Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
133
result(s) for
"Khan, Muhammad Taimoor"
Sort by:
A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT)
2021
The Internet of Things (IoT) has emerged as a new technological world connecting billions of devices. Despite providing several benefits, the heterogeneous nature and the extensive connectivity of the devices make it a target of different cyberattacks that result in data breach and financial loss. There is a severe need to secure the IoT environment from such attacks. In this paper, an SDN-enabled deep-learning-driven framework is proposed for threats detection in an IoT environment. The state-of-the-art Cuda-deep neural network, gated recurrent unit (Cu- DNNGRU), and Cuda-bidirectional long short-term memory (Cu-BLSTM) classifiers are adopted for effective threat detection. We have performed 10 folds cross-validation to show the unbiasedness of results. The up-to-date publicly available CICIDS2018 data set is introduced to train our hybrid model. The achieved accuracy of the proposed scheme is 99.87%, with a recall of 99.96%. Furthermore, we compare the proposed hybrid model with Cuda-Gated Recurrent Unit, Long short term memory (Cu-GRULSTM) and Cuda-Deep Neural Network, Long short term memory (Cu- DNNLSTM), as well as with existing benchmark classifiers. Our proposed mechanism achieves impressive results in terms of accuracy, F1-score, precision, speed efficiency, and other evaluation metrics.
Journal Article
Correction: Javeed et al. A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT). Sensors 2021, 21, 4884
by
Khan, Muhammad Taimoor
,
Ahmad, Ijaz
,
Gao, Tianhan
in
Deep learning
,
Internet of Things
,
Sensors
2025
Affiliation Correction [...]
Journal Article
Anonymous and Efficient Chaotic Map-Based Authentication Protocol for Industrial Internet of Things
2025
The exponential growth of Internet infrastructure and the widespread adoption of smart sensing devices have empowered industrial personnel to conduct remote, real-time data analysis within the Industrial Internet of Things (IIoT) framework. However, transmitting this real-time data over public channels raises significant security and privacy concerns. To prevent unauthorized access, user authentication mechanisms are crucial in the IIoT environment. To mitigate security vulnerabilities within IIoT environments, a novel user authentication and key agreement protocol is proposed. The protocol is designed to restrict service access exclusively to authorized users of designated smart sensing devices. By incorporating cryptographic hash functions, chaotic maps, Physical Unclonable Functions (PUFs), and fuzzy extractors, the protocol enhances security and functional integrity. PUFs provide robust protection against tampering and cloning, while fuzzy extractors facilitate secure biometric verification through the integration of smart cards, passwords, and personal biometrics. Moreover, the protocol accommodates dynamic device enrollment, password and biometric updates, and smart card revocation. A rigorous formal security analysis employing the Real-or-Random (ROR) model was conducted to validate session key security. Complementary informal security analysis was performed to assess resistance to a broad spectrum of attacks. Comparative performance evaluations unequivocally demonstrate the protocol’s superior efficiency and security in comparison to existing benchmarks.
Journal Article
A Hybrid Intelligent Framework to Combat Sophisticated Threats in Secure Industries
2022
With the new advancements in Internet of Things (IoT) and its applications in different sectors, such as the industrial sector, by connecting billions of devices and instruments, IoT has evolved as a new paradigm known as the Industrial Internet of Things (IIoT). Nonetheless, its benefits and applications have been approved in different areas, but there are possibilities for various cyberattacks because of its extensive connectivity and diverse nature. Such attacks result in financial loss and data breaches, which urge a consequential need to secure IIoT infrastructure. To combat the threats in the IIoT environment, we proposed a deep-learning SDN-enabled intelligent framework. A hybrid classifier is used for threat detection purposes, i.e., Cu-LSTMGRU + Cu-BLSTM. The proposed model achieved a better detection accuracy with low false-positive rate. We have conducted 10-fold cross-validation to show the unbiasdness of the results. The proposed scheme results are compared with Cu-DNNLSTM and Cu-DNNGRU classifiers, which were tested and trained on the same dataset. We have further compared the proposed model with other existing standard classifiers for a thorough performance evaluation. Results achieved by our proposed scheme are impressive with respect to speed efficiency, F1 score, accuracy, precision, and other evaluation metrics.
