Skip to main content

Research Repository

Advanced Search

All Outputs (27)

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data (2023)
Presentation / Conference Contribution
Shahbaz Khan, M., Ahmad, J., Ali, H., Pitropakis, N., Al-Dubai, A., Ghaleb, B., & Buchanan, W. J. (2023, October). SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data. Presented at 9th International Conference on Engineering and Emerging Technologies (IEEE ICEET 2023), Istanbul, Turkey

With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlate... Read More about SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption (2023)
Presentation / Conference Contribution
Ali, H., Khan, M. S., Driss, M., Ahmad, J., Buchanan, W. J., & Pitropakis, N. (2023, October). CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption. Presented at 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), Hong Kong, Hong Kong

In the era of Industrial IoT (IIoT) and Industry 4.0, ensuring secure data transmission has become a critical concern. Among other data types, images are widely transmitted and utilized across various IIoT applications, ranging from sensor-generated... Read More about CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption.

A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data (2023)
Presentation / Conference Contribution
Naz, N., Khan, M. A., Khan, M. A., Khan, M. A., Jan, S. U., Shah, S. A., Arshad, Abbasi, Q. H., & Ahmad, J. (2022, October). A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data. Presented at 3rd International Conference of Advanced Computing and Informatics, Casablanca, Morocco

The Internet of Things (IoT) is a grid of interconnected pre-programmed electronic devices to provide intelligent services for daily life tasks. However, the security of such networks is a considerable obstacle to successful implementation. Therefore... Read More about A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data.

The Mobile Attacks Under Internet of Things Networks (2023)
Presentation / Conference Contribution
Kean, C., Ghaleb, B., Mcclelland, B., Ahmad, J., Wadhaj, I., & Thomson, C. (2022, September). The Mobile Attacks Under Internet of Things Networks. Presented at International Conference on Emerging Technologies and Intelligent Systems, Online

Since the introduction of the Routing Protocol for Low Power and Lossy Networks (RPL), its security aspects have been the focus of the scientific community who reported several security flaws that left the protocol vulnerable for several attacks. In... Read More about The Mobile Attacks Under Internet of Things Networks.

Automated Grading of Diabetic Macular Edema Using Color Retinal Photographs (2022)
Presentation / Conference Contribution
Zubair, M., Ahmad, J., Alqahtani, F., Khan, F., Shah, S. A., Abbasi, Q. H., & Jan, S. U. (2022, May). Automated Grading of Diabetic Macular Edema Using Color Retinal Photographs. Presented at 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia

Diabetic Macular Edema (DME) is an advanced indication of diabetic retinopathy (DR). It starts with blurring in vision and can lead to partial or even complete irreversible visual compromise. The only cure is timely diagnosis, prevention and treatmen... Read More about Automated Grading of Diabetic Macular Edema Using Color Retinal Photographs.

Comparing the Performance of Different Classifiers for Posture Detection (2022)
Presentation / Conference Contribution
Suresh Kumar, S., Dashtipour, K., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., Imran, M. A., Abbasi, Q., & Ahmad, W. (2021, October). Comparing the Performance of Different Classifiers for Posture Detection. Presented at 16th EAI International Conference, BODYNETS 2021, Online

Human Posture Classification (HPC) is used in many fields such as human computer interfacing, security surveillance, rehabilitation, remote monitoring, and so on. This paper compares the performance of different classifiers in the detection of 3 post... Read More about Comparing the Performance of Different Classifiers for Posture Detection.

Detecting Alzheimer’s Disease Using Machine Learning Methods (2022)
Presentation / Conference Contribution
Dashtipour, K., Taylor, W., Ansari, S., Zahid, A., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., Ali Imran, M., & Abbasi, Q. (2021, October). Detecting Alzheimer’s Disease Using Machine Learning Methods. Presented at 16th EAI International Conference, BODYNETS 2021, Online

As the world is experiencing population growth, the portion of the older people, aged 65 and above, is also growing at a faster rate. As a result, the dementia with Alzheimer’s disease is expected to increase rapidly in the next few years. Currently,... Read More about Detecting Alzheimer’s Disease Using Machine Learning Methods.

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers (2022)
Presentation / Conference Contribution
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2021, December). Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. Presented at IEEE SINCONF: 14th International Conference on Security of Information and Networks, Edinburgh

Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the... Read More about Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.

Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions (2021)
Presentation / Conference Contribution
Driss, M., Hasan, D., Boulila, W., & Ahmad, J. (2021, September). Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions. Presented at 25th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, Szczecin, Poland

In recent years, the Internet of Things (IoT) technology has led to the emergence of multiple smart applications in different vital sectors including healthcare, education, agriculture, energy management, etc. IoT aims to interconnect several intelli... Read More about Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions.

Application of Artificial Neural Network in Predicting Flashover Behaviour of Outdoor Insulators under Polluted Conditions (2021)
Presentation / Conference Contribution
Sajjad, U., Arshad, Ahmad, J., & Shoaib, S. (2021, January). Application of Artificial Neural Network in Predicting Flashover Behaviour of Outdoor Insulators under Polluted Conditions. Presented at 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), St. Petersburg, Moscow, Russia

Safe and reliable delivery of power through transmission lines mainly depends on the quality condition of the high voltage insulators. In the last few decades, demand in polymeric insulator has been dramatically increased due to their advanced perfor... Read More about Application of Artificial Neural Network in Predicting Flashover Behaviour of Outdoor Insulators under Polluted Conditions.

