Search Results - "Khan, Izhar Ahmed"

Refine Results
  1. 1

    SAR-to-optical image translation using multi-stream deep ResCNN of information reconstruction by Pan, Yue, Ahmed Khan, Izhar, Meng, Han

    Published in Expert systems with applications (15-08-2023)
    “…SAR image is a high-resolution radar image with ground penetration capability. However, SAR has been affected by signal noise and image distortion, which are…”
    Get full text
    Journal Article
  2. 2

    An Enhanced Multi-Stage Deep Learning Framework for Detecting Malicious Activities From Autonomous Vehicles by Khan, Izhar Ahmed, Moustafa, Nour, Pi, Dechang, Haider, Waqas, Li, Bentian, Jolfaei, Alireza

    “…Intelligent Transportation Systems (ITS), particularly Autonomous Vehicles (AVs), are susceptible to safety and security concerns that impend people's lives…”
    Get full text
    Journal Article
  3. 3

    Self-supervised Learning IoT Device Features with Graph Contrastive Neural Network for Device Classification in Social Internet of Things by Li, Bentian, Lin, Yunxia, Khan, Izhar Ahmed

    “…Device Classification (DC) is one of the critical network management means in the Internet of Things (IoT). Most of machine learning-driven DC methods are…”
    Get full text
    Journal Article
  4. 4

    DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks by Khan, Izhar Ahmed, Moustafa, Nour, Pi, Dechang, Hussain, Yasir, Khan, Nauman Ali

    “…The management of contemporary communication networks of supply chain (SC) 4.0 is becoming more complex due to the heterogeneity requirements of new devices…”
    Get full text
    Journal Article
  5. 5

    A Novel Collaborative SRU Network With Dynamic Behaviour Aggregation, Reduced Communication Overhead and Explainable Features by Khan, Izhar Ahmed, Razzak, Imran, Pi, Dechang, Zia, Umar, Kamal, Shaharyar, Hussain, Yasir

    “…Leakage and tampering problems in collection and transmission of biomedical data have attracted much attention as these concerns instigates negative impression…”
    Get full text
    Journal Article
  6. 6

    Multi-source information fusion based heterogeneous network embedding by Li, Bentian, Pi, Dechang, Lin, Yunxia, Khan, Izhar Ahmed, Cui, Lin

    Published in Information sciences (01-09-2020)
    “…•Proposes a novel and generic heterogeneous network embedding approach.•Multi-source information in heterogeneous network is successfully modeled jointly.•The…”
    Get full text
    Journal Article
  7. 7

    A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks by Khan, Izhar Ahmed, Moustafa, Nour, Pi, Dechang, Sallam, Karam M., Zomaya, Albert Y., Li, Bentian

    Published in IEEE internet of things journal (01-07-2022)
    “…Industrial Internet of Things (IIoT) and Industry 4.0 empower interrelation among manufacturing processes, industrial machines, and utility services. The…”
    Get full text
    Journal Article
  8. 8

    Video Surveillance Anomaly Detection: A Review on Deep Learning Benchmarks by Duja, Kashaf U, Khan, Izhar Ahmed, Alsuhaibani, Mohammed

    Published in IEEE access (01-01-2024)
    “…Many surveillance cameras are mounted in sparse and crowded indoor and outdoor areas to monitor and detect various patterns of human behaviors and anomalies in…”
    Get full text
    Journal Article
  9. 9

    Federated-SRUs: A Federated-Simple-Recurrent-Units-Based IDS for Accurate Detection of Cyber Attacks Against IoT-Augmented Industrial Control Systems by Khan, Izhar Ahmed, Pi, Dechang, Abbas, Muhammad Zahid, Zia, Umar, Hussain, Yasir, Soliman, Hatem

    Published in IEEE internet of things journal (15-05-2023)
    “…The security of industrial control systems (ICSs) against cyber-attacks is essential in modern era since ICSs are vital constituent of modern societies and…”
    Get full text
    Journal Article
  10. 10
  11. 11

    HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems by Khan, Izhar Ahmed, Pi, Dechang, Khan, Zaheer Ullah, Hussain, Yasir, Nawaz, Asif

