Computer Society (2)
- John Wiley & Sons, Inc. (2)
- Kluwer Academic Publishers (2)
- Elsevier North-Holland, Inc. (1)
- Hindawi Limited (1)
- Inderscience Publishers (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOpen AccessPublished By ACMPublished By ACM
Data Augmentation-based Novel Deep Learning Method for Deepfaked Images Detection
- Farkhund Iqbal
Zayed University, Abu Dhabi, UAE
, - Ahmed Abbasi
Air university, Islamabad, Pakistan
, - Abdul Rehman Javed
Department of Electrical and Computer Engineering, Lebanese American University, Byblos, Lebanon
, - Ahmad Almadhor
Jouf University, Sakaka, Saudi Arabia
, - Zunera Jalil
Air university, Islambad, Pakistan
, - Sajid Anwar
Institute of Management Sciences, Peshawar, Pakistan
, - Imad Rida
University of Technology of Compiègne, Compiègnee, France
ACM Transactions on Multimedia Computing, Communications, and Applications, Volume 20, Issue 11•November 2024, Article No.: 339, pp 1-15 • https://doi.org/10.1145/3592615Recent advances in artificial intelligence have led to deepfake images, enabling users to replace a real face with a genuine one. deepfake images have recently been used to malign public figures, politicians, and even average citizens. deepfake but ...
- 9Citation
- 1,760
- Downloads
MetricsTotal Citations9Total Downloads1,760Last 12 Months1,350Last 6 weeks509
- Farkhund Iqbal
- research-articlePublished By ACMPublished By ACM
Multimodal Religiously Hateful Social Media Memes Classification Based on Textual and Image Data
- Ameer Hamza
Air University, Islamabad, Pakistan
, - Abdul Rehman Javed
Lebanese American University, Byblos, Lebanon
, - Farkhund Iqbal
Zayed University, Abu Dhabi, UAE
, - Amanullah Yasin
Air University, Islamabad, Pakistan
, - Gautam Srivastava
Brandon University, Brandon, Canada, China Medical University, Taichung, Taiwan, and Lebanese American University, Beirut, Lebanon
, - Dawid Połap
Silesian University of Technology, Gliwice, Poland
, - Thippa Reddy Gadekallu
Lebanese American University, Byblos, Lebanon, Jiaxing University, Jiaxing, China, and Lovely Professional University, Phagwara, India
, - Zunera Jalil
National University of Computer and Emerging Sciences, Islamabad, Pakistan
ACM Transactions on Asian and Low-Resource Language Information Processing, Volume 23, Issue 8•August 2024, Article No.: 114, pp 1-19 • https://doi.org/10.1145/3623396Multimodal hateful social media meme detection is an important and challenging problem in the vision-language domain. Recent studies show high accuracy for such multimodal tasks due to datasets that provide better joint multimodal embedding to narrow the ...
- 3Citation
- 783
- Downloads
MetricsTotal Citations3Total Downloads783Last 12 Months675Last 6 weeks100
- Ameer Hamza
- research-articleOpen AccessPublished By ACMPublished By ACM
Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot
- Farkhund Iqbal
College of Technological Innovation , Zayed University, United Arab Emirates
, - Abdullah Kazim
College of Technological Innovation , Zayed University, United Arab Emirates
, - Aine MacDermott
School of Computer Science and Mathematics, Liverpool John Moores University, Liverpool, UK, United Kingdom
, - Richard Ikuesan
College of Technological Innovation , Zayed University, United Arab Emirates
, - Musaab Hasan
Emirates College for Advanced Education, United Arab Emirates
, - Andrew Marrington
College of Technological Innovation , Zayed University, United Arab Emirates
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security•July 2024, Article No.: 194, pp 1-9• https://doi.org/10.1145/3664476.3670906The Internet of Things (IoT) plays a significant role in our daily lives as interconnection and automation positively impact our societal needs. In contrast to traditional devices, IoT devices require connectivity and data sharing to operate effectively. ...