5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum (2020)
Presentation / Conference Contribution
Khan, J. S., Tahir, A., Ahmad, J., Shah, S. A., Abbasi, Q. H., Russell, G., & Buchanan, W. (2020, July). 5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum. Presented at 2020 Computing Conference, London

Freezing of gait (FOG) is one of the most incapacitating and disconcerting symptom in Parkinson's disease (PD). FOG is the result of neural control disorder and motor impairments, which severely impedes forward locomotion. This paper presents the exp... Read More about 5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum.

Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning (2020)
Presentation / Conference Contribution
Ilyas, M., Ahmad, J., Lawson, A., Khan, J. S., Tahir, A., Adeel, A., Larijani, H., Kerrouche, A., Shaikh, M. G., Buchanan, W., & Hussain, A. (2019, July). Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning. Presented at 10th International Conference, BICS 2019, Guangzhou, China

Prospective studies using longitudinal patient data can be used to help to predict responsiveness to Growth Hormone (GH) therapy and assess any suspected risks. In this paper, a novel Clinical Decision Support System (CDSS) is developed to predict gr... Read More about Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning.

A Heuristic Intrusion Detection System for Internet-of-Things (IoT) (2019)
Presentation / Conference Contribution
Qureshi, A., Larijani, H., Ahmad, J., & Mtetwa, N. (2019, July). A Heuristic Intrusion Detection System for Internet-of-Things (IoT). Presented at 2019 Computing Conference, London, UK

Today, digitally connected devices are involved in every aspect of life due to the advancements in Internet-of-Things (IoT) paradigm. Recently, it has been a driving force for a major technological revolution towards the development of advanced moder... Read More about A Heuristic Intrusion Detection System for Internet-of-Things (IoT).

An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera (2018)
Presentation / Conference Contribution
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., & Javed, A. (2018, September). An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera. Presented at SAI Intelligent Systems Conference, London

Real-time occupancy monitoring information is an important component in building energy management and security. Advances in technology enables us to develop vision-based systems. These systems have gained popularity among different scientific resear... Read More about An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera.

Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map (2018)
Presentation / Conference Contribution
Abbasi, S. F., Ahmad, J., Khan, J. S., Khan, M. A., & Sheikh, S. A. (2019). Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map. . https://doi.org/10.1007/978-3-030-01177-2_56

Transmission of images over the Internet is exponentially increased in the last decade. However, Internet is considered as an insecure channel and hence may cause serious privacy issues. To overcome such privacy concerns, researchers are trying to se... Read More about Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map.

DNA Sequence Based Medical Image Encryption Scheme (2018)
Presentation / Conference Contribution
Khan, J. S., Ahmad, J., Abbasi, S. F., Ali, A., & Kayhan, S. K. (2018). DNA Sequence Based Medical Image Encryption Scheme. In 2018 10th Computer Science and Electronic Engineering (CEEC). https://doi.org/10.1109/ceec.2018.8674221

Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdroppers is one of the most challenging and significant research areas. Due to var... Read More about DNA Sequence Based Medical Image Encryption Scheme.

A Novel Random Neural Network Based Approach for Intrusion Detection Systems (2018)
Presentation / Conference Contribution
Qureshi, A., Larijani, H., Ahmad, J., & Mtetwa, N. (2018). A Novel Random Neural Network Based Approach for Intrusion Detection Systems. . https://doi.org/10.1109/ceec.2018.8674228

Computer security and privacy of user specific data is a prime concern in day to day communication. The mass use of internet connected systems has given rise to many vulnerabilities which includes attacks on smart devices. Regular occurrence of such... Read More about A Novel Random Neural Network Based Approach for Intrusion Detection Systems.

Intertwining and NCA Maps Based New Image Encryption Scheme (2018)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Ahmad, J., Khan, J. S., & Stankovic, V. (2018, August). Intertwining and NCA Maps Based New Image Encryption Scheme. Presented at 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), Southend, United Kingdom

In this digital era, the Internet is a main source of communication. Due to exponential advancement in Internet technologies, transmission of multimedia data is very common now. However, transmitting sensitive information over the Internet is always... Read More about Intertwining and NCA Maps Based New Image Encryption Scheme.

Detection and prevention of Black Hole Attacks in IOT & WSN (2018)
Presentation / Conference Contribution
Ali, S., Khan, M. A., Ahmad, J., Malik, A. W., & ur Rehman, A. (2018, April). Detection and prevention of Black Hole Attacks in IOT & WSN. Presented at 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), Barcelona, Spain

Wireless Sensor Network is the combination of small devices called sensor nodes, gateways and software. These nodes use wireless medium for transmission and are capable to sense and transmit the data to other nodes. Generally, WSN composed of two typ... Read More about Detection and prevention of Black Hole Attacks in IOT & WSN.