Journal Article
Hierarchical lifelong topic modeling using rules extracted from network communities
by
Khan, Muhammad Taimoor
,
Aziz, Furqan
,
Azam, Nouman
in
Computational linguistics
,
Computer and Information Sciences
,
Computer science
2022
Topic models extract latent concepts from texts in the form of topics. Lifelong topic models extend topic models by learning topics continuously based on accumulated knowledge from the past which is updated continuously as new information becomes available. Hierarchical topic modeling extends topic modeling by extracting topics and organizing them into a hierarchical structure. In this study, we combine the two and introduce hierarchical lifelong topic models. Hierarchical lifelong topic models not only allow to examine the topics at different levels of granularity but also allows to continuously adjust the granularity of the topics as more information becomes available. A fundamental issue in hierarchical lifelong topic modeling is the extraction of rules that are used to preserve the hierarchical structural information among the rules and will continuously update based on new information. To address this issue, we introduce a network communities based rule mining approach for hierarchical lifelong topic models (NHLTM). The proposed approach extracts hierarchical structural information among the rules by representing textual documents as graphs and analyzing the underlying communities in the graph. Experimental results indicate improvement of the hierarchical topic structures in terms of topic coherence that increases from general to specific topics.
Journal Article
AndroDex: Android Dex Images of Obfuscated Malware
by
Khan, Muhammad Taimoor
,
Loukas, George
,
Aurangzeb, Sana
in
639/705
,
639/705/1046
,
639/705/117
2024
With the emergence of technology and the usage of a large number of smart devices, cyber threats are increasing. Therefore, research studies have shifted their attention to detecting Android malware in recent years. As a result, a reliable and large-scale malware dataset is essential to build effective malware classifiers. In this paper, we have created AndroDex: an Android malware dataset containing a total of 24,746 samples that belong to more than 180 malware families. These samples are based on .dex images that truly reflect the characteristics of malware. To construct this dataset, we first downloaded the APKs of the malware, applied obfuscation techniques, and then converted them into images. We believe this dataset will significantly enhance a series of research studies, including Android malware detection and classification, and it will also boost deep learning classification efforts, among others. The main objective of creating images based on the Android dataset is to help other malware researchers better understand how malware works. Additionally, an important result of this study is that most malware nowadays employs obfuscation techniques to hide their malicious activities. However, malware images can overcome such issues. The main limitation of this dataset is that it contains images based on .dex files that are based on static analysis. However, dynamic analysis takes time, therefore, to overcome the issue of time and space this dataset can be used for the initial examination of any .apk files.
Journal Article
Therapeutic deep brain stimulation worsening dysprosody in Parkinson's disease - an unexplored entity
by
Khan, Muhammad Taimoor
,
Shoaib, Maria
in
Deep Brain Simulation
,
Deep brain stimulation
,
Depression (Mood disorder)
2018
Maria Shoaib,1 Muhammad Taimoor Khan2 1Department of Medicine, Dow Medical College, Karachi, Pakistan; 2Department of Neurology, Charleston Area Medical Center/West Virginia University, Charleston, WV, USA We read this article, \"Altered emotional recognition and expression in patients with Parkinson's disease\" by Jin et al1 with great interest and appreciate the novel information provided on altered emotional processing in pre-deep brain stimulation (DBS) Parkinson's disease (PD) patients and we would like to add our feedback on the role of DBS on nonmotor and emotional components of PD.View the original paper by Jin and colleagues.
Journal Article
Online Knowledge-Based Model for Big Data Topic Extraction
2016
Lifelong machine learning (LML) models learn with experience maintaining a knowledge-base, without user intervention. Unlike traditional single-domain models they can easily scale up to explore big data. The existing LML models have high data dependency, consume more resources, and do not support streaming data. This paper proposes online LML model (OAMC) to support streaming data with reduced data dependency. With engineering the knowledge-base and introducing new knowledge features the learning pattern of the model is improved for data arriving in pieces. OAMC improves accuracy as topic coherence by 7% for streaming data while reducing the processing cost to half.
Journal Article
Cerebral air embolism from a Central Venous Catheter: A timely reminder of the importance of rapid diagnosis
by
Tariq, Syed Maaz
,
Khan, Muhammad Taimoor
,
Shoaib, Maria
in
adult intensive care
,
Case reports
,
Catheterization, Central Venous - adverse effects
2018
Cerebral air embolism (CAE) is a rare, avoidable and potentially fatal iatrogenic complication. Here, we report a case of CAE associated with a central venous catheter in the internal jugular vein that resulted in neurological deficits and generalised epileptic seizures. A 64-year-old man admitted for fasciotomy for compartment syndrome developed CAE with left-sided neurological deficits. The suspected origin was retrograde air flow from the right internal jugular venous catheter. The air spontaneously resorbed without the need for specific therapy, and he made a good recovery. CAE is an infrequent iatrogenic complication that requires prompt diagnosis to avoid significant morbidity and mortality. This case serves as a timely reminder that adverse outcome such as stroke, seizures or death can be avoided by a high index of suspicion and prompt diagnosis. Hyperbaric oxygen is the prime therapeutic measure, but high-quality evidence on its clinical value is lacking.
Journal Article