Skip to main content

Research Repository

Advanced Search

Outputs (147)

Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model (2022)
Journal Article
Rehman, M. U., Shafique, A., Khan, K. H., Khalid, S., Alotaibi, A. A., Althobaiti, T., …Abbasi, Q. H. (2022). Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model. Sensors, 22(2), Article 461.

This article presents non-invasive sensing-based diagnoses of pneumonia disease, exploiting a deep learning model to make the technique non-invasive coupled with security preservation. Sensing and securing healthcare and medical images such as X-rays... Read More about Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model.

Machine learning empowered COVID-19 patient monitoring using non-contact sensing: An extensive review (2022)
Journal Article
Saeed, U., Shah, S. Y., Ahmad, J., Imran, M. A., Abbasi, Q. H., & Shah, S. A. (2022). Machine learning empowered COVID-19 patient monitoring using non-contact sensing: An extensive review. Journal of Pharmaceutical Analysis, 12(2), 193-204. https://doi.or

The severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), which caused the coronavirus disease 2019 (COVID-19) pandemic, has affected more than 400 million people worldwide. With the recent rise of new Delta and Omicron variants, the efficacy... Read More about Machine learning empowered COVID-19 patient monitoring using non-contact sensing: An extensive review.

Browsers’ Private Mode: Is It What We Were Promised? (2021)
Journal Article
Hughes, K., Papadopoulos, P., Pitropakis, N., Smales, A., Ahmad, J., & Buchanan, W. J. (2021). Browsers’ Private Mode: Is It What We Were Promised?. Computers, 10(12), Article 165. https://doi.org/10.3390/computers10120165

Web browsers are one of the most used applications on every computational device in our days. Hence, they play a pivotal role in any forensic investigation and help determine if nefarious or suspicious activity has occurred on that device. Our study... Read More about Browsers’ Private Mode: Is It What We Were Promised?.

A new color image encryption technique using DNA computing and Chaos-based substitution box (2021)
Journal Article
Ahmad, J., Masood, F., Masood, J., Zhang, L., Shaukat Jamal, S., Boulila, W., …Khan, F. A. (2022). A new color image encryption technique using DNA computing and Chaos-based substitution box. Soft Computing, 26(16), 7461-7477. https://doi.org/10.1007/s0

In many cases, images contain sensitive information and patterns that require secure processing to avoid risk. It can be accessed by unauthorized users who can illegally exploit them to threaten the safety of people’s life and property. Protecting th... Read More about A new color image encryption technique using DNA computing and Chaos-based substitution box.

Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network (2021)
Journal Article
Latif, S., Huma, Z. E., Jamal, S. S., Ahmed, F., Ahmad, J., Zahid, A., …Abbasi, Q. H. (2022). Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network. IEEE Transactions on Industrial Informatics, 18(9), 6435-6444. ht

The Internet of Things (IoT) devices, networks, and applications have become an integral part of modern societies. Despite their social, economic, and industrial benefits, these devices and networks are frequently targeted by cybercriminals. Hence, I... Read More about Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network.

Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions (2021)
Journal Article
Latif, S., Driss, M., Boulila, W., Huma, Z. E., Jamal, S. S., Idrees, Z., & Ahmad, J. (2021). Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future D

The Industrial Internet of Things (IIoT) refers to the use of smart sensors, actuators, fast communication protocols, and efficient cybersecurity mechanisms to improve industrial processes and applications. In large industrial networks, smart devices... Read More about Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions.

Noninvasive Detection of Respiratory Disorder Due to COVID-19 at the Early Stages in Saudi Arabia (2021)
Journal Article
Boulila, W., Shah, S. A., Ahmad, J., Driss, M., Ghandorh, H., Alsaeedi, A., …Saeed, F. (2021). Noninvasive Detection of Respiratory Disorder Due to COVID-19 at the Early Stages in Saudi Arabia. Electronics, 10(21), Article 2701. https://doi.org/10.3390/

The Kingdom of Saudi Arabia has suffered from COVID-19 disease as part of the global pandemic due to severe acute respiratory syndrome coronavirus 2. The economy of Saudi Arabia also suffered a heavy impact. Several measures were taken to help mitiga... Read More about Noninvasive Detection of Respiratory Disorder Due to COVID-19 at the Early Stages in Saudi Arabia.

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT (2021)
Journal Article
Almas Khan, M., Khan, M. A., Ullah Jan, S., Ahmad, J., Jamal, S. S., Shah, A. A., Pitropakis, N., Buchanan, W. J., Alonistioti, N., Panagiotakis, S., & Markakis, E. K. (2021). A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors,

A large number of smart devices in Internet of Things (IoT) environments communicate via different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely used publish–subscribe-based protocol for the communication of sensor or ev... Read More about A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT.

Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks (2021)
Journal Article
Ur Rehman, M., Ahmed, F., Attique Khan, M., Tariq, U., Abdulaziz Alfouzan, F., M. Alzahrani, N., & Ahmad, J. (2021). Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks. Computers, Materials & Continua, 70(3), 4675-4690. https://doi.org/10.326

Recognition of dynamic hand gestures in real-time is a difficult task because the system can never know when or from where the gesture starts and ends in a video stream. Many researchers have been working on vision-based gesture recognition due to it... Read More about Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks.

Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions (2021)
Presentation / Conference Contribution
Driss, M., Hasan, D., Boulila, W., & Ahmad, J. (2021). Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions. Procedia Computer Science, 192, 2385-2395. https://doi.org/10.1016/j.procs.2021.09.007

In recent years, the Internet of Things (IoT) technology has led to the emergence of multiple smart applications in different vital sectors including healthcare, education, agriculture, energy management, etc. IoT aims to interconnect several intelli... Read More about Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions.