Skip to main content

Research Repository

Advanced Search

All Outputs (164)

DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things (2022)
Journal Article
Ahmad, J., Shah, S. A., Latif, S., Ahmed, F., Zou, Z., & Pitropakis, N. (2022). DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things. Journal of King Saud University (Computer and Information Sciences), 34(10), 8112-8121. https://doi.org/10.1016/j.jksuci.2022.07.023

The Industrial Internet of Things (IIoT) is a rapidly emerging technology that increases the efficiency and productivity of industrial environments by integrating smart sensors and devices with the internet. The advancements in communication technolo... Read More about DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things.

A novel security and authentication method for infrared medical image with discrete time chaotic systems (2022)
Journal Article
Boyraz, O. F., Guleryuz, E., Akgul, A., Yildiz, M. Z., Kiran, H. E., & Ahmad, J. (2022). A novel security and authentication method for infrared medical image with discrete time chaotic systems. Optik, 267, Article 169717. https://doi.org/10.1016/j.ijleo.2022.169717

Objective:
Hand vein images have become important biometric signs used for identification systems. Also, dorsal hand vein images have noteworthy advantages in terms of reliability and contactless procedure. Surgically changing the vascular pattern u... Read More about A novel security and authentication method for infrared medical image with discrete time chaotic systems.

Ensemble learning-based IDS for sensors telemetry data in IoT networks (2022)
Journal Article
Naz, N., Khan, M. A., Alsuhibany, S. A., Diyan, M., Tan, Z., Khan, M. A., & Ahmad, J. (2022). Ensemble learning-based IDS for sensors telemetry data in IoT networks. Mathematical Biosciences and Engineering, 19(10), 10550-10580. https://doi.org/10.3934/mbe.2022493

The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT devices collect data from the surrounding environment and communicate with ot... Read More about Ensemble learning-based IDS for sensors telemetry data in IoT networks.

A Deep Learning-Based Semantic Segmentation Architecture for Autonomous Driving Applications (2022)
Journal Article
Masood, S., Ahmed, F., Alsuhibany, S. A., Ghadi, Y. Y., Siyal, M. Y., Kumar, H., Khan, K., & Ahmad, J. (2022). A Deep Learning-Based Semantic Segmentation Architecture for Autonomous Driving Applications. Wireless Communications and Mobile Computing, 2022, Article 8684138. https://doi.org/10.1155/2022/8684138

In recent years, the development of smart transportation has accelerated research on semantic segmentation as it is one of the most important problems in this area. A large receptive field has always been the center of focus when designing convolutio... Read More about A Deep Learning-Based Semantic Segmentation Architecture for Autonomous Driving Applications.

Modified SHARK Cipher and Duffing Map-Based Cryptosystem (2022)
Journal Article
Rabie, O., Ahmad, J., & Alghazzawi, D. (2022). Modified SHARK Cipher and Duffing Map-Based Cryptosystem. Mathematics, 10(12), Article 2034. https://doi.org/10.3390/math10122034

Recent years have seen a lot of interest in the study of chaotic structures and their accompanying cryptography frameworks. In this research, we came up with a new way to encrypt images that used the chaos and a modified block cipher named the SHARK... Read More about Modified SHARK Cipher and Duffing Map-Based Cryptosystem.

A Secure and Lightweight Chaos Based Image Encryption Scheme (2022)
Journal Article
Ali Khan, F., Ahmed, J., Alqahtani, F., Alsuhibany, S. A., Ahmed, F., & Ahmad, J. (2022). A Secure and Lightweight Chaos Based Image Encryption Scheme. Computers, Materials & Continua, 73(1), 279-294. https://doi.org/10.32604/cmc.2022.028789

In this paper, we present an image encryption scheme based on the multi-stage chaos-based image encryption algorithm. The method works on the principle of confusion and diffusion. The proposed scheme containing both confusion and diffusion modules ar... Read More about A Secure and Lightweight Chaos Based Image Encryption Scheme.

A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos (2022)
Journal Article
Kamran, M. I., Khan, M. A., Alsuhibany, S. A., Ghadi, Y. Y., Arshad, Arif, J., & Ahmad, J. (2022). A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos. Computers, Materials & Continua, 73(1), 657-672. https://doi.org/10.32604/cmc.2022.028876

The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation (4G) and 5th generation (5G) etc. Researchers have proposed many image... Read More about A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos.

A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering (2022)
Journal Article
Ullah, S., Ahmad, J., Khan, M. A., Alkhammash, E. H., Hadjouni, M., Ghadi, Y. Y., Saeed, F., & Pitropakis, N. (2022). A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering. Sensors, 22(10), Article 3607. https://doi.org/10.3390/s22103607

The Internet of Things (IoT) is a widely used technology in automated network systems across the world. The impact of the IoT on different industries has occurred in recent years. Many IoT nodes collect, store, and process personal data, which is an... Read More about A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering.

Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning (2022)
Journal Article
Ghaleb, F. A., Alsaedi, M., Saeed, F., Ahmad, J., & Alasli, M. (2022). Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning. Sensors, 22(9), Article 3373. https://doi.org/10.3390/s22093373

Web applications have become ubiquitous for many business sectors due to their platform independence and low operation cost. Billions of users are visiting these applications to accomplish their daily tasks. However, many of these applications are ei... Read More about Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.

Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform (2022)
Journal Article
Abd, M. H., Al-Suhail, G. A., Tahir, F. R., Ali Ali, A. M., Abbood, H. A., Dashtipour, K., Jamal, S. S., & Ahmad, J. (2022). Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform. Remote Sensing, 14(9), Article 1984. https://doi.org/10.3390/rs14091984

There is no doubt that chaotic systems are still attractive issues in various radar applications and communication systems. In this paper, we present a new 0.3 GHz mono-static microwave chaotic radar. It includes a chaotic system based on a time-dela... Read More about Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform.

