-
Privacy-Preserving Credit Card Approval Using Homomorphic SVM: Toward Secure Inference in FinTech Applications
Authors:
Faneela,
Baraq Ghaleb,
Jawad Ahmad,
William J. Buchanan,
Sana Ullah Jan
Abstract:
The growing use of machine learning in cloud environments raises critical concerns about data security and privacy, especially in finance. Fully Homomorphic Encryption (FHE) offers a solution by enabling computations on encrypted data, but its high computational cost limits practicality. In this paper, we propose PP-FinTech, a privacy-preserving scheme for financial applications that employs a CKK…
▽ More
The growing use of machine learning in cloud environments raises critical concerns about data security and privacy, especially in finance. Fully Homomorphic Encryption (FHE) offers a solution by enabling computations on encrypted data, but its high computational cost limits practicality. In this paper, we propose PP-FinTech, a privacy-preserving scheme for financial applications that employs a CKKS-based encrypted soft-margin SVM, enhanced with a hybrid kernel for modeling non-linear patterns and an adaptive thresholding mechanism for robust encrypted classification. Experiments on the Credit Card Approval dataset demonstrate comparable performance to the plaintext models, highlighting PP-FinTech's ability to balance privacy, and efficiency in secure financial ML systems.
△ Less
Submitted 9 May, 2025;
originally announced May 2025.
-
Tell Me the Good Stuff: User Preferences in Movie Recommendation Explanations
Authors:
Juan Ahmad,
Jonas Hellgren,
Alan Said
Abstract:
Recommender systems play a vital role in helping users discover content in streaming services, but their effectiveness depends on users understanding why items are recommended. In this study, explanations were based solely on item features rather than personalized data, simulating recommendation scenarios. We compared user perceptions of one-sided (purely positive) and two-sided (positive and nega…
▽ More
Recommender systems play a vital role in helping users discover content in streaming services, but their effectiveness depends on users understanding why items are recommended. In this study, explanations were based solely on item features rather than personalized data, simulating recommendation scenarios. We compared user perceptions of one-sided (purely positive) and two-sided (positive and negative) feature-based explanations for popular movie recommendations. Through an online study with 129 participants, we examined how explanation style affected perceived trust, transparency, effectiveness, and satisfaction. One-sided explanations consistently received higher ratings across all dimensions. Our findings suggest that in low-stakes entertainment domains such as popular movie recommendations, simpler positive explanations may be more effective. However, the results should be interpreted with caution due to potential confounding factors such as item familiarity and the placement of negative information in explanations. This work provides practical insights for explanation design in recommender interfaces and highlights the importance of context in shaping user preferences.
△ Less
Submitted 6 May, 2025;
originally announced May 2025.
-
A Novel Feature-Aware Chaotic Image Encryption Scheme For Data Security and Privacy in IoT and Edge Networks
Authors:
Muhammad Shahbaz Khan,
Ahmed Al-Dubai,
Jawad Ahmad,
Nikolaos Pitropakis,
Baraq Ghaleb
Abstract:
The security of image data in the Internet of Things (IoT) and edge networks is crucial due to the increasing deployment of intelligent systems for real-time decision-making. Traditional encryption algorithms such as AES and RSA are computationally expensive for resource-constrained IoT devices and ineffective for large-volume image data, leading to inefficiencies in privacy-preserving distributed…
▽ More
The security of image data in the Internet of Things (IoT) and edge networks is crucial due to the increasing deployment of intelligent systems for real-time decision-making. Traditional encryption algorithms such as AES and RSA are computationally expensive for resource-constrained IoT devices and ineffective for large-volume image data, leading to inefficiencies in privacy-preserving distributed learning applications. To address these concerns, this paper proposes a novel Feature-Aware Chaotic Image Encryption scheme that integrates Feature-Aware Pixel Segmentation (FAPS) with Chaotic Chain Permutation and Confusion mechanisms to enhance security while maintaining efficiency. The proposed scheme consists of three stages: (1) FAPS, which extracts and reorganizes pixels based on high and low edge intensity features for correlation disruption; (2) Chaotic Chain Permutation, which employs a logistic chaotic map with SHA-256-based dynamically updated keys for block-wise permutation; and (3) Chaotic chain Confusion, which utilises dynamically generated chaotic seed matrices for bitwise XOR operations. Extensive security and performance evaluations demonstrate that the proposed scheme significantly reduces pixel correlation -- almost zero, achieves high entropy values close to 8, and resists differential cryptographic attacks. The optimum design of the proposed scheme makes it suitable for real-time deployment in resource-constrained environments.
△ Less
Submitted 1 May, 2025;
originally announced May 2025.
-
Nash Equilibrium Between Consumer Electronic Devices and DoS Attacker for Distributed IoT-enabled RSE Systems
Authors:
Gengcan Chen,
Donghong Cai,
Zahid Khan,
Jawad Ahmad,
Wadii Boulila
Abstract:
In electronic consumer Internet of Things (IoT), consumer electronic devices as edge devices require less computational overhead and the remote state estimation (RSE) of consumer electronic devices is always at risk of denial-of-service (DoS) attacks. Therefore, the adversarial strategy between consumer electronic devices and DoS attackers is critical. This paper focuses on the adversarial strateg…
▽ More
In electronic consumer Internet of Things (IoT), consumer electronic devices as edge devices require less computational overhead and the remote state estimation (RSE) of consumer electronic devices is always at risk of denial-of-service (DoS) attacks. Therefore, the adversarial strategy between consumer electronic devices and DoS attackers is critical. This paper focuses on the adversarial strategy between consumer electronic devices and DoS attackers in IoT-enabled RSE Systems. We first propose a remote joint estimation model for distributed measurements to effectively reduce consumer electronic device workload and minimize data leakage risks. The Kalman filter is deployed on the remote estimator, and the DoS attacks with open-loop as well as closed-loop are considered. We further introduce advanced reinforcement learning techniques, including centralized and distributed Minimax-DQN, to address high-dimensional decision-making challenges in both open-loop and closed-loop scenarios. Especially, the Q-network instead of the Q-table is used in the proposed approaches, which effectively solves the challenge of Q-learning. Moreover, the proposed distributed Minimax-DQN reduces the action space to expedite the search for Nash Equilibrium (NE). The experimental results validate that the proposed model can expeditiously restore the RSE error covariance to a stable state in the presence of DoS attacks, exhibiting notable attack robustness. The proposed centralized and distributed Minimax-DQN effectively resolves the NE in both open and closed-loop case, showcasing remarkable performance in terms of convergence. It reveals that substantial advantages in both efficiency and stability are achieved compared with the state-of-the-art methods.
△ Less
Submitted 12 April, 2025;
originally announced April 2025.
-
Efficient IoT Intrusion Detection with an Improved Attention-Based CNN-BiLSTM Architecture
Authors:
Amna Naeem,
Muazzam A. Khan,
Nada Alasbali,
Jawad Ahmad,
Aizaz Ahmad Khattak,
Muhammad Shahbaz Khan
Abstract:
The ever-increasing security vulnerabilities in the Internet-of-Things (IoT) systems require improved threat detection approaches. This paper presents a compact and efficient approach to detect botnet attacks by employing an integrated approach that consists of traffic pattern analysis, temporal support learning, and focused feature extraction. The proposed attention-based model benefits from a hy…
▽ More
The ever-increasing security vulnerabilities in the Internet-of-Things (IoT) systems require improved threat detection approaches. This paper presents a compact and efficient approach to detect botnet attacks by employing an integrated approach that consists of traffic pattern analysis, temporal support learning, and focused feature extraction. The proposed attention-based model benefits from a hybrid CNN-BiLSTM architecture and achieves 99% classification accuracy in detecting botnet attacks utilizing the N-BaIoT dataset, while maintaining high precision and recall across various scenarios. The proposed model's performance is further validated by key parameters, such as Mathews Correlation Coefficient and Cohen's kappa Correlation Coefficient. The close-to-ideal results for these parameters demonstrate the proposed model's ability to detect botnet attacks accurately and efficiently in practical settings and on unseen data. The proposed model proved to be a powerful defence mechanism for IoT networks to face emerging security challenges.
△ Less
Submitted 1 May, 2025; v1 submitted 25 March, 2025;
originally announced March 2025.
-
Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and Openfhe
Authors:
Faneela,
Jawad Ahmad,
Baraq Ghaleb,
Sana Ullah Jan,
William J. Buchanan
Abstract:
The rapid growth of cloud computing and data-driven applications has amplified privacy concerns, driven by the increasing demand to process sensitive data securely. Homomorphic encryption (HE) has become a vital solution for addressing these concerns by enabling computations on encrypted data without revealing its contents. This paper provides a comprehensive evaluation of two leading HE libraries…
▽ More
The rapid growth of cloud computing and data-driven applications has amplified privacy concerns, driven by the increasing demand to process sensitive data securely. Homomorphic encryption (HE) has become a vital solution for addressing these concerns by enabling computations on encrypted data without revealing its contents. This paper provides a comprehensive evaluation of two leading HE libraries, SEAL and OpenFHE, examining their performance, usability, and support for prominent HE schemes such as BGV and CKKS. Our analysis highlights computational efficiency, memory usage, and scalability across Linux and Windows platforms, emphasizing their applicability in real-world scenarios. Results reveal that Linux outperforms Windows in computation efficiency, with OpenFHE emerging as the optimal choice across diverse cryptographic settings. This paper provides valuable insights for researchers and practitioners to advance privacy-preserving applications using FHE.
△ Less
Submitted 17 March, 2025; v1 submitted 14 March, 2025;
originally announced March 2025.
