Skip to main content

Research Repository

Advanced Search

ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption (2024)
Journal Article
Jiang, D., Tsafack, N., Boulila, W., Ahmad, J., & Barba-Franco, J. (in press). ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption. Expert Systems with Applications, 236, Article 121378. https://doi.org/10.1016/j.eswa.2023.121378

Recent advances in intelligent wearable devices have brought tremendous chances for the development of healthcare monitoring system. However, the data collected by various sensors in it are user-privacy-related information. Once the individuals’ priv... Read More about ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption.

Enhancing IoT network security through deep learning-powered Intrusion Detection System (2023)
Journal Article
Bakhsh, S. A., Khan, M. A., Ahmed, F., Alshehri, M. S., Ali, H., & Ahmad, J. (in press). Enhancing IoT network security through deep learning-powered Intrusion Detection System. Internet of Things, Article 100936. https://doi.org/10.1016/j.iot.2023.100936

The rapid growth of the Internet of Things (IoT) has brought about a global concern for the security of interconnected devices and networks. This necessitates the use of efficient Intrusion Detection System (IDS) to mitigate cyber threats. Deep learn... Read More about Enhancing IoT network security through deep learning-powered Intrusion Detection System.

An efficient deep learning model for brain tumour detection with privacy preservation (2023)
Journal Article
Rehman, M. U., Shafique, A., Khan, I. U., Ghadi, Y. Y., Ahmad, J., Alshehri, M. S., …Zayyan, M. H. (in press). An efficient deep learning model for brain tumour detection with privacy preservation. CAAI Transactions on Intelligence Technology, https://doi.org/10.1049/cit2.12254

Internet of medical things (IoMT) is becoming more prevalent in healthcare applications as a result of current AI advancements, helping to improve our quality of life and ensure a sustainable health system. IoMT systems with cutting‐edge scientific c... Read More about An efficient deep learning model for brain tumour detection with privacy preservation.

A Hybrid Deep Learning-based Intrusion Detection System for IoT Networks (2023)
Journal Article
Khan, N. W., Alshehri, M. S., Khan, M. A., Almakdi, S., Moradpoor, N., Alazeb, A., …Ahmad, J. (2023). A Hybrid Deep Learning-based Intrusion Detection System for IoT Networks. Mathematical Biosciences and Engineering, 20(8), 13491-13520. https://doi.org/10.3934/mbe.2023602

The Internet of Things (IoT) is a rapidly evolving technology with a wide range of potential applications, but the security of IoT networks remains a major concern. The existing system needs improvement in detecting intrusions in IoT networks. Severa... Read More about A Hybrid Deep Learning-based Intrusion Detection System for IoT Networks.

Prediction of the SARS-CoV-2 Derived T-Cell Epitopes’ Response Against COVID Variants (2023)
Journal Article
Tahir, H., Shahbaz Khan, M., Ahmed, F., M. Albarrak, A., Noman Qasem, S., & Ahmad, J. (2023). Prediction of the SARS-CoV-2 Derived T-Cell Epitopes’ Response Against COVID Variants. Computers, Materials & Continua, 75(2), 3517-3535. https://doi.org/10.32604/cmc.2023.035410

The COVID-19 outbreak began in December 2019 and was declared a global health emergency by the World Health Organization. The four most dominating variants are Beta, Gamma, Delta, and Omicron. After the administration of vaccine doses, an eminent dec... Read More about Prediction of the SARS-CoV-2 Derived T-Cell Epitopes’ Response Against COVID Variants.

A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder (2023)
Journal Article
Ahmed, F., Rehman, M. U., Ahmad, J., Khan, M. S., Boulila, W., Srivastava, G., …Buchanan, W. J. (2023). A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder. ACM transactions on multimedia computing communications and applications, 19(3s), Article 128. https://doi.org/10.1145/3570165

With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally... Read More about A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder.

