TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks
Journal Article
Ullah, S., Ahmad, J., Khan, M. A., Alshehri, M. S., Boulila, W., Koubaa, A., …Iqbal Ch, M. M. (2023)
TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks. Computer Networks, 237, Article 110072. https://doi.org/10.1016/j.comnet.2023.110072
The Internet of Things (IoT) is a global network that connects a large number of smart devices. MQTT is a de facto standard, lightweight, and reliable protocol for machine-to-...
A secure image encryption scheme based on chaotic maps and affine transformation
Journal Article
Ahmad, J., & Hwang, S. O. (2016)
A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications, 75(21), 13951-13976. https://doi.org/10.1007/s11042-015-2973-y
Due to the interesting nonlinear dynamic properties of chaotic maps, recently chaos-based encryption algorithms have gained much attention in cryptographic communities. Howeve...
A transformer-based approach empowered by a self-attention technique for semantic segmentation in remote sensing
Journal Article
Semantic segmentation of Remote Sensing (RS) images involves the classification of each pixel in a satellite image into distinct and non-overlapping regions or segments. This ...
Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform
Journal Article
Abd, M. H., Al-Suhail, G. A., Tahir, F. R., Ali Ali, A. M., Abbood, H. A., Dashtipour, K., …Ahmad, J. (2022)
Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform. Remote Sensing, 14(9), Article 1984. https://doi.org/10.3390/rs14091984
There is no doubt that chaotic systems are still attractive issues in various radar applications and communication systems. In this paper, we present a new 0.3 GHz mono-static...
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform
Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022)
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively...
Comparing the Performance of Different Classifiers for Posture Detection
Conference Proceeding
Suresh Kumar, S., Dashtipour, K., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., …Ahmad, W. (2022)
Comparing the Performance of Different Classifiers for Posture Detection. In Body Area Networks. Smart IoT and Big Data for Intelligent Health Management. BODYNETS 2021 (210-218). https://doi.org/10.1007/978-3-030-95593-9_17
Human Posture Classification (HPC) is used in many fields such as human computer interfacing, security surveillance, rehabilitation, remote monitoring, and so on. This paper c...
An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box
Journal Article
Khan, M. A., Ahmad, J., Javaid, Q., & Saqib, N. A. (2017)
An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. Journal of Modern Optics, 64(5), 531-540. https://doi.org/10.1080/09500340.2016.1246680
Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to...
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers
Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022)
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can...
A new chaos-based secure image encryption scheme using multiple substitution boxes
Conference Proceeding
Khan, J. S., ur Rehman, A., Ahmad, J., & Habib, Z. (2015)
A new chaos-based secure image encryption scheme using multiple substitution boxes. In 2015 Conference on Information Assurance and Cyber Security (CIACS)https://doi.org/10.1109/ciacs.2015.7395561
Due to development in Internet and networking technology, multimedia data is broadly transmitted via wired and wireless medium. Thus security is a major concern in modern comm...
A novel CNN-LSTM-based approach to predict urban expansion
Journal Article
Boulila, W., Ghandorh, H., Khan, M. A., Ahmed, F., & Ahmad, J. (2021)
A novel CNN-LSTM-based approach to predict urban expansion. Ecological Informatics, 64, Article 101325. https://doi.org/10.1016/j.ecoinf.2021.101325
Time-series remote sensing data offer a rich source of information that can be used in a wide range of applications, from monitoring changes in land cover to surveillance of c...