-
X-Cross: Image Encryption Featuring Novel Dual-Layer Block Permutation and Dynamic Substitution Techniques
Authors:
Hansa Ahsan,
Safee Ullah,
Jawad Ahmad,
Aizaz Ahmad Khattak,
Muhammad Ali,
Muhammad Shahbaz Khan
Abstract:
In this digital age, ensuring the security of digital data, especially the image data is critically important. Image encryption plays an important role in securing the online transmission/storage of images from unauthorized access. In this regard, this paper presents a novel diffusion-confusion-based image encryption algorithm named as X-CROSS. The diffusion phase involves a dual-layer block permu…
▽ More
In this digital age, ensuring the security of digital data, especially the image data is critically important. Image encryption plays an important role in securing the online transmission/storage of images from unauthorized access. In this regard, this paper presents a novel diffusion-confusion-based image encryption algorithm named as X-CROSS. The diffusion phase involves a dual-layer block permutation. It involves a bit-level permutation termed Inter-Bit Transference (IBT) using a Bit-Extraction key, and pixel permutation with a unique X-crosspermutation algorithm to effectively scramble the pixels within an image. The proposed algorithm utilizes a resilient 2D chaotic map with non-linear dynamical behavior, assisting in generating complex Extraction Keys. After the permutation phase, the confusion phase proceeds with a dynamic substitution technique on the permuted images, establishing the final encryption layer. This combination of novel permutation and confusion results in the removal of the image's inherent patterns and increases its resistance to cyber-attacks. The close to ideal statistical security results for information entropy, correlation, homogeneity, contrast, and energy validate the proposed scheme's effectiveness in hiding the information within the image.
△ Less
Submitted 12 March, 2025;
originally announced March 2025.
-
A Chaotic Image Encryption Scheme Using Novel Geometric Block Permutation and Dynamic Substitution
Authors:
Muhammad Ali,
Jawad Ahmad,
Muhammad Abdullah Hussain Khan,
Safee Ullah,
Mujeeb Ur Rehman,
Syed Aziz Shah,
Muhammad Shahbaz Khan
Abstract:
In this digital era, ensuring the security of digital data during transmission and storage is crucial. Digital data, particularly image data, needs to be protected against unauthorized access. To address this, this paper presents a novel image encryption scheme based on a confusion diffusion architecture. The diffusion module introduces a novel geometric block permutation technique, which effectiv…
▽ More
In this digital era, ensuring the security of digital data during transmission and storage is crucial. Digital data, particularly image data, needs to be protected against unauthorized access. To address this, this paper presents a novel image encryption scheme based on a confusion diffusion architecture. The diffusion module introduces a novel geometric block permutation technique, which effectively scrambles the pixels based on geometric shape extraction of pixels. The image is converted into four blocks, and pixels are extracted from these blocks using L-shape, U-shape, square-shape, and inverted U-shape patterns for each block, respectively. This robust extraction and permutation effectively disrupts the correlation within the image. Furthermore, the confusion module utilises bit-XOR and dynamic substitution techniques. For the bit-XOR operation, 2D Henon map has been utilised to generate a chaotic seed matrix, which is bit-XORed with the scrambled image. The resultant image then undergoes the dynamic substitution process to complete confusion phase. A statistical security analysis demonstrates the superior security of the proposed scheme, with being high uncertainty and unpredictability, achieving an entropy of 7.9974 and a correlation coefficient of 0.0014. These results validate the proposed scheme's effectiveness in securing digital images.
△ Less
Submitted 12 March, 2025;
originally announced March 2025.
-
Performance Evaluation of Threshold Signing Schemes in Cryptography
Authors:
Faneela,
Jawad Ahmad,
Baraq Ghaleb,
Imdad Ullah Khan,
William J. Buchanan,
Sana Ullah Jan,
Muhammad Shahbaz Khan
Abstract:
Threshold Signature Scheme (TSS) protocols have gained significant attention over the past ten years due to their widespread adoption in cryptocurrencies. The adoption is mainly boosted by Gennaro and Goldfedder's TSS protocol. Since then, various TSS protocols have been introduced with different features, such as security and performance, etc. Large organizations are using TSS protocols to protec…
▽ More
Threshold Signature Scheme (TSS) protocols have gained significant attention over the past ten years due to their widespread adoption in cryptocurrencies. The adoption is mainly boosted by Gennaro and Goldfedder's TSS protocol. Since then, various TSS protocols have been introduced with different features, such as security and performance, etc. Large organizations are using TSS protocols to protect many digital assets, such as cryptocurrency. However, the adoption of these TSS protocols requires an understanding of state-of-the-art research in threshold signing. This study describes the holistic view of TSS protocols, evaluates cutting-edge TSS protocols, highlights their characteristics, and compares them in terms of security and performance. The evaluation of these TSS protocols will help the researchers address real-world problems by considering the relevant merits of different TSS protocols.
△ Less
Submitted 12 March, 2025;
originally announced March 2025.
-
A Hybrid Neural Network with Smart Skip Connections for High-Precision, Low-Latency EMG-Based Hand Gesture Recognition
Authors:
Hafsa Wazir,
Jawad Ahmad,
Muazzam A. Khan,
Sana Ullah Jan,
Fadia Ali Khan,
Muhammad Shahbaz Khan
Abstract:
Electromyography (EMG) is extensively used in key biomedical areas, such as prosthetics, and assistive and interactive technologies. This paper presents a new hybrid neural network named ConSGruNet for precise and efficient hand gesture recognition. The proposed model comprises convolutional neural networks with smart skip connections in conjunction with a Gated Recurrent Unit (GRU). The proposed…
▽ More
Electromyography (EMG) is extensively used in key biomedical areas, such as prosthetics, and assistive and interactive technologies. This paper presents a new hybrid neural network named ConSGruNet for precise and efficient hand gesture recognition. The proposed model comprises convolutional neural networks with smart skip connections in conjunction with a Gated Recurrent Unit (GRU). The proposed model is trained on the complete Ninapro DB1 dataset. The proposed model boasts an accuracy of 99.7\% in classifying 53 classes in just 25 milliseconds. In addition to being fast, the proposed model is lightweight with just 3,946 KB in size. Moreover, the proposed model has also been evaluated for the reliability parameters, i.e., Cohen's kappa coefficient, Matthew's correlation coefficient, and confidence intervals. The close to ideal results of these parameters validate the models performance on unseen data.
△ Less
Submitted 12 March, 2025;
originally announced March 2025.
-
Image Encryption Using DNA Encoding, Snake Permutation and Chaotic Substitution Techniques
Authors:
Waleed Ahmed Farooqui,
Jawad Ahmad,
Nadeem Kureshi,
Fawad Ahmed,
Aizaz Ahmad Khattak,
Muhammad Shahbaz Khan
Abstract:
Securing image data in IoT networks and other insecure information channels is a matter of critical concern. This paper presents a new image encryption scheme using DNA encoding, snake permutation and chaotic substitution techniques that ensures robust security of the image data with reduced computational overhead. The DNA encoding and snake permutation modules ensure effective scrambling of the p…
▽ More
Securing image data in IoT networks and other insecure information channels is a matter of critical concern. This paper presents a new image encryption scheme using DNA encoding, snake permutation and chaotic substitution techniques that ensures robust security of the image data with reduced computational overhead. The DNA encoding and snake permutation modules ensure effective scrambling of the pixels and result in efficient diffusion in the plaintext image. For the confusion part, the chaotic substitution technique is implemented, which substitutes the pixel values chosen randomly from 3 S-boxes. Extensive security analysis validate the efficacy of the image encryption algorithm proposed in this paper and results demonstrate that the encrypted images have an ideal information entropy of 7.9895 and an almost zero correlation coefficient of -0.001660. These results indicate a high degree of randomness and no correlation in the encrypted image.
△ Less
Submitted 11 March, 2025;
originally announced March 2025.
-
Immersive Human-in-the-Loop Control: Real-Time 3D Surface Meshing and Physics Simulation
Authors:
Sait Akturk,
Justin Valentine,
Junaid Ahmad,
Martin Jagersand
Abstract:
This paper introduces the TactiMesh Teleoperator Interface (TTI), a novel predictive visual and haptic system designed explicitly for human-in-the-loop robot control using a head-mounted display (HMD). By employing simultaneous localization and mapping (SLAM)in tandem with a space carving method (CARV), TTI creates a real time 3D surface mesh of remote environments from an RGB camera mounted on a…
▽ More
This paper introduces the TactiMesh Teleoperator Interface (TTI), a novel predictive visual and haptic system designed explicitly for human-in-the-loop robot control using a head-mounted display (HMD). By employing simultaneous localization and mapping (SLAM)in tandem with a space carving method (CARV), TTI creates a real time 3D surface mesh of remote environments from an RGB camera mounted on a Barrett WAM arm. The generated mesh is integrated into a physics simulator, featuring a digital twin of the WAM robot arm to create a virtual environment. In this virtual environment, TTI provides haptic feedback directly in response to the operator's movements, eliminating the problem with delayed response from the haptic follower robot. Furthermore, texturing the 3D mesh with keyframes from SLAM allows the operator to control the viewpoint of their Head Mounted Display (HMD) independently of the arm-mounted robot camera, giving a better visual immersion and improving manipulation speed. Incorporating predictive visual and haptic feedback significantly improves teleoperation in applications such as search and rescue, inspection, and remote maintenance.
△ Less
Submitted 18 December, 2024;
originally announced December 2024.
