Skip to main content

Research Repository

Advanced Search

Dr Jawad Ahmad's Outputs (191)

Intrusion Detection Systems Using Machine Learning (2023)
Book Chapter
Taylor, W., Hussain, A., Gogate, M., Dashtipour, K., & Ahmad, J. (2024). Intrusion Detection Systems Using Machine Learning. In W. Boulila, J. Ahmad, A. Koubaa, M. Driss, & I. Riadh Farah (Eds.), Decision Making and Security Risk Management for IoT Environments (75-98). Springer. https://doi.org/10.1007/978-3-031-47590-0_5

Intrusion detection systems (IDS) have developed and evolved over time to form an important component in network security. The aim of an intrusion detection system is to successfully detect intrusions within a network and to trigger alerts to system... Read More about Intrusion Detection Systems Using Machine Learning.

AI-Enabled Traffic Control Prioritization in Software-Defined IoT Networks for Smart Agriculture (2023)
Journal Article
Masood, F., Khan, W. U., Jan, S. U., & Ahmad, J. (2023). AI-Enabled Traffic Control Prioritization in Software-Defined IoT Networks for Smart Agriculture. Sensors, 23(19), Article 8218. https://doi.org/10.3390/s23198218

Smart agricultural systems have received a great deal of interest in recent years because of their potential for improving the efficiency and productivity of farming practices. These systems gather and analyze environmental data such as temperature,... Read More about AI-Enabled Traffic Control Prioritization in Software-Defined IoT Networks for Smart Agriculture.

Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0 (2023)
Journal Article
Siddique, A. A., Boulila, W., Alshehri, M. S., Ahmed, F., Gadekallu, T. R., Victor, N., Qadri, M. T., & Ahmad, J. (2023). Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0. IEEE Transactions on Consumer Electronics, 70(1), 1923-1939. https://doi.org/10.1109/tce.2023.3319565

Pneumonia is a significant global health concern that can lead to severe and sometimes fatal consequences. Timely identification and classification of pneumonia can substantially improve patient outcomes. However, the disclosure of sensitive medical... Read More about Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0.

Resolving the Decreased Rank Attack in RPL’s IoT Networks (2023)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Hussain, A., Ahmad, J., Romdhani, I., & Jaroucheh, Z. (2023, June). Resolving the Decreased Rank Attack in RPL’s IoT Networks. Presented at 19th Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT 2023), Pafos, Cyprus

The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core... Read More about Resolving the Decreased Rank Attack in RPL’s IoT Networks.

FireXnet: an explainable AI-based tailored deep learning model for wildfire detection on resource-constrained devices (2023)
Journal Article
Ahmad, K., Khan, M. S., Ahmed, F., Driss, M., Boulila, W., Alazeb, A., Alsulami, M., Alshehri, M. S., Ghadi, Y. Y., & Ahmad, J. (2023). FireXnet: an explainable AI-based tailored deep learning model for wildfire detection on resource-constrained devices. Fire Ecology, 19, Article 54. https://doi.org/10.1186/s42408-023-00216-0

Background: Forests cover nearly one-third of the Earth’s land and are some of our most biodiverse ecosystems. Due to climate change, these essential habitats are endangered by increasing wildfires. Wildfires are not just a risk to the environment, b... Read More about FireXnet: an explainable AI-based tailored deep learning model for wildfire detection on resource-constrained devices.

Enhancing IoT network security through deep learning-powered Intrusion Detection System (2023)
Journal Article
Bakhsh, S. A., Khan, M. A., Ahmed, F., Alshehri, M. S., Ali, H., & Ahmad, J. (2023). Enhancing IoT network security through deep learning-powered Intrusion Detection System. Internet of Things, 24, Article 100936. https://doi.org/10.1016/j.iot.2023.100936

The rapid growth of the Internet of Things (IoT) has brought about a global concern for the security of interconnected devices and networks. This necessitates the use of efficient Intrusion Detection System (IDS) to mitigate cyber threats. Deep learn... Read More about Enhancing IoT network security through deep learning-powered Intrusion Detection System.