- 0Citation
- 122
- Downloads
MetricsTotal Citations0Total Downloads122Last 12 Months122Last 6 weeks49
- Farkhund Iqbal
- Article
Moral Dilemmas in Social Robots: An Exploratory Study for Future Research
- Muhammad Umair Shah
Management Sciences, University of Waterloo, Waterloo, ON, Canada
, - Patrick C. K. Hung
Faculty of Business and IT, Ontario Tech University, Oshawa, ON, Canada
, - Farkhund Iqbal
College of Technological Innovation, Zayed University, Abu Dhabi, United Arab Emirates
, - Robee Kassandra Adajar
Faculty of Business and IT, Ontario Tech University, Oshawa, ON, Canada
, - Inon Wiratsin
Faculty of Business and IT, Ontario Tech University, Oshawa, ON, Canada
AbstractThis study examines the ethical issues related to technological advancements in social robots. We argue that a relationship exists between the emergence of social robots and various ethical dilemmas that may affect humans. Prior research lacks an ...
- 0Citation
MetricsTotal Citations0
- Muhammad Umair Shah
- research-articlefreePublished By ACMPublished By ACM
Transfer Learning-based Forensic Analysis and Classification of E-Mail Content
- Farkhund Iqbal
College of Technological Innovation Zayed University, UAE
, - Abdul Rehman Javed
Department of Electrical and Computer Engineering Lebanese American University, Lebanon
, - Rutvij H. Jhaveri
Department of Computer Science and Engineering, School of Technology Pandit Deendayal Energy University, India
, - Ahmad Almadhor
Department of Computer Engineering and Networks, College of Computer and Information Sciences Jouf University, Saudi Arabia
, - Umar Farooq
Department of Computer Science National University of Computer and Emerging Sciences, Pakistan
ACM Transactions on Asian and Low-Resource Language Information Processing, Volume 0, Issue ja • https://doi.org/10.1145/3604592- 3Citation
- 915
- Downloads
MetricsTotal Citations3Total Downloads915Last 12 Months739Last 6 weeks71
- Farkhund Iqbal
- research-articlePublished By ACMPublished By ACM
Differentially Private Release of Heterogeneous Network for Managing Healthcare Data
- Rashid Hussain Khokhar
Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Quebec, Canada
, - Benjamin C. M. Fung
School of Information Studies, McGill University, Montreal, Quebec, Canada
, - Farkhund Iqbal
College of Technological Innovation, Zayed University, Abu Dhabi, United Arab Emirates
, - Khalil Al-Hussaeni
Rochester Institute of Technology, Dubai, United Arab Emirates
, - Mohammed Hussain
College of Technological Innovation, Zayed University, Dubai, United Arab Emirates
ACM Transactions on Knowledge Discovery from Data, Volume 17, Issue 6•July 2023, Article No.: 90, pp 1-30 • https://doi.org/10.1145/3580367With the increasing adoption of digital health platforms through mobile apps and online services, people have greater flexibility connecting with medical practitioners, pharmacists, and laboratories and accessing resources to manage their own health-...
- 2Citation
- 321
- Downloads
MetricsTotal Citations2Total Downloads321Last 12 Months133Last 6 weeks16
- Rashid Hussain Khokhar
- research-article
A GPU-based machine learning approach for detection of botnet attacks
- Michal Motylinski
School of Computer Science and Mathematics, Liverpool John Moores University, Liverpool, UK
, - Áine MacDermott
School of Computer Science and Mathematics, Liverpool John Moores University, Liverpool, UK
, - Farkhund Iqbal
College of Technological Innovation, Zayed University, United Arab Emirates
, - Babar Shah
College of Technological Innovation, Zayed University, United Arab Emirates
AbstractRapid development and adaptation of the Internet of Things (IoT) has created new problems for securing these interconnected devices and networks. There are hundreds of thousands of IoT devices with underlying security vulnerabilities, ...
- 1Citation
MetricsTotal Citations1
- Michal Motylinski
- research-article
Exploring the human factors in moral dilemmas of autonomous vehicles
- Muhammad Umair Shah
Department of Management Sciences, Faculty of Engineering, University of Waterloo, 200 University Avenue West, N2L 3G1, Waterloo, ON, Canada
, - Umair Rehman
Department of User Experience Design, Faculty of Liberal Arts, Wilfrid Laurier University, 73 George Street, N3T 2Y3, Brantford, ON, Canada
, - Farkhund Iqbal
College of Technological Innovation, Zayed University, P.O. Box 144534, Abu Dhabi Campus, United Arab Emirates
, - Hassan Ilahi
Department of Psychology, Faculty of Arts, University of Waterloo, 200 University Avenue West, N2L 3G1, Waterloo, ON, Canada
Personal and Ubiquitous Computing, Volume 26, Issue 5•Oct 2022, pp 1321-1331 • https://doi.org/10.1007/s00779-022-01685-xAbstractGiven the widespread popularity of autonomous vehicles (AVs), researchers have been exploring the ethical implications of AVs. Researchers believe that empirical experiments can provide insights into human characterization of ethically sound ...
- 1Citation
MetricsTotal Citations1
- Muhammad Umair Shah
- research-article
Recommendations for a smart toy parental control tool
- Otavio de Paula Albuquerque
School of Arts, Sciences and Humanities, University of São Paulo, 03828-000, São Paulo, São Paulo, Brazil
, - Marcelo Fantinato
School of Arts, Sciences and Humanities, University of São Paulo, 03828-000, São Paulo, São Paulo, Brazil
, - Patrick C. K. Hung
Faculty of Business and IT, Ontario Tech University, L1G 0C5, Oshawa, Ontario, Canada
, - Sarajane Marques Peres
School of Arts, Sciences and Humanities, University of São Paulo, 03828-000, São Paulo, São Paulo, Brazil
, - Farkhund Iqbal
College of Technological Innovation, Zayed University, Abu Dhabi, United Arab Emirates
, - Umair Rehman
User Experience Design, Wilfrid Laurier University, N2L 3C5, Waterloo, Ontario, Canada
, - Muhammad Umair Shah
Department of Management Sciences, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada
The Journal of Supercomputing, Volume 78, Issue 8•May 2022, pp 11156-11194 • https://doi.org/10.1007/s11227-022-04319-4AbstractCurrent smart toy parental control tools offered by toy companies do not adequately support parents in protecting their children. Moreover, there is no reference solution in the literature to be used by toymakers. Most studies are limited to ...
- 0Citation
MetricsTotal Citations0
- Otavio de Paula Albuquerque
- research-article
DeepClassRooms: a deep learning based digital twin framework for on-campus class rooms
- Saad Razzaq
Department of Computer Science & IT, University of Sargodha, Sargodha, Pakistan
, - Babar Shah
College of Technological Innovation, Zayed University, Abu Dhabi, United Arab Emirates
, - Farkhund Iqbal
College of Technological Innovation, Zayed University, Abu Dhabi, United Arab Emirates
, - Muhammad Ilyas
Department of Computer Science & IT, University of Sargodha, Sargodha, Pakistan
, - Fahad Maqbool
Department of Computer Science & IT, University of Sargodha, Sargodha, Pakistan
, - Alvaro Rocha
University of Lisbon, ISEG, Lisboa, Portugal
Neural Computing and Applications, Volume 35, Issue 11•Apr 2023, pp 8017-8026 • https://doi.org/10.1007/s00521-021-06754-5AbstractA lot of different methods are being opted for improving the educational standards through monitoring of the classrooms. The developed world uses Smart classrooms to enhance faculty efficiency based on accumulated learning outcomes and interests. ...
- 0Citation
MetricsTotal Citations0
- Saad Razzaq
- review-article
Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review
- Andrea Michienzi,
- Rahman Ali
QACCUniversity of PeshawarPeshawarPakistanuop.edu.pk
, - Asmat Ali
Department of Computer ScienceUniversity of PeshawarPeshawarPakistanuop.edu.pk
, - Farkhund Iqbal
College of Technological InnovationZayed UniversityDubaiUAEzu.ac.ae
, - Mohammed Hussain
College of Technological InnovationZayed UniversityDubaiUAEzu.ac.ae
, - Farhan Ullah
School of SoftwareNorthwestern Polytechnical University127 West Youyi RoadBeilin DistrictXi’an 710072Chinanwpu.edu.cn
Android and Windows are the predominant operating systems used in mobile environment and personal computers and it is expected that their use will rise during the next decade. Malware is one of the main threats faced by these platforms as well as Internet ...
- 0Citation
MetricsTotal Citations0
- research-article
Multicriteria Decision Making for Carbon Dioxide (CO2) Emission Reduction
- Debo Cheng,
- Rahman Ali
QACCUniversity of PeshawarPeshawarPakistanuop.edu.pk
, - Farkhund Iqbal
College of Technological InnovationZayed UniversityAbu Dhabi CampusUAEzu.ac.ae
, - Muhammad Sadiq Hassan Zada
University of DerbyKedleston RdDerbyUKderby.ac.uk
The fast industrial revolution all over the world has increased emission of carbon dioxide (CO2), which has badly affected the atmosphere. Main sources of CO2 emission include vehicles and factories, which use oil, gas, and coal. Similarly, due to the ...
