Skip to main content

Showing 1–11 of 11 results for author: Rehman, M

Searching in archive cs. Search in all archives.
.
  1. Reconfigurable Intelligent Surface for Physical Layer Security in 6G-IoT: Designs, Issues, and Advances

    Authors: Waqas Khalid, M. Atif Ur Rehman, Trinh Van Chien, Zeeshan Kaleem, Howon Lee, Heejung Yu

    Abstract: Sixth-generation (6G) networks pose substantial security risks because confidential information is transmitted over wireless channels with a broadcast nature, and various attack vectors emerge. Physical layer security (PLS) exploits the dynamic characteristics of wireless environments to provide secure communications, while reconfigurable intelligent surfaces (RISs) can facilitate PLS by controlli… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

    Comments: Accepted for IEEE Internet of Things Journal

    MSC Class: 10.1109/JIOT.2023.3297241

  2. arXiv:2308.04355  [pdf, other

    eess.SP cs.IT

    Vascular Ageing and Smoking Habit Prediction via a Low-Cost Single-Lead ECG Module

    Authors: S. Anas Ali, M. Saqib Niaz, Mubashir Rehman, Ahsan Mehmood, M. Mahboob Ur Rahman, Kashif Riaz, Qammer H. Abbasi

    Abstract: This paper presents a novel low-cost method to predict: i) the vascular age of a healthy young person, ii) whether or not a person is a smoker, using only the lead-I of the electrocardiogram (ECG). We begin by collecting (lead-I) ECG data from 42 healthy subjects (male, female, smoker, non-smoker) aged 18 to 30 years, using our custom-built low-cost single-lead ECG module, and anthropometric data,… ▽ More

    Submitted 18 December, 2023; v1 submitted 8 August, 2023; originally announced August 2023.

    Comments: 8 pages, 7 figures, 5 tables, submitted to a journal for review

  3. arXiv:2304.10204  [pdf, other

    cs.NI

    FoggyEdge: An Information Centric Computation Offloading and Management Framework for Edge-based Vehicular Fog Computing

    Authors: Muhammad Atif Ur Rehman, Muhammad Salahuddin, Spyridon Mastorakis, Byung-Seo Kim

    Abstract: The recent advances aiming to enable in-network service provisioning are empowering a plethora of smart infrastructure developments, including smart cities, and intelligent transportation systems. Although edge computing in conjunction with roadside units appears as a promising technology for proximate service computations, the rising demands for ubiquitous computing and ultra-low latency requirem… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

    Comments: This paper has been accepted for publication by the IEEE Intelligent Transportation System Magazine. The copyright is with IEEE and the final version will be published by IEEE

  4. A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder

    Authors: Fawad Ahmed, Muneeb Ur Rehman, Jawad Ahmad, Muhammad Shahbaz Khan, Wadii Boulila, Gautam Srivastava, Jerry Chun-Wei Lin, William J. Buchanan

    Abstract: With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally results in low encryption/decryption speed along with exerting a burden on the limited bandwidth of the transmission channel. To address the aforement… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Journal ref: (2022) ACM Trans. Multimedia Comput. Commun. Appl

  5. arXiv:2208.14515  [pdf, other

    cs.DC

    Comparative Review of Cloud Computing Platforms for Data Science Workflows

    Authors: Mohammad Rehman, Hairong Wang

    Abstract: With the advantages that cloud computing offers in terms of platform as a service, software as a service, and infrastructure as a service, data engineers and data scientists are able to leverage cloud computing for their ETL/ELT (extract, transform and load) and ML (machine learning) requirements and deployments. The proposed framework for the comparative review of cloud computing platforms for da… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

  6. Map** Temporary Slums from Satellite Imagery using a Semi-Supervised Approach

    Authors: M. Fasi ur Rehman, Izza Ali, Waqas Sultani, Mohsen Ali

    Abstract: One billion people worldwide are estimated to be living in slums, and documenting and analyzing these regions is a challenging task. As compared to regular slums; the small, scattered and temporary nature of temporary slums makes data collection and labeling tedious and time-consuming. To tackle this challenging problem of temporary slums detection, we present a semi-supervised deep learning segme… ▽ More

    Submitted 9 April, 2022; originally announced April 2022.