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map (2022)
Journal Article
Alharbi, A. R., Ahmad, J., Arshad, Shaukat, S., Masood, F., Ghadi, Y. Y., Pitropakis, N., & Buchanan, W. J. (2022). A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complexity, 2022, Article 7047282. https://doi.org/10.1155/2022/7047282

With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain. To address these concerns and keep data safe, a robust privacy-preserving... Read More about A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.

Optimal Pitch Angle Controller for DFIG-Based Wind Turbine System Using Computational Optimization Techniques (2022)
Journal Article
Khurshid, A., Mughal, M. A., Othman, A., Al-Hadhrami, T., Kumar, H., Khurshid, I., Arshad, & Ahmad, J. (2022). Optimal Pitch Angle Controller for DFIG-Based Wind Turbine System Using Computational Optimization Techniques. Electronics, 11(8), Article 1290. https://doi.org/10.3390/electronics11081290

With the advent of high-speed and parallel computing, the applicability of computational optimization in engineering problems has increased, with greater validation than conventional methods. Pitch angle is an effective variable in extracting maximum... Read More about Optimal Pitch Angle Controller for DFIG-Based Wind Turbine System Using Computational Optimization Techniques.

A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map (2022)
Journal Article
Masood, F., Boulila, W., Alsaeedi, A., Khan, J. S., Ahmad, J., Khan, M. A., & Rehman, S. U. (2022). A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map. Multimedia Tools and Applications, 81, 30931-30959. https://doi.org/10.1007/s11042-022-12844-w

In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. Benefiting from inherent properties such as ergodicity and key-sensitivity; this can potentially improve non-linearity in encrypted data. This paper i... Read More about A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map.

A federated learning framework for cyberattack detection in vehicular sensor networks (2022)
Journal Article
Driss, M., Almomani, I., e Huma, Z., & Ahmad, J. (2022). A federated learning framework for cyberattack detection in vehicular sensor networks. Complex and Intelligent Systems, 8(5), 4221-4235. https://doi.org/10.1007/s40747-022-00705-w

Vehicular Sensor Networks (VSN) introduced a new paradigm for modern transportation systems by improving traffic management and comfort. However, the increasing adoption of smart sensing technologies with the Internet of Things (IoT) made VSN a high-... Read More about A federated learning framework for cyberattack detection in vehicular sensor networks.

A Smart and Robust Automatic Inspection of Printed Labels Using an Image Hashing Technique (2022)
Journal Article
Khan, M. A., Ahmed, F., Khan, M. D., Ahmad, J., Kumar, H., & Pitropakis, N. (2022). A Smart and Robust Automatic Inspection of Printed Labels Using an Image Hashing Technique. Electronics, 11(6), Article 955. https://doi.org/10.3390/electronics11060955

This work is focused on the development of a smart and automatic inspection system for printed labels. This is a challenging problem to solve since the collected labels are typically subjected to a variety of geometric and non-geometric distortions.... Read More about A Smart and Robust Automatic Inspection of Printed Labels Using an Image Hashing Technique.

Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme (2022)
Journal Article
Sher Khan, J., Koç Kayhan, S., Siddiq Ahmed, S., Ahmad, J., Ayesha Siddiqa, H., Ahmed, F., Ghaleb, B., & Al Dubai, A. (2022). Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme. Wireless Personal Communications, 125, 513-530. https://doi.org/10.1007/s11277-022-09562-9

Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking is one of the promising technologies that can protect digital information.... Read More about Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme.

Evolution towards Smart and Software-Defined Internet of Things (2022)
Journal Article
Abid, M. A., Afaqui, N., Khan, M. A., Akhtar, M. W., Malik, A. W., Munir, A., Ahmad, J., & Shabir, B. (2022). Evolution towards Smart and Software-Defined Internet of Things. AI, 3(1), 100-123. https://doi.org/10.3390/ai3010007

The Internet of Things (IoT) is a mesh network of interconnected objects with unique identifiers that can transmit data and communicate with one another without the need for human intervention. The IoT has brought the future closer to us. It has open... Read More about Evolution towards Smart and Software-Defined Internet of Things.

Detecting Alzheimer’s Disease Using Machine Learning Methods (2022)
Presentation / Conference Contribution
Dashtipour, K., Taylor, W., Ansari, S., Zahid, A., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., Ali Imran, M., & Abbasi, Q. (2021, October). Detecting Alzheimer’s Disease Using Machine Learning Methods. Presented at 16th EAI International Conference, BODYNETS 2021, Online

As the world is experiencing population growth, the portion of the older people, aged 65 and above, is also growing at a faster rate. As a result, the dementia with Alzheimer’s disease is expected to increase rapidly in the next few years. Currently,... Read More about Detecting Alzheimer’s Disease Using Machine Learning Methods.

Comparing the Performance of Different Classifiers for Posture Detection (2022)
Presentation / Conference Contribution
Suresh Kumar, S., Dashtipour, K., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., Imran, M. A., Abbasi, Q., & Ahmad, W. (2021, October). Comparing the Performance of Different Classifiers for Posture Detection. Presented at 16th EAI International Conference, BODYNETS 2021, Online

Human Posture Classification (HPC) is used in many fields such as human computer interfacing, security surveillance, rehabilitation, remote monitoring, and so on. This paper compares the performance of different classifiers in the detection of 3 post... Read More about Comparing the Performance of Different Classifiers for Posture Detection.

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers (2022)
Presentation / Conference Contribution
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2021, December). Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. Presented at IEEE SINCONF: 14th International Conference on Security of Information and Networks, Edinburgh

Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the... Read More about Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.