Skip to main content

Research Repository

Advanced Search

All Outputs (15)

Transparent RFID tag wall enabled by artificial intelligence for assisted living (2024)
Journal Article
Khan, M. Z., Usman, M., Tahir, A., Farooq, M., Qayyum, A., Ahmad, J., Abbas, H., Imran, M., & Abbasi, Q. H. (2024). Transparent RFID tag wall enabled by artificial intelligence for assisted living. Scientific Reports, 14(1), 18896. https://doi.org/10.1038/s41598-024-64411-y

Current approaches to activity-assisted living (AAL) are complex, expensive, and intrusive, which reduces their practicality and end user acceptance. However, emerging technologies such as artificial intelligence and wireless communications offer new... Read More about Transparent RFID tag wall enabled by artificial intelligence for assisted living.

UAVs and Blockchain Synergy: Enabling Secure Reputation-based Federated Learning in Smart Cities (2024)
Journal Article
Aqleem Abbas, S. M., Khan, M. A., Boulila, W., Kouba, A., Shahbaz Khan, M., & Ahmad, J. (2024). UAVs and Blockchain Synergy: Enabling Secure Reputation-based Federated Learning in Smart Cities. IEEE Access, 12, 154035-154053. https://doi.org/10.1109/access.2024.3432610

Unmanned aerial vehicles (UAVs) can be used as drones’ edge Intelligence to assist with data collection, training models, and communication over wireless networks. UAV use for smart cities is rapidly growing in various industries, including tracking... Read More about UAVs and Blockchain Synergy: Enabling Secure Reputation-based Federated Learning in Smart Cities.

Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology (2024)
Journal Article
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Ghaleb, B., Ullah, A., Khan, M. A., & Buchanan, W. J. (online). Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology. IEEE Transactions on Consumer Electronics, https://doi.org/10.1109/tce.2024.3415411

The rapid advancement in consumer technology has led to an exponential increase in the connected devices, resulting in an enormous and continuous flow of data, particularly the image data. This data needs to be processed, managed, and secured efficie... Read More about Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology.

Clustering-Based Resource Management for Consumer Cost Optimization in IoT Edge Computing Environments (2024)
Journal Article
Denden, M., Jemmali, M., Boulila, W., Soni, M., Khan, F., & Ahmad, J. (online). Clustering-Based Resource Management for Consumer Cost Optimization in IoT Edge Computing Environments. IEEE Transactions on Consumer Electronics, https://doi.org/10.1109/tce.2024.3414929

Edge computing emerges as a pivotal model in the era of next-generation consumer electronics and the emerging challenges of multimodal data-driven decision-making. Specifically, edge computing offers an open computing architecture for the vast and di... Read More about Clustering-Based Resource Management for Consumer Cost Optimization in IoT Edge Computing Environments.

SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things (2024)
Journal Article
Qathrady, M. A., Ullah, S., Alshehri, M. S., Ahmad, J., Almakdi, S., Alqhtani, S. M., Khan, M. A., & Ghaleb, B. (online). SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things. CAAI Transactions on Intelligence Technology, https://doi.org/10.1049/cit2.12352

Industrial Internet of Things (IIoT) is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial environments. Several IIoT nodes operate confidential data (such as medical, transportatio... Read More about SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things.

ML-FAS: Multi-Level Face Anonymization Scheme and Its Application to E-Commerce Systems (2024)
Journal Article
Jiang, D., Ahmad, J., Suo, Z., Alsulami, M. M., Ghadi, Y. Y., & Boulila, W. (online). ML-FAS: Multi-Level Face Anonymization Scheme and Its Application to E-Commerce Systems. IEEE Transactions on Consumer Electronics, https://doi.org/10.1109/tce.2024.3411102

With the proliferation of electronic commerce, the facial data used for identity authentication and mobile payment are potentially subject to data analytics and mining attacks by third-party platforms, which has raised public privacy concerns. To tac... Read More about ML-FAS: Multi-Level Face Anonymization Scheme and Its Application to E-Commerce Systems.

A Two-branch Edge Guided Lightweight Network for infrared image saliency detection (2024)
Journal Article
Liu, Z., Li, X., Zhang, T., Zhang, X., Sun, C., Rehman, S. U., & Ahmad, J. (2024). A Two-branch Edge Guided Lightweight Network for infrared image saliency detection. Computers and Electrical Engineering, 118(Part A), Article 109296. https://doi.org/10.1016/j.compeleceng.2024.109296

In the dynamic landscape of saliency detection, convolutional neural networks have emerged as catalysts for innovation, but remain largely tailored for RGB imagery, falling short in the context of infrared images, particularly in memory-restricted en... Read More about A Two-branch Edge Guided Lightweight Network for infrared image saliency detection.

