Skip to main content

Research Repository

Advanced Search

Outputs (19)

Transparent RFID tag wall enabled by artificial intelligence for assisted living (2024)
Journal Article
Khan, M. Z., Usman, M., Tahir, A., Farooq, M., Qayyum, A., Ahmad, J., Abbas, H., Imran, M., & Abbasi, Q. H. (2024). Transparent RFID tag wall enabled by artificial intelligence for assisted living. Scientific Reports, 14(1), 18896. https://doi.org/10.1038/s41598-024-64411-y

Current approaches to activity-assisted living (AAL) are complex, expensive, and intrusive, which reduces their practicality and end user acceptance. However, emerging technologies such as artificial intelligence and wireless communications offer new... Read More about Transparent RFID tag wall enabled by artificial intelligence for assisted living.

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Ali, M., Dubai, A. A., Pitropakis, N., & Buchanan, W. J. (2024, July). VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. Presented at 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP), Sousse, Tunisia

In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. In this regards, this paper presents a robust image encryption scheme named... Read More about VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography.

Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records (2024)
Presentation / Conference Contribution
Noyon, M. S. I., Moradpoor, N., Maglaras, L., & Ahmad, J. (2024, April). Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records. Presented at DCOSS-IoT 2024, Abu Dhabi, United Arab Emirates

The health sector stands as one of the most crucial and vulnerable domains, harbouring extensive personal data. Particularly, Electronic Health Records store information in electronic media where users lack control over their data. Unauthorized acces... Read More about Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records.

UAVs and Blockchain Synergy: Enabling Secure Reputation-based Federated Learning in Smart Cities (2024)
Journal Article
Aqleem Abbas, S. M., Khan, M. A., Boulila, W., Kouba, A., Shahbaz Khan, M., & Ahmad, J. (online). UAVs and Blockchain Synergy: Enabling Secure Reputation-based Federated Learning in Smart Cities. IEEE Access, https://doi.org/10.1109/access.2024.3432610

Unmanned aerial vehicles (UAVs) can be used as drones’ edge Intelligence to assist with data collection, training models, and communication over wireless networks. UAV use for smart cities is rapidly growing in various industries, including tracking... Read More about UAVs and Blockchain Synergy: Enabling Secure Reputation-based Federated Learning in Smart Cities.

ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance (2024)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Romdhani, I., Ahmad, J., Aldhaheri, T., & Kulkarni, S. (2024, January). ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance. Presented at 2024 International Conference on Information Networking (ICOIN), Ho Chi Minh City, Vietnam

The Routing Protocol for Low Power and Lossy Networks (RPL) plays a pivotal role in IoT communication, employing a rank-based topology to guide routing decisions. However, RPL is vulnerable to Decreased Rank Attacks, where malicious nodes illegitimat... Read More about ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance.

Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology (2024)
Journal Article
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Ghaleb, B., Ullah, A., Khan, M. A., & Buchanan, W. J. (online). Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology. IEEE Transactions on Consumer Electronics, https://doi.org/10.1109/tce.2024.3415411

The rapid advancement in consumer technology has led to an exponential increase in the connected devices, resulting in an enormous and continuous flow of data, particularly the image data. This data needs to be processed, managed, and secured efficie... Read More about Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology.

Clustering-Based Resource Management for Consumer Cost Optimization in IoT Edge Computing Environments (2024)
Journal Article
Denden, M., Jemmali, M., Boulila, W., Soni, M., Khan, F., & Ahmad, J. (online). Clustering-Based Resource Management for Consumer Cost Optimization in IoT Edge Computing Environments. IEEE Transactions on Consumer Electronics, https://doi.org/10.1109/tce.2024.3414929

Edge computing emerges as a pivotal model in the era of next-generation consumer electronics and the emerging challenges of multimodal data-driven decision-making. Specifically, edge computing offers an open computing architecture for the vast and di... Read More about Clustering-Based Resource Management for Consumer Cost Optimization in IoT Edge Computing Environments.

SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things (2024)
Journal Article
Qathrady, M. A., Ullah, S., Alshehri, M. S., Ahmad, J., Almakdi, S., Alqhtani, S. M., Khan, M. A., & Ghaleb, B. (online). SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things. CAAI Transactions on Intelligence Technology, https://doi.org/10.1049/cit2.12352

Industrial Internet of Things (IIoT) is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial environments. Several IIoT nodes operate confidential data (such as medical, transportatio... Read More about SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things.

ML-FAS: Multi-Level Face Anonymization Scheme and Its Application to E-Commerce Systems (2024)
Journal Article
Jiang, D., Ahmad, J., Suo, Z., Alsulami, M. M., Ghadi, Y. Y., & Boulila, W. (online). ML-FAS: Multi-Level Face Anonymization Scheme and Its Application to E-Commerce Systems. IEEE Transactions on Consumer Electronics, https://doi.org/10.1109/tce.2024.3411102

With the proliferation of electronic commerce, the facial data used for identity authentication and mobile payment are potentially subject to data analytics and mining attacks by third-party platforms, which has raised public privacy concerns. To tac... Read More about ML-FAS: Multi-Level Face Anonymization Scheme and Its Application to E-Commerce Systems.

A Two-branch Edge Guided Lightweight Network for infrared image saliency detection (2024)
Journal Article
Liu, Z., Li, X., Zhang, T., Zhang, X., Sun, C., Rehman, S. U., & Ahmad, J. (2024). A Two-branch Edge Guided Lightweight Network for infrared image saliency detection. Computers and Electrical Engineering, 118(Part A), Article 109296. https://doi.org/10.1016/j.compeleceng.2024.109296

In the dynamic landscape of saliency detection, convolutional neural networks have emerged as catalysts for innovation, but remain largely tailored for RGB imagery, falling short in the context of infrared images, particularly in memory-restricted en... Read More about A Two-branch Edge Guided Lightweight Network for infrared image saliency detection.