Skip to main content

Showing 1–50 of 76 results for author: Ahmad, J

.
  1. arXiv:2505.05920  [pdf, ps, other

    cs.CR

    Privacy-Preserving Credit Card Approval Using Homomorphic SVM: Toward Secure Inference in FinTech Applications

    Authors: Faneela, Baraq Ghaleb, Jawad Ahmad, William J. Buchanan, Sana Ullah Jan

    Abstract: The growing use of machine learning in cloud environments raises critical concerns about data security and privacy, especially in finance. Fully Homomorphic Encryption (FHE) offers a solution by enabling computations on encrypted data, but its high computational cost limits practicality. In this paper, we propose PP-FinTech, a privacy-preserving scheme for financial applications that employs a CKK… ▽ More

    Submitted 9 May, 2025; originally announced May 2025.

  2. Tell Me the Good Stuff: User Preferences in Movie Recommendation Explanations

    Authors: Juan Ahmad, Jonas Hellgren, Alan Said

    Abstract: Recommender systems play a vital role in helping users discover content in streaming services, but their effectiveness depends on users understanding why items are recommended. In this study, explanations were based solely on item features rather than personalized data, simulating recommendation scenarios. We compared user perceptions of one-sided (purely positive) and two-sided (positive and nega… ▽ More

    Submitted 6 May, 2025; originally announced May 2025.

    Comments: Adjunct Proceedings of the 33rd ACM Conference on User Modeling, Adaptation and Personalization

  3. arXiv:2505.00593  [pdf, ps, other

    cs.CR

    A Novel Feature-Aware Chaotic Image Encryption Scheme For Data Security and Privacy in IoT and Edge Networks

    Authors: Muhammad Shahbaz Khan, Ahmed Al-Dubai, Jawad Ahmad, Nikolaos Pitropakis, Baraq Ghaleb

    Abstract: The security of image data in the Internet of Things (IoT) and edge networks is crucial due to the increasing deployment of intelligent systems for real-time decision-making. Traditional encryption algorithms such as AES and RSA are computationally expensive for resource-constrained IoT devices and ineffective for large-volume image data, leading to inefficiencies in privacy-preserving distributed… ▽ More

    Submitted 1 May, 2025; originally announced May 2025.

  4. arXiv:2504.09415  [pdf, other

    cs.LG cs.GT

    Nash Equilibrium Between Consumer Electronic Devices and DoS Attacker for Distributed IoT-enabled RSE Systems

    Authors: Gengcan Chen, Donghong Cai, Zahid Khan, Jawad Ahmad, Wadii Boulila

    Abstract: In electronic consumer Internet of Things (IoT), consumer electronic devices as edge devices require less computational overhead and the remote state estimation (RSE) of consumer electronic devices is always at risk of denial-of-service (DoS) attacks. Therefore, the adversarial strategy between consumer electronic devices and DoS attackers is critical. This paper focuses on the adversarial strateg… ▽ More

    Submitted 12 April, 2025; originally announced April 2025.

  5. arXiv:2503.19339  [pdf, other

    cs.CR cs.AI

    Efficient IoT Intrusion Detection with an Improved Attention-Based CNN-BiLSTM Architecture

    Authors: Amna Naeem, Muazzam A. Khan, Nada Alasbali, Jawad Ahmad, Aizaz Ahmad Khattak, Muhammad Shahbaz Khan

    Abstract: The ever-increasing security vulnerabilities in the Internet-of-Things (IoT) systems require improved threat detection approaches. This paper presents a compact and efficient approach to detect botnet attacks by employing an integrated approach that consists of traffic pattern analysis, temporal support learning, and focused feature extraction. The proposed attention-based model benefits from a hy… ▽ More

    Submitted 1 May, 2025; v1 submitted 25 March, 2025; originally announced March 2025.

  6. arXiv:2503.11216  [pdf, other

    cs.CR

    Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and Openfhe

    Authors: Faneela, Jawad Ahmad, Baraq Ghaleb, Sana Ullah Jan, William J. Buchanan

    Abstract: The rapid growth of cloud computing and data-driven applications has amplified privacy concerns, driven by the increasing demand to process sensitive data securely. Homomorphic encryption (HE) has become a vital solution for addressing these concerns by enabling computations on encrypted data without revealing its contents. This paper provides a comprehensive evaluation of two leading HE libraries… ▽ More

    Submitted 17 March, 2025; v1 submitted 14 March, 2025; originally announced March 2025.

  7. arXiv:2503.09953  [pdf

    cs.CR

    X-Cross: Image Encryption Featuring Novel Dual-Layer Block Permutation and Dynamic Substitution Techniques

    Authors: Hansa Ahsan, Safee Ullah, Jawad Ahmad, Aizaz Ahmad Khattak, Muhammad Ali, Muhammad Shahbaz Khan

    Abstract: In this digital age, ensuring the security of digital data, especially the image data is critically important. Image encryption plays an important role in securing the online transmission/storage of images from unauthorized access. In this regard, this paper presents a novel diffusion-confusion-based image encryption algorithm named as X-CROSS. The diffusion phase involves a dual-layer block permu… ▽ More

    Submitted 12 March, 2025; originally announced March 2025.

  8. arXiv:2503.09939  [pdf

    cs.CR

    A Chaotic Image Encryption Scheme Using Novel Geometric Block Permutation and Dynamic Substitution

    Authors: Muhammad Ali, Jawad Ahmad, Muhammad Abdullah Hussain Khan, Safee Ullah, Mujeeb Ur Rehman, Syed Aziz Shah, Muhammad Shahbaz Khan

    Abstract: In this digital era, ensuring the security of digital data during transmission and storage is crucial. Digital data, particularly image data, needs to be protected against unauthorized access. To address this, this paper presents a novel image encryption scheme based on a confusion diffusion architecture. The diffusion module introduces a novel geometric block permutation technique, which effectiv… ▽ More

    Submitted 12 March, 2025; originally announced March 2025.

  9. arXiv:2503.09047  [pdf

    cs.CR

    Performance Evaluation of Threshold Signing Schemes in Cryptography

    Authors: Faneela, Jawad Ahmad, Baraq Ghaleb, Imdad Ullah Khan, William J. Buchanan, Sana Ullah Jan, Muhammad Shahbaz Khan

    Abstract: Threshold Signature Scheme (TSS) protocols have gained significant attention over the past ten years due to their widespread adoption in cryptocurrencies. The adoption is mainly boosted by Gennaro and Goldfedder's TSS protocol. Since then, various TSS protocols have been introduced with different features, such as security and performance, etc. Large organizations are using TSS protocols to protec… ▽ More

    Submitted 12 March, 2025; originally announced March 2025.

  10. arXiv:2503.09041  [pdf

    cs.CR

    A Hybrid Neural Network with Smart Skip Connections for High-Precision, Low-Latency EMG-Based Hand Gesture Recognition

    Authors: Hafsa Wazir, Jawad Ahmad, Muazzam A. Khan, Sana Ullah Jan, Fadia Ali Khan, Muhammad Shahbaz Khan

    Abstract: Electromyography (EMG) is extensively used in key biomedical areas, such as prosthetics, and assistive and interactive technologies. This paper presents a new hybrid neural network named ConSGruNet for precise and efficient hand gesture recognition. The proposed model comprises convolutional neural networks with smart skip connections in conjunction with a Gated Recurrent Unit (GRU). The proposed… ▽ More

    Submitted 12 March, 2025; originally announced March 2025.

  11. arXiv:2503.09038  [pdf

    cs.CR

    Image Encryption Using DNA Encoding, Snake Permutation and Chaotic Substitution Techniques

    Authors: Waleed Ahmed Farooqui, Jawad Ahmad, Nadeem Kureshi, Fawad Ahmed, Aizaz Ahmad Khattak, Muhammad Shahbaz Khan

    Abstract: Securing image data in IoT networks and other insecure information channels is a matter of critical concern. This paper presents a new image encryption scheme using DNA encoding, snake permutation and chaotic substitution techniques that ensures robust security of the image data with reduced computational overhead. The DNA encoding and snake permutation modules ensure effective scrambling of the p… ▽ More

    Submitted 11 March, 2025; originally announced March 2025.

  12. arXiv:2412.13752  [pdf

    cs.RO

    Immersive Human-in-the-Loop Control: Real-Time 3D Surface Meshing and Physics Simulation

    Authors: Sait Akturk, Justin Valentine, Junaid Ahmad, Martin Jagersand

    Abstract: This paper introduces the TactiMesh Teleoperator Interface (TTI), a novel predictive visual and haptic system designed explicitly for human-in-the-loop robot control using a head-mounted display (HMD). By employing simultaneous localization and mapping (SLAM)in tandem with a space carving method (CARV), TTI creates a real time 3D surface mesh of remote environments from an RGB camera mounted on a… ▽ More

    Submitted 18 December, 2024; originally announced December 2024.

    Comments: IROS 2024

    Journal ref: IROS 2024

  13. arXiv:2408.07925  [pdf

    cs.LG eess.SP

    A Single Channel-Based Neonatal Sleep-Wake Classification using Hjorth Parameters and Improved Gradient Boosting

    Authors: Muhammad Arslan, Muhammad Mubeen, Saadullah Farooq Abbasi, Muhammad Shahbaz Khan, Wadii Boulila, Jawad Ahmad

    Abstract: Sleep plays a crucial role in neonatal development. Monitoring the sleep patterns in neonates in a Neonatal Intensive Care Unit (NICU) is imperative for understanding the maturation process. While polysomnography (PSG) is considered the best practice for sleep classification, its expense and reliance on human annotation pose challenges. Existing research often relies on multichannel EEG signals; h… ▽ More

    Submitted 15 August, 2024; originally announced August 2024.

    Comments: 8 pages, 5 figures, 3 tables, International Polydisciplinary Conference on Artificial Intelligence and New Technologies

  14. arXiv:2407.18405  [pdf, other

    cond-mat.stat-mech cond-mat.soft

    Computational Phase Transitions in Two-Dimensional Antiferromagnetic Melting

    Authors: Zack Weinstein, Jalal Abu Ahmad, Daniel Podolsky, Ehud Altman

    Abstract: A computational phase transition in a classical or quantum system is a non-analytic change in behavior of an order parameter which can only be observed with the assistance of a nontrivial classical computation. Such phase transitions, and the computational observables which detect them, play a crucial role in the optimal decoding of quantum error-correcting codes and in the scalable detection of m… ▽ More

    Submitted 25 July, 2024; originally announced July 2024.

    Comments: 20+8 pages, 7+2 figures

  15. arXiv:2404.00946  [pdf

    cs.CV

    Exploring the Efficacy of Group-Normalization in Deep Learning Models for Alzheimer's Disease Classification

    Authors: Gousia Habib, Ishfaq Ahmed Malik, Jameel Ahmad, Imtiaz Ahmed, Shaima Qureshi

    Abstract: Batch Normalization is an important approach to advancing deep learning since it allows multiple networks to train simultaneously. A problem arises when normalizing along the batch dimension because B.N.'s error increases significantly as batch size shrinks because batch statistics estimates are inaccurate. As a result, computer vision tasks like detection, segmentation, and video, which require t… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

    Comments: 19 pages, 3 figures

  16. arXiv:2403.05210  [pdf, other

    cs.CR

    TIPS: Threat Sharing Information Platform for Enhanced Security

    Authors: Lakshmi Rama Kiran Pasumarthy, Hisham Ali, William J Buchanan, Jawad Ahmad, Audun Josang, Vasileios Mavroeidis, Mouad Lemoudden

    Abstract: There is an increasing need to share threat information for the prevention of widespread cyber-attacks. While threat-related information sharing can be conducted through traditional information exchange methods, such as email communications etc., these methods are often weak in terms of their trustworthiness and privacy. Additionally, the absence of a trust infrastructure between different informa… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  17. arXiv:2401.04707  [pdf, other

    cs.CR

    RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Baraq Ghaleb, Nikolaos Pitropakis, William J. Buchanan

    Abstract: Given the security concerns of Internet of Things (IoT) networks and limited computational resources of IoT devices, this paper presents RNA-TransCrypt, a novel image encryption scheme that is not only highly secure but also efficient and lightweight. RNA-TransCrypt integrates the biocryptographic properties of RNA encoding with the non-linearity and unpredictability of chaos theory. This scheme i… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

  18. arXiv:2311.04932  [pdf, other

    cs.CV

    GC-VTON: Predicting Globally Consistent and Occlusion Aware Local Flows with Neighborhood Integrity Preservation for Virtual Try-on

    Authors: Hamza Rawal, Muhammad Junaid Ahmad, Farooq Zaman

    Abstract: Flow based garment warping is an integral part of image-based virtual try-on networks. However, optimizing a single flow predicting network for simultaneous global boundary alignment and local texture preservation results in sub-optimal flow fields. Moreover, dense flows are inherently not suited to handle intricate conditions like garment occlusion by body parts or by other garments. Forcing flow… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: accepted at WACV 2024

  19. arXiv:2311.04058  [pdf, other

    cs.CV

    mmFUSION: Multimodal Fusion for 3D Objects Detection

    Authors: Javed Ahmad, Alessio Del Bue

    Abstract: Multi-sensor fusion is essential for accurate 3D object detection in self-driving systems. Camera and LiDAR are the most commonly used sensors, and usually, their fusion happens at the early or late stages of 3D detectors with the help of regions of interest (RoIs). On the other hand, fusion at the intermediate level is more adaptive because it does not need RoIs from modalities but is complex as… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: 10 pages,

  20. arXiv:2311.02795  [pdf, other

    cs.CR

    PermutEx: Feature-Extraction-Based Permutation -- A New Diffusion Scheme for Image Encryption Algorithms

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan

    Abstract: Traditional permutation schemes mostly focus on random scrambling of pixels, often neglecting the intrinsic image information that could enhance diffusion in image encryption algorithms. This paper introduces PermutEx, a feature-extraction-based permutation method that utilizes inherent image features to scramble pixels effectively. Unlike random permutation schemes, PermutEx extracts the spatial… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

  21. arXiv:2310.05032  [pdf, other

    cs.CR

    PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks

    Authors: Hisham Ali, Mwrwan Abubakar, Jawad Ahmad, William J. Buchanan, Zakwan Jaroucheh

    Abstract: In recent years, there has been a significant proliferation of industrial Internet of Things (IoT) applications, with a wide variety of use cases being developed and put into operation. As the industrial IoT landscape expands, the establishment of secure and reliable infrastructure becomes crucial to instil trust among users and stakeholders, particularly in addressing fundamental concerns such as… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

  22. arXiv:2309.11476  [pdf

    cs.CR

    CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption

    Authors: Hassan Ali, Muhammad Shahbaz Khan, Maha Driss, Jawad Ahmad, William J. Buchanan, Nikolaos Pitropakis

    Abstract: In the era of Industrial IoT (IIoT) and Industry 4.0, ensuring secure data transmission has become a critical concern. Among other data types, images are widely transmitted and utilized across various IIoT applications, ranging from sensor-generated visual data and real-time remote monitoring to quality control in production lines. The encryption of these images is essential for maintaining operat… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  23. arXiv:2309.11471  [pdf

    cs.CR

    Noise-Crypt: Image Encryption with Non-linear Noise, Hybrid Chaotic Maps, and Hashing

    Authors: Laiba Asghar, Fawad Ahmed, Muhammad Shahbaz Khan, Arshad Arshad, Jawad Ahmad

    Abstract: To secure the digital images over insecure transmission channels, a new image encryption algorithm Noise-Crypt is proposed in this paper. Noise-Crypt integrates non-linear random noise, hybrid chaotic maps, and SHA-256 hashing algorithm. The utilized hybrid chaotic maps are the logistic-tent and the logistic-sine-cosine map. The hybrid chaotic maps enhance the pseudorandom sequence generation and… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  24. arXiv:2308.10834  [pdf, other

    cs.CR cs.IT

    SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Hisham Ali, Nikolaos Pitropakis, Ahmed Al-Dubai, Baraq Ghaleb, William J. Buchanan

    Abstract: With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlated regions of an image. This paper addresses the security issues presented by three prevalent S-box substitution methods, i.e., single S-box, multiple… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: 6 Pages

  25. arXiv:2305.10025  [pdf

    cs.NI cs.CR

    Resolving the Decreased Rank Attack in RPL's IoT Networks

    Authors: B. Ghaleb, A. Al-Dubai, A. Hussain, J. Ahmad, I. Romdhani, Z. Jaroucheh

    Abstract: The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core communication technology for the Internet of Things (IoT) networks. RPL organizes its network in the form of a tree-like structure where a node is co… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

  26. arXiv:2305.07453  [pdf, other

    cs.DC

    Distributed Twins in Edge Computing: Blockchain and IOTA

    Authors: Anwar Sadad, Muazzam A. Khan, Baraq Ghaleb, Fadia Ali Khan, Maha Driss, Wadii Boulila, Jawad Ahmad

    Abstract: Blockchain (BC) and Information for Operational and Tactical Analysis (IOTA) are distributed ledgers that record a huge number of transactions in multiple places at the same time using decentralized databases. Both BC and IOTA facilitate Internet-of-Things (IoT) by overcoming the issues related to traditional centralized systems, such as privacy, security, resources cost, performance, and transpar… ▽ More

    Submitted 29 April, 2023; originally announced May 2023.

  27. arXiv:2304.10603   

    physics.soc-ph

    Analyzing the Knock-on Impacts of 2022 Floods on Rabi 2023 Using Remote Sensing and Field Surveys

    Authors: Mohammad Sohail, Usman Nazir, Jawairia Ahmad, Abubakr Muhammad, Murtaza Taj, Ritvik Sahajpal

    Abstract: While the world's attention is focused on immediate relief and rescue operations for the affectees of the current floods in Pakistan, knock-on effects are expected to play further havoc with the country's economy and food security in the coming months. Significant crop yield losses had already occurred for Winter (Rabi) 2021-22 due to a heatwave earlier in the year and estimates for the Summer (Kh… ▽ More

    Submitted 17 May, 2023; v1 submitted 21 March, 2023; originally announced April 2023.

    Comments: The paper writing and analysis need further work. I believe it has not reached a sufficiently developed state to be disseminated among the global community

    Journal ref: International Conference on Integrated Flood Management under Changing Climate Scenario (IFMCC), 2023

  28. arXiv:2304.09756  [pdf, other

    cs.LG cs.AI cs.HC eess.SP

    Contactless Human Activity Recognition using Deep Learning with Flexible and Scalable Software Define Radio

    Authors: Muhammad Zakir Khan, Jawad Ahmad, Wadii Boulila, Matthew Broadbent, Syed Aziz Shah, Anis Koubaa, Qammer H. Abbasi

    Abstract: Ambient computing is gaining popularity as a major technological advancement for the future. The modern era has witnessed a surge in the advancement in healthcare systems, with viable radio frequency solutions proposed for remote and unobtrusive human activity recognition (HAR). Specifically, this study investigates the use of Wi-Fi channel state information (CSI) as a novel method of ambient sens… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

  29. arXiv:2212.10661  [pdf, other

    math.ST

    Aggregate Markov models in life insurance: estimation via the EM algorithm

    Authors: Jamaal Ahmad, Mogens Bladt

    Abstract: In this paper, we consider statistical estimation of time-inhomogeneous aggregate Markov models. Unaggregated models, which corresponds to Markov chains, are commonly used in multi-state life insurance to model the biometric states of an insured. By aggregating microstates to each biometric state, we are able to model dependencies between transitions of the biometric states as well as the distribu… ▽ More

    Submitted 10 August, 2023; v1 submitted 20 December, 2022; originally announced December 2022.

  30. arXiv:2212.03705  [pdf, other

    math.PR

    Aggregate Markov models in life insurance: properties and valuation

    Authors: Jamaal Ahmad, Mogens Bladt, Christian Furrer

    Abstract: In multi-state life insurance, an adequate balance between analytic tractability, computational efficiency, and statistical flexibility is of great importance. This might explain the popularity of Markov chain modelling, where matrix analytic methods allow for a comprehensive treatment. Unfortunately, Markov chain modelling is unable to capture duration effects, so this paper presents aggregate Ma… ▽ More

    Submitted 23 April, 2024; v1 submitted 7 December, 2022; originally announced December 2022.

  31. A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder

    Authors: Fawad Ahmed, Muneeb Ur Rehman, Jawad Ahmad, Muhammad Shahbaz Khan, Wadii Boulila, Gautam Srivastava, Jerry Chun-Wei Lin, William J. Buchanan

    Abstract: With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally results in low encryption/decryption speed along with exerting a burden on the limited bandwidth of the transmission channel. To address the aforement… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Journal ref: (2022) ACM Trans. Multimedia Comput. Commun. Appl

  32. arXiv:2207.11303  [pdf, other

    math.ST

    Estimating absorption time distributions of general Markov jump processes

    Authors: Jamaal Ahmad, Martin Bladt, Mogens Bladt

    Abstract: The estimation of absorption time distributions of Markov jump processes is an important task in various branches of statistics and applied probability. While the time-homogeneous case is classic, the time-inhomogeneous case has recently received increased attention due to its added flexibility and advances in computational power. However, commuting sub-intensity matrices are assumed, which in var… ▽ More

    Submitted 22 July, 2022; originally announced July 2022.

  33. arXiv:2207.11292  [pdf, other

    q-fin.RM

    Phase-type representations of stochastic interest rates with applications to life insurance

    Authors: Jamaal Ahmad, Mogens Bladt

    Abstract: The purpose of the present paper is to incorporate stochastic interest rates into a matrix-approach to multi-state life insurance, where formulas for reserves, moments of future payments and equivalence premiums can be obtained as explicit formulas in terms of product integrals or matrix exponentials. To this end we consider the Markovian interest model, where the rates are piecewise deterministic… ▽ More

    Submitted 17 November, 2022; v1 submitted 22 July, 2022; originally announced July 2022.

  34. arXiv:2207.05710  [pdf

    cs.SE cs.LG

    The Untold Impact of Learning Approaches on Software Fault-Proneness Predictions

    Authors: Mohammad Jamil Ahmad, Katerina Goseva-Popstojanova, Robyn R. Lutz

    Abstract: Software fault-proneness prediction is an active research area, with many factors affecting prediction performance extensively studied. However, the impact of the learning approach (i.e., the specifics of the data used for training and the target variable being predicted) on the prediction performance has not been studied, except for one initial work. This paper explores the effects of two learnin… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  35. arXiv:2202.05662  [pdf, other

    cs.CR cs.SD eess.AS

    A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids

    Authors: Awais Aziz Shah, Ahsan Adeel, Jawad Ahmad, Ahmed Al-Dubai, Mandar Gogate, Abhijeet Bishnu, Muhammad Diyan, Tassadaq Hussain, Kia Dashtipour, Tharm Ratnarajah, Amir Hussain

    Abstract: Multimodal hearing aids (HAs) aim to deliver more intelligible audio in noisy environments by contextually sensing and processing data in the form of not only audio but also visual information (e.g. lip reading). Machine learning techniques can play a pivotal role for the contextually processing of multimodal data. However, since the computational power of HA devices is low, therefore this data mu… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

  36. Ransomware: Analysing the Impact on Windows Active Directory Domain Services

    Authors: Grant McDonald, Pavlos Papadopoulos, Nikolaos Pitropakis, Jawad Ahmad, William J. Buchanan

    Abstract: Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to succumb to ransom demands as part of operating expenses to counter the cost incurred from downtime. Despite the prevalence of ransomware as a threat t… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

    Journal ref: Sensors 22, no. 3: 953 (2022)

  37. arXiv:2112.10092  [pdf, other

    cs.CR

    Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

    Authors: Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan

    Abstract: Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the risk of a potential cyberattack - the requirements for threat information sharing range from simplistic sharing of documents to threat intelligence sh… ▽ More

    Submitted 19 December, 2021; originally announced December 2021.

    Journal ref: IEEE SINCONF 2021: 14th International Conference on Security of Information and Networks

  38. arXiv:2107.04128  [pdf

    cs.NI

    Evolution of Target Localization in Wireless Sensor Network (WSN): A Review

    Authors: Muneeb A. Khan, Muazzam A. Khan, Maha Driss, Wadii Boulila, Jawad Ahmad

    Abstract: Wireless Sensor Network holds a pivotal position and gained a lot of attention from researchers in recent years. Sensor nodes have been used in vast applications such as environment monitoring, security purpose applications, and target tracking. This latter comprises of detection and monitoring of the target movement. In this paper, we explore in detail well-known target tracking techniques. The e… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

  39. arXiv:2105.13435  [pdf, other

    cs.CR

    Intrusion Detection using Machine Learning Techniques: An Experimental Comparison

    Authors: Kathryn-Ann Tait, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, Jawad Ahmad

    Abstract: Due to an exponential increase in the number of cyber-attacks, the need for improved Intrusion Detection Systems (IDS) is apparent than ever. In this regard, Machine Learning (ML) techniques are playing a pivotal role in the early classification of the attacks in case of intrusion detection within the system. However, due to a large number of algorithms available, the selection of the right method… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

  40. arXiv:2105.13426  [pdf

    cs.CV

    GuideMe: A Mobile Application based on Global Positioning System and Object Recognition Towards a Smart Tourist Guide

    Authors: Wadii Boulila, Anmar Abuhamdah, Maha Driss, Slim Kammoun, Jawad Ahmad

    Abstract: Finding information about tourist places to visit is a challenging problem that people face while visiting different countries. This problem is accentuated when people are coming from different countries, speak different languages, and are from all segments of society. In this context, visitors and pilgrims face important problems to find the appropriate doaas when visiting holy places. In this pa… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

  41. arXiv:2105.07722  [pdf

    cs.CR cs.SE

    Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions

    Authors: Maha Driss, Daniah Hasan, Wadii Boulila, Jawad Ahmad

    Abstract: In recent years, the Internet of Things (IoT) technology has led to the emergence of multiple smart applications in different vital sectors including healthcare, education, agriculture, energy management, etc. IoT aims to interconnect several intelligent devices over the Internet such as sensors, monitoring systems, and smart appliances to control, store, exchange, and analyze collected data. The… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

  42. arXiv:2104.10015  [pdf, other

    cs.CR

    Voting Classifier-based Intrusion Detection for IoT Networks

    Authors: Muhammad Almas Khan, Muazzam A Khan, Shahid Latif, Awais Aziz Shah, Mujeeb Ur Rehman, Wadii Boulila, Maha Driss, Jawad Ahmad

    Abstract: Internet of Things (IoT) is transforming human lives by paving the way for the management of physical devices on the edge. These interconnected IoT objects share data for remote accessibility and can be vulnerable to open attacks and illegal access. Intrusion detection methods are commonly used for the detection of such kinds of attacks but with these methods, the performance/accuracy is not optim… ▽ More

    Submitted 25 April, 2021; v1 submitted 20 April, 2021; originally announced April 2021.

  43. arXiv:2103.01695  [pdf

    cs.CV cs.LG

    A Novel CNN-LSTM-based Approach to Predict Urban Expansion

    Authors: Wadii Boulila, Hamza Ghandorh, Mehshan Ahmed Khan, Fawad Ahmed, Jawad Ahmad

    Abstract: Time-series remote sensing data offer a rich source of information that can be used in a wide range of applications, from monitoring changes in land cover to surveilling crops, coastal changes, flood risk assessment, and urban sprawl. This paper addresses the challenge of using time-series satellite images to predict urban expansion. Building upon previous work, we propose a novel two-step approac… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

  44. arXiv:2102.11714  [pdf, other

    q-fin.RM math.PR

    Multivariate higher order moments in multi-state life insurance

    Authors: Jamaal Ahmad

    Abstract: It is well-known that combining life annuities and death benefits introduce opposite effects in payments with respect to the mortality risk on the lifetime of the insured. In a general multi-state framework with multiple product types, such joint effects are less trivial. In this paper, we consider a multivariate payment process in multi-state life insurance, where the components are defined in te… ▽ More

    Submitted 1 October, 2021; v1 submitted 22 February, 2021; originally announced February 2021.

