Skip to main content

Research Repository

Advanced Search

All Outputs (20)

Multi-modal Features Representation-based Convolutional Neural Network Model for Malicious Website Detection (2023)
Journal Article
Alsaedi, M., Ghaleb, F. A., Saeed, F., Ahmad, J., & Alasli, M. (2024). Multi-modal Features Representation-based Convolutional Neural Network Model for Malicious Website Detection. IEEE Access, 12, 7271 - 7284. https://doi.org/10.1109/access.2023.3348071

Web applications have proliferated across various business sectors, serving as essential tools for billions of users in their daily lives activities. However, many of these applications are malicious which is a major threat to Internet users as they... Read More about Multi-modal Features Representation-based Convolutional Neural Network Model for Malicious Website Detection.

Sustainable Collaboration: Federated Learning for Environmentally Conscious Forest Fire Classification in Green Internet of Things (IoT) (2023)
Journal Article
Siddique, A. A., Alasbali, N., Driss, M., Boulila, W., Alshehri, M. S., & Ahmad, J. (2024). Sustainable Collaboration: Federated Learning for Environmentally Conscious Forest Fire Classification in Green Internet of Things (IoT). Internet of Things, 25, Article 101013. https://doi.org/10.1016/j.iot.2023.101013

Forests are an invaluable natural resource, playing a crucial role in the regulation of both local and global climate patterns. Additionally, they offer a plethora of benefits such as medicinal plants, food, and non-timber forest products. However, w... Read More about Sustainable Collaboration: Federated Learning for Environmentally Conscious Forest Fire Classification in Green Internet of Things (IoT).

DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm (2023)
Journal Article
Latif, S., Boulila, W., Koubaa, A., Zou, Z., & Ahmad, J. (2024). DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm. Journal of Network and Computer Applications, 221, 103784. https://doi.org/10.1016/j.jnca.2023.103784

In the dynamic field of the Industrial Internet of Things (IIoT), the networks are increasingly vulnerable to a diverse range of cyberattacks. This vulnerability necessitates the development of advanced intrusion detection systems (IDSs). Addressing... Read More about DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm.

A novel routing optimization strategy based on reinforcement learning in perception layer networks (2023)
Journal Article
Tan, H., Ye, T., ur Rehman, S., ur Rehman, O., Tu, S., & Ahmad, J. (2023). A novel routing optimization strategy based on reinforcement learning in perception layer networks. Computer Networks, 237, Article 110105. https://doi.org/10.1016/j.comnet.2023.110105

Wireless sensor networks have become incredibly popular due to the Internet of Things’ (IoT) rapid development. IoT routing is the basis for the efficient operation of the perception-layer network. As a popular type of machine learning, reinforcement... Read More about A novel routing optimization strategy based on reinforcement learning in perception layer networks.

Automatic neonatal sleep stage classification: A comparative study (2023)
Journal Article
Abbasi, S. F., Abbas, A., Ahmad, I., Alshehri, M. S., Almakdi, S., Ghadi, Y. Y., & Ahmad, J. (2023). Automatic neonatal sleep stage classification: A comparative study. Heliyon, 9(11), Article e22195. https://doi.org/10.1016/j.heliyon.2023.e22195

Sleep is an essential feature of living beings. For neonates, it is vital for their mental and physical development. Sleep stage cycling is an important parameter to assess neonatal brain and physical development. Therefore, it is crucial to administ... Read More about Automatic neonatal sleep stage classification: A comparative study.

TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks (2023)
Journal Article
Ullah, S., Ahmad, J., Khan, M. A., Alshehri, M. S., Boulila, W., Koubaa, A., …Iqbal Ch, M. M. (2023). TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks. Computer Networks, 237, Article 110072. https://doi.org/10.1016/j.comnet.2023.110072

The Internet of Things (IoT) is a global network that connects a large number of smart devices. MQTT is a de facto standard, lightweight, and reliable protocol for machine-to-machine communication, widely adopted in IoT networks. Various smart device... Read More about TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks.