    Published in IEEE access (2019)
    “…Critical infrastructures, e.g., electricity generation and dispersal networks, chemical processing plants, and gas distribution, are governed and monitored by…”
    Get full text
    Journal Article
  12. 12

    Context-Aware Trust and Reputation Model for Fog-Based IoT by Hussain, Yasir, Zhiqiu, Huang, Akbar, Muhammad Azeem, Alsanad, Ahmed, Alsanad, Abeer Abdul-Aziz, Nawaz, Asif, Khan, Izhar Ahmed, Khan, Zaheer Ullah

    Published in IEEE access (2020)
    “…Trust and reputation are important terms whether the communication is Humans-to-Human (H2H), Human-Machine-Interaction (HMI) or Machine-to-Machine (M2M). As…”
    Get full text
    Journal Article
  13. 13

    XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks by Khan, Izhar Ahmed, Moustafa, Nour, Razzak, Imran, Tanveer, M., Pi, Dechang, Pan, Yue, Ali, Bakht Sher

    Published in Future generation computer systems (01-02-2022)
    “…The Internet of Medical Things (IoMT) is increasingly replacing the traditional healthcare systems. However, less focus has been paid to their security against…”
    Get full text
    Journal Article
  14. 14

    Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems by Khan, Izhar Ahmed, Keshk, Marwa, Pi, Dechang, Khan, Nasrullah, Hussain, Yasir, Soliman, Hatem

    Published in Ad hoc networks (01-09-2022)
    “…Industrial Internet of Things (IIoT) networks involves heterogeneous technological and manufacturing services and devices. The communication and data exchange…”
    Get full text
    Journal Article
  15. 15

    iRSpot-SPI: Deep learning-based recombination spots prediction by incorporating secondary sequence information coupled with physio-chemical properties via Chou's 5-step rule and pseudo components by Khan, Zaheer Ullah, Ali, Farman, Khan, Izhar Ahmed, Hussain, Yasir, Pi, Dechang

    “…Meiotic recombination plays an important role in the process of genetic diversity generation. “Hotspots” are regions that show a higher rate of meiotic…”
    Get full text
    Journal Article
  16. 16

    DFSat: Deep Federated Learning for Identifying Cyber Threats in IoT-based Satellite Networks by Moustafa, Nour, Khan, Izhar Ahmed, Hassanin, Mohammed, Ormrod, David, Pi, Dechang, Razzak, Imran, Slay, Jill

    “…The integration of satellite systems with smart computing and networking technologies, such as the Internet of Things (IoT), has intensely augmented…”
    Get full text
    Journal Article
  17. 17

    Fed-Inforce-Fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks by Khan, Izhar Ahmed, Razzak, Imran, Pi, Dechang, Khan, Nasrullah, Hussain, Yasir, Li, Bentian, Kousar, Tanzeela

    Published in Information fusion (01-01-2024)
    “…Internet of Medical Things (IoMT) has emerged as a combination of sensors, healthcare devices, and Internet of Things (IoT) to deliver better and intelligent…”
    Get full text
    Journal Article
  18. 18

    A context-aware zero trust-based hybrid approach to IoT-based self-driving vehicles security by Khan, Izhar Ahmed, Keshk, Marwa, Hussain, Yasir, Pi, Dechang, Li, Bentian, Kousar, Tanzeela, Ali, Bakht Sher

    Published in Ad hoc networks (02-02-2025)
    “…With the speedy progression and adoption of IoT devices in modern self-driving vehicles (SDVs), autonomous driving industry is gradually reforming its…”
    Get full text
    Journal Article
  19. 19

    A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks by Khan, Izhar Ahmed, Pi, Dechang, Khan, Nasrullah, Khan, Zaheer Ullah, Hussain, Yasir, Nawaz, Asif, Ali, Farman

    “…Contemporary Smart Power Systems (SPNs) depend on Cyber-Physical Systems (CPSs) to connect physical devices and control tools. Developing a robust…”
    Get full text
    Journal Article
  20. 20

    DUFuse: Deep U-Net for visual and infrared images fusion by Pan, Yue, Pi, Dechang, Khan, Izhar Ahmed, Meng, Han

    “…The vision sensor is capable of capturing image detail features suitable for human observation, while the infrared sensor is capable of capturing the thermal…”
    Get full text
    Journal Article