The Mobile Attacks Under Internet of Things Networks (2023)
Conference Proceeding
Kean, C., Ghaleb, B., Mcclelland, B., Ahmad, J., Wadhaj, I., & Thomson, C. (2023). The Mobile Attacks Under Internet of Things Networks. In Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems ICETIS 2022: Volume 1 (523-532). https://doi.org/10.1007/978-3-031-25274-7_44

Since the introduction of the Routing Protocol for Low Power and Lossy Networks (RPL), its security aspects have been the focus of the scientific community who reported several security flaws that left the protocol vulnerable for several attacks. In... Read More about The Mobile Attacks Under Internet of Things Networks.

An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant (2022)
Journal Article
Jemmali, M., Bashir, A. K., Boulila, W., Melhim, L. K. B., Jhaveri, R. H., & Ahmad, J. (in press). An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant. IEEE Transactions on Intelligent Transportation Systems, https://doi.org/10.1109/tits.2022.3219568

Nowadays, developing environmental solutions to ensure the preservation and sustainability of natural resources is one of the core research topics for providing a better life quality. Using renewable energy sources, such as solar energy, is one of th... Read More about An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant.

Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things (2022)
Journal Article
Hasan, A., Khan, M. A., Shabir, B., Munir, A., Malik, A. W., Anwar, Z., & Ahmad, J. (2022). Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things. Applied Sciences, 12(22), Article 11442. https://doi.org/10.3390/app122211442

The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to their resource-constrained nature. Extensive research efforts have been dedicated to securing these systems, but various vulnerabilities remain. Notably,... Read More about Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things.

Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring (2022)
Journal Article
Ghadi, Y. Y., Alsuhibany, S. A., Ahmad, J., Kumar, H., Boulila, W., Alsaedi, M., …Bhatti, S. A. (2022). Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring. Journal of Healthcare Engineering, 2022, Article 7745132. https://doi.org/10.1155/2022/7745132

With the advancement of camera and wireless technologies, surveillance camera-based occupancy has received ample attention from the research community. However, camera-based occupancy monitoring and wireless channels, especially Wi-Fi hotspot, pose s... Read More about Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring.

A Proposal of a New Chaotic Map for Application in the Image Encryption Domain (2022)
Journal Article
Abu-Amara, F., & Ahmad, J. (2023). A Proposal of a New Chaotic Map for Application in the Image Encryption Domain. Journal of Information and Knowledge Management, 22(2), Article 2250088. https://doi.org/10.1142/s0219649222500885

Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption scheme has pros and cons regarding its speed, complexity, and security. This paper proposes a new chaotic map called Power-Chaotic Map (PCM). Characte... Read More about A Proposal of a New Chaotic Map for Application in the Image Encryption Domain.

The Development of a Cross-Border Energy Trade Cooperation Model of Interconnected Virtual Power Plants Using Bilateral Contracts (2022)
Journal Article
Ullah, Z., Arshad, & Ahmad, J. (2022). The Development of a Cross-Border Energy Trade Cooperation Model of Interconnected Virtual Power Plants Using Bilateral Contracts. Energies, 15(21), Article 8171. https://doi.org/10.3390/en15218171

By coordinating the operation of regionally interconnected virtual power plants (VPPs), the growing penetration problem of renewable energy sources (RESs) into the power system can be addressed. This study presents an interactive trading cooperation... Read More about The Development of a Cross-Border Energy Trade Cooperation Model of Interconnected Virtual Power Plants Using Bilateral Contracts.

An Efficient Lightweight Image Encryption Scheme Using Multichaos (2022)
Journal Article
Ullah, A., Shah, A. A., Khan, J. S., Sajjad, M., Boulila, W., Akgul, A., …Ahmad, J. (2022). An Efficient Lightweight Image Encryption Scheme Using Multichaos. Security and Communication Networks, 2022, Article 5680357. https://doi.org/10.1155/2022/5680357

With an immense increase in Internet multimedia applications over the past few years, digital content such as digital images are stored and shared over global networks, the probability for information leakage and illegal modifications to the digital... Read More about An Efficient Lightweight Image Encryption Scheme Using Multichaos.

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform (2022)
Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022). Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379

Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and impro... Read More about Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.