Extracting Visual Micro-Doppler Signatures from Human Lips Motion Using UoG Radar Sensing Data for Hearing Aid Applications (2023)
Journal Article
Saeed, U., Shah, S. A., Ghadi, Y. Y., Khan, M. Z., Ahmad, J., Shah, S. I., Hameed, H., & Abbasi, Q. H. (2023). Extracting Visual Micro-Doppler Signatures from Human Lips Motion Using UoG Radar Sensing Data for Hearing Aid Applications. IEEE Sensors Journal, 23(19), 22111-22118. https://doi.org/10.1109/jsen.2023.3308972

This study proposes a secure and effective lips-reading system that can accurately detect lips movements, even when face masks are worn. The system utilizes radio frequency (RF) sensing and ultra-wideband (UWB) radar technology, which overcomes the c... Read More about Extracting Visual Micro-Doppler Signatures from Human Lips Motion Using UoG Radar Sensing Data for Hearing Aid Applications.

A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data (2023)
Presentation / Conference Contribution
Naz, N., Khan, M. A., Khan, M. A., Khan, M. A., Jan, S. U., Shah, S. A., Arshad, Abbasi, Q. H., & Ahmad, J. (2022, October). A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data. Presented at 3rd International Conference of Advanced Computing and Informatics, Casablanca, Morocco

The Internet of Things (IoT) is a grid of interconnected pre-programmed electronic devices to provide intelligent services for daily life tasks. However, the security of such networks is a considerable obstacle to successful implementation. Therefore... Read More about A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data.

An efficient deep learning model for brain tumour detection with privacy preservation (2023)
Journal Article
Rehman, M. U., Shafique, A., Khan, I. U., Ghadi, Y. Y., Ahmad, J., Alshehri, M. S., Al Qathrady, M., Alhaisoni, M., & Zayyan, M. H. (online). An efficient deep learning model for brain tumour detection with privacy preservation. CAAI Transactions on Intelligence Technology, https://doi.org/10.1049/cit2.12254

Internet of medical things (IoMT) is becoming more prevalent in healthcare applications as a result of current AI advancements, helping to improve our quality of life and ensure a sustainable health system. IoMT systems with cutting‐edge scientific c... Read More about An efficient deep learning model for brain tumour detection with privacy preservation.

A Hybrid Deep Learning-based Intrusion Detection System for IoT Networks (2023)
Journal Article
Khan, N. W., Alshehri, M. S., Khan, M. A., Almakdi, S., Moradpoor, N., Alazeb, A., Ullah, S., Naz, N., & Ahmad, J. (2023). A Hybrid Deep Learning-based Intrusion Detection System for IoT Networks. Mathematical Biosciences and Engineering, 20(8), 13491-13520. https://doi.org/10.3934/mbe.2023602

The Internet of Things (IoT) is a rapidly evolving technology with a wide range of potential applications, but the security of IoT networks remains a major concern. The existing system needs improvement in detecting intrusions in IoT networks. Severa... Read More about A Hybrid Deep Learning-based Intrusion Detection System for IoT Networks.

Prediction of the SARS-CoV-2 Derived T-Cell Epitopes’ Response Against COVID Variants (2023)
Journal Article
Tahir, H., Shahbaz Khan, M., Ahmed, F., M. Albarrak, A., Noman Qasem, S., & Ahmad, J. (2023). Prediction of the SARS-CoV-2 Derived T-Cell Epitopes’ Response Against COVID Variants. Computers, Materials & Continua, 75(2), 3517-3535. https://doi.org/10.32604/cmc.2023.035410

The COVID-19 outbreak began in December 2019 and was declared a global health emergency by the World Health Organization. The four most dominating variants are Beta, Gamma, Delta, and Omicron. After the administration of vaccine doses, an eminent dec... Read More about Prediction of the SARS-CoV-2 Derived T-Cell Epitopes’ Response Against COVID Variants.

A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder (2023)
Journal Article
Ahmed, F., Rehman, M. U., Ahmad, J., Khan, M. S., Boulila, W., Srivastava, G., Lin, J. C.-W., & Buchanan, W. J. (2023). A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder. ACM transactions on multimedia computing communications and applications, 19(3s), Article 128. https://doi.org/10.1145/3570165

With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally... Read More about A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder.

