Ali Kashif Bashir

Ali Kashif Bashir
Manchester Metropolitan University | MMU · Computing and Mathematics

PhD

About

279
Publications
59,603
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,522
Citations
Additional affiliations
October 2013 - present
Osaka University
Position
  • Research Associate
Description
  • Teaching advanced network courses. Working on the projects of NTT and NICT.
September 2012 - September 2013
National Fusion Research Institute
Position
  • PostDoc Position
September 2011 - February 2012
Kepco
Position
  • Lecturer

Publications

Publications (279)
Article
Full-text available
Predictive health monitoring systems help to detect human health threats in the early stage. Evolving deep learning techniques in medical image analysis results in efficient feedback in quick time. Fibrous dysplasia (FD) is a genetic disorder, triggered by the mutation in Guanine Nucleotide binding protein with alpha stimulatory activities in the h...
Article
Full-text available
Human activity recognition (HAR) is a very active yet challenging and demanding area of computer science. Due to the articulated nature of human motion, it is not trivial to detect human activity with high accuracy for all applications. Generally, activities are recognized from a series of actions performed by the human through vision-based sensors...
Article
Full-text available
With quick advancement in web technology, web-services offered on internet are growing quickly, making it challenging for users to choose a web-service fit to their needs. Recommender systems save users the hassle of going through a range of products by product recommendations through analytical techniques on historical data of user experiences of...
Chapter
Security and privacy are the major parameters needed to work upon in a variety of applications. The most widely used infrastructure known as cyber-physical system (CPS) is used for solving different types of challenges. In today’s world of growing technology, decision-making should be very much fast. The Internet of Things or CPS brings changes int...
Article
Deep learning has recently attracted great attention in many application fields, especially for big data analysis in the field of edge computing. Federated learning, as a promising machine learning technology, applies training data on distributed edge nodes to design shared learning systems to protect data privacy. Due to the system update in feder...
Article
As an important carrier of healthcare data, Electronic Medical Records (EMRs) generated from various sensors, i.e., wearable, implantable, are extremely valuable research materials for artificial intelligence and machine learning. The efficient circulation of EMRs can improve remote medical services and promote the development of the related health...
Article
Full-text available
Internet of Things (IoT) is a novel paradigm, which not only facilitates a large number of devices to be ubiquitously connected over the Internet but also provides a mechanism to remotely control these devices. The IoT is pervasive and is almost an integral part of our daily life. These connected devices often obtain user's personal data and store...
Article
Imagining things without mixed emotions is next to impossible in today’s scenario. Whether it is news or any online movement started on social media applications. One of the social media applications i.e Twitter started a movement known as #BlackLivesMatter. The people from all over the world participated showing mixed reactions, sentiments, and em...
Article
Full-text available
Most deep-learning-based vision models are trained and tested on clear images, avoiding noisy, or hazy, images. However, these models may encounter degraded images. So, it is important to recover and enhance them using a dehazing process. Dehazing usually serves as a preprocessing step for low-, medium-, and high-level vision tasks. Therefore, this...
Article
Full-text available
Demographic factors, statistical information, and technological innovation are prominent factors shaping energy transitions in the residential sector. Explaining these energy transitions requires combining insights from the disciplines investigating these factors. The existing literature is not consistent in identifying these factors, nor in propos...
Article
Full-text available
Security is a crucial factor in the continuously evolving programmable networks. With the emergence of programmable networking terminals, the need to protect the networks has become mandatory. Software‐defined networks (SDNs) provide programmable switches, thereby isolating the data plane from the control plane. Many security algorithms have been p...
Article
Full-text available
In this paper, we proposed a novel generalized pixel value ordering–based reversible data hiding using firefly algorithm (GPVOFA). The sequence of minimum and maximum number pixels value has been used to embed the secret data while prediction and modification are held on minimum, and the maximum number of pixel blocks is used to embed the secret da...
Article
Full-text available
A SARS-CoV-2 virus-specific reverse transcriptase-polymerase chain reaction (RT-PCR) test is usually used to diagnose COVID-19. However, this test requires up to 2 days for completion. Moreover, to avoid false-negative outcomes, serial testing may be essential. The availability of RT-PCR test kits is currently limited, highlighting the need for alt...
Article
A SARS-CoV-2 virus-specific reverse transcriptase-polymerase chain reaction (RT-PCR) test is usually used to diagnose COVID-19. However, this test requires up to 2 days for completion. Moreover, to avoid false-negative outcomes, serial testing may be essential. The availability of RT-PCR test kits is currently limited, highlighting the need for alt...
Article
Cyber-Physical Systems (CPSs) becoming one of the most complex, intelligent, and sophisticated system. Ensuring security is an important aspect towards CPSs. However, increase in sophisticated and complexity attacks in CPSs, the conventional anomaly detection methods are facing problems and also growth in volume of data becomes challenging which re...
Article
Wireless sensing networks (WSNs) have been applied on various research applications such as monitoring health of humans, targets tracking, natural resources investigation, air quality prediction, water pollution prediction and radiation pollution. The challenges on predicting these applications are still exist. In order to maintain the healthy soci...
Article
Full-text available
