156 results

Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE

Presentation / Conference Contribution
Faneela, Ahmad, J., Ghaleb, B., Jan, S. U., & Buchanan, W. J. (2025, April)
Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE. Presented at 2025 International Conference on New Trends in Computing Sciences (ICTCS), Amman, Jordan
The rapid growth of cloud computing and data-driven applications has amplified privacy concerns, driven by the increasing demand to process sensitive data securely. Homomorphi...

Decentralized EEG-based detection of major depressive disorder via transformer architectures and split learning

Journal Article
Umair, M., Ahmad, J., Alasbali, N., Saidani, O., Hanif, M., Khattak, A. A., & Khan, M. S. (2025)
Decentralized EEG-based detection of major depressive disorder via transformer architectures and split learning. Frontiers in Computational Neuroscience, 19, Article 1569828. https://doi.org/10.3389/fncom.2025.1569828
Introduction: Major Depressive Disorder (MDD) remains a critical mental health concern, necessitating accurate detection. Traditional approaches to diagnosing MDD often rely o...

Privacy-enhanced skin disease classification: integrating federated learning in an IoT-enabled edge computing

Journal Article
Alasbali, N., Ahmad, J., Siddique, A. A., Saidani, O., Al Mazroa, A., Raza, A., Ullah, R., & Khan, M. S. (2025)
Privacy-enhanced skin disease classification: integrating federated learning in an IoT-enabled edge computing. Frontiers in Computer Science, 7, Article 1550677. https://doi.org/10.3389/fcomp.2025.1550677
Introduction: The accurate and timely diagnosis of skin diseases is a critical concern, as many skin diseases exhibit similar symptoms in the early stages. Most existing autom...

Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques

Journal Article
Konstantinou, A., Kasimatis, D., Buchanan, W. J., Ullah Jan, S., Ahmad, J., Politis, I., & Pitropakis, N. (2025)
Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques. Machine Learning and Knowledge Extraction, 7(2), Article 31. https://doi.org/10.3390/make7020031
This paper explores the potential use of Large Language Models (LLMs), such as ChatGPT, Google Gemini, and Microsoft Copilot, in threat hunting, specifically focusing on Livin...

Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis

Presentation / Conference Contribution
Weir, S., Khan, M. S., Moradpoor, N., & Ahmad, J. (2024, December)
Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis. Presented at 2024 17th International Conference on Security of Information and Networks (SIN), Sydney, Australia
This study explores advancements in AI-generated image detection, emphasizing the increasing realism of images, including deepfakes, and the need for effective detection metho...

Sustainable Environmental Monitoring: Multistage Fusion Algorithm for Remotely Sensed Underwater Super-Resolution Image Enhancement and Classification

Journal Article
Ghaban, W., Ahmad, J., Siddique, A. A., Alshehri, M. S., Saghir, A., Saeed, F., Ghaleb, B., & Rehman, M. U. (2025)
Sustainable Environmental Monitoring: Multistage Fusion Algorithm for Remotely Sensed Underwater Super-Resolution Image Enhancement and Classification. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 18, 3640-3653. https://doi.org/10.1109/jstars.2024.3522202
Oceans and seas cover more than 70% of the Earth's surface. If compared with the land mass there are a lot of unexplored locations, a wealth of natural resources, and diverse ...

A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments

Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Driss, M., & Buchanan, W. J. (2024, September)
A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments. Presented at 28th International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES 2024), Spain
With the widespread use of the Internet of Things (IoT), securing the storage and transmission of multimedia content across IoT devices is a critical concern. Chaos-based Pseu...

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography

Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Ali, M., Al Dubai, A., Pitropakis, N., & Buchanan, W. J. (2024, July)
VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. Presented at 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP), Sousse, Tunisia
In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. ...

ML-FAS: Multi-Level Face Anonymization Scheme and Its Application to E-Commerce Systems

Journal Article
Jiang, D., Ahmad, J., Suo, Z., Alsulami, M. M., Ghadi, Y. Y., & Boulila, W. (2024)
ML-FAS: Multi-Level Face Anonymization Scheme and Its Application to E-Commerce Systems. IEEE Transactions on Consumer Electronics, 70(3), 5090 - 5100. https://doi.org/10.1109/tce.2024.3411102
With the proliferation of electronic commerce, the facial data used for identity authentication and mobile payment are potentially subject to data analytics and mining attacks...

A transformer-based approach empowered by a self-attention technique for semantic segmentation in remote sensing

Journal Article
Semantic segmentation of Remote Sensing (RS) images involves the classification of each pixel in a satellite image into distinct and non-overlapping regions or segments. This ...
7 results

Data Sharing in Highly Secure Environments

2024 - 2027
In several areas of government there is a requirement for strong control of data sharing. This KTP investigates the usage of PQC (Post Quantum Cryptography) and Homomorphic Encryption (HE) to protect ...
Funder: Innovate UK | Value: £273,181

Trusted Threat Sharing and Privacy Preserving using LLMs

2024 - 2024
Organisations are facing an increasing number of cyber threats, which makes it evident that relying solely on security tools and technologies may fail to detect malware, indicators of compromise, and ...
Funder: Innovate UK | Value: £12,620

PhD Studentship (Homomorphic Encryption)

2023 - 2026
This PhD studentship will be funded at £10k per year for a period of three years, and focus on homomorphic encryption in 5G / 6G network slices and strategies to foster and enhance federated structure...
Funder: 6G Health Institute GmbH | Value: £35,082

TrustShare: Privacy-Preserving And Trusted Threat Intelligence Sharing Using Distributed Ledgers

2023 - 2024
Organisations are facing an increasing number of cyber threats, which is making it evident that relying solely on security tools and technologies may fail to identify emerging threats, malware, and ot...
Funder: Innovate UK | Value: £31,386

TruElect

2022 - 2023
Democracy Counts is a market-leading organization that address the needs of global elections. With a deep understanding of international electoral systems, the company already provides international c...
Funder: Innovate UK | Value: £27,225

Cyber Hunt

2022 - 2025
Automated Cyberthreat Hunting and Cyber-relevant Incident Response for Critical Infrastructures. CyberHunt will develop highly innovative cybersecurity technologies that can sense, detect, analyse, d...
Funder: The Research Funding Council of Norway | Value: £37,500

Artificial Intelligence (AI)-powered dashboard for COVID-19 related public sentiment and opinion mining in social media platforms

2020 - 2020
: The project will aid in understanding and mitigating the direct and indirect impacts of the COVID-19 pandemic, by creating an AI-driven dashboard for policymakers, public health and clinical practit...
Funder: Chief Scientists Office | Value: £135,104

Date


Date