  7. arXiv:2105.13435  [pdf, other

    cs.CR

    Intrusion Detection using Machine Learning Techniques: An Experimental Comparison

    Authors: Kathryn-Ann Tait, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, Jawad Ahmad

    Abstract: Due to an exponential increase in the number of cyber-attacks, the need for improved Intrusion Detection Systems (IDS) is apparent than ever. In this regard, Machine Learning (ML) techniques are playing a pivotal role in the early classification of the attacks in case of intrusion detection within the system. However, due to a large number of algorithms available, the selection of the right method… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

  8. arXiv:2104.10015  [pdf, other

    cs.CR

    Voting Classifier-based Intrusion Detection for IoT Networks

    Authors: Muhammad Almas Khan, Muazzam A Khan, Shahid Latif, Awais Aziz Shah, Mujeeb Ur Rehman, Wadii Boulila, Maha Driss, Jawad Ahmad

    Abstract: Internet of Things (IoT) is transforming human lives by paving the way for the management of physical devices on the edge. These interconnected IoT objects share data for remote accessibility and can be vulnerable to open attacks and illegal access. Intrusion detection methods are commonly used for the detection of such kinds of attacks but with these methods, the performance/accuracy is not optim… ▽ More

    Submitted 25 April, 2021; v1 submitted 20 April, 2021; originally announced April 2021.

  9. arXiv:2011.12095  [pdf, other

    cs.NI

    CCIC-WSN: An Architecture for Single Channel Cluster-based Information-Centric Wireless Sensor Networks

    Authors: Muhammad Atif Ur Rehman, Rehmat Ullah, Byung-Seo Kim, Boubakr Nour, Spyridon Mastorakis

    Abstract: The promising vision of Information-Centric Networking (ICN) and of its realization, Named Data Networking (NDN), has attracted extensive attention in recent years in the context of the Internet of Things (IoT) and Wireless Sensor Networks (WSNs). However, a comprehensive NDN/ICN-based architectural design for WSNs, including specially tailored naming schemes and forwarding mechanisms, has yet to… ▽ More

    Submitted 24 November, 2020; originally announced November 2020.

    Comments: This paper has been accepted for publication by the IEEE Internet of Things Journal. The copyright is with IEEE and the final version will be published by IEEE

  10. arXiv:1905.04651  [pdf, ps, other

    cs.NI cs.LG

    Passport: Enabling Accurate Country-Level Router Geolocation using Inaccurate Sources

    Authors: Muzammil Abdul Rehman, Sharon Goldberg, David Choffnes

    Abstract: When does Internet traffic cross international borders? This question has major geopolitical, legal and social implications and is surprisingly difficult to answer. A critical stumbling block is a dearth of tools that accurately map routers traversed by Internet traffic to the countries in which they are located. This paper presents Passport: a new approach for efficient, accurate country-level ro… ▽ More

    Submitted 23 July, 2019; v1 submitted 12 May, 2019; originally announced May 2019.

  11. arXiv:1904.05556  [pdf, other

    cs.CY cs.NI

    The Role of Big Data Analytics in Industrial Internet of Things

    Authors: Muhammad Habib ur Rehman, Ibrar Yaqoob, Khaled Salah, Muhammad Imran, Prem Prakash Jayaraman, Charith Perera

    Abstract: Big data production in industrial Internet of Things (IIoT) is evident due to the massive deployment of sensors and Internet of Things (IoT) devices. However, big data processing is challenging due to limited computational, networking and storage resources at IoT device-end. Big data analytics (BDA) is expected to provide operational- and customer-level intelligence in IIoT systems. Although numer… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

    Journal ref: Future Generation Computer Systems, 2019