MAGRU-IDS: A Multi-Head Attention-based Gated Recurrent Unit for Intrusion Detection in IIoT Networks (2023)
Journal Article
Ullah, S., Boulila, W., Koubaa, A., & Ahmad, J. (2023). MAGRU-IDS: A Multi-Head Attention-based Gated Recurrent Unit for Intrusion Detection in IIoT Networks. IEEE Access, 11, 114590-114601. https://doi.org/10.1109/access.2023.3324657

The increasing prevalence of the Industrial Internet of Things (IIoT) in industrial environments amplifies the potential for security breaches and compromises. To monitor IIoT networks, intrusion detection systems (IDS) have been introduced to detect... Read More about MAGRU-IDS: A Multi-Head Attention-based Gated Recurrent Unit for Intrusion Detection in IIoT Networks.

AI-Enabled Traffic Control Prioritization in Software-Defined IoT Networks for Smart Agriculture (2023)
Journal Article
Masood, F., Khan, W. U., Jan, S. U., & Ahmad, J. (2023). AI-Enabled Traffic Control Prioritization in Software-Defined IoT Networks for Smart Agriculture. Sensors, 23(19), Article 8218. https://doi.org/10.3390/s23198218

Smart agricultural systems have received a great deal of interest in recent years because of their potential for improving the efficiency and productivity of farming practices. These systems gather and analyze environmental data such as temperature,... Read More about AI-Enabled Traffic Control Prioritization in Software-Defined IoT Networks for Smart Agriculture.

Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0 (2023)
Journal Article
Siddique, A. A., Boulila, W., Alshehri, M. S., Ahmed, F., Gadekallu, T. R., Victor, N., …Ahmad, J. (2023). Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0. IEEE Transactions on Consumer Electronics, https://doi.org/10.1109/tce.2023.3319565

Pneumonia is a significant global health concern that can lead to severe and sometimes fatal consequences. Timely identification and classification of pneumonia can substantially improve patient outcomes. However, the disclosure of sensitive medical... Read More about Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0.

FireXnet: an explainable AI-based tailored deep learning model for wildfire detection on resource-constrained devices (2023)
Journal Article
Ahmad, K., Khan, M. S., Ahmed, F., Driss, M., Boulila, W., Alazeb, A., …Ahmad, J. (2023). FireXnet: an explainable AI-based tailored deep learning model for wildfire detection on resource-constrained devices. Fire Ecology, 19, Article 54. https://doi.org/10.1186/s42408-023-00216-0

Background: Forests cover nearly one-third of the Earth’s land and are some of our most biodiverse ecosystems. Due to climate change, these essential habitats are endangered by increasing wildfires. Wildfires are not just a risk to the environment, b... Read More about FireXnet: an explainable AI-based tailored deep learning model for wildfire detection on resource-constrained devices.

Enhancing IoT network security through deep learning-powered Intrusion Detection System (2023)
Journal Article
Bakhsh, S. A., Khan, M. A., Ahmed, F., Alshehri, M. S., Ali, H., & Ahmad, J. (2023). Enhancing IoT network security through deep learning-powered Intrusion Detection System. Internet of Things, 24, Article 100936. https://doi.org/10.1016/j.iot.2023.100936

The rapid growth of the Internet of Things (IoT) has brought about a global concern for the security of interconnected devices and networks. This necessitates the use of efficient Intrusion Detection System (IDS) to mitigate cyber threats. Deep learn... Read More about Enhancing IoT network security through deep learning-powered Intrusion Detection System.

Extracting Visual Micro-Doppler Signatures from Human Lips Motion Using UoG Radar Sensing Data for Hearing Aid Applications (2023)
Journal Article
Saeed, U., Shah, S. A., Ghadi, Y. Y., Khan, M. Z., Ahmad, J., Shah, S. I., …Abbasi, Q. H. (2023). Extracting Visual Micro-Doppler Signatures from Human Lips Motion Using UoG Radar Sensing Data for Hearing Aid Applications. IEEE Sensors Journal, 23(19), 22111-22118. https://doi.org/10.1109/jsen.2023.3308972

This study proposes a secure and effective lips-reading system that can accurately detect lips movements, even when face masks are worn. The system utilizes radio frequency (RF) sensing and ultra-wideband (UWB) radar technology, which overcomes the c... Read More about Extracting Visual Micro-Doppler Signatures from Human Lips Motion Using UoG Radar Sensing Data for Hearing Aid Applications.