-
A Single Channel-Based Neonatal Sleep-Wake Classification using Hjorth Parameters and Improved Gradient Boosting
Authors:
Muhammad Arslan,
Muhammad Mubeen,
Saadullah Farooq Abbasi,
Muhammad Shahbaz Khan,
Wadii Boulila,
Jawad Ahmad
Abstract:
Sleep plays a crucial role in neonatal development. Monitoring the sleep patterns in neonates in a Neonatal Intensive Care Unit (NICU) is imperative for understanding the maturation process. While polysomnography (PSG) is considered the best practice for sleep classification, its expense and reliance on human annotation pose challenges. Existing research often relies on multichannel EEG signals; h…
▽ More
Sleep plays a crucial role in neonatal development. Monitoring the sleep patterns in neonates in a Neonatal Intensive Care Unit (NICU) is imperative for understanding the maturation process. While polysomnography (PSG) is considered the best practice for sleep classification, its expense and reliance on human annotation pose challenges. Existing research often relies on multichannel EEG signals; however, concerns arise regarding the vulnerability of neonates and the potential impact on their sleep quality. This paper introduces a novel approach to neonatal sleep stage classification using a single-channel gradient boosting algorithm with Hjorth features. The gradient boosting parameters are fine-tuned using random search cross-validation (randomsearchCV), achieving an accuracy of 82.35% for neonatal sleep-wake classification. Validation is conducted through 5-fold cross-validation. The proposed algorithm not only enhances existing neonatal sleep algorithms but also opens avenues for broader applications.
△ Less
Submitted 15 August, 2024;
originally announced August 2024.
-
Computational Phase Transitions in Two-Dimensional Antiferromagnetic Melting
Authors:
Zack Weinstein,
Jalal Abu Ahmad,
Daniel Podolsky,
Ehud Altman
Abstract:
A computational phase transition in a classical or quantum system is a non-analytic change in behavior of an order parameter which can only be observed with the assistance of a nontrivial classical computation. Such phase transitions, and the computational observables which detect them, play a crucial role in the optimal decoding of quantum error-correcting codes and in the scalable detection of m…
▽ More
A computational phase transition in a classical or quantum system is a non-analytic change in behavior of an order parameter which can only be observed with the assistance of a nontrivial classical computation. Such phase transitions, and the computational observables which detect them, play a crucial role in the optimal decoding of quantum error-correcting codes and in the scalable detection of measurement-induced phenomena. In this work we show that computational phase transitions and observables can also provide important physical insight on the phase diagram of a classical statistical physics system, specifically in the context of the dislocation-mediated melting of a two-dimensional antiferromagnetic (AF) crystal. In the solid phase, elementary dislocations disrupt the bipartiteness of the underlying square lattice, and as a result, pairs of dislocations are linearly confined by string-like AF domain walls. It has previously been argued that a novel AF tetratic phase can arise when double dislocations proliferate while elementary dislocations remain bound. However, since elementary dislocations carry AF Ising gauge flux, no local order parameter can distinguish between AF and paramagnetic (PM) tetratic regimes, and consequently there is no thermodynamic phase transition separating the two regimes. Nonetheless, we demonstrate that it is possible to algorithmically construct a staggered magnetization which distinguishes the AF and PM tetratic regimes by "pairing" dislocations, which requires an increasingly nontrivial classical computation as elementary dislocation pairs increase in density and unbind. We discuss both algorithm-dependent and "intrinsic" algorithm-independent computational phase transitions in this setting, the latter of which includes a transition in one's ability to consistently sort atoms into two sublattices to construct a well-defined staggered magnetization.
△ Less
Submitted 25 July, 2024;
originally announced July 2024.
-
Exploring the Efficacy of Group-Normalization in Deep Learning Models for Alzheimer's Disease Classification
Authors:
Gousia Habib,
Ishfaq Ahmed Malik,
Jameel Ahmad,
Imtiaz Ahmed,
Shaima Qureshi
Abstract:
Batch Normalization is an important approach to advancing deep learning since it allows multiple networks to train simultaneously. A problem arises when normalizing along the batch dimension because B.N.'s error increases significantly as batch size shrinks because batch statistics estimates are inaccurate. As a result, computer vision tasks like detection, segmentation, and video, which require t…
▽ More
Batch Normalization is an important approach to advancing deep learning since it allows multiple networks to train simultaneously. A problem arises when normalizing along the batch dimension because B.N.'s error increases significantly as batch size shrinks because batch statistics estimates are inaccurate. As a result, computer vision tasks like detection, segmentation, and video, which require tiny batches based on memory consumption, aren't suitable for using Batch Normalization for larger model training and feature transfer. Here, we explore Group Normalization as an easy alternative to using Batch Normalization A Group Normalization is a channel normalization method in which each group is divided into different channels, and the corresponding mean and variance are calculated for each group. Group Normalization computations are accurate across a wide range of batch sizes and are independent of batch size. When trained using a large ImageNet database on ResNet-50, GN achieves a very low error rate of 10.6% compared to Batch Normalization. when a smaller batch size of only 2 is used. For usual batch sizes, the performance of G.N. is comparable to that of Batch Normalization, but at the same time, it outperforms other normalization techniques. Implementing Group Normalization as a direct alternative to B.N to combat the serious challenges faced by the Batch Normalization in deep learning models with comparable or improved classification accuracy. Additionally, Group Normalization can be naturally transferred from the pre-training to the fine-tuning phase. .
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
TIPS: Threat Sharing Information Platform for Enhanced Security
Authors:
Lakshmi Rama Kiran Pasumarthy,
Hisham Ali,
William J Buchanan,
Jawad Ahmad,
Audun Josang,
Vasileios Mavroeidis,
Mouad Lemoudden
Abstract:
There is an increasing need to share threat information for the prevention of widespread cyber-attacks. While threat-related information sharing can be conducted through traditional information exchange methods, such as email communications etc., these methods are often weak in terms of their trustworthiness and privacy. Additionally, the absence of a trust infrastructure between different informa…
▽ More
There is an increasing need to share threat information for the prevention of widespread cyber-attacks. While threat-related information sharing can be conducted through traditional information exchange methods, such as email communications etc., these methods are often weak in terms of their trustworthiness and privacy. Additionally, the absence of a trust infrastructure between different information-sharing domains also poses significant challenges. These challenges include redactment of information, the Right-to-be-forgotten, and access control to the information-sharing elements. These access issues could be related to time bounds, the trusted deletion of data, and the location of accesses. This paper presents an abstraction of a trusted information-sharing process which integrates Attribute-Based Encryption (ABE), Homomorphic Encryption (HE) and Zero Knowledge Proof (ZKP) integrated into a permissioned ledger, specifically Hyperledger Fabric (HLF). It then provides a protocol exchange between two threat-sharing agents that share encrypted messages through a trusted channel. This trusted channel can only be accessed by those trusted in the sharing and could be enabled for each data-sharing element or set up for long-term sharing.
△ Less
Submitted 8 March, 2024;
originally announced March 2024.
-
RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations
Authors:
Muhammad Shahbaz Khan,
Jawad Ahmad,
Ahmed Al-Dubai,
Baraq Ghaleb,
Nikolaos Pitropakis,
William J. Buchanan
Abstract:
Given the security concerns of Internet of Things (IoT) networks and limited computational resources of IoT devices, this paper presents RNA-TransCrypt, a novel image encryption scheme that is not only highly secure but also efficient and lightweight. RNA-TransCrypt integrates the biocryptographic properties of RNA encoding with the non-linearity and unpredictability of chaos theory. This scheme i…
▽ More
Given the security concerns of Internet of Things (IoT) networks and limited computational resources of IoT devices, this paper presents RNA-TransCrypt, a novel image encryption scheme that is not only highly secure but also efficient and lightweight. RNA-TransCrypt integrates the biocryptographic properties of RNA encoding with the non-linearity and unpredictability of chaos theory. This scheme introduces three novel contributions: 1) the two-base RNA encoding method, which transforms the image into RNA strands-like sequence, ensuring efficient scrambling; 2) the transformative substitution technique, which transforms the s-box values before replacing the pixel values, and is responsible for making the scheme lightweight; and 3) three mathematical cryptographic operations designed especially for image encryption that ensure the effective transformation of the s-box values, resulting in a new outcome even for the same input values. These modules are key-dependent, utilizing chaotic keys generated by the De Jong Fractal Map and the Van der Pol Oscillator. Extensive security analysis, including histogram analysis, correlation analysis, and the results of the statistical security parameters obtained from the Gray-Level Co-occurrence Matrix (GLCM) validate the efficacy of the proposed scheme in encrypting input images with close-to-ideal results of 7.997 entropy and 0.0006 correlation.
△ Less
Submitted 9 January, 2024;
originally announced January 2024.
-
GC-VTON: Predicting Globally Consistent and Occlusion Aware Local Flows with Neighborhood Integrity Preservation for Virtual Try-on
Authors:
Hamza Rawal,
Muhammad Junaid Ahmad,
Farooq Zaman
Abstract:
Flow based garment warping is an integral part of image-based virtual try-on networks. However, optimizing a single flow predicting network for simultaneous global boundary alignment and local texture preservation results in sub-optimal flow fields. Moreover, dense flows are inherently not suited to handle intricate conditions like garment occlusion by body parts or by other garments. Forcing flow…
▽ More
Flow based garment warping is an integral part of image-based virtual try-on networks. However, optimizing a single flow predicting network for simultaneous global boundary alignment and local texture preservation results in sub-optimal flow fields. Moreover, dense flows are inherently not suited to handle intricate conditions like garment occlusion by body parts or by other garments. Forcing flows to handle the above issues results in various distortions like texture squeezing, and stretching. In this work, we propose a novel approach where we disentangle the global boundary alignment and local texture preserving tasks via our GlobalNet and LocalNet modules. A consistency loss is then employed between the two modules which harmonizes the local flows with the global boundary alignment. Additionally, we explicitly handle occlusions by predicting body-parts visibility mask, which is used to mask out the occluded regions in the warped garment. The masking prevents the LocalNet from predicting flows that distort texture to compensate for occlusions. We also introduce a novel regularization loss (NIPR), that defines a criteria to identify the regions in the warped garment where texture integrity is violated (squeezed or stretched). NIPR subsequently penalizes the flow in those regions to ensure regular and coherent warps that preserve the texture in local neighborhoods. Evaluation on a widely used virtual try-on dataset demonstrates strong performance of our network compared to the current SOTA methods.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
mmFUSION: Multimodal Fusion for 3D Objects Detection
Authors:
Javed Ahmad,
Alessio Del Bue
Abstract:
Multi-sensor fusion is essential for accurate 3D object detection in self-driving systems. Camera and LiDAR are the most commonly used sensors, and usually, their fusion happens at the early or late stages of 3D detectors with the help of regions of interest (RoIs). On the other hand, fusion at the intermediate level is more adaptive because it does not need RoIs from modalities but is complex as…
▽ More
Multi-sensor fusion is essential for accurate 3D object detection in self-driving systems. Camera and LiDAR are the most commonly used sensors, and usually, their fusion happens at the early or late stages of 3D detectors with the help of regions of interest (RoIs). On the other hand, fusion at the intermediate level is more adaptive because it does not need RoIs from modalities but is complex as the features of both modalities are presented from different points of view. In this paper, we propose a new intermediate-level multi-modal fusion (mmFUSION) approach to overcome these challenges. First, the mmFUSION uses separate encoders for each modality to compute features at a desired lower space volume. Second, these features are fused through cross-modality and multi-modality attention mechanisms proposed in mmFUSION. The mmFUSION framework preserves multi-modal information and learns to complement modalities' deficiencies through attention weights. The strong multi-modal features from the mmFUSION framework are fed to a simple 3D detection head for 3D predictions. We evaluate mmFUSION on the KITTI and NuScenes dataset where it performs better than available early, intermediate, late, and even two-stage based fusion schemes. The code with the mmdetection3D project plugin will be publicly available soon.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
PermutEx: Feature-Extraction-Based Permutation -- A New Diffusion Scheme for Image Encryption Algorithms
Authors:
Muhammad Shahbaz Khan,
Jawad Ahmad,
Ahmed Al-Dubai,
Zakwan Jaroucheh,
Nikolaos Pitropakis,
William J. Buchanan
Abstract:
Traditional permutation schemes mostly focus on random scrambling of pixels, often neglecting the intrinsic image information that could enhance diffusion in image encryption algorithms. This paper introduces PermutEx, a feature-extraction-based permutation method that utilizes inherent image features to scramble pixels effectively. Unlike random permutation schemes, PermutEx extracts the spatial…
▽ More
Traditional permutation schemes mostly focus on random scrambling of pixels, often neglecting the intrinsic image information that could enhance diffusion in image encryption algorithms. This paper introduces PermutEx, a feature-extraction-based permutation method that utilizes inherent image features to scramble pixels effectively. Unlike random permutation schemes, PermutEx extracts the spatial frequency and local contrast features of the image and ranks each pixel based on this information, identifying which pixels are more important or information-rich based on texture and edge information. In addition, a unique permutation key is generated using the Logistic-Sine Map based on chaotic behavior. The ranked pixels are permuted in conjunction with this unique key, effectively permuting the original image into a scrambled version. Experimental results indicate that the proposed method effectively disrupts the correlation in information-rich areas within the image resulting in a correlation value of 0.000062. The effective scrambling of pixels, resulting in nearly zero correlation, makes this method suitable to be used as diffusion in image encryption algorithms.
△ Less
Submitted 5 November, 2023;
originally announced November 2023.
-
PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks
Authors:
Hisham Ali,
Mwrwan Abubakar,
Jawad Ahmad,
William J. Buchanan,
Zakwan Jaroucheh
Abstract:
In recent years, there has been a significant proliferation of industrial Internet of Things (IoT) applications, with a wide variety of use cases being developed and put into operation. As the industrial IoT landscape expands, the establishment of secure and reliable infrastructure becomes crucial to instil trust among users and stakeholders, particularly in addressing fundamental concerns such as…
▽ More
In recent years, there has been a significant proliferation of industrial Internet of Things (IoT) applications, with a wide variety of use cases being developed and put into operation. As the industrial IoT landscape expands, the establishment of secure and reliable infrastructure becomes crucial to instil trust among users and stakeholders, particularly in addressing fundamental concerns such as traceability, integrity protection, and privacy that some industries still encounter today. This paper introduces a privacy-preserving method in the industry's IoT systems using blockchain-based data access control for remote industry safety monitoring and maintaining event information confidentiality, integrity and authenticity.
△ Less
Submitted 8 October, 2023;
originally announced October 2023.
-
CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption
Authors:
Hassan Ali,
Muhammad Shahbaz Khan,
Maha Driss,
Jawad Ahmad,
William J. Buchanan,
Nikolaos Pitropakis
Abstract:
In the era of Industrial IoT (IIoT) and Industry 4.0, ensuring secure data transmission has become a critical concern. Among other data types, images are widely transmitted and utilized across various IIoT applications, ranging from sensor-generated visual data and real-time remote monitoring to quality control in production lines. The encryption of these images is essential for maintaining operat…
▽ More
In the era of Industrial IoT (IIoT) and Industry 4.0, ensuring secure data transmission has become a critical concern. Among other data types, images are widely transmitted and utilized across various IIoT applications, ranging from sensor-generated visual data and real-time remote monitoring to quality control in production lines. The encryption of these images is essential for maintaining operational integrity, data confidentiality, and seamless integration with analytics platforms. This paper addresses these critical concerns by proposing a robust image encryption algorithm tailored for IIoT and Cyber-Physical Systems (CPS). The algorithm combines Rule-30 cellular automata with chaotic scrambling and substitution. The Rule 30 cellular automata serves as an efficient mechanism for generating pseudo-random sequences that enable fast encryption and decryption cycles suitable for real-time sensor data in industrial settings. Most importantly, it induces non-linearity in the encryption algorithm. Furthermore, to increase the chaotic range and keyspace of the algorithm, which is vital for security in distributed industrial networks, a hybrid chaotic map, i.e., logistic-sine map is utilized. Extensive security analysis has been carried out to validate the efficacy of the proposed algorithm. Results indicate that our algorithm achieves close-to-ideal values, with an entropy of 7.99 and a correlation of 0.002. This enhances the algorithm's resilience against potential cyber-attacks in the industrial domain.
△ Less
Submitted 20 September, 2023;
originally announced September 2023.
-
Noise-Crypt: Image Encryption with Non-linear Noise, Hybrid Chaotic Maps, and Hashing
Authors:
Laiba Asghar,
Fawad Ahmed,
Muhammad Shahbaz Khan,
Arshad Arshad,
Jawad Ahmad
Abstract:
To secure the digital images over insecure transmission channels, a new image encryption algorithm Noise-Crypt is proposed in this paper. Noise-Crypt integrates non-linear random noise, hybrid chaotic maps, and SHA-256 hashing algorithm. The utilized hybrid chaotic maps are the logistic-tent and the logistic-sine-cosine map. The hybrid chaotic maps enhance the pseudorandom sequence generation and…
▽ More
To secure the digital images over insecure transmission channels, a new image encryption algorithm Noise-Crypt is proposed in this paper. Noise-Crypt integrates non-linear random noise, hybrid chaotic maps, and SHA-256 hashing algorithm. The utilized hybrid chaotic maps are the logistic-tent and the logistic-sine-cosine map. The hybrid chaotic maps enhance the pseudorandom sequence generation and selection of substitution boxes, while the logistic-sine-cosine map induces non-linearity in the algorithm through random noise. This deliberate inclusion of noise contributes to increased resistance against cryptanalysis. The proposed scheme has been evaluated for several security parameters, such as differential attacks, entropy, correlation, etc. Extensive evaluation demonstrates the efficacy of the proposed scheme, with almost ideal values of entropy of 7.99 and correlation of -0.0040. Results of the security analysis validate the potency of the proposed scheme in achieving robust image encryption.
△ Less
Submitted 20 September, 2023;
originally announced September 2023.
-
SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data
Authors:
Muhammad Shahbaz Khan,
Jawad Ahmad,
Hisham Ali,
Nikolaos Pitropakis,
Ahmed Al-Dubai,
Baraq Ghaleb,
William J. Buchanan
Abstract:
With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlated regions of an image. This paper addresses the security issues presented by three prevalent S-box substitution methods, i.e., single S-box, multiple…
▽ More
With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlated regions of an image. This paper addresses the security issues presented by three prevalent S-box substitution methods, i.e., single S-box, multiple S-boxes, and multiple rounds with multiple S-boxes, especially when handling images with highly auto-correlated pixels. To resolve the addressed security issues, this paper proposes a new scheme SRSS-the Single Round Single S-Box encryption scheme. SRSS uses a single S-box for substitution in just one round to break the pixel correlations and encrypt the plaintext image effectively. Additionally, this paper introduces a new Chaos-based Random Operation Selection System-CROSS, which nullifies the requirement for multiple S-boxes, thus reducing the encryption scheme's complexity. By randomly selecting the operation to be performed on each pixel, driven by a chaotic sequence, the proposed scheme effectively scrambles even high auto-correlation areas. When compared to the substitution methods mentioned above, the proposed encryption scheme exhibited exceptionally well in just a single round with a single S-box. The close-to-ideal statistical security analysis results, i.e., an entropy of 7.89 and a correlation coefficient of 0.007, validate the effectiveness of the proposed scheme. This research offers an innovative path forward for securing images in applications requiring low computational complexity and fast encryption and decryption speeds.
△ Less
Submitted 21 August, 2023;
originally announced August 2023.
-
Resolving the Decreased Rank Attack in RPL's IoT Networks
Authors:
B. Ghaleb,
A. Al-Dubai,
A. Hussain,
J. Ahmad,
I. Romdhani,
Z. Jaroucheh
Abstract:
The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core communication technology for the Internet of Things (IoT) networks. RPL organizes its network in the form of a tree-like structure where a node is co…
▽ More
The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core communication technology for the Internet of Things (IoT) networks. RPL organizes its network in the form of a tree-like structure where a node is configured as the root of the tree while others integrate themselves into that structure based on their relative distance. A value called the Rank is used to define each node's relative position and it is used by other nodes to take their routing decisions. A malicious node can illegitimately claim a closer position to the root by advertising a lower rank value trapping other nodes to forward their traffic through that malicious node. In this study, we show how this behavior can have a detrimental side effect on the network via extensive simulations and propose a new secure objective function to prevent such an attack.
△ Less
Submitted 17 May, 2023;
originally announced May 2023.
-
Distributed Twins in Edge Computing: Blockchain and IOTA
Authors:
Anwar Sadad,
Muazzam A. Khan,
Baraq Ghaleb,
Fadia Ali Khan,
Maha Driss,
Wadii Boulila,
Jawad Ahmad
Abstract:
Blockchain (BC) and Information for Operational and Tactical Analysis (IOTA) are distributed ledgers that record a huge number of transactions in multiple places at the same time using decentralized databases. Both BC and IOTA facilitate Internet-of-Things (IoT) by overcoming the issues related to traditional centralized systems, such as privacy, security, resources cost, performance, and transpar…
▽ More
Blockchain (BC) and Information for Operational and Tactical Analysis (IOTA) are distributed ledgers that record a huge number of transactions in multiple places at the same time using decentralized databases. Both BC and IOTA facilitate Internet-of-Things (IoT) by overcoming the issues related to traditional centralized systems, such as privacy, security, resources cost, performance, and transparency. Still, IoT faces the potential challenges of real-time processing, resource management, and storage services. Edge computing (EC) has been introduced to tackle the underlying challenges of IoT by providing real-time processing, resource management, and storage services nearer to IoT devices on the network's edge. To make EC more efficient and effective, solutions using BC and IOTA have been devoted to this area. However, BC and IOTA came with their pitfalls. This survey outlines the pitfalls of BC and IOTA in EC and provides research directions to be investigated further.
△ Less
Submitted 29 April, 2023;
originally announced May 2023.
-
Analyzing the Knock-on Impacts of 2022 Floods on Rabi 2023 Using Remote Sensing and Field Surveys
Authors:
Mohammad Sohail,
Usman Nazir,
Jawairia Ahmad,
Abubakr Muhammad,
Murtaza Taj,
Ritvik Sahajpal
Abstract:
While the world's attention is focused on immediate relief and rescue operations for the affectees of the current floods in Pakistan, knock-on effects are expected to play further havoc with the country's economy and food security in the coming months. Significant crop yield losses had already occurred for Winter (Rabi) 2021-22 due to a heatwave earlier in the year and estimates for the Summer (Kh…
▽ More
While the world's attention is focused on immediate relief and rescue operations for the affectees of the current floods in Pakistan, knock-on effects are expected to play further havoc with the country's economy and food security in the coming months. Significant crop yield losses had already occurred for Winter (Rabi) 2021-22 due to a heatwave earlier in the year and estimates for the Summer (Kharif) 2022 crop damage due to flood inundation have already been determined to be very high. With the next sowing season already upon the flood affectees, there is a big question mark over the resumption of agricultural activity in disaster-struck districts. This study is aimed at analyzing the range of influences of the 2022 floods on the upcoming winter (Rabi) crop. Satellite-based remote sensing data, state-of-the-art Earth system models, and field observations will be leveraged to estimate the impacts of the flood on the resumption of agricultural activity in the most impacted districts of Southern Punjab, Sindh, and Baluchistan. The field surveys are conducted during multiple visits to the study area to maximize the monitoring of on-ground conditions and provide a larger validation dataset for the satellite-based inundation and crop classification maps. The project leverages on the expertise and previous experiences of the LUMS team in performing satellite-based land/crop classification, estimation of soil moisture levels for irrigation activity, and determining changes in land-use patterns for detecting key agricultural activities. Delays in the sowing of the winter crop and its effects on crop-yield were analyzed through this study.
△ Less
Submitted 17 May, 2023; v1 submitted 21 March, 2023;
originally announced April 2023.
-
Contactless Human Activity Recognition using Deep Learning with Flexible and Scalable Software Define Radio
Authors:
Muhammad Zakir Khan,
Jawad Ahmad,
Wadii Boulila,
Matthew Broadbent,
Syed Aziz Shah,
Anis Koubaa,
Qammer H. Abbasi
Abstract:
Ambient computing is gaining popularity as a major technological advancement for the future. The modern era has witnessed a surge in the advancement in healthcare systems, with viable radio frequency solutions proposed for remote and unobtrusive human activity recognition (HAR). Specifically, this study investigates the use of Wi-Fi channel state information (CSI) as a novel method of ambient sens…
▽ More
Ambient computing is gaining popularity as a major technological advancement for the future. The modern era has witnessed a surge in the advancement in healthcare systems, with viable radio frequency solutions proposed for remote and unobtrusive human activity recognition (HAR). Specifically, this study investigates the use of Wi-Fi channel state information (CSI) as a novel method of ambient sensing that can be employed as a contactless means of recognizing human activity in indoor environments. These methods avoid additional costly hardware required for vision-based systems, which are privacy-intrusive, by (re)using Wi-Fi CSI for various safety and security applications. During an experiment utilizing universal software-defined radio (USRP) to collect CSI samples, it was observed that a subject engaged in six distinct activities, which included no activity, standing, sitting, and leaning forward, across different areas of the room. Additionally, more CSI samples were collected when the subject walked in two different directions. This study presents a Wi-Fi CSI-based HAR system that assesses and contrasts deep learning approaches, namely convolutional neural network (CNN), long short-term memory (LSTM), and hybrid (LSTM+CNN), employed for accurate activity recognition. The experimental results indicate that LSTM surpasses current models and achieves an average accuracy of 95.3% in multi-activity classification when compared to CNN and hybrid techniques. In the future, research needs to study the significance of resilience in diverse and dynamic environments to identify the activity of multiple users.
△ Less
Submitted 18 April, 2023;
originally announced April 2023.
-
Aggregate Markov models in life insurance: estimation via the EM algorithm
Authors:
Jamaal Ahmad,
Mogens Bladt
Abstract:
In this paper, we consider statistical estimation of time-inhomogeneous aggregate Markov models. Unaggregated models, which corresponds to Markov chains, are commonly used in multi-state life insurance to model the biometric states of an insured. By aggregating microstates to each biometric state, we are able to model dependencies between transitions of the biometric states as well as the distribu…
▽ More
In this paper, we consider statistical estimation of time-inhomogeneous aggregate Markov models. Unaggregated models, which corresponds to Markov chains, are commonly used in multi-state life insurance to model the biometric states of an insured. By aggregating microstates to each biometric state, we are able to model dependencies between transitions of the biometric states as well as the distribution of occupancy in these. This allows for non--Markovian modelling in general. Since only paths of the macrostates are observed, we develop an expectation-maximization (EM) algorithm to obtain maximum likelihood estimates of transition intensities on the micro level. Special attention is given to a semi-Markovian case, known as the reset property, which leads to simplified estimation procedures where EM algorithms for inhomogeneous phase-type distributions can be used as building blocks. We provide a numerical example of the latter in combination with piecewise constant transition rates in a three-state disability model with data simulated from a time-inhomogeneous semi-Markov model. Comparisons of our fits with more classic GLM-based fits as well as true and empirical distributions are provided to relate our model with existing models and their tools.
△ Less
Submitted 10 August, 2023; v1 submitted 20 December, 2022;
originally announced December 2022.
-
Aggregate Markov models in life insurance: properties and valuation
Authors:
Jamaal Ahmad,
Mogens Bladt,
Christian Furrer
Abstract:
In multi-state life insurance, an adequate balance between analytic tractability, computational efficiency, and statistical flexibility is of great importance. This might explain the popularity of Markov chain modelling, where matrix analytic methods allow for a comprehensive treatment. Unfortunately, Markov chain modelling is unable to capture duration effects, so this paper presents aggregate Ma…
▽ More
In multi-state life insurance, an adequate balance between analytic tractability, computational efficiency, and statistical flexibility is of great importance. This might explain the popularity of Markov chain modelling, where matrix analytic methods allow for a comprehensive treatment. Unfortunately, Markov chain modelling is unable to capture duration effects, so this paper presents aggregate Markov models as an alternative. Aggregate Markov models retain most of the analytical tractability of Markov chains, yet are non-Markovian and thus more flexible. Based on an explicit characterization of the fundamental martingales, matrix representations of the expected accumulated cash flows and corresponding prospective reserves are derived for duration-dependent payments with and without incidental policyholder behaviour. Throughout, special attention is given to a semi-Markovian case. Finally, the methods and results are illustrated in a numerical example.
△ Less
Submitted 23 April, 2024; v1 submitted 7 December, 2022;
originally announced December 2022.
-
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
Authors:
Fawad Ahmed,
Muneeb Ur Rehman,
Jawad Ahmad,
Muhammad Shahbaz Khan,
Wadii Boulila,
Gautam Srivastava,
Jerry Chun-Wei Lin,
William J. Buchanan
Abstract:
With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally results in low encryption/decryption speed along with exerting a burden on the limited bandwidth of the transmission channel. To address the aforement…
▽ More
With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally results in low encryption/decryption speed along with exerting a burden on the limited bandwidth of the transmission channel. To address the aforementioned issues, a new encryption scheme for colour images employing convolutional autoencoder, DNA and chaos is presented in this paper. The proposed scheme has two main modules, the dimensionality conversion module using the proposed convolutional autoencoder, and the encryption/decryption module using DNA and chaos. The dimension of the input colour image is first reduced from N $\times$ M $\times$ 3 to P $\times$ Q gray-scale image using the encoder. Encryption and decryption are then performed in the reduced dimension space. The decrypted gray-scale image is upsampled to obtain the original colour image having dimension N $\times$ M $\times$ 3. The training and validation accuracy of the proposed autoencoder is 97% and 95%, respectively. Once the autoencoder is trained, it can be used to reduce and subsequently increase the dimension of any arbitrary input colour image. The efficacy of the designed autoencoder has been demonstrated by the successful reconstruction of the compressed image into the original colour image with negligible perceptual distortion. The second major contribution presented in this paper is an image encryption scheme using DNA along with multiple chaotic sequences and substitution boxes. The security of the proposed image encryption algorithm has been gauged using several evaluation parameters, such as histogram of the cipher image, entropy, NPCR, UACI, key sensitivity, contrast, etc. encryption.
△ Less
Submitted 7 November, 2022;
originally announced November 2022.
-
Estimating absorption time distributions of general Markov jump processes
Authors:
Jamaal Ahmad,
Martin Bladt,
Mogens Bladt
Abstract:
The estimation of absorption time distributions of Markov jump processes is an important task in various branches of statistics and applied probability. While the time-homogeneous case is classic, the time-inhomogeneous case has recently received increased attention due to its added flexibility and advances in computational power. However, commuting sub-intensity matrices are assumed, which in var…
▽ More
The estimation of absorption time distributions of Markov jump processes is an important task in various branches of statistics and applied probability. While the time-homogeneous case is classic, the time-inhomogeneous case has recently received increased attention due to its added flexibility and advances in computational power. However, commuting sub-intensity matrices are assumed, which in various cases limits the parsimonious properties of the resulting representation. This paper develops the theory required to solve the general case through maximum likelihood estimation, and in particular, using the expectation-maximization algorithm. A reduction to a piecewise constant intensity matrix function is proposed in order to provide succinct representations, where a parametric linear model binds the intensities together. Practical aspects are discussed and illustrated through the estimation of notoriously demanding theoretical distributions and real data, from the perspective of matrix analytic methods.
△ Less
Submitted 22 July, 2022;
originally announced July 2022.
-
Phase-type representations of stochastic interest rates with applications to life insurance
Authors:
Jamaal Ahmad,
Mogens Bladt
Abstract:
The purpose of the present paper is to incorporate stochastic interest rates into a matrix-approach to multi-state life insurance, where formulas for reserves, moments of future payments and equivalence premiums can be obtained as explicit formulas in terms of product integrals or matrix exponentials. To this end we consider the Markovian interest model, where the rates are piecewise deterministic…
▽ More
The purpose of the present paper is to incorporate stochastic interest rates into a matrix-approach to multi-state life insurance, where formulas for reserves, moments of future payments and equivalence premiums can be obtained as explicit formulas in terms of product integrals or matrix exponentials. To this end we consider the Markovian interest model, where the rates are piecewise deterministic (or even constant) in the different states of a Markov jump process, and which is shown to integrate naturally into the matrix framework. The discounting factor then becomes the price of a zero-coupon bond which may or may not be correlated with the biometric insurance process. Another nice feature about the Markovian interest model is that the price of the bond coincides with the survival function of a phase-type distributed random variable. This, in particular, allows for calibrating the Markovian interest rate models using a maximum likelihood approach to observed data (prices) or to theoretical models like e.g. a Vasicek model. Due to the denseness of phase-type distributions, we can approximate the price behaviour of any zero-coupon bond with interest rates bounded from below by choosing the number of possible interest rate values sufficiently large. For observed data models with few data points, lower dimensions will usually suffice, while for theoretical models the dimensionality is only a computational issue.
△ Less
Submitted 17 November, 2022; v1 submitted 22 July, 2022;
originally announced July 2022.
-
The Untold Impact of Learning Approaches on Software Fault-Proneness Predictions
Authors:
Mohammad Jamil Ahmad,
Katerina Goseva-Popstojanova,
Robyn R. Lutz
Abstract:
Software fault-proneness prediction is an active research area, with many factors affecting prediction performance extensively studied. However, the impact of the learning approach (i.e., the specifics of the data used for training and the target variable being predicted) on the prediction performance has not been studied, except for one initial work. This paper explores the effects of two learnin…
▽ More
Software fault-proneness prediction is an active research area, with many factors affecting prediction performance extensively studied. However, the impact of the learning approach (i.e., the specifics of the data used for training and the target variable being predicted) on the prediction performance has not been studied, except for one initial work. This paper explores the effects of two learning approaches, useAllPredictAll and usePrePredictPost, on the performance of software fault-proneness prediction, both within-release and across-releases. The empirical results are based on data extracted from 64 releases of twelve open-source projects. Results show that the learning approach has a substantial, and typically unacknowledged, impact on the classification performance. Specifically, using useAllPredictAll leads to significantly better performance than using usePrePredictPost learning approach, both within-release and across-releases. Furthermore, this paper uncovers that, for within-release predictions, this difference in classification performance is due to different levels of class imbalance in the two learning approaches. When class imbalance is addressed, the performance difference between the learning approaches is eliminated. Our findings imply that the learning approach should always be explicitly identified and its impact on software fault-proneness prediction considered. The paper concludes with a discussion of potential consequences of our results for both research and practice.
△ Less
Submitted 12 July, 2022;
originally announced July 2022.
-
A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids
Authors:
Awais Aziz Shah,
Ahsan Adeel,
Jawad Ahmad,
Ahmed Al-Dubai,
Mandar Gogate,
Abhijeet Bishnu,
Muhammad Diyan,
Tassadaq Hussain,
Kia Dashtipour,
Tharm Ratnarajah,
Amir Hussain
Abstract:
Multimodal hearing aids (HAs) aim to deliver more intelligible audio in noisy environments by contextually sensing and processing data in the form of not only audio but also visual information (e.g. lip reading). Machine learning techniques can play a pivotal role for the contextually processing of multimodal data. However, since the computational power of HA devices is low, therefore this data mu…
▽ More
Multimodal hearing aids (HAs) aim to deliver more intelligible audio in noisy environments by contextually sensing and processing data in the form of not only audio but also visual information (e.g. lip reading). Machine learning techniques can play a pivotal role for the contextually processing of multimodal data. However, since the computational power of HA devices is low, therefore this data must be processed either on the edge or cloud which, in turn, poses privacy concerns for sensitive user data. Existing literature proposes several techniques for data encryption but their computational complexity is a major bottleneck to meet strict latency requirements for development of future multi-modal hearing aids. To overcome this problem, this paper proposes a novel real-time audio/visual data encryption scheme based on chaos-based encryption using the Tangent-Delay Ellipse Reflecting Cavity-Map System (TD-ERCS) map and Non-linear Chaotic (NCA) Algorithm. The results achieved against different security parameters, including Correlation Coefficient, Unified Averaged Changed Intensity (UACI), Key Sensitivity Analysis, Number of Changing Pixel Rate (NPCR), Mean-Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Entropy test, and Chi-test, indicate that the newly proposed scheme is more lightweight due to its lower execution time as compared to existing schemes and more secure due to increased key-space against modern brute-force attacks.
△ Less
Submitted 11 February, 2022;
originally announced February 2022.
-
Ransomware: Analysing the Impact on Windows Active Directory Domain Services
Authors:
Grant McDonald,
Pavlos Papadopoulos,
Nikolaos Pitropakis,
Jawad Ahmad,
William J. Buchanan
Abstract:
Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to succumb to ransom demands as part of operating expenses to counter the cost incurred from downtime. Despite the prevalence of ransomware as a threat t…
▽ More
Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to succumb to ransom demands as part of operating expenses to counter the cost incurred from downtime. Despite the prevalence of ransomware as a threat towards organisations, there is very little information outlining how ransomware affects Windows Server environments, and particularly its proprietary domain services such as Active Directory. Hence, we aim to increase the cyber situational awareness of organisations and corporations that utilise these environments. Dynamic analysis was performed using three ransomware variants to uncover how crypto-ransomware affects Windows Server-specific services and processes. Our work outlines the practical investigation undertaken as WannaCry, TeslaCrypt, and Jigsaw were acquired and tested against several domain services. The findings showed that none of the three variants stopped the processes and decidedly left all domain services untouched. However, although the services remained operational, they became uniquely dysfunctional as ransomware encrypted the files pertaining to those services
△ Less
Submitted 7 February, 2022;
originally announced February 2022.
-
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers
Authors:
Hisham Ali,
Pavlos Papadopoulos,
Jawad Ahmad,
Nikolaos Pitropakis,
Zakwan Jaroucheh,
William J. Buchanan
Abstract:
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the risk of a potential cyberattack - the requirements for threat information sharing range from simplistic sharing of documents to threat intelligence sh…
▽ More
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the risk of a potential cyberattack - the requirements for threat information sharing range from simplistic sharing of documents to threat intelligence sharing. Therefore, the storage and sharing of highly sensitive threat information raises considerable concerns regarding constructing a secure, trusted threat information exchange infrastructure. Establishing a trusted ecosystem for threat sharing will promote the validity, security, anonymity, scalability, latency efficiency, and traceability of the stored information that protects it from unauthorized disclosure. This paper proposes a system that ensures the security principles mentioned above by utilizing a distributed ledger technology that provides secure decentralized operations through smart contracts and provides a privacy-preserving ecosystem for threat information storage and sharing regarding the MITRE ATT\&CK framework.
△ Less
Submitted 19 December, 2021;
originally announced December 2021.
-
Evolution of Target Localization in Wireless Sensor Network (WSN): A Review
Authors:
Muneeb A. Khan,
Muazzam A. Khan,
Maha Driss,
Wadii Boulila,
Jawad Ahmad
Abstract:
Wireless Sensor Network holds a pivotal position and gained a lot of attention from researchers in recent years. Sensor nodes have been used in vast applications such as environment monitoring, security purpose applications, and target tracking. This latter comprises of detection and monitoring of the target movement. In this paper, we explore in detail well-known target tracking techniques. The e…
▽ More
Wireless Sensor Network holds a pivotal position and gained a lot of attention from researchers in recent years. Sensor nodes have been used in vast applications such as environment monitoring, security purpose applications, and target tracking. This latter comprises of detection and monitoring of the target movement. In this paper, we explore in detail well-known target tracking techniques. The existing techniques are evaluated using metrics such as network topology, target recovery, energy efficiency, and security. We also discuss some of the challenges that affect the performance of tracking schemes. Furthermore, a thorough analysis is performed on existing techniques and future directions are explored.
△ Less
Submitted 8 July, 2021;
originally announced July 2021.
-
Intrusion Detection using Machine Learning Techniques: An Experimental Comparison
Authors:
Kathryn-Ann Tait,
Jan Sher Khan,
Fehaid Alqahtani,
Awais Aziz Shah,
Fadia Ali Khan,
Mujeeb Ur Rehman,
Wadii Boulila,
Jawad Ahmad
Abstract:
Due to an exponential increase in the number of cyber-attacks, the need for improved Intrusion Detection Systems (IDS) is apparent than ever. In this regard, Machine Learning (ML) techniques are playing a pivotal role in the early classification of the attacks in case of intrusion detection within the system. However, due to a large number of algorithms available, the selection of the right method…
▽ More
Due to an exponential increase in the number of cyber-attacks, the need for improved Intrusion Detection Systems (IDS) is apparent than ever. In this regard, Machine Learning (ML) techniques are playing a pivotal role in the early classification of the attacks in case of intrusion detection within the system. However, due to a large number of algorithms available, the selection of the right method is a challenging task. To resolve this issue, this paper analyses some of the current state-of-the-art intrusion detection methods and discusses their pros and cons. Further, a review of different ML methods is carried out with four methods showing to be the most suitable one for classifying attacks. Several algorithms are selected and investigated to evaluate the performance of IDS. These IDS classifies binary and multiclass attacks in terms of detecting whether or not the traffic has been considered as benign or an attack. The experimental results demonstrate that binary classification has greater consistency in their accuracy results which ranged from 0.9938 to 0.9977, while multiclass ranges from 0.9294 to 0.9983. However, it has been also observed that multiclass provides the best results with the algorithm k-Nearest neighbor giving an accuracy score of 0.9983 while the binary classification highest score is 0.9977 from Random Forest. The experimental results demonstrate that multiclass classification produces better performance in terms of intrusion detection by specifically differentiating between the attacks and allowing a more targeted response to an attack.
△ Less
Submitted 27 May, 2021;
originally announced May 2021.
-
GuideMe: A Mobile Application based on Global Positioning System and Object Recognition Towards a Smart Tourist Guide
Authors:
Wadii Boulila,
Anmar Abuhamdah,
Maha Driss,
Slim Kammoun,
Jawad Ahmad
Abstract:
Finding information about tourist places to visit is a challenging problem that people face while visiting different countries. This problem is accentuated when people are coming from different countries, speak different languages, and are from all segments of society. In this context, visitors and pilgrims face important problems to find the appropriate doaas when visiting holy places. In this pa…
▽ More
Finding information about tourist places to visit is a challenging problem that people face while visiting different countries. This problem is accentuated when people are coming from different countries, speak different languages, and are from all segments of society. In this context, visitors and pilgrims face important problems to find the appropriate doaas when visiting holy places. In this paper, we propose a mobile application that helps the user find the appropriate doaas for a given holy place in an easy and intuitive manner. Three different options are developed to achieve this goal: 1) manual search, 2) GPS location to identify the holy places and therefore their corresponding doaas, and 3) deep learning (DL) based method to determine the holy place by analyzing an image taken by the visitor. Experiments show good performance of the proposed mobile application in providing the appropriate doaas for visited holy places.
△ Less
Submitted 27 May, 2021;
originally announced May 2021.
-
Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions
Authors:
Maha Driss,
Daniah Hasan,
Wadii Boulila,
Jawad Ahmad
Abstract:
In recent years, the Internet of Things (IoT) technology has led to the emergence of multiple smart applications in different vital sectors including healthcare, education, agriculture, energy management, etc. IoT aims to interconnect several intelligent devices over the Internet such as sensors, monitoring systems, and smart appliances to control, store, exchange, and analyze collected data. The…
▽ More
In recent years, the Internet of Things (IoT) technology has led to the emergence of multiple smart applications in different vital sectors including healthcare, education, agriculture, energy management, etc. IoT aims to interconnect several intelligent devices over the Internet such as sensors, monitoring systems, and smart appliances to control, store, exchange, and analyze collected data. The main issue in IoT environments is that they can present potential vulnerabilities to be illegally accessed by malicious users, which threatens the safety and privacy of gathered data. To face this problem, several recent works have been conducted using microservices-based architecture to minimize the security threats and attacks related to IoT data. By employing microservices, these works offer extensible, reusable, and reconfigurable security features. In this paper, we aim to provide a survey about microservices-based approaches for securing IoT applications. This survey will help practitioners understand ongoing challenges and explore new and promising research opportunities in the IoT security field. To the best of our knowledge, this paper constitutes the first survey that investigates the use of microservices technology for securing IoT applications.
△ Less
Submitted 17 May, 2021;
originally announced May 2021.
-
Voting Classifier-based Intrusion Detection for IoT Networks
Authors:
Muhammad Almas Khan,
Muazzam A Khan,
Shahid Latif,
Awais Aziz Shah,
Mujeeb Ur Rehman,
Wadii Boulila,
Maha Driss,
Jawad Ahmad
Abstract:
Internet of Things (IoT) is transforming human lives by paving the way for the management of physical devices on the edge. These interconnected IoT objects share data for remote accessibility and can be vulnerable to open attacks and illegal access. Intrusion detection methods are commonly used for the detection of such kinds of attacks but with these methods, the performance/accuracy is not optim…
▽ More
Internet of Things (IoT) is transforming human lives by paving the way for the management of physical devices on the edge. These interconnected IoT objects share data for remote accessibility and can be vulnerable to open attacks and illegal access. Intrusion detection methods are commonly used for the detection of such kinds of attacks but with these methods, the performance/accuracy is not optimal. This work introduces a novel intrusion detection approach based on an ensemble-based voting classifier that combines multiple traditional classifiers as a base learner and gives the vote to the predictions of the traditional classifier in order to get the final prediction. To test the effectiveness of the proposed approach, experiments are performed on a set of seven different IoT devices and tested for binary attack classification and multi-class attack classification. The results illustrate prominent accuracies on Global Positioning System (GPS) sensors and weather sensors to 96% and 97% and for other machine learning algorithms to 85% and 87%, respectively. Furthermore, comparison with other traditional machine learning methods validates the superiority of the proposed algorithm.
△ Less
Submitted 25 April, 2021; v1 submitted 20 April, 2021;
originally announced April 2021.
-
A Novel CNN-LSTM-based Approach to Predict Urban Expansion
Authors:
Wadii Boulila,
Hamza Ghandorh,
Mehshan Ahmed Khan,
Fawad Ahmed,
Jawad Ahmad
Abstract:
Time-series remote sensing data offer a rich source of information that can be used in a wide range of applications, from monitoring changes in land cover to surveilling crops, coastal changes, flood risk assessment, and urban sprawl. This paper addresses the challenge of using time-series satellite images to predict urban expansion. Building upon previous work, we propose a novel two-step approac…
▽ More
Time-series remote sensing data offer a rich source of information that can be used in a wide range of applications, from monitoring changes in land cover to surveilling crops, coastal changes, flood risk assessment, and urban sprawl. This paper addresses the challenge of using time-series satellite images to predict urban expansion. Building upon previous work, we propose a novel two-step approach based on semantic image segmentation in order to predict urban expansion. The first step aims to extract information about urban regions at different time scales and prepare them for use in the training step. The second step combines Convolutional Neural Networks (CNN) with Long Short Term Memory (LSTM) methods in order to learn temporal features and thus predict urban expansion. In this paper, experimental results are conducted using several multi-date satellite images representing the three largest cities in Saudi Arabia, namely: Riyadh, Jeddah, and Dammam. We empirically evaluated our proposed technique, and examined its results by comparing them with state-of-the-art approaches. Following this evaluation, we determined that our results reveal improved performance for the new-coupled CNN-LSTM approach, particularly in terms of assessments based on Mean Square Error, Root Mean Square Error, Peak Signal to Noise Ratio, Structural Similarity Index, and overall classification accuracy.