The Mobile Attacks Under Internet of Things Networks (2023)
Presentation / Conference Contribution
Kean, C., Ghaleb, B., Mcclelland, B., Ahmad, J., Wadhaj, I., & Thomson, C. (2022, September). The Mobile Attacks Under Internet of Things Networks. Presented at International Conference on Emerging Technologies and Intelligent Systems, Online

Since the introduction of the Routing Protocol for Low Power and Lossy Networks (RPL), its security aspects have been the focus of the scientific community who reported several security flaws that left the protocol vulnerable for several attacks. In... Read More about The Mobile Attacks Under Internet of Things Networks.

An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant (2022)
Journal Article
Jemmali, M., Bashir, A. K., Boulila, W., Melhim, L. K. B., Jhaveri, R. H., & Ahmad, J. (2023). An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant. IEEE Transactions on Intelligent Transportation Systems, 24(12), 15633 - 15641. https://doi.org/10.1109/tits.2022.3219568

Nowadays, developing environmental solutions to ensure the preservation and sustainability of natural resources is one of the core research topics for providing a better life quality. Using renewable energy sources, such as solar energy, is one of th... Read More about An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant.

Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things (2022)
Journal Article
Hasan, A., Khan, M. A., Shabir, B., Munir, A., Malik, A. W., Anwar, Z., & Ahmad, J. (2022). Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things. Applied Sciences, 12(22), Article 11442. https://doi.org/10.3390/app122211442

The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to their resource-constrained nature. Extensive research efforts have been dedicated to securing these systems, but various vulnerabilities remain. Notably,... Read More about Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things.

Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring (2022)
Journal Article
Ghadi, Y. Y., Alsuhibany, S. A., Ahmad, J., Kumar, H., Boulila, W., Alsaedi, M., Khan, K., & Bhatti, S. A. (2022). Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring. Journal of Healthcare Engineering, 2022, Article 7745132. https://doi.org/10.1155/2022/7745132

With the advancement of camera and wireless technologies, surveillance camera-based occupancy has received ample attention from the research community. However, camera-based occupancy monitoring and wireless channels, especially Wi-Fi hotspot, pose s... Read More about Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring.

A Proposal of a New Chaotic Map for Application in the Image Encryption Domain (2022)
Journal Article
Abu-Amara, F., & Ahmad, J. (2023). A Proposal of a New Chaotic Map for Application in the Image Encryption Domain. Journal of Information and Knowledge Management, 22(2), Article 2250088. https://doi.org/10.1142/s0219649222500885

Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption scheme has pros and cons regarding its speed, complexity, and security. This paper proposes a new chaotic map called Power-Chaotic Map (PCM). Characte... Read More about A Proposal of a New Chaotic Map for Application in the Image Encryption Domain.

The Development of a Cross-Border Energy Trade Cooperation Model of Interconnected Virtual Power Plants Using Bilateral Contracts (2022)
Journal Article
Ullah, Z., Arshad, & Ahmad, J. (2022). The Development of a Cross-Border Energy Trade Cooperation Model of Interconnected Virtual Power Plants Using Bilateral Contracts. Energies, 15(21), Article 8171. https://doi.org/10.3390/en15218171

By coordinating the operation of regionally interconnected virtual power plants (VPPs), the growing penetration problem of renewable energy sources (RESs) into the power system can be addressed. This study presents an interactive trading cooperation... Read More about The Development of a Cross-Border Energy Trade Cooperation Model of Interconnected Virtual Power Plants Using Bilateral Contracts.

An Efficient Lightweight Image Encryption Scheme Using Multichaos (2022)
Journal Article
Ullah, A., Shah, A. A., Khan, J. S., Sajjad, M., Boulila, W., Akgul, A., Masood, J., Ghaleb, F. A., Shah, S. A., & Ahmad, J. (2022). An Efficient Lightweight Image Encryption Scheme Using Multichaos. Security and Communication Networks, 2022, Article 5680357. https://doi.org/10.1155/2022/5680357

With an immense increase in Internet multimedia applications over the past few years, digital content such as digital images are stored and shared over global networks, the probability for information leakage and illegal modifications to the digital... Read More about An Efficient Lightweight Image Encryption Scheme Using Multichaos.