Research explorer tool

37 results

Chaos‐based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks

Journal Article
Ansari, S., Ahmad, J., Aziz Shah, S., Kashif Bashir, A., Boutaleb, T., & Sinanovic, S. (2020)
Chaos‐based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks. Transactions on Emerging Telecommunications Technologies, 31(5), https://doi.org/10.1002/ett.3966
There is a high demand for secure and reliable communications for Connected Autonomous Vehicles (CAVs) in the automotive industry. Privacy and security are key issues in CAVs,...

Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication

Journal Article
Aziz Shah, S., Ahmad, J., Tahir, A., Ahmed, F., Russell, G., Shah, S. Y., …Abbasi, Q. H. (2020)
Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication. Micromachines, 11(4), https://doi.org/10.3390/mi11040379
Nano-scaled structures, wireless sensing, wearable devices, and wireless communications systems are anticipated to support the development of new next-generation technologies ...

A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping

Journal Article
Ahmad, J., Masood, F., Shah, S. A., Jamal, S. S., & Hussain, I. (2020)
A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping. Symmetry, 12(3), https://doi.org/10.3390/sym12030350
Smart building control, managing queues for instant points of service, security systems, and customer support can benefit from the number of occupants information known as occ...

A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map

Journal Article
Masood, F., Ahmad, J., Shah, S. A., Jamal, S. S., & Hussain, I. (2020)
A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map. Entropy, 22(3), https://doi.org/10.3390/e22030274
Chaos-based encryption schemes have attracted many researchers around the world in the digital image security domain. Digital images can be secured using existing chaotic maps...

Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning

Conference Proceeding
Ilyas, M., Ahmad, J., Lawson, A., Khan, J. S., Tahir, A., Adeel, A., …Hussain, A. (2020)
Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning. In Advances in Brain Inspired Cognitive Systems. , (76-85). https://doi.org/10.1007/978-3-030-39431-8_8
Prospective studies using longitudinal patient data can be used to help to predict responsiveness to Growth Hormone (GH) therapy and assess any suspected risks. In this paper,...

An authentication protocol based on chaos and zero knowledge proof

Journal Article
Major, W., Buchanan, W. J., & Ahmad, J. (2020)
An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065–3087. https://doi.org/10.1007/s11071-020-05463-3
Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authentica...

WiFreeze: Multiresolution Scalograms for Freezing of Gait Detection in Parkinson's Leveraging 5G Spectrum with Deep Learning

Journal Article
Tahir, A., Ahmad, J., Shah, S. A., Morison, G., Skelton, D. A., Larijani, H., …Gibson, R. M. (2019)
WiFreeze: Multiresolution Scalograms for Freezing of Gait Detection in Parkinson's Leveraging 5G Spectrum with Deep Learning. Electronics, 8(12), https://doi.org/10.3390/electronics8121433
Freezing of Gait (FOG) is an episodic absence of forward movement in Parkinson's Disease (PD) patients and represents an onset of disabilities. FOG hinders daily activities an...

A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids

Journal Article
Bashir, I., Ahmed, F., Ahmad, J., Boulila, W., & Alharbi, N. (2019)
A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids. Entropy, 21(11), https://doi.org/10.3390/e21111132
Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual ...

A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids

Journal Article
Adeel, A., Ahmad, J., Larijani, H., & Hussain, A. (in press)
A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids. Cognitive Computation, https://doi.org/10.1007/s12559-019-09653-z
Next-generation audio-visual (AV) hearing aids stand as a major enabler to realize more intelligible audio. However, high data rate, low latency, low computational complexity,...

DNA key based visual chaotic image encryption

Journal Article
Khan, J. S., Ahmad, J., Ahmed, S. S., Siddiqa, H. A., Abbasi, S. F., & Kayhan, S. K. (2019)
DNA key based visual chaotic image encryption. Journal of Intelligent and Fuzzy Systems, 37(2), 2549-2561. https://doi.org/10.3233/jifs-182778
With the exponential growth of Internet technologies, digital information exchanged over the Internet is also significantly increased. In order to ensure the security of multi...

Date


Date


Date


Date