A transformer-based approach empowered by a self-attention technique for semantic segmentation in remote sensing (2024)
Journal Article
Boulila, W., Ghandorh, H., Masood, S., Alzahem, A., Koubaa, A., Ahmed, F., Khan, Z., & Ahmad, J. (2024). A transformer-based approach empowered by a self-attention technique for semantic segmentation in remote sensing. Heliyon, 10(8), Article e29396. https://doi.org/10.1016/j.heliyon.2024.e29396

Semantic segmentation of Remote Sensing (RS) images involves the classification of each pixel in a satellite image into distinct and non-overlapping regions or segments. This task is crucial in various domains, including land cover classification, au... Read More about A transformer-based approach empowered by a self-attention technique for semantic segmentation in remote sensing.

A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection (2024)
Journal Article
Alshehri, M. S., Saidani, O., Alrayes, F. S., Abbasi, S. F., & Ahmad, J. (2024). A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection. IEEE Access, 12, 45762-45772. https://doi.org/10.1109/access.2024.3380816

The Industrial Internet of Things (IIoT) comprises a variety of systems, smart devices, and an extensive range of communication protocols. Hence, these systems face susceptibility to privacy and security challenges, making them prime targets for mali... Read More about A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection.

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT (2024)
Journal Article
Alshehri, M. S., Ahmad, J., Almakdi, S., Qathrady, M. A., Ghadi, Y. Y., & Buchanan, W. J. (2024). SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT. IEEE Access, 12, https://doi.org/10.1109/access.2024.3371992

The rise of Internet of Things (IoT) has led to increased security risks, particularly from botnet attacks that exploit IoT device vulnerabilities. This situation necessitates effective Intrusion Detection Systems (IDS), that are accurate, lightweigh... Read More about SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT.

ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption (2024)
Journal Article
Jiang, D., Tsafack, N., Boulila, W., Ahmad, J., & Barba-Franco, J. (in press). ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption. Expert Systems with Applications, 236, Article 121378. https://doi.org/10.1016/j.eswa.2023.121378

Recent advances in intelligent wearable devices have brought tremendous chances for the development of healthcare monitoring system. However, the data collected by various sensors in it are user-privacy-related information. Once the individuals’ priv... Read More about ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption.

Decision Making and Security Risk Management for IoT Environments (2024)
Book
Boulila, W., Ahmad, J., Koubaa, A., Driss, M., & Farah, I. R. (Eds.). (2024). Decision Making and Security Risk Management for IoT Environments. Springer. https://doi.org/10.1007/978-3-031-47590-0

This book contains contemporary research that outlines and addresses security, privacy challenges and decision-making in IoT environments. The authors provide a variety of subjects related to the following Keywords: IoT, security, AI, deep learning,... Read More about Decision Making and Security Risk Management for IoT Environments.

British Sign Language Detection Using Ultra-Wideband Radar Sensing and Residual Neural Network (2024)
Journal Article
Saeed, U., Shah, S. A., Ghadi, Y. Y., Hameed, H., Shah, S. I., Ahmad, J., & Abbasi, Q. H. (2024). British Sign Language Detection Using Ultra-Wideband Radar Sensing and Residual Neural Network. IEEE Sensors Journal, 24(7), 11144-11151. https://doi.org/10.1109/jsen.2024.3364389

This study represents a significant advancement in Sign Language Detection (SLD), a crucial tool for enhancing communication and fostering inclusivity among the hearing-impaired community. It innovatively combines radar technology with deep learning... Read More about British Sign Language Detection Using Ultra-Wideband Radar Sensing and Residual Neural Network.

A novel medical image data protection scheme for smart healthcare system (2024)
Journal Article
Rehman, M. U., Shafique, A., Khan, M. S., Driss, M., Boulila, W., Ghadi, Y. Y., Changalasetty, S. B., Alhaisoni, M., & Ahmad, J. (2024). A novel medical image data protection scheme for smart healthcare system. CAAI Transactions on Intelligence Technology, 9(4), 821-836. https://doi.org/10.1049/cit2.12292

The Internet of Multimedia Things (IoMT) refers to a network of interconnected multimedia devices that communicate with each other over the Internet. Recently, smart healthcare has emerged as a significant application of the IoMT, particularly in the... Read More about A novel medical image data protection scheme for smart healthcare system.

Energy efficiency considerations in software‐defined wireless body area networks (2024)
Journal Article
Masood, F., Khan, W. U., Alshehri, M. S., Alsumayt, A., & Ahmad, J. (2024). Energy efficiency considerations in software‐defined wireless body area networks. Engineering Reports, 6(3), Article e12841. https://doi.org/10.1002/eng2.12841

Wireless body area networks (WBAN) provide remote services for patient monitoring which allows healthcare practitioners to diagnose, monitor, and prescribe them without their physical presence. To address the shortcomings of WBAN, software-defined ne... Read More about Energy efficiency considerations in software‐defined wireless body area networks.