18 results

An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

Journal Article
Churcher, A., Ullah, R., Ahmad, J., Ur Rehman, S., Masood, F., Gogate, M., …Buchanan, W. J. (2021)
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks. Sensors, 21(2), Article 446. https://doi.org/10.3390/s21020446
In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices i...

DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption

Journal Article
Khan, J. S., Boulila, W., Ahmad, J., Rubaiee, S., Rehman, A. U., Alroobaea, R., & Buchanan, W. J. (2020)
DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption. IEEE Access, 8, 159732-159744. https://doi.org/10.1109/access.2020.3020917
Visual selective image encryption can both improve the efficiency of the image encryption algorithm and reduce the frequency and severity of attacks against data. In this artic...

Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution

Journal Article
Qayyum, A., Ahmad, J., Boulila, W., Rubaiee, S., Arshad, , Masood, F., …Buchanan, W. J. (2020)
Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution. IEEE Access, 8, 140876-140895. https://doi.org/10.1109/access.2020.3012912
The evolution of wireless and mobile communication from 0G to the upcoming 5G gives riseto data sharing through the Internet. This data transfer via open public networks are s...

5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum

Conference Proceeding
Khan, J. S., Tahir, A., Ahmad, J., Shah, S. A., Abbasi, Q. H., Russell, G., & Buchanan, W. (2020)
5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum. In Intelligent Computing: Proceedings of the 2020 Computing Conference, Volume 3. https://doi.org/10.1007/978-3-030-52243-8_3
Freezing of gait (FOG) is one of the most incapacitating and disconcerting symptom in Parkinson's disease (PD). FOG is the result of neural control disorder and motor impairme...

A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos

Journal Article
Masood, F., Boulila, W., Ahmad, J., Arshad, A., Sankar, S., Rubaiee, S., & Buchanan, W. J. (2020)
A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos. Remote Sensing, 12(11), https://doi.org/10.3390/rs12111893
Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can co...

Energy demand forecasting of buildings using random neural networks

Journal Article
Ahmad, J., Tahir, A., Larijani, H., Ahmed, F., Aziz Shah, S., Hall, A. J., & Buchanan, W. J. (2020)
Energy demand forecasting of buildings using random neural networks. Journal of Intelligent and Fuzzy Systems, 38(4), 4753-4765. https://doi.org/10.3233/jifs-191458
Energy uncertainty and ecological pressures have contributed to a high volatility in energy demand and consumption. The building sector accounts for 30 to 40% of the total glo...

Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication

Journal Article
Aziz Shah, S., Ahmad, J., Tahir, A., Ahmed, F., Russell, G., Shah, S. Y., …Abbasi, Q. H. (2020)
Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication. Micromachines, 11(4), https://doi.org/10.3390/mi11040379
Nano-scaled structures, wireless sensing, wearable devices, and wireless communications systems are anticipated to support the development of new next-generation technologies ...

An authentication protocol based on chaos and zero knowledge proof

Journal Article
Major, W., Buchanan, W. J., & Ahmad, J. (2020)
An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065-3087. https://doi.org/10.1007/s11071-020-05463-3
Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authentica...