△ Less
Submitted 2 March, 2021;
originally announced March 2021.
-
Multivariate higher order moments in multi-state life insurance
Authors:
Jamaal Ahmad
Abstract:
It is well-known that combining life annuities and death benefits introduce opposite effects in payments with respect to the mortality risk on the lifetime of the insured. In a general multi-state framework with multiple product types, such joint effects are less trivial. In this paper, we consider a multivariate payment process in multi-state life insurance, where the components are defined in te…
▽ More
It is well-known that combining life annuities and death benefits introduce opposite effects in payments with respect to the mortality risk on the lifetime of the insured. In a general multi-state framework with multiple product types, such joint effects are less trivial. In this paper, we consider a multivariate payment process in multi-state life insurance, where the components are defined in terms of the same Markovian state process. The multivariate present value of future payments is introduced, and we derive differential equations and product integral representations of its conditional moments and moment generating function. Special attention is given to pair-wise covariances between two present values, where results closely connected to Hattendorff type of results for the variance are derived. The results are illustrated in a numerical example in a disability model.
△ Less
Submitted 1 October, 2021; v1 submitted 22 February, 2021;
originally announced February 2021.
-
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
Authors:
Andrew Churcher,
Rehmat Ullah,
Jawad Ahmad,
Sadaqat ur Rehman,
Fawad Masood,
Mandar Gogate,
Fehaid Alqahtani,
Boubakr Nour,
William J. Buchanan
Abstract:
In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As…
▽ More
In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As the number of attacks possible on a network increases, it becomes more difficult for traditional intrusion detection systems (IDS) to cope with these attacks efficiently. In this paper, we highlight several machine learning (ML) methods such as k-nearest neighbour (KNN), support vector machine (SVM), decision tree (DT), naive Bayes (NB), random forest (RF), artificial neural network (ANN), and logistic regression (LR) that can be used in IDS. In this work, ML algorithms are compared for both binary and multi-class classification on Bot-IoT dataset. Based on several parameters such as accuracy, precision, recall, F1 score, and log loss, we experimentally compared the aforementioned ML algorithms. In the case of HTTP distributed denial-of-service (DDoS) attack, the accuracy of RF is 99%. Furthermore, other simulation results-based precision, recall, F1 score, and log loss metric reveal that RF outperforms on all types of attacks in binary classification. However, in multi-class classification, KNN outperforms other ML algorithms with an accuracy of 99%, which is 4% higher than RF.
△ Less
Submitted 10 January, 2021;
originally announced January 2021.
-
piSAAC: Extended notion of SAAC feature selection novel method for discrimination of Enzymes model using different machine learning algorithm
Authors:
Zaheer Ullah Khan,
Dechang Pi,
Izhar Ahmed Khan,
Asif Nawaz,
Jamil Ahmad,
Mushtaq Hussain
Abstract:
Enzymes and proteins are live driven biochemicals, which has a dramatic impact over the environment, in which it is active. So, therefore, it is highly looked-for to build such a robust and highly accurate automatic and computational model to accurately predict enzymes nature. In this study, a novel split amino acid composition model named piSAAC is proposed. In this model, protein sequence is dis…
▽ More
Enzymes and proteins are live driven biochemicals, which has a dramatic impact over the environment, in which it is active. So, therefore, it is highly looked-for to build such a robust and highly accurate automatic and computational model to accurately predict enzymes nature. In this study, a novel split amino acid composition model named piSAAC is proposed. In this model, protein sequence is discretized in equal and balanced terminus to fully evaluate the intrinsic correlation properties of the sequence. Several state-of-the-art algorithms have been employed to evaluate the proposed model. A 10-folds cross-validation evaluation is used for finding out the authenticity and robust-ness of the model using different statistical measures e.g. Accuracy, sensitivity, specificity, F-measure and area un-der ROC curve. The experimental results show that, probabilistic neural network algorithm with piSAAC feature extraction yields an accuracy of 98.01%, sensitivity of 97.12%, specificity of 95.87%, f-measure of 0.9812and AUC 0.95812, over dataset S1, accuracy of 97.85%, sensitivity of 97.54%, specificity of 96.24%, f-measure of 0.9774 and AUC 0.9803 over dataset S2. Evident from these excellent empirical results, the proposed model would be a very useful tool for academic research and drug designing related application areas.
△ Less
Submitted 15 December, 2020;
originally announced January 2021.
-
Deep Learning Techniques for Future Intelligent Cross-Media Retrieval
Authors:
Sadaqat ur Rehman,
Muhammad Waqas,
Shanshan Tu,
Anis Koubaa,
Obaid ur Rehman,
Jawad Ahmad,
Muhammad Hanif,
Zhu Han
Abstract:
With the advancement in technology and the expansion of broadcasting, cross-media retrieval has gained much attention. It plays a significant role in big data applications and consists in searching and finding data from different types of media. In this paper, we provide a novel taxonomy according to the challenges faced by multi-modal deep learning approaches in solving cross-media retrieval, nam…
▽ More
With the advancement in technology and the expansion of broadcasting, cross-media retrieval has gained much attention. It plays a significant role in big data applications and consists in searching and finding data from different types of media. In this paper, we provide a novel taxonomy according to the challenges faced by multi-modal deep learning approaches in solving cross-media retrieval, namely: representation, alignment, and translation. These challenges are evaluated on deep learning (DL) based methods, which are categorized into four main groups: 1) unsupervised methods, 2) supervised methods, 3) pairwise based methods, and 4) rank based methods. Then, we present some well-known cross-media datasets used for retrieval, considering the importance of these datasets in the context in of deep learning based cross-media retrieval approaches. Moreover, we also present an extensive review of the state-of-the-art problems and its corresponding solutions for encouraging deep learning in cross-media retrieval. The fundamental objective of this work is to exploit Deep Neural Networks (DNNs) for bridging the "media gap", and provide researchers and developers with a better understanding of the underlying problems and the potential solutions of deep learning assisted cross-media retrieval. To the best of our knowledge, this is the first comprehensive survey to address cross-media retrieval under deep learning methods.
△ Less
Submitted 21 July, 2020;
originally announced August 2020.
-
Computation of bonus in multi-state life insurance
Authors:
Jamaal Ahmad,
Kristian Buchardt,
Christian Furrer
Abstract:
We consider computation of market values of bonus payments in multi-state with-profit life insurance. The bonus scheme consists of additional benefits bought according to a dividend strategy that depends on the past realization of financial risk, the current individual insurance risk, the number of additional benefits currently held, and so-called portfolio-wide means describing the shape of the i…
▽ More
We consider computation of market values of bonus payments in multi-state with-profit life insurance. The bonus scheme consists of additional benefits bought according to a dividend strategy that depends on the past realization of financial risk, the current individual insurance risk, the number of additional benefits currently held, and so-called portfolio-wide means describing the shape of the insurance business. We formulate numerical procedures that efficiently combine simulation of financial risk with classic methods for the outstanding insurance risk. Special attention is given to the case where the number of additional benefits bought only depends on the financial risk. Methods and results are illustrated via a numerical example.
△ Less
Submitted 5 November, 2023; v1 submitted 8 July, 2020;
originally announced July 2020.
-
Understanding the Impact of Customer Reviews on Hotel Rating: An Empirical Research
Authors:
J. Ahmad,
H. Sami Ullah,
S. Aslam
Abstract:
The ascent of the Internet has caused numerous adjustments in our lives. The Internet has radically changed the manner in which we carry on with our lives, the manner in which we spend our occasions, how we speak with one another day by day, and how we buy items. The development of the Internet among users has created content on the Internet by sources, for example, web-based life, reviews site, o…
▽ More
The ascent of the Internet has caused numerous adjustments in our lives. The Internet has radically changed the manner in which we carry on with our lives, the manner in which we spend our occasions, how we speak with one another day by day, and how we buy items. The development of the Internet among users has created content on the Internet by sources, for example, web-based life, reviews site, online journals, item fan page and some more. This has a lead on to another method for arranging an occasion or searching for a reasonable hotel to remain. Thus, hotel review sites have turned into a famous stage for visitors to share their experiences, reviews, and suggestions on hotels, which they have visited. In Europe, the hotel business has been a standout amongst the most vital monetary developments of the nation. The essential objective of a hotel is to satisfy the customers, to have the capacity to give a high caliber of administration and give them a vital affair while remaining at the hotel. The motivation behind this examination is to comprehend and recognize the scope of elements, which may add as per the general inclination of customers and in addition through their reviews to decide the measures of customers' desires. Information was gathered from online review sites, for example, Booking.com. Text analytics is utilized to analyze the contents gathered.
△ Less
Submitted 22 February, 2020; v1 submitted 12 February, 2020;
originally announced February 2020.
-
An authentication protocol based on chaos and zero knowledge proof
Authors:
Will Major,
William J Buchanan,
Jawad Ahmad
Abstract:
Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port knocking have resulted in an increase in complexity in design, preventing port knocking solutions from realising their potential. This paper proposes a nove…
▽ More
Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port knocking have resulted in an increase in complexity in design, preventing port knocking solutions from realising their potential. This paper proposes a novel port knocking solution, named Crucible, which is a secure method of authentication, with high usability and features of stealth, allowing servers and services to remain hidden and protected. Crucible is a stateless solution, only requiring the client memorise a command, the server's IP and a chosen password. The solution is forwarded as a method for protecting servers against attacks ranging from port scans, to zero-day exploitation. To act as a random oracle for both client and server, cryptographic hashes were generated through chaotic systems.
△ Less
Submitted 22 January, 2020;
originally announced January 2020.