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data (2023)
Conference Proceeding
Shahbaz Khan, M., Ahmad, J., Ali, H., Pitropakis, N., Al-Dubai, A., Ghaleb, B., & Buchanan, W. J. (in press). SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlate... Read More about SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data (2023)
Conference Proceeding
Naz, N., Khan, M. A., Khan, M. A., Khan, M. A., Jan, S. U., Shah, S. A., …Ahmad, J. (2023). A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data. In Advances on Intelligent Computing and Data Science. ICACIn 2022 (451-462). https://doi.org/10.1007/978-3-031-36258-3_40

The Internet of Things (IoT) is a grid of interconnected pre-programmed electronic devices to provide intelligent services for daily life tasks. However, the security of such networks is a considerable obstacle to successful implementation. Therefore... Read More about A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data.

An efficient deep learning model for brain tumour detection with privacy preservation (2023)
Journal Article
Rehman, M. U., Shafique, A., Khan, I. U., Ghadi, Y. Y., Ahmad, J., Alshehri, M. S., …Zayyan, M. H. (in press). An efficient deep learning model for brain tumour detection with privacy preservation. CAAI Transactions on Intelligence Technology, https://doi.org/10.1049/cit2.12254

Internet of medical things (IoMT) is becoming more prevalent in healthcare applications as a result of current AI advancements, helping to improve our quality of life and ensure a sustainable health system. IoMT systems with cutting‐edge scientific c... Read More about An efficient deep learning model for brain tumour detection with privacy preservation.

A Hybrid Deep Learning-based Intrusion Detection System for IoT Networks (2023)
Journal Article
Khan, N. W., Alshehri, M. S., Khan, M. A., Almakdi, S., Moradpoor, N., Alazeb, A., …Ahmad, J. (2023). A Hybrid Deep Learning-based Intrusion Detection System for IoT Networks. Mathematical Biosciences and Engineering, 20(8), 13491-13520. https://doi.org/10.3934/mbe.2023602

The Internet of Things (IoT) is a rapidly evolving technology with a wide range of potential applications, but the security of IoT networks remains a major concern. The existing system needs improvement in detecting intrusions in IoT networks. Severa... Read More about A Hybrid Deep Learning-based Intrusion Detection System for IoT Networks.

Prediction of the SARS-CoV-2 Derived T-Cell Epitopes’ Response Against COVID Variants (2023)
Journal Article
Tahir, H., Shahbaz Khan, M., Ahmed, F., M. Albarrak, A., Noman Qasem, S., & Ahmad, J. (2023). Prediction of the SARS-CoV-2 Derived T-Cell Epitopes’ Response Against COVID Variants. Computers, Materials & Continua, 75(2), 3517-3535. https://doi.org/10.32604/cmc.2023.035410

The COVID-19 outbreak began in December 2019 and was declared a global health emergency by the World Health Organization. The four most dominating variants are Beta, Gamma, Delta, and Omicron. After the administration of vaccine doses, an eminent dec... Read More about Prediction of the SARS-CoV-2 Derived T-Cell Epitopes’ Response Against COVID Variants.

A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder (2023)
Journal Article
Ahmed, F., Rehman, M. U., Ahmad, J., Khan, M. S., Boulila, W., Srivastava, G., …Buchanan, W. J. (2023). A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder. ACM transactions on multimedia computing communications and applications, 19(3s), Article 128. https://doi.org/10.1145/3570165

With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally... Read More about A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder.

The Mobile Attacks Under Internet of Things Networks (2023)
Conference Proceeding
Kean, C., Ghaleb, B., Mcclelland, B., Ahmad, J., Wadhaj, I., & Thomson, C. (2023). The Mobile Attacks Under Internet of Things Networks. In Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems ICETIS 2022: Volume 1 (523-532). https://doi.org/10.1007/978-3-031-25274-7_44

Since the introduction of the Routing Protocol for Low Power and Lossy Networks (RPL), its security aspects have been the focus of the scientific community who reported several security flaws that left the protocol vulnerable for several attacks. In... Read More about The Mobile Attacks Under Internet of Things Networks.