Skip to main content

Research Repository

Advanced Search

All Outputs (147)

Detecting Alzheimer’s Disease Using Machine Learning Methods (2022)
Presentation / Conference Contribution
Dashtipour, K., Taylor, W., Ansari, S., Zahid, A., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., Ali Imran, M., & Abbasi, Q. (2021, October). Detecting Alzheimer’s Disease Using Machine Learning Methods. Presented at 16th EAI International Conference,

As the world is experiencing population growth, the portion of the older people, aged 65 and above, is also growing at a faster rate. As a result, the dementia with Alzheimer’s disease is expected to increase rapidly in the next few years. Currently,... Read More about Detecting Alzheimer’s Disease Using Machine Learning Methods.

Comparing the Performance of Different Classifiers for Posture Detection (2022)
Presentation / Conference Contribution
Suresh Kumar, S., Dashtipour, K., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., Imran, M. A., Abbasi, Q., & Ahmad, W. (2021, October). Comparing the Performance of Different Classifiers for Posture Detection. Presented at 16th EAI International Conferen

Human Posture Classification (HPC) is used in many fields such as human computer interfacing, security surveillance, rehabilitation, remote monitoring, and so on. This paper compares the performance of different classifiers in the detection of 3 post... Read More about Comparing the Performance of Different Classifiers for Posture Detection.

HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles (2022)
Journal Article
Ullah, S., Khan, M. A., Ahmad, J., Jamal, S. S., e Huma, Z., Hassan, M. T., …Buchanan, W. J. (2022). HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles. Sensors, 22(4), Article 1340. https://doi.org/10.3390/

Internet of Vehicles (IoV) is an application of the Internet of Things (IoT) network that connects smart vehicles to the internet, and vehicles with each other. With the emergence of IoV technology, customers have placed great attention on smart vehi... Read More about HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers (2022)
Presentation / Conference Contribution
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2021, December). Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. Presented at IEEE SINCONF: 14th International Conference on Security of

Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the... Read More about Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.

Chest X-ray Classification for the Detection of COVID-19 Using Deep Learning Techniques (2022)
Journal Article
Khan, E., Rehman, M. Z. U., Ahmed, F., Alfouzan, F. A., Alzahrani, N. M., & Ahmad, J. (2022). Chest X-ray Classification for the Detection of COVID-19 Using Deep Learning Techniques. Sensors, 22(3), Article 1211. https://doi.org/10.3390/s22031211

Recent technological developments pave the path for deep learning-based techniques to be used in almost every domain of life. The precision of deep learning techniques make it possible for these to be used in the medical field for the classification... Read More about Chest X-ray Classification for the Detection of COVID-19 Using Deep Learning Techniques.

Semantic Segmentation and Edge Detection—Approach to Road Detection in Very High Resolution Satellite Images (2022)
Journal Article
Ghandorh, H., Boulila, W., Masood, S., Koubaa, A., Ahmed, F., & Ahmad, J. (2022). Semantic Segmentation and Edge Detection—Approach to Road Detection in Very High Resolution Satellite Images. Remote Sensing, 14(3), Article 613. https://doi.org/10.3390/r

Road detection technology plays an essential role in a variety of applications, such as urban planning, map updating, traffic monitoring and automatic vehicle navigation. Recently, there has been much development in detecting roads in high-resolution... Read More about Semantic Segmentation and Edge Detection—Approach to Road Detection in Very High Resolution Satellite Images.

Ransomware: Analysing the Impact on Windows Active Directory Domain Services (2022)
Journal Article
McDonald, G., Papadopoulos, P., Pitropakis, N., Ahmad, J., & Buchanan, W. J. (2022). Ransomware: Analysing the Impact on Windows Active Directory Domain Services. Sensors, 22(3), Article 953. https://doi.org/10.3390/s22030953

Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to... Read More about Ransomware: Analysing the Impact on Windows Active Directory Domain Services.

A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution (2022)
Journal Article
Arif, J., Khan, M. A., Ghaleb, B., Ahmad, J., Munir, A., Rashid, U., & Al-Dubai, A. Y. (2022). A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access, 10, 12966-12982. https://doi.org/10

Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement. However, these algor... Read More about A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution.

Multiple Participants’ Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing (2022)
Journal Article
Saeed, U., Yaseen Shah, S., Aziz Shah, S., Liu, H., Alhumaidi Alotaibi, A., Althobaiti, T., …H. Abbasi, Q. (2022). Multiple Participants’ Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless

Wireless sensing is the utmost cutting-edge way of monitoring different health-related activities and, concurrently, preserving most of the privacy of individuals. To meet future needs, multi-subject activity monitoring is in demand, whether it is fo... Read More about Multiple Participants’ Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing.

Multiple Participants’ Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing (2022)
Journal Article
Saeed, U., Yaseen Shah, S., Aziz Shah, S., Liu, H., Alhumaidi Alotaibi, A., Althobaiti, T., …Abbasi, Q. H. (2022). Multiple Participants’ Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless

Wireless sensing is the utmost cutting-edge way of monitoring different health-related activities and, concurrently, preserving most of the privacy of individuals. To meet future needs, multi-subject activity monitoring is in demand, whether it is fo... Read More about Multiple Participants’ Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing.

Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model (2022)
Journal Article
Rehman, M. U., Shafique, A., Khan, K. H., Khalid, S., Alotaibi, A. A., Althobaiti, T., …Abbasi, Q. H. (2022). Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model. Sensors, 22(2), Article 461.