- 0Citation
MetricsTotal Citations0
- Article
Snapshot of Research Issues in Service Robots
- Patrick C. K. Hung
Faculty of Business and IT, Ontario Tech University, Oshawa, ON, Canada
, - Farkhund Iqbal
College of Technological Innovation, Zayed University, Abu Dhabi, UAE
, - Saiqa Aleem
College of Technological Innovation, Zayed University, Abu Dhabi, UAE
, - Laura Rafferty
Faculty of Business and IT, Ontario Tech University, Oshawa, ON, Canada
Service-Oriented Computing – ICSOC 2021 Workshops•November 2021, pp 363-376• https://doi.org/10.1007/978-3-031-14135-5_32AbstractA service (social) robot is defined as the Internet of Things (IoT) consisting of a physical robot body that connects to one or more Cloud services to facilitate human-machine interaction activities to enhance the functionality of a traditional ...
- 0Citation
MetricsTotal Citations0
- Patrick C. K. Hung
- Article
Persuasive Technology in Games: A Brief Review and Reappraisal
- Umair Rehman
User Experience Design, Wilfrid Laurier University, Brantford, ON, Canada
, - Muhammad Umair Shah
Management Sciences, University of Waterloo, Waterloo, ON, Canada
, - Amir Zaib Abbasi
Faculty of Management Sciences, Shaheed Zulfiqar Ali Bhutto Institute of Science Technology (SZABIST), Islamabad, Pakistan
, - Farkhund Iqbal
College of Technological Innovation, Zayed University Dubai, Dubai, United Arab Emirates
, - Ali Arsalan
Amazon Alexa Engineering, Amazon Inc., Seattle, WA, USA
, - Muhammad Umair Javaid
Department of Management Sciences, Lahore Garrison University, Lahore, Pakistan
HCI in Games: Experience Design and Game Mechanics•July 2021, pp 99-109• https://doi.org/10.1007/978-3-030-77277-2_8AbstractPersuasive technology is a new field of research that has attracted considerable attention from game designers since there is a growing interest in games promoting positive behavioral changes. Persuasive games have been exploited to tremendous ...
- 0Citation
MetricsTotal Citations0
- Umair Rehman
- research-articlePublished By ACMPublished By ACM
4P based forensics investigation framework for smart connected toys
- Benjamin Yankson
University at Albany
, - Farkhund Iqbal
Zayed University, Abu Dhabi
, - Patrick C. K. Hung
OntarioTech University, Oshawa, Ontario
ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and Security•August 2020, Article No.: 44, pp 1-9• https://doi.org/10.1145/3407023.3409213Smart Connected Toys (SCTs) have the potential to collect terabytes of sensitive personal, contextual, and usage information which may be a subject of cybercrime or used as a conduit for cybercrime resulting in a digital forensic investigation which ...
- 6Citation
- 169
- Downloads
MetricsTotal Citations6Total Downloads169Last 12 Months34Last 6 weeks5
- Benjamin Yankson
- research-articlePublished By ACMPublished By ACM
Blockchain-based chain of custody: towards real-time tamper-proof evidence management
- Liza Ahmad
Zayed University, Abu Dhabi UAE
, - Salam Khanji
Zayed University, Abu Dhabi UAE
, - Farkhund Iqbal
Zayed University, Abu Dhabi UAE
, - Faouzi Kamoun
ESPRIT School of Engineering, Tunis Tunisia
ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and Security•August 2020, Article No.: 48, pp 1-8• https://doi.org/10.1145/3407023.3409199Evidence is a tangible demonstrative artifact that proves a fact and shapes the investigation of various misconduct cases involving for instance corruption, misbehavior, or violation. It is imperative to maintain proper evidence management to guarantee ...