  45. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

    Authors: Andrew Churcher, Rehmat Ullah, Jawad Ahmad, Sadaqat ur Rehman, Fawad Masood, Mandar Gogate, Fehaid Alqahtani, Boubakr Nour, William J. Buchanan

    Abstract: In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As… ▽ More

    Submitted 10 January, 2021; originally announced January 2021.

    Journal ref: Sensors. 2021; 21(2):446

  46. arXiv:2101.03126  [pdf

    q-bio.BM cs.LG

    piSAAC: Extended notion of SAAC feature selection novel method for discrimination of Enzymes model using different machine learning algorithm

    Authors: Zaheer Ullah Khan, Dechang Pi, Izhar Ahmed Khan, Asif Nawaz, Jamil Ahmad, Mushtaq Hussain

    Abstract: Enzymes and proteins are live driven biochemicals, which has a dramatic impact over the environment, in which it is active. So, therefore, it is highly looked-for to build such a robust and highly accurate automatic and computational model to accurately predict enzymes nature. In this study, a novel split amino acid composition model named piSAAC is proposed. In this model, protein sequence is dis… ▽ More

    Submitted 15 December, 2020; originally announced January 2021.

    Comments: 3 Figures, 5 Tables, 6 Pages

  47. arXiv:2008.01191  [pdf, other

    cs.IR cs.CV cs.LG

    Deep Learning Techniques for Future Intelligent Cross-Media Retrieval

    Authors: Sadaqat ur Rehman, Muhammad Waqas, Shanshan Tu, Anis Koubaa, Obaid ur Rehman, Jawad Ahmad, Muhammad Hanif, Zhu Han

    Abstract: With the advancement in technology and the expansion of broadcasting, cross-media retrieval has gained much attention. It plays a significant role in big data applications and consists in searching and finding data from different types of media. In this paper, we provide a novel taxonomy according to the challenges faced by multi-modal deep learning approaches in solving cross-media retrieval, nam… ▽ More

    Submitted 21 July, 2020; originally announced August 2020.

    Comments: arXiv admin note: text overlap with arXiv:1804.09539 by other authors

  48. arXiv:2007.04051  [pdf, other

    q-fin.RM

    Computation of bonus in multi-state life insurance

    Authors: Jamaal Ahmad, Kristian Buchardt, Christian Furrer

    Abstract: We consider computation of market values of bonus payments in multi-state with-profit life insurance. The bonus scheme consists of additional benefits bought according to a dividend strategy that depends on the past realization of financial risk, the current individual insurance risk, the number of additional benefits currently held, and so-called portfolio-wide means describing the shape of the i… ▽ More

    Submitted 5 November, 2023; v1 submitted 8 July, 2020; originally announced July 2020.

    MSC Class: 60J28; 91G60; 91B30

  49. arXiv:2002.05342  [pdf

    cs.CY

    Understanding the Impact of Customer Reviews on Hotel Rating: An Empirical Research

    Authors: J. Ahmad, H. Sami Ullah, S. Aslam

    Abstract: The ascent of the Internet has caused numerous adjustments in our lives. The Internet has radically changed the manner in which we carry on with our lives, the manner in which we spend our occasions, how we speak with one another day by day, and how we buy items. The development of the Internet among users has created content on the Internet by sources, for example, web-based life, reviews site, o… ▽ More

    Submitted 22 February, 2020; v1 submitted 12 February, 2020; originally announced February 2020.

    Comments: 13 pages, 13 Figures and 16 References

  50. An authentication protocol based on chaos and zero knowledge proof

    Authors: Will Major, William J Buchanan, Jawad Ahmad

    Abstract: Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port knocking have resulted in an increase in complexity in design, preventing port knocking solutions from realising their potential. This paper proposes a nove… ▽ More

    Submitted 22 January, 2020; originally announced January 2020.

    Comments: J. Nonlinear Dyn (2020)