A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution (2022)
Journal Article
Alghamdi, Y., Munir, A., & Ahmad, J. (2022). A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution. Entropy, 24(10), Article 1344. https://doi.org/10.3390/e24101344

Chaotic-maps-based image encryption methods have been a topic of research interest for a decade. However, most of the proposed methods suffer from slow encryption time or compromise on the security of the encryption to achieve faster encryption. This... Read More about A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution.

Classification of Skin Cancer Lesions Using Explainable Deep Learning (2022)
Journal Article
Zia Ur Rehman, M., Ahmed, F., Alsuhibany, S. A., Jamal, S. S., Zulfiqar Ali, M., & Ahmad, J. (2022). Classification of Skin Cancer Lesions Using Explainable Deep Learning. Sensors, 22(18), Article 6915. https://doi.org/10.3390/s22186915

Skin cancer is among the most prevalent and life-threatening forms of cancer that occur worldwide. Traditional methods of skin cancer detection need an in-depth physical examination by a medical professional, which is time-consuming in some cases. Re... Read More about Classification of Skin Cancer Lesions Using Explainable Deep Learning.

A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis (2022)
Journal Article
Rehman, M. U., Shafique, A., Ghadi, Y. Y., Boulila, W., Jan, S. U., Gadekallu, T. R., …Ahmad, J. (2022). A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis. IEEE Transactions on Network Science and Engineering, 9(6), 4322-4337. https://doi.org/10.1109/tnse.2022.3199235

Early cancer identification is regarded as a challenging problem in cancer prevention for the healthcare community. In addition, ensuring privacy-preserving healthcare data becomes more difficult with the growing demand for sharing these data. This s... Read More about A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis.

Predicting Breast Cancer Leveraging Supervised Machine Learning Techniques (2022)
Journal Article
Aamir, S., Rahim, A., Aamir, Z., Abbasi, S. F., Khan, M. S., Alhaisoni, M., …Ahmad, J. (2022). Predicting Breast Cancer Leveraging Supervised Machine Learning Techniques. Computational and Mathematical Methods in Medicine, 2022, Article 5869529. https://doi.org/10.1155/2022/5869529

Breast cancer is one of the leading causes of increasing deaths in women worldwide. The complex nature (microcalcification and masses) of breast cancer cells makes it quite difficult for radiologists to diagnose it properly. Subsequently, various com... Read More about Predicting Breast Cancer Leveraging Supervised Machine Learning Techniques.

Machine Learning-Based Prediction of Node Localization Accuracy in IIoT-Based MI-UWSNs and Design of a TD Coil for Omnidirectional Communication (2022)
Journal Article
Gang, Q., Muhammad, A., Khan, Z. U., Khan, M. S., Ahmed, F., & Ahmad, J. (2022). Machine Learning-Based Prediction of Node Localization Accuracy in IIoT-Based MI-UWSNs and Design of a TD Coil for Omnidirectional Communication. Sustainability, 14(15), Article 9683. https://doi.org/10.3390/su14159683

This study aims to realize Sustainable Development Goals (SDGs), i.e., SDG 9: Industry Innovation and Infrastructure and SDG 14: Life below Water, through the improvement of localization estimation accuracy in magneto-inductive underwater wireless se... Read More about Machine Learning-Based Prediction of Node Localization Accuracy in IIoT-Based MI-UWSNs and Design of a TD Coil for Omnidirectional Communication.

Automated Grading of Diabetic Macular Edema Using Color Retinal Photographs (2022)
Conference Proceeding
Zubair, M., Ahmad, J., Alqahtani, F., Khan, F., Shah, S. A., Abbasi, Q. H., & Jan, S. U. (2022). Automated Grading of Diabetic Macular Edema Using Color Retinal Photographs. In 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH). https://doi.org/10.1109/smarttech54121.2022.00016

Diabetic Macular Edema (DME) is an advanced indication of diabetic retinopathy (DR). It starts with blurring in vision and can lead to partial or even complete irreversible visual compromise. The only cure is timely diagnosis, prevention and treatmen... Read More about Automated Grading of Diabetic Macular Edema Using Color Retinal Photographs.