- 20Citation
- 653
- Downloads
MetricsTotal Citations20Total Downloads653Last 12 Months150Last 6 weeks19
- Liza Ahmad
- research-article
Efficient scheduling of video camera sensor networks for IoT systems in smart cities
- Muhammad Naeem
Department of Electrical Engineering COMSATS University Islamabad, Wah Campus Wah Cantonment Pakistan
, - Waleed Ejaz
Department of Applied Science & Engineering Thompson Rivers University, Kamloops Kamloops British Columbia Canada
, - Muhammad Iqbal
Department of Electrical Engineering COMSATS University Islamabad, Wah Campus Wah Cantonment Pakistan
, - Farkhund Iqbal
College of Technological Innovation Zayed University Abu Dhabi UAE
, - Alagan Anpalagan
Department of Electrical and Computer Engineering Ryerson University Toronto Ontario Canada
, - Joel J. P. C. Rodrigues
Federal University of Piauí (UFPI) Teresina ‐ Pi Brazil
Instituto de Telecomunicacções Portugal
Transactions on Emerging Telecommunications Technologies, Volume 31, Issue 5•May 2020 • https://doi.org/10.1002/ett.3798AbstractVideo camera sensor networks (VCSN) has numerous applications in smart cities, including vehicular networks, environmental monitoring, and smart houses. Scheduling of video camera sensor networks (VCSN) can reduce the computational complexity, ...
image image
- ‐We mathematically model scheduling of VCSNs for IoT systems.
- ‐We have used a probabilistic learning method by minimizing the Kullback Leibler (KL) distance/divergence.
- ‐We evaluated the performance of the CEO for scheduling of VCSNs in terms ...
- 1Citation
MetricsTotal Citations1
- Muhammad Naeem
- research-article
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild
- Morteza Safaei Pour
The Cyber Center for Security and Analytics, University of Texas at San Antonio, Texas, USA
, - Antonio Mangino
The Cyber Center for Security and Analytics, University of Texas at San Antonio, Texas, USA
, - Kurt Friday
The Cyber Center for Security and Analytics, University of Texas at San Antonio, Texas, USA
, - Matthias Rathbun
Florida Atlantic University, Florida, USA
, - Elias Bou-Harb
The Cyber Center for Security and Analytics, University of Texas at San Antonio, Texas, USA
, - Farkhund Iqbal
College of Technological Innovation, Zayed University, Abu Dhabi, UAE
, - Sagar Samtani
Department of Information Systems and Decision Sciences, University of South Florida, Florida, USA
, - Jorge Crichigno
Integrated Information Technology, University of South Carolina, Columbia, USA
, - Nasir Ghani
Department of Electrical Engineering and Cyber Florida, University of South Florida, Florida, USA
AbstractThe insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in consumer and critical infrastructures. The highly heterogeneous nature of IoT devices and their widespread deployments has led to the rise of several ...
- 6Citation
MetricsTotal Citations6
- Morteza Safaei Pour
- article
A Deep Learning Framework for Malware Classification
- Farkhund Iqbal
Zayed University, Abu Dhabi, UAE
, - Mahmoud Kalash
University of Manitoba, Winnipeg, Canada
, - Mrigank Rochan
University of Manitoba, Winnipeg, Canada
, - Noman Mohammed
University of Manitoba, Winnipeg, Canada
, - Neil Bruce
Ryerson University, Toronto, Canada
, - Yang Wang
University of Manitoba, Winnipeg, Canada
International Journal of Digital Crime and Forensics, Volume 12, Issue 1•Jan 2020, pp 90-108 • https://doi.org/10.4018/IJDCF.2020010105In this article, the authors propose a deep learning framework for malware classification. There has been a huge increase in the volume of malware in recent years which poses serious security threats to financial institutions, businesses, and ...
- 2Citation
MetricsTotal Citations2
- Farkhund Iqbal
- article
Towards a Better Understanding of Drone Forensics: A Case Study of Parrot AR Drone 2.0
- Hana Bouafif
ESPRIT School of Engineering, Tunis, Tunisia
, - Faouzi Kamoun
ESPRIT School of Engineering, Tunis, Tunisia
, - Farkhund Iqbal
College of Technical Innovation, Zayed University, Abu Dhabi, UAE
International Journal of Digital Crime and Forensics, Volume 12, Issue 1•Jan 2020, pp 35-57 • https://doi.org/10.4018/IJDCF.2020010103Unmanned aerial vehicles (drones) have gained increased popularity as their innovative uses continue to expand across various fields. Despite their numerous beneficial uses, drones have unfortunately been misused, through many reported cases, to ...
- 1Citation
MetricsTotal Citations1
- Hana Bouafif
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner