Skip to main content

Research Repository

Advanced Search

All Outputs (161)

Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis (2024)
Presentation / Conference Contribution
Weir, S., Khan, M. S., Moradpoor, N., & Ahmad, J. (2024, December). Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis. Paper presented at SINCONF 2024: 17th International Conference on Security of Information and Networks (SIN'24), Online

This study explores advancements in AI-generated image detection, emphasizing the increasing realism of images, including deepfakes, and the need for effective detection methods. Traditional Convolutional Neural Networks (CNNs) have shown success but... Read More about Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis.

Transparent RFID tag wall enabled by artificial intelligence for assisted living (2024)
Journal Article
Khan, M. Z., Usman, M., Tahir, A., Farooq, M., Qayyum, A., Ahmad, J., Abbas, H., Imran, M., & Abbasi, Q. H. (2024). Transparent RFID tag wall enabled by artificial intelligence for assisted living. Scientific Reports, 14(1), 18896. https://doi.org/10.1038/s41598-024-64411-y

Current approaches to activity-assisted living (AAL) are complex, expensive, and intrusive, which reduces their practicality and end user acceptance. However, emerging technologies such as artificial intelligence and wireless communications offer new... Read More about Transparent RFID tag wall enabled by artificial intelligence for assisted living.

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Ali, M., Dubai, A. A., Pitropakis, N., & Buchanan, W. J. (2024, July). VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. Presented at 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP), Sousse, Tunisia

In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. In this regards, this paper presents a robust image encryption scheme named... Read More about VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography.

Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records (2024)
Presentation / Conference Contribution
Noyon, M. S. I., Moradpoor, N., Maglaras, L., & Ahmad, J. (2024, April). Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records. Presented at DCOSS-IoT 2024, Abu Dhabi, United Arab Emirates

The health sector stands as one of the most crucial and vulnerable domains, harbouring extensive personal data. Particularly, Electronic Health Records store information in electronic media where users lack control over their data. Unauthorized acces... Read More about Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records.

UAVs and Blockchain Synergy: Enabling Secure Reputation-based Federated Learning in Smart Cities (2024)
Journal Article
Aqleem Abbas, S. M., Khan, M. A., Boulila, W., Kouba, A., Shahbaz Khan, M., & Ahmad, J. (2024). UAVs and Blockchain Synergy: Enabling Secure Reputation-based Federated Learning in Smart Cities. IEEE Access, 12, 154035-154053. https://doi.org/10.1109/access.2024.3432610

Unmanned aerial vehicles (UAVs) can be used as drones’ edge Intelligence to assist with data collection, training models, and communication over wireless networks. UAV use for smart cities is rapidly growing in various industries, including tracking... Read More about UAVs and Blockchain Synergy: Enabling Secure Reputation-based Federated Learning in Smart Cities.

ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance (2024)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Romdhani, I., Ahmad, J., Aldhaheri, T., & Kulkarni, S. (2024, January). ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance. Presented at 2024 International Conference on Information Networking (ICOIN), Ho Chi Minh City, Vietnam

The Routing Protocol for Low Power and Lossy Networks (RPL) plays a pivotal role in IoT communication, employing a rank-based topology to guide routing decisions. However, RPL is vulnerable to Decreased Rank Attacks, where malicious nodes illegitimat... Read More about ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance.

Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology (2024)
Journal Article
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Ghaleb, B., Ullah, A., Khan, M. A., & Buchanan, W. J. (online). Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology. IEEE Transactions on Consumer Electronics, https://doi.org/10.1109/tce.2024.3415411

The rapid advancement in consumer technology has led to an exponential increase in the connected devices, resulting in an enormous and continuous flow of data, particularly the image data. This data needs to be processed, managed, and secured efficie... Read More about Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology.

Clustering-Based Resource Management for Consumer Cost Optimization in IoT Edge Computing Environments (2024)
Journal Article
Denden, M., Jemmali, M., Boulila, W., Soni, M., Khan, F., & Ahmad, J. (online). Clustering-Based Resource Management for Consumer Cost Optimization in IoT Edge Computing Environments. IEEE Transactions on Consumer Electronics, https://doi.org/10.1109/tce.2024.3414929

Edge computing emerges as a pivotal model in the era of next-generation consumer electronics and the emerging challenges of multimodal data-driven decision-making. Specifically, edge computing offers an open computing architecture for the vast and di... Read More about Clustering-Based Resource Management for Consumer Cost Optimization in IoT Edge Computing Environments.

SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things (2024)
Journal Article
Qathrady, M. A., Ullah, S., Alshehri, M. S., Ahmad, J., Almakdi, S., Alqhtani, S. M., Khan, M. A., & Ghaleb, B. (online). SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things. CAAI Transactions on Intelligence Technology, https://doi.org/10.1049/cit2.12352

Industrial Internet of Things (IIoT) is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial environments. Several IIoT nodes operate confidential data (such as medical, transportatio... Read More about SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things.

ML-FAS: Multi-Level Face Anonymization Scheme and Its Application to E-Commerce Systems (2024)
Journal Article
Jiang, D., Ahmad, J., Suo, Z., Alsulami, M. M., Ghadi, Y. Y., & Boulila, W. (online). ML-FAS: Multi-Level Face Anonymization Scheme and Its Application to E-Commerce Systems. IEEE Transactions on Consumer Electronics, https://doi.org/10.1109/tce.2024.3411102

With the proliferation of electronic commerce, the facial data used for identity authentication and mobile payment are potentially subject to data analytics and mining attacks by third-party platforms, which has raised public privacy concerns. To tac... Read More about ML-FAS: Multi-Level Face Anonymization Scheme and Its Application to E-Commerce Systems.

A Two-branch Edge Guided Lightweight Network for infrared image saliency detection (2024)
Journal Article
Liu, Z., Li, X., Zhang, T., Zhang, X., Sun, C., Rehman, S. U., & Ahmad, J. (2024). A Two-branch Edge Guided Lightweight Network for infrared image saliency detection. Computers and Electrical Engineering, 118(Part A), Article 109296. https://doi.org/10.1016/j.compeleceng.2024.109296

In the dynamic landscape of saliency detection, convolutional neural networks have emerged as catalysts for innovation, but remain largely tailored for RGB imagery, falling short in the context of infrared images, particularly in memory-restricted en... Read More about A Two-branch Edge Guided Lightweight Network for infrared image saliency detection.

ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT (2024)
Presentation / Conference Contribution
Huma, Z. E., Ahmad, J., Hamadi, H. A., Ghaleb, B., Buchanan, W. J., & Jan, S. U. (2024, February). ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT. Presented at 2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates

The Internet of Things (IoT) has become an integral part of modern societies, with devices, networks, and applications offering industrial, economic, and social benefits. However, these devices and networks generate vast amounts of data, making them... Read More about ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT.

A transformer-based approach empowered by a self-attention technique for semantic segmentation in remote sensing (2024)
Journal Article
Boulila, W., Ghandorh, H., Masood, S., Alzahem, A., Koubaa, A., Ahmed, F., Khan, Z., & Ahmad, J. (2024). A transformer-based approach empowered by a self-attention technique for semantic segmentation in remote sensing. Heliyon, 10(8), Article e29396. https://doi.org/10.1016/j.heliyon.2024.e29396

Semantic segmentation of Remote Sensing (RS) images involves the classification of each pixel in a satellite image into distinct and non-overlapping regions or segments. This task is crucial in various domains, including land cover classification, au... Read More about A transformer-based approach empowered by a self-attention technique for semantic segmentation in remote sensing.

PermutEx: Feature-Extraction-Based Permutation — A New Diffusion Scheme for Image Encryption Algorithms (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Jaroucheh, Z., Pitropakis, N., & Buchanan, W. J. (2023, November). PermutEx: Feature-Extraction-Based Permutation — A New Diffusion Scheme for Image Encryption Algorithms. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, United Kingdom

Traditional permutation schemes mostly focus on random scrambling of pixels, often neglecting the intrinsic image information that could enhance diffusion in image encryption algorithms. This paper introduces PermutEx, a feature-extractionbased permu... Read More about PermutEx: Feature-Extraction-Based Permutation — A New Diffusion Scheme for Image Encryption Algorithms.

A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection (2024)
Journal Article
Alshehri, M. S., Saidani, O., Alrayes, F. S., Abbasi, S. F., & Ahmad, J. (2024). A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection. IEEE Access, 12, 45762-45772. https://doi.org/10.1109/access.2024.3380816

The Industrial Internet of Things (IIoT) comprises a variety of systems, smart devices, and an extensive range of communication protocols. Hence, these systems face susceptibility to privacy and security challenges, making them prime targets for mali... Read More about A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection.

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT (2024)
Journal Article
Alshehri, M. S., Ahmad, J., Almakdi, S., Qathrady, M. A., Ghadi, Y. Y., & Buchanan, W. J. (2024). SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT. IEEE Access, 12, https://doi.org/10.1109/access.2024.3371992

The rise of Internet of Things (IoT) has led to increased security risks, particularly from botnet attacks that exploit IoT device vulnerabilities. This situation necessitates effective Intrusion Detection Systems (IDS), that are accurate, lightweigh... Read More about SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT.

ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption (2024)
Journal Article
Jiang, D., Tsafack, N., Boulila, W., Ahmad, J., & Barba-Franco, J. (in press). ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption. Expert Systems with Applications, 236, Article 121378. https://doi.org/10.1016/j.eswa.2023.121378

Recent advances in intelligent wearable devices have brought tremendous chances for the development of healthcare monitoring system. However, the data collected by various sensors in it are user-privacy-related information. Once the individuals’ priv... Read More about ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption.

Decision Making and Security Risk Management for IoT Environments (2024)
Book
Boulila, W., Ahmad, J., Koubaa, A., Driss, M., & Farah, I. R. (Eds.). (2024). Decision Making and Security Risk Management for IoT Environments. Springer. https://doi.org/10.1007/978-3-031-47590-0

This book contains contemporary research that outlines and addresses security, privacy challenges and decision-making in IoT environments. The authors provide a variety of subjects related to the following Keywords: IoT, security, AI, deep learning,... Read More about Decision Making and Security Risk Management for IoT Environments.

British Sign Language Detection Using Ultra-Wideband Radar Sensing and Residual Neural Network (2024)
Journal Article
Saeed, U., Shah, S. A., Ghadi, Y. Y., Hameed, H., Shah, S. I., Ahmad, J., & Abbasi, Q. H. (2024). British Sign Language Detection Using Ultra-Wideband Radar Sensing and Residual Neural Network. IEEE Sensors Journal, 24(7), 11144-11151. https://doi.org/10.1109/jsen.2024.3364389

This study represents a significant advancement in Sign Language Detection (SLD), a crucial tool for enhancing communication and fostering inclusivity among the hearing-impaired community. It innovatively combines radar technology with deep learning... Read More about British Sign Language Detection Using Ultra-Wideband Radar Sensing and Residual Neural Network.

A novel medical image data protection scheme for smart healthcare system (2024)
Journal Article
Rehman, M. U., Shafique, A., Khan, M. S., Driss, M., Boulila, W., Ghadi, Y. Y., Changalasetty, S. B., Alhaisoni, M., & Ahmad, J. (2024). A novel medical image data protection scheme for smart healthcare system. CAAI Transactions on Intelligence Technology, 9(4), 821-836. https://doi.org/10.1049/cit2.12292

The Internet of Multimedia Things (IoMT) refers to a network of interconnected multimedia devices that communicate with each other over the Internet. Recently, smart healthcare has emerged as a significant application of the IoMT, particularly in the... Read More about A novel medical image data protection scheme for smart healthcare system.