Skip to main content

Research Repository

Advanced Search

All Outputs (25)

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data (2023)
Conference Proceeding
Shahbaz Khan, M., Ahmad, J., Ali, H., Pitropakis, N., Al-Dubai, A., Ghaleb, B., & Buchanan, W. J. (in press). SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlate... Read More about SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data (2023)
Conference Proceeding
Naz, N., Khan, M. A., Khan, M. A., Khan, M. A., Jan, S. U., Shah, S. A., …Ahmad, J. (2023). A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data. In Advances on Intelligent Computing and Data Science. ICACIn 2022 (451-462). https://doi.org/10.1007/978-3-031-36258-3_40

The Internet of Things (IoT) is a grid of interconnected pre-programmed electronic devices to provide intelligent services for daily life tasks. However, the security of such networks is a considerable obstacle to successful implementation. Therefore... Read More about A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data.

The Mobile Attacks Under Internet of Things Networks (2023)
Conference Proceeding
Kean, C., Ghaleb, B., Mcclelland, B., Ahmad, J., Wadhaj, I., & Thomson, C. (2023). The Mobile Attacks Under Internet of Things Networks. In Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems ICETIS 2022: Volume 1 (523-532). https://doi.org/10.1007/978-3-031-25274-7_44

Since the introduction of the Routing Protocol for Low Power and Lossy Networks (RPL), its security aspects have been the focus of the scientific community who reported several security flaws that left the protocol vulnerable for several attacks. In... Read More about The Mobile Attacks Under Internet of Things Networks.

Automated Grading of Diabetic Macular Edema Using Color Retinal Photographs (2022)
Conference Proceeding
Zubair, M., Ahmad, J., Alqahtani, F., Khan, F., Shah, S. A., Abbasi, Q. H., & Jan, S. U. (2022). Automated Grading of Diabetic Macular Edema Using Color Retinal Photographs. In 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH). https://doi.org/10.1109/smarttech54121.2022.00016

Diabetic Macular Edema (DME) is an advanced indication of diabetic retinopathy (DR). It starts with blurring in vision and can lead to partial or even complete irreversible visual compromise. The only cure is timely diagnosis, prevention and treatmen... Read More about Automated Grading of Diabetic Macular Edema Using Color Retinal Photographs.

Detecting Alzheimer’s Disease Using Machine Learning Methods (2022)
Conference Proceeding
Dashtipour, K., Taylor, W., Ansari, S., Zahid, A., Gogate, M., Ahmad, J., …Abbasi, Q. (2022). Detecting Alzheimer’s Disease Using Machine Learning Methods. In Body Area Networks. Smart IoT and Big Data for Intelligent Health Management 16th EAI International Conference, BODYNETS 2021, Virtual Event, October 25-26, 2021, Proceedings. https://doi.org/10.1007/978-3-030-95593-9_8

As the world is experiencing population growth, the portion of the older people, aged 65 and above, is also growing at a faster rate. As a result, the dementia with Alzheimer’s disease is expected to increase rapidly in the next few years. Currently,... Read More about Detecting Alzheimer’s Disease Using Machine Learning Methods.

Comparing the Performance of Different Classifiers for Posture Detection (2022)
Conference Proceeding
Suresh Kumar, S., Dashtipour, K., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., …Ahmad, W. (2022). Comparing the Performance of Different Classifiers for Posture Detection. In Body Area Networks. Smart IoT and Big Data for Intelligent Health Management. BODYNETS 2021 (210-218). https://doi.org/10.1007/978-3-030-95593-9_17

Human Posture Classification (HPC) is used in many fields such as human computer interfacing, security surveillance, rehabilitation, remote monitoring, and so on. This paper compares the performance of different classifiers in the detection of 3 post... Read More about Comparing the Performance of Different Classifiers for Posture Detection.

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers (2022)
Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022). Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366

Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the... Read More about Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.

Application of Artificial Neural Network in Predicting Flashover Behaviour of Outdoor Insulators under Polluted Conditions (2021)
Conference Proceeding
Sajjad, U., Arshad, Ahmad, J., & Shoaib, S. (2021). Application of Artificial Neural Network in Predicting Flashover Behaviour of Outdoor Insulators under Polluted Conditions. In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). https://doi.org/10.1109/elconrus51938.2021.9396388

Safe and reliable delivery of power through transmission lines mainly depends on the quality condition of the high voltage insulators. In the last few decades, demand in polymeric insulator has been dramatically increased due to their advanced perfor... Read More about Application of Artificial Neural Network in Predicting Flashover Behaviour of Outdoor Insulators under Polluted Conditions.

5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum (2020)
Conference Proceeding
Khan, J. S., Tahir, A., Ahmad, J., Shah, S. A., Abbasi, Q. H., Russell, G., & Buchanan, W. (2020). 5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum. In Intelligent Computing: Proceedings of the 2020 Computing Conference, Volume 3. https://doi.org/10.1007/978-3-030-52243-8_3

Freezing of gait (FOG) is one of the most incapacitating and disconcerting symptom in Parkinson's disease (PD). FOG is the result of neural control disorder and motor impairments, which severely impedes forward locomotion. This paper presents the exp... Read More about 5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum.

Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning (2020)
Conference Proceeding
Ilyas, M., Ahmad, J., Lawson, A., Khan, J. S., Tahir, A., Adeel, A., …Hussain, A. (2020). Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning. In Advances in Brain Inspired Cognitive Systems (76-85). https://doi.org/10.1007/978-3-030-39431-8_8

Prospective studies using longitudinal patient data can be used to help to predict responsiveness to Growth Hormone (GH) therapy and assess any suspected risks. In this paper, a novel Clinical Decision Support System (CDSS) is developed to predict gr... Read More about Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning.

A Heuristic Intrusion Detection System for Internet-of-Things (IoT) (2019)
Conference Proceeding
Qureshi, A., Larijani, H., Ahmad, J., & Mtetwa, N. (2019). A Heuristic Intrusion Detection System for Internet-of-Things (IoT). In Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume 1 (86-98). https://doi.org/10.1007/978-3-030-22871-2_7

Today, digitally connected devices are involved in every aspect of life due to the advancements in Internet-of-Things (IoT) paradigm. Recently, it has been a driving force for a major technological revolution towards the development of advanced moder... Read More about A Heuristic Intrusion Detection System for Internet-of-Things (IoT).

An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera (2018)
Conference Proceeding
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., & Javed, A. (2019). An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera. In Proceedings of SAI Intelligent Systems Conference (957-969). https://doi.org/10.1007/978-3-030-01057-7_71

Real-time occupancy monitoring information is an important component in building energy management and security. Advances in technology enables us to develop vision-based systems. These systems have gained popularity among different scientific resear... Read More about An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera.

Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map (2018)
Conference Proceeding
Abbasi, S. F., Ahmad, J., Khan, J. S., Khan, M. A., & Sheikh, S. A. (2019). Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map. . https://doi.org/10.1007/978-3-030-01177-2_56

Transmission of images over the Internet is exponentially increased in the last decade. However, Internet is considered as an insecure channel and hence may cause serious privacy issues. To overcome such privacy concerns, researchers are trying to se... Read More about Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map.

A Novel Random Neural Network Based Approach for Intrusion Detection Systems (2018)
Conference Proceeding
Qureshi, A., Larijani, H., Ahmad, J., & Mtetwa, N. (2018). A Novel Random Neural Network Based Approach for Intrusion Detection Systems. . https://doi.org/10.1109/ceec.2018.8674228

Computer security and privacy of user specific data is a prime concern in day to day communication. The mass use of internet connected systems has given rise to many vulnerabilities which includes attacks on smart devices. Regular occurrence of such... Read More about A Novel Random Neural Network Based Approach for Intrusion Detection Systems.

DNA Sequence Based Medical Image Encryption Scheme (2018)
Conference Proceeding
Khan, J. S., Ahmad, J., Abbasi, S. F., Ali, A., & Kayhan, S. K. (2018). DNA Sequence Based Medical Image Encryption Scheme. In 2018 10th Computer Science and Electronic Engineering (CEEC). https://doi.org/10.1109/ceec.2018.8674221

Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdroppers is one of the most challenging and significant research areas. Due to var... Read More about DNA Sequence Based Medical Image Encryption Scheme.

Intertwining and NCA Maps Based New Image Encryption Scheme (2018)
Conference Proceeding
Khan, F. A., Ahmed, J., Ahmad, J., Khan, J. S., & Stankovic, V. (2018). Intertwining and NCA Maps Based New Image Encryption Scheme. In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE). https://doi.org/10.1109/iccecome.2018.8658919

In this digital era, the Internet is a main source of communication. Due to exponential advancement in Internet technologies, transmission of multimedia data is very common now. However, transmitting sensitive information over the Internet is always... Read More about Intertwining and NCA Maps Based New Image Encryption Scheme.

Detection and prevention of Black Hole Attacks in IOT & WSN (2018)
Conference Proceeding
Ali, S., Khan, M. A., Ahmad, J., Malik, A. W., & ur Rehman, A. (2018). Detection and prevention of Black Hole Attacks in IOT & WSN. In 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC). https://doi.org/10.1109/fmec.2018.8364068

Wireless Sensor Network is the combination of small devices called sensor nodes, gateways and software. These nodes use wireless medium for transmission and are capable to sense and transmit the data to other nodes. Generally, WSN composed of two typ... Read More about Detection and prevention of Black Hole Attacks in IOT & WSN.

A new technique for designing 8 × 8 substitution box for image encryption applications (2017)
Conference Proceeding
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., Khan, M. A., & Hwang, S. O. (2017). A new technique for designing 8 × 8 substitution box for image encryption applications. In 2017 9th Computer Science and Electronic Engineering (CEEC). https://doi.org/10.1109/ceec.2017.8101591

To create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secure encryption algorithm, substitution plays a key role during confusion stag... Read More about A new technique for designing 8 × 8 substitution box for image encryption applications.

A novel substitution box for encryption based on Lorenz equations (2017)
Conference Proceeding
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017). A novel substitution box for encryption based on Lorenz equations. In 2017 International Conference on Circuits, System and Simulation (ICCSS). https://doi.org/10.1109/cirsyssim.2017.8023176

Complexity of an encryption algorithm is highly dependent on nonlinear components that drive actual security. Only nonlinear component in all traditional encryption algorithms is mainly Substitution Box (S-Box). In block ciphers, the relationship bet... Read More about A novel substitution box for encryption based on Lorenz equations.