136 results

Comparing the Performance of Different Classifiers for Posture Detection

Conference Proceeding
Suresh Kumar, S., Dashtipour, K., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., …Ahmad, W. (2022)
Comparing the Performance of Different Classifiers for Posture Detection. In Body Area Networks. Smart IoT and Big Data for Intelligent Health Management. BODYNETS 2021 (210-218). https://doi.org/10.1007/978-3-030-95593-9_17
Human Posture Classification (HPC) is used in many fields such as human computer interfacing, security surveillance, rehabilitation, remote monitoring, and so on. This paper c...

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022)
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can...

HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles

Journal Article
Ullah, S., Khan, M. A., Ahmad, J., Jamal, S. S., e Huma, Z., Hassan, M. T., …Buchanan, W. J. (2022)
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles. Sensors, 22(4), Article 1340. https://doi.org/10.3390/s22041340
Internet of Vehicles (IoV) is an application of the Internet of Things (IoT) network that connects smart vehicles to the internet, and vehicles with each other. With the emerg...

Chest X-ray Classification for the Detection of COVID-19 Using Deep Learning Techniques

Journal Article
Khan, E., Rehman, M. Z. U., Ahmed, F., Alfouzan, F. A., Alzahrani, N. M., & Ahmad, J. (2022)
Chest X-ray Classification for the Detection of COVID-19 Using Deep Learning Techniques. Sensors, 22(3), Article 1211. https://doi.org/10.3390/s22031211
Recent technological developments pave the path for deep learning-based techniques to be used in almost every domain of life. The precision of deep learning techniques make it...

Semantic Segmentation and Edge Detection—Approach to Road Detection in Very High Resolution Satellite Images

Journal Article
Ghandorh, H., Boulila, W., Masood, S., Koubaa, A., Ahmed, F., & Ahmad, J. (2022)
Semantic Segmentation and Edge Detection—Approach to Road Detection in Very High Resolution Satellite Images. Remote Sensing, 14(3), Article 613. https://doi.org/10.3390/rs14030613
Road detection technology plays an essential role in a variety of applications, such as urban planning, map updating, traffic monitoring and automatic vehicle navigation. Rece...

Ransomware: Analysing the Impact on Windows Active Directory Domain Services

Journal Article
McDonald, G., Papadopoulos, P., Pitropakis, N., Ahmad, J., & Buchanan, W. J. (2022)
Ransomware: Analysing the Impact on Windows Active Directory Domain Services. Sensors, 22(3), Article 953. https://doi.org/10.3390/s22030953
Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enter...

A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution

Journal Article
Arif, J., Khan, M. A., Ghaleb, B., Ahmad, J., Munir, A., Rashid, U., & Al-Dubai, A. Y. (2022)
A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access, 10, 12966-12982. https://doi.org/10.1109/access.2022.3146792
Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorith...

Multiple Participants’ Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing

Journal Article
Saeed, U., Yaseen Shah, S., Aziz Shah, S., Liu, H., Alhumaidi Alotaibi, A., Althobaiti, T., …Abbasi, Q. H. (2022)
Multiple Participants’ Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing. Sensors, 22(3), Article 809. https://doi.org/10.3390/s22030809
Wireless sensing is the utmost cutting-edge way of monitoring different health-related activities and, concurrently, preserving most of the privacy of individuals. To meet fut...

Multiple Participants’ Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing

Journal Article
Saeed, U., Yaseen Shah, S., Aziz Shah, S., Liu, H., Alhumaidi Alotaibi, A., Althobaiti, T., …H. Abbasi, Q. (2022)
Multiple Participants’ Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing. Sensors, 22(3), Article 809. https://doi.org/10.3390/s22030809
Wireless sensing is the utmost cutting-edge way of monitoring different health-related activities and, concurrently, preserving most of the privacy of individuals. To meet fut...

Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model

Journal Article
Rehman, M. U., Shafique, A., Khan, K. H., Khalid, S., Alotaibi, A. A., Althobaiti, T., …Abbasi, Q. H. (2022)
Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model. Sensors, 22(2), Article 461. https://doi.org/10.3390/s22020461
This article presents non-invasive sensing-based diagnoses of pneumonia disease, exploiting a deep learning model to make the technique non-invasive coupled with security pres...
5 results

PhD Studentship (Homomorphic Encryption)

2023 - 2026
This PhD studentship will be funded at £10k per year for a period of three years, and focus on homomorphic encryption in 5G / 6G network slices and strategies to foster and enhance federated structure...
Funder: 6G Health Institute GmbH | Value: £35,082

TrustShare: Privacy-Preserving And Trusted Threat Intelligence Sharing Using Distributed Ledgers

2023 - 2024
Organisations are facing an increasing number of cyber threats, which is making it evident that relying solely on security tools and technologies may fail to identify emerging threats, malware, and ot...
Funder: Innovate UK | Value: £31,386

TruElect

2022 - 2023
Democracy Counts is a market-leading organization that address the needs of global elections. With a deep understanding of international electoral systems, the company already provides international c...
Funder: Innovate UK | Value: £27,225

Cyber Hunt

2022 - 2025
Automated Cyberthreat Hunting and Cyber-relevant Incident Response for Critical Infrastructures. CyberHunt will develop highly innovative cybersecurity technologies that can sense, detect, analyse, d...
Funder: The Research Funding Council of Norway | Value: £37,500

Artificial Intelligence (AI)-powered dashboard for COVID-19 related public sentiment and opinion mining in social media platforms

2020 - 2020
: The project will aid in understanding and mitigating the direct and indirect impacts of the COVID-19 pandemic, by creating an AI-driven dashboard for policymakers, public health and clinical practit...
Funder: Chief Scientists Office | Value: £135,104

Date


Date