Skip to main content

Showing 1–9 of 9 results for author: Amin, M B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2208.07060  [pdf, ps, other

    cs.CR

    A Blockchain-based Decentralised and Dynamic Authorisation Scheme for the Internet of Things

    Authors: Khizar Hameed, Ali Raza, Saurabh Garg, Muhammad Bilal Amin

    Abstract: An authorisation has been recognised as an important security measure for preventing unauthorised access to critical resources, such as devices and data, within the Internet of Things (IoT) networks. Existing authorisation methods for the IoT network are based on traditional access control models, which have several drawbacks, including architecture centralisation, policy tampering, access rights… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

  2. arXiv:2108.09931  [pdf, other

    cs.CR

    Towards a Formal Modelling, Analysis, and Verification of a Clone Node Attack Detection Scheme in the Internet of Things

    Authors: Khizar Hameed, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang

    Abstract: In a clone node attack, an attacker attempted to physically capture the devices to gather sensitive information to conduct various insider attacks. Several solutions for detecting clone node attacks on IoT networks have been presented in the viewpoints above. These solutions are focused on specific system designs, processes, and feature sets and act as a high-level abstraction of underlying system… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

  3. arXiv:2106.15890  [pdf, ps, other

    cs.CR

    A Context-Aware Information-Based Clone Node Attack Detection Scheme in Internet of Things

    Authors: Khizar Hameed, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang, Abid Khan

    Abstract: The rapidly expanding nature of the Internet of Things (IoT) networks is beginning to attract interest across a range of applications, including smart homes, smart transportation, smart health, and industrial contexts. This cutting-edge technology enables individuals to track and control their integrated environment in real-time and remotely via a thousand IoT devices comprised of sensors and actu… ▽ More

    Submitted 30 June, 2021; originally announced June 2021.

  4. arXiv:2105.11665  [pdf, ps, other

    cs.CR

    A Taxonomy Study on Securing Blockchain-based Industrial Applications: An Overview, Application Perspectives, Requirements, Attacks, Countermeasures, and Open Issues

    Authors: Khizar Hameed, Mutaz Barika, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang

    Abstract: Blockchain technology has taken on a leading role in today's industrial applications by providing salient features and showing significant performance since its beginning. Blockchain began its journey from the concept of cryptocurrency and is now part of a range of core applications to achieve resilience and automation between various tasks. With the integration of Blockchain technology into diffe… ▽ More

    Submitted 25 May, 2021; originally announced May 2021.

  5. Multiple Linear Regression-Based Energy-Aware Resource Allocation in the Fog Computing Environment

    Authors: Ranesh Kumar Naha, Saurabh Garg, Sudheer Kumar Battula, Muhammad Bilal Amin, Dimitrios Georgakopoulos

    Abstract: Fog computing is a promising computing paradigm for time-sensitive Internet of Things (IoT) applications. It helps to process data close to the users, in order to deliver faster processing outcomes than the Cloud; it also helps to reduce network traffic. The computation environment in the Fog computing is highly dynamic and most of the Fog devices are battery powered hence the chances of applicati… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

    Comments: 8 Pages, 9 Figures

    Report number: S1389128622003164

    Journal ref: Computer Networks, 216, 109240 (2022)

  6. arXiv:2103.06381  [pdf, other

    cs.DC

    Fuzzy Logic-based Robust Failure Handling Mechanism for Fog Computing

    Authors: Ranesh Kumar Naha, Saurabh Garg, Muhammad Bilal Amin, Rajiv Ranjan

    Abstract: Fog computing is an emerging computing paradigm which is mainly suitable for time-sensitive and real-time Internet of Things (IoT) applications. Academia and industries are focusing on the exploration of various aspects of Fog computing for market adoption. The key idea of the Fog computing paradigm is to use idle computation resources of various handheld, mobile, stationery and network devices ar… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

    Comments: 12 Pages,12 Figures

  7. Predicting Prostate Cancer-Specific Mortality with A.I.-based Gleason Grading

    Authors: Ellery Wulczyn, Kunal Nagpal, Matthew Symonds, Melissa Moran, Markus Plass, Robert Reihs, Farah Nader, Fraser Tan, Yuannan Cai, Trissia Brown, Isabelle Flament-Auvigne, Mahul B. Amin, Martin C. Stumpe, Heimo Muller, Peter Regitnig, Andreas Holzinger, Greg S. Corrado, Lily H. Peng, Po-Hsuan Cameron Chen, David F. Steiner, Kurt Zatloukal, Yun Liu, Craig H. Mermel

    Abstract: Gleason grading of prostate cancer is an important prognostic factor but suffers from poor reproducibility, particularly among non-subspecialist pathologists. Although artificial intelligence (A.I.) tools have demonstrated Gleason grading on-par with expert pathologists, it remains an open question whether A.I. grading translates to better prognostication. In this study, we developed a system to p… ▽ More

    Submitted 24 November, 2020; originally announced December 2020.

    Journal ref: Nature Communications Medicine (2021)

  8. Similar Image Search for Histopathology: SMILY

    Authors: Narayan Hegde, Jason D. Hipp, Yun Liu, Michael E. Buck, Emily Reif, Daniel Smilkov, Michael Terry, Carrie J. Cai, Mahul B. Amin, Craig H. Mermel, Phil Q. Nelson, Lily H. Peng, Greg S. Corrado, Martin C. Stumpe

    Abstract: The increasing availability of large institutional and public histopathology image datasets is enabling the searching of these datasets for diagnosis, research, and education. Though these datasets typically have associated metadata such as diagnosis or clinical notes, even carefully curated datasets rarely contain annotations of the location of regions of interest on each image. Because pathology… ▽ More

    Submitted 5 February, 2019; v1 submitted 30 January, 2019; originally announced January 2019.

    Comments: 23 Pages with 6 figures and 3 tables. The file also has 6 pages of supplemental material. Improved figure resolution, edited metadata

    Journal ref: Nature Partner Journal Digital Medicine (2019)

  9. Development and Validation of a Deep Learning Algorithm for Improving Gleason Scoring of Prostate Cancer

    Authors: Kunal Nagpal, Davis Foote, Yun Liu, Po-Hsuan, Chen, Ellery Wulczyn, Fraser Tan, Niels Olson, Jenny L. Smith, Arash Mohtashamian, James H. Wren, Greg S. Corrado, Robert MacDonald, Lily H. Peng, Mahul B. Amin, Andrew J. Evans, Ankur R. Sangoi, Craig H. Mermel, Jason D. Hipp, Martin C. Stumpe

    Abstract: For prostate cancer patients, the Gleason score is one of the most important prognostic factors, potentially determining treatment independent of the stage. However, Gleason scoring is based on subjective microscopic examination of tumor morphology and suffers from poor reproducibility. Here we present a deep learning system (DLS) for Gleason scoring whole-slide images of prostatectomies. Our syst… ▽ More

    Submitted 15 November, 2018; originally announced November 2018.

    Journal ref: Nature Partner Journal Digital Medicine (2019)