Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things
Journal Article
Hasan, A., Khan, M. A., Shabir, B., Munir, A., Malik, A. W., Anwar, Z., & Ahmad, J. (2022)
Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things. Applied Sciences, 12(22), Article 11442. https://doi.org/10.3390/app122211442
The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to their resource-constrained nature. Extensive research efforts have been dedica...
Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring
Journal Article
Ghadi, Y. Y., Alsuhibany, S. A., Ahmad, J., Kumar, H., Boulila, W., Alsaedi, M., …Bhatti, S. A. (2022)
Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring. Journal of Healthcare Engineering, 2022, Article 7745132. https://doi.org/10.1155/2022/7745132
With the advancement of camera and wireless technologies, surveillance camera-based occupancy has received ample attention from the research community. However, camera-based o...
A Proposal of a New Chaotic Map for Application in the Image Encryption Domain
Journal Article
Abu-Amara, F., & Ahmad, J. (in press)
A Proposal of a New Chaotic Map for Application in the Image Encryption Domain. Journal of Information and Knowledge Management, https://doi.org/10.1142/s0219649222500885
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption scheme has pros and cons regarding its speed, complexity, and security. Thi...
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
Journal Article
Ahmed, F., Ur Rehman, M., Ahmad, J., Shahbaz Khan, M., Boulila, W., Srivastava, G., …Buchanan, W. J. (in press)
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder. ACM transactions on multimedia computing communications and applications, https://doi.org/10.1145/3570165
With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. ...
The Development of a Cross-Border Energy Trade Cooperation Model of Interconnected Virtual Power Plants Using Bilateral Contracts
Journal Article
Ullah, Z., Arshad, & Ahmad, J. (2022)
The Development of a Cross-Border Energy Trade Cooperation Model of Interconnected Virtual Power Plants Using Bilateral Contracts. Energies, 15(21), Article 8171. https://doi.org/10.3390/en15218171
By coordinating the operation of regionally interconnected virtual power plants (VPPs), the growing penetration problem of renewable energy sources (RESs) into the power syste...
An Efficient Lightweight Image Encryption Scheme Using Multichaos
Journal Article
Ullah, A., Shah, A. A., Khan, J. S., Sajjad, M., Boulila, W., Akgul, A., …Ahmad, J. (2022)
An Efficient Lightweight Image Encryption Scheme Using Multichaos. Security and Communication Networks, 2022, Article 5680357. https://doi.org/10.1155/2022/5680357
With an immense increase in Internet multimedia applications over the past few years, digital content such as digital images are stored and shared over global networks, the pr...
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform
Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022)
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively...
A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution
Journal Article
Alghamdi, Y., Munir, A., & Ahmad, J. (2022)
A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution. Entropy, 24(10), Article 1344. https://doi.org/10.3390/e24101344
Chaotic-maps-based image encryption methods have been a topic of research interest for a decade. However, most of the proposed methods suffer from slow encryption time or comp...
Classification of Skin Cancer Lesions Using Explainable Deep Learning
Journal Article
Zia Ur Rehman, M., Ahmed, F., Alsuhibany, S. A., Jamal, S. S., Zulfiqar Ali, M., & Ahmad, J. (2022)
Classification of Skin Cancer Lesions Using Explainable Deep Learning. Sensors, 22(18), Article 6915. https://doi.org/10.3390/s22186915
Skin cancer is among the most prevalent and life-threatening forms of cancer that occur worldwide. Traditional methods of skin cancer detection need an in-depth physical exami...
A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis
Journal Article
Rehman, M. U., Shafique, A., Ghadi, Y. Y., Boulila, W., Jan, S. U., Gadekallu, T. R., …Ahmad, J. (2022)
A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis. IEEE Transactions on Network Science and Engineering, 9(6), 4322-4337. https://doi.org/10.1109/TNSE.2022.3199235
Early cancer identification is regarded as a challenging problem in cancer prevention for the healthcare community. In addition, ensuring privacy-preserving healthcare data be...