105 results

TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks

Journal Article
Ullah, S., Ahmad, J., Khan, M. A., Alshehri, M. S., Boulila, W., Koubaa, A., …Iqbal Ch, M. M. (2023)
TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks. Computer Networks, 237, Article 110072. https://doi.org/10.1016/j.comnet.2023.110072
The Internet of Things (IoT) is a global network that connects a large number of smart devices. MQTT is a de facto standard, lightweight, and reliable protocol for machine-to-...

A secure image encryption scheme based on chaotic maps and affine transformation

Journal Article
Ahmad, J., & Hwang, S. O. (2016)
A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications, 75(21), 13951-13976. https://doi.org/10.1007/s11042-015-2973-y
Due to the interesting nonlinear dynamic properties of chaotic maps, recently chaos-based encryption algorithms have gained much attention in cryptographic communities. Howeve...

A transformer-based approach empowered by a self-attention technique for semantic segmentation in remote sensing

Journal Article
Semantic segmentation of Remote Sensing (RS) images involves the classification of each pixel in a satellite image into distinct and non-overlapping regions or segments. This ...

Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform

Journal Article
Abd, M. H., Al-Suhail, G. A., Tahir, F. R., Ali Ali, A. M., Abbood, H. A., Dashtipour, K., …Ahmad, J. (2022)
Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform. Remote Sensing, 14(9), Article 1984. https://doi.org/10.3390/rs14091984
There is no doubt that chaotic systems are still attractive issues in various radar applications and communication systems. In this paper, we present a new 0.3 GHz mono-static...

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022)
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively...

Comparing the Performance of Different Classifiers for Posture Detection

Conference Proceeding
Suresh Kumar, S., Dashtipour, K., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., …Ahmad, W. (2022)
Comparing the Performance of Different Classifiers for Posture Detection. In Body Area Networks. Smart IoT and Big Data for Intelligent Health Management. BODYNETS 2021 (210-218). https://doi.org/10.1007/978-3-030-95593-9_17
Human Posture Classification (HPC) is used in many fields such as human computer interfacing, security surveillance, rehabilitation, remote monitoring, and so on. This paper c...

An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box

Journal Article
Khan, M. A., Ahmad, J., Javaid, Q., & Saqib, N. A. (2017)
An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. Journal of Modern Optics, 64(5), 531-540. https://doi.org/10.1080/09500340.2016.1246680
Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to...

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022)
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can...

A new chaos-based secure image encryption scheme using multiple substitution boxes

Conference Proceeding
Khan, J. S., ur Rehman, A., Ahmad, J., & Habib, Z. (2015)
A new chaos-based secure image encryption scheme using multiple substitution boxes. In 2015 Conference on Information Assurance and Cyber Security (CIACS)https://doi.org/10.1109/ciacs.2015.7395561
Due to development in Internet and networking technology, multimedia data is broadly transmitted via wired and wireless medium. Thus security is a major concern in modern comm...

A novel CNN-LSTM-based approach to predict urban expansion

Journal Article
Boulila, W., Ghandorh, H., Khan, M. A., Ahmed, F., & Ahmad, J. (2021)
A novel CNN-LSTM-based approach to predict urban expansion. Ecological Informatics, 64, Article 101325. https://doi.org/10.1016/j.ecoinf.2021.101325
Time-series remote sensing data offer a rich source of information that can be used in a wide range of applications, from monitoring changes in land cover to surveillance of c...

Date


Date


Date