| The rise of “blockchain”: bibliometric analysis of blockchain study A Firdaus, MFA Razak, A Feizollah, IAT Hashem, M Hazim, NB Anuar Scientometrics 120 (3), 1289-1331, 2019 | 290 | 2019 |
| VulBERTa: Simplified Source Code Pre-Training for Vulnerability Detection H Hanif, S Maffeis 2022 International Joint Conference on Neural Networks (IJCNN), 2022 | 260 | 2022 |
| The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches H Hanif, MHNM Nasir, MF Ab Razak, A Firdaus, NB Anuar Journal of Network and Computer Applications 179, 103009, 2021 | 220 | 2021 |
| Halal products on Twitter: Data extraction and sentiment analysis using stack of deep learning algorithms A Feizollah, S Ainin, NB Anuar, NAB Abdullah, M Hazim Ieee Access 7, 83354-83362, 2019 | 119 | 2019 |
| Detecting opinion spams through supervised boosting approach M Hazim, NB Anuar, MF Ab Razak, NA Abdullah PloS one 13 (6), e0198884, 2018 | 52 | 2018 |
| A hybrid graph neural network approach for detecting PHP vulnerabilities R Rabheru, H Hanif, S Maffeis 2022 IEEE Conference on Dependable and Secure Computing (DSC), 1-9, 2022 | 51* | 2022 |
| Performance evaluation of machine learning algorithms for spam profile detection on Twitter using WEKA and RapidMiner MHM Hanif, KS Adewole, NB Anuar, A Kamsin Advanced Science Letters 24 (2), 1043-1046, 2018 | 18 | 2018 |
| Improved temporal IoT device identification using robust statistical features N Aqil, F Zaki, F Afifi, H Hanif, MLM Kiah, NB Anuar PeerJ Computer Science 10, e2145, 2024 | 3 | 2024 |
| Federated learning in network traffic classification: Taxonomy of implementation, application, and impact on sixth-generation wireless networks A Ariffin, F Afifi, F Zaki, H Hanif, NB Anuar Engineering Applications of Artificial Intelligence 158, 111471, 2025 | 2 | 2025 |
| Transformer-based tokenization for IoT traffic classification across diverse network environments F Afifi, F Zaki, H Hanif, N Aqil, NB Anuar PeerJ Computer Science 11, e3126, 2025 | 2 | 2025 |
| The Richer Representation Fallacy: Are We Just Adding Noise to LLM-based Software Vulnerability Detectors? H Hanif, S Maffeis, NB Anuar 2025 IEEE International Conference on Computing (ICOCO), 465-470, 2025 | | 2025 |
| Mitigating adversarial attacks in federated learning based network traffic classification applications using secure hierarchical remote attestation and adaptive aggregation … A Ariffin, F Zaki, H Hanif, NB Anuar PeerJ Computer Science 11, e3215, 2025 | | 2025 |
| Adversarial Attack and Defence of Federated Learning-Based Network Traffic Classification in Edge Computing Environment A Ariffin, F Zaki, H Hanif, NB Anuar Computer Networks, 111739, 2025 | | 2025 |
| MOTEC: The Malay Offensive Text Classification using Extra Tree and Dialectal Standardization FA Narudin, F Zaki, HHM Altarturi, H Hanif, NB Anuar Malaysian Journal of Computer Science 38 (1), 81-98, 2025 | | 2025 |
| Deep Representation Learning for Software Vulnerability Detection H Hanif Imperial College London, 2023 | | 2023 |
| Opinion Spam Detection Using Supervised Boosting Models H Hanif | | 2018 |