This article presents non-invasive sensing-based diagnoses of pneumonia disease, exploiting a deep learning model to make the technique non-invasive coupled with security preservation. Sensing and securing healthcare and medical images such as X-rays... Read More about Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model.

Machine learning empowered COVID-19 patient monitoring using non-contact sensing: An extensive review (2022)
Journal Article
Saeed, U., Shah, S. Y., Ahmad, J., Imran, M. A., Abbasi, Q. H., & Shah, S. A. (2022). Machine learning empowered COVID-19 patient monitoring using non-contact sensing: An extensive review. Journal of Pharmaceutical Analysis, 12(2), 193-204. https://doi.or

The severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), which caused the coronavirus disease 2019 (COVID-19) pandemic, has affected more than 400 million people worldwide. With the recent rise of new Delta and Omicron variants, the efficacy... Read More about Machine learning empowered COVID-19 patient monitoring using non-contact sensing: An extensive review.

Browsers’ Private Mode: Is It What We Were Promised? (2021)
Journal Article
Hughes, K., Papadopoulos, P., Pitropakis, N., Smales, A., Ahmad, J., & Buchanan, W. J. (2021). Browsers’ Private Mode: Is It What We Were Promised?. Computers, 10(12), Article 165. https://doi.org/10.3390/computers10120165

Web browsers are one of the most used applications on every computational device in our days. Hence, they play a pivotal role in any forensic investigation and help determine if nefarious or suspicious activity has occurred on that device. Our study... Read More about Browsers’ Private Mode: Is It What We Were Promised?.

A new color image encryption technique using DNA computing and Chaos-based substitution box (2021)
Journal Article
Ahmad, J., Masood, F., Masood, J., Zhang, L., Shaukat Jamal, S., Boulila, W., …Khan, F. A. (2022). A new color image encryption technique using DNA computing and Chaos-based substitution box. Soft Computing, 26(16), 7461-7477. https://doi.org/10.1007/s0

In many cases, images contain sensitive information and patterns that require secure processing to avoid risk. It can be accessed by unauthorized users who can illegally exploit them to threaten the safety of people’s life and property. Protecting th... Read More about A new color image encryption technique using DNA computing and Chaos-based substitution box.

Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network (2021)
Journal Article
Latif, S., Huma, Z. E., Jamal, S. S., Ahmed, F., Ahmad, J., Zahid, A., …Abbasi, Q. H. (2022). Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network. IEEE Transactions on Industrial Informatics, 18(9), 6435-6444. ht

The Internet of Things (IoT) devices, networks, and applications have become an integral part of modern societies. Despite their social, economic, and industrial benefits, these devices and networks are frequently targeted by cybercriminals. Hence, I... Read More about Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network.

Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions (2021)
Journal Article
Latif, S., Driss, M., Boulila, W., Huma, Z. E., Jamal, S. S., Idrees, Z., & Ahmad, J. (2021). Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future D

The Industrial Internet of Things (IIoT) refers to the use of smart sensors, actuators, fast communication protocols, and efficient cybersecurity mechanisms to improve industrial processes and applications. In large industrial networks, smart devices... Read More about Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions.

Noninvasive Detection of Respiratory Disorder Due to COVID-19 at the Early Stages in Saudi Arabia (2021)
Journal Article
Boulila, W., Shah, S. A., Ahmad, J., Driss, M., Ghandorh, H., Alsaeedi, A., …Saeed, F. (2021). Noninvasive Detection of Respiratory Disorder Due to COVID-19 at the Early Stages in Saudi Arabia. Electronics, 10(21), Article 2701. https://doi.org/10.3390/

The Kingdom of Saudi Arabia has suffered from COVID-19 disease as part of the global pandemic due to severe acute respiratory syndrome coronavirus 2. The economy of Saudi Arabia also suffered a heavy impact. Several measures were taken to help mitiga... Read More about Noninvasive Detection of Respiratory Disorder Due to COVID-19 at the Early Stages in Saudi Arabia.

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT (2021)
Journal Article
Almas Khan, M., Khan, M. A., Ullah Jan, S., Ahmad, J., Jamal, S. S., Shah, A. A., Pitropakis, N., Buchanan, W. J., Alonistioti, N., Panagiotakis, S., & Markakis, E. K. (2021). A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors,

A large number of smart devices in Internet of Things (IoT) environments communicate via different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely used publish–subscribe-based protocol for the communication of sensor or ev... Read More about A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT.

Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks (2021)
Journal Article
Ur Rehman, M., Ahmed, F., Attique Khan, M., Tariq, U., Abdulaziz Alfouzan, F., M. Alzahrani, N., & Ahmad, J. (2021). Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks. Computers, Materials & Continua, 70(3), 4675-4690. https://doi.org/10.326

Recognition of dynamic hand gestures in real-time is a difficult task because the system can never know when or from where the gesture starts and ends in a video stream. Many researchers have been working on vision-based gesture recognition due to it... Read More about Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks.

Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions (2021)
Presentation / Conference Contribution
Driss, M., Hasan, D., Boulila, W., & Ahmad, J. (2021). Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions. Procedia Computer Science, 192, 2385-2395. https://doi.org/10.1016/j.procs.2021.09.007

In recent years, the Internet of Things (IoT) technology has led to the emergence of multiple smart applications in different vital sectors including healthcare, education, agriculture, energy management, etc. IoT aims to interconnect several intelli... Read More about Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions.