Search Results - "Khan, Izhar Ahmed"
-
1
SAR-to-optical image translation using multi-stream deep ResCNN of information reconstruction
Published in Expert systems with applications (15-08-2023)“…SAR image is a high-resolution radar image with ground penetration capability. However, SAR has been affected by signal noise and image distortion, which are…”
Get full text
Journal Article -
2
An Enhanced Multi-Stage Deep Learning Framework for Detecting Malicious Activities From Autonomous Vehicles
Published in IEEE transactions on intelligent transportation systems (01-12-2022)“…Intelligent Transportation Systems (ITS), particularly Autonomous Vehicles (AVs), are susceptible to safety and security concerns that impend people's lives…”
Get full text
Journal Article -
3
Self-supervised Learning IoT Device Features with Graph Contrastive Neural Network for Device Classification in Social Internet of Things
Published in IEEE eTransactions on network and service management (01-12-2023)“…Device Classification (DC) is one of the critical network management means in the Internet of Things (IoT). Most of machine learning-driven DC methods are…”
Get full text
Journal Article -
4
DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks
Published in IEEE transactions on industrial informatics (01-03-2023)“…The management of contemporary communication networks of supply chain (SC) 4.0 is becoming more complex due to the heterogeneity requirements of new devices…”
Get full text
Journal Article -
5
A Novel Collaborative SRU Network With Dynamic Behaviour Aggregation, Reduced Communication Overhead and Explainable Features
Published in IEEE journal of biomedical and health informatics (01-06-2024)“…Leakage and tampering problems in collection and transmission of biomedical data have attracted much attention as these concerns instigates negative impression…”
Get full text
Journal Article -
6
Multi-source information fusion based heterogeneous network embedding
Published in Information sciences (01-09-2020)“…•Proposes a novel and generic heterogeneous network embedding approach.•Multi-source information in heterogeneous network is successfully modeled jointly.•The…”
Get full text
Journal Article -
7
A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks
Published in IEEE internet of things journal (01-07-2022)“…Industrial Internet of Things (IIoT) and Industry 4.0 empower interrelation among manufacturing processes, industrial machines, and utility services. The…”
Get full text
Journal Article -
8
Video Surveillance Anomaly Detection: A Review on Deep Learning Benchmarks
Published in IEEE access (01-01-2024)“…Many surveillance cameras are mounted in sparse and crowded indoor and outdoor areas to monitor and detect various patterns of human behaviors and anomalies in…”
Get full text
Journal Article -
9
Federated-SRUs: A Federated-Simple-Recurrent-Units-Based IDS for Accurate Detection of Cyber Attacks Against IoT-Augmented Industrial Control Systems
Published in IEEE internet of things journal (15-05-2023)“…The security of industrial control systems (ICSs) against cyber-attacks is essential in modern era since ICSs are vital constituent of modern societies and…”
Get full text
Journal Article -
10
Molecular characterization of lumpy skin disease virus (LSDV) emerged in Bangladesh reveals unique genetic features compared to contemporary field strains
Published in BMC veterinary research (29-01-2021)“…Lumpy skin disease (LSD) is a contagious viral disease of cattle caused by lumpy skin disease virus (LSDV). LSD has recently spread in Asia following outbreaks…”
Get full text
Journal Article -
11
HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems
Published in IEEE access (2019)“…Critical infrastructures, e.g., electricity generation and dispersal networks, chemical processing plants, and gas distribution, are governed and monitored by…”
Get full text
Journal Article -
12
Context-Aware Trust and Reputation Model for Fog-Based IoT
Published in IEEE access (2020)“…Trust and reputation are important terms whether the communication is Humans-to-Human (H2H), Human-Machine-Interaction (HMI) or Machine-to-Machine (M2M). As…”
Get full text
Journal Article -
13
XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks
Published in Future generation computer systems (01-02-2022)“…The Internet of Medical Things (IoMT) is increasingly replacing the traditional healthcare systems. However, less focus has been paid to their security against…”
Get full text
Journal Article -
14
Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems
Published in Ad hoc networks (01-09-2022)“…Industrial Internet of Things (IIoT) networks involves heterogeneous technological and manufacturing services and devices. The communication and data exchange…”
Get full text
Journal Article -
15
iRSpot-SPI: Deep learning-based recombination spots prediction by incorporating secondary sequence information coupled with physio-chemical properties via Chou's 5-step rule and pseudo components
Published in Chemometrics and intelligent laboratory systems (15-06-2019)“…Meiotic recombination plays an important role in the process of genetic diversity generation. “Hotspots” are regions that show a higher rate of meiotic…”
Get full text
Journal Article -
16
DFSat: Deep Federated Learning for Identifying Cyber Threats in IoT-based Satellite Networks
Published in IEEE transactions on industrial informatics (2024)“…The integration of satellite systems with smart computing and networking technologies, such as the Internet of Things (IoT), has intensely augmented…”
Get full text
Journal Article -
17
Fed-Inforce-Fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks
Published in Information fusion (01-01-2024)“…Internet of Medical Things (IoMT) has emerged as a combination of sensors, healthcare devices, and Internet of Things (IoT) to deliver better and intelligent…”
Get full text
Journal Article -
18
A context-aware zero trust-based hybrid approach to IoT-based self-driving vehicles security
Published in Ad hoc networks (02-02-2025)“…With the speedy progression and adoption of IoT devices in modern self-driving vehicles (SDVs), autonomous driving industry is gradually reforming its…”
Get full text
Journal Article -
19
A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks
Published in Applied intelligence (Dordrecht, Netherlands) (01-10-2021)“…Contemporary Smart Power Systems (SPNs) depend on Cyber-Physical Systems (CPSs) to connect physical devices and control tools. Developing a robust…”
Get full text
Journal Article -
20
DUFuse: Deep U-Net for visual and infrared images fusion
Published in Journal of ambient intelligence and humanized computing (01-09-2023)“…The vision sensor is capable of capturing image detail features suitable for human observation, while the infrared sensor is capable of capturing the thermal…”
Get full text
Journal Article