Alzheimer's disease (AD) is an irreversible illness of the brain impacting the functional and daily activities of elderly population worldwide. Neuroimaging sensory systems such as Magnetic Resonance Imaging (MRI) and Positron Emission Tomography (PET) measure the pathological changes in the brain associated with this disorder especially in its ear...
Preprint
Network slicing provides introduces customized and agile network deployment for managing different service types for various verticals under the same infrastructure. To cater to the dynamic service requirements of these verticals and meet the required quality-of-service (QoS) mentioned in the service-level agreement (SLA), network slices need to be...
Article
The advantages provided by the drones with regards to three dimensional mobility and ease of deployment makes them a viable candidate for 5G and beyond (B5G) networks. Significant amount of research has been conducted on the aspect of networking for using drones as base stations to provide different services. In this work, we deviate from the tradi...
Article
Full-text available
Road transportation is a statutory organ in a modern society; however it costs the global economy over a million lives and billions of dollars each year due to increase in road accidents. Researchers make use of machine learning to detect and predict road accidents by incorporating the social media which has an enormous corpus of geo-tagged data. T...
Article
Cloud computing promises the advent of a new era of service boosted by means of virtualization technology. The process of virtualization means creation of virtual infrastructure, devices, servers and computing resources needed to deploy an application smoothly. This extensively practiced technology involves selecting an efficient Virtual Machine (V...
Article
Relational databases are storage for a massive amount of data. Knowledge of structured query language is a prior requirement to access that data. That is not possible for all non-technical personals, leading to the need for a system that translates text to SQL query itself rather than the user. Text to SQL task is also crucial because of its econom...
Article
Full-text available
As technology advances, cities are getting smarter. Smart mobility is the key element in smart cities and Autonomous Driving (AV) are an essential part of smart mobility. However, the vulnerability of unmanned vehicles can also affect the value of life and human safety. In this paper, we provide a comprehensive analysis of 3D Point-Cloud (3DPC) pro...
Article
The internet of Drones (IoD) can encompass many essential services, including surveillance and emergency/rescue operations. While IoD is becomin popular and experiencing a rapid usage increase, privacy and security are the main concerns to avoid leakage of critical information and/or denial of services by a single drone or a whole IoD network. In a...
Article
Digital Twin (DT) has become the key technology in the Intelligent Transportation Systems (ITS) in smart cities to keep the health and reliability of various DT requesters, such as private vehicles, public transportation, energy systems, etc. The combination of DT and ITS can further release the potential of participants in smart cities and guarant...
Article
The rising popularity of ICT and the Internet has enabled Unmanned Aerial Vehicle (UAV) to offer advantageous assistance to Vehicular Ad-hoc Network (VANET), realizing a relay node's role among the disconnected segments in the road. In this scenario, the communication is done between Vehicles to UAVs (V2U), subsequently transforming into a UAV-assi...
Article
According to statistics, in the 185 countries' 36 types of cancer, the morbidity and mortality of lung cancer take the first place, and non-small cell lung cancer (NSCLC) accounts for 85% of lung cancer [1-2]. Significantly in many developing countries, limited medical resources and excess population seriously affect the diagnosis and treatment of...
Article
The Internet of Medical Things (IoMT) is structured upon both the sensing and communication infrastructure and computation facilities. The IoMT provides the convenient and cheapest ways for healthcare by aiding the remote access to the patients’ physiological data and using machine learning techniques for help in diagnosis. The communication delays...
Article
In Intelligent Transportation Systems, images are the main data sources to be analyzed for providing intelligent and precision cognitive services. Therefore, how to protect the privacy of sensitive images in the process of information transmission has become an important research issue, especially in future no non-private data era. In this article,...
Article
As one of most successful industrial realizations of Internet of Things, a smart grid is a smart IoT system that deploys widespread smart meters to capture fine-grained data on residential power usage. It suffers diverse privacy attacks, which seriously increases the risk of violating the privacy of customers. Although some solutions have been prop...
Article
Full-text available
Image memorability is a very hard problem in image processing due to its subjective nature. But due to the introduction of Deep Learning and the large availability of data and GPUs, great strides have been made in predicting the memorability of an image. In this paper, we propose a novel deep learning architecture called ResMem-Net that is a hybrid...
Article
The Industrial Internet of Things (IIoT), a typical Internet of Things (IoT) application, integrates the global industrial system with other advanced computing, analysis, and sensing technologies through Internet connectivity. Due to the limited storage and computing capacity of edge and IIoT devices, data sensed and collected by these devices are...
Article
Full-text available
Indoor environments are challenging for global navigation satellite systems and cripple its performance. Magnetic field data-based positioning and localization has emerged as a potential solution for ubiquitous indoor positioning and localization. The availability of embedded magnetic sensors in the smartphone simplifies the positioning without the...
Article
Detection of outliers or anomalies is one of the vital issues in pattern-driven data mining. Outlier detection detects the inconsistent behavior of individual objects. It is an important sector in the data mining field with several different applications such as detecting credit card fraud, hacking discovery and discovering criminal activities. It...
Article
Full-text available
Haze and fog had a great influence on the quality of images, and to eliminate this, dehazing and defogging are applied. For this purpose, an effective and automatic dehazing method is proposed. To dehaze a hazy image, we need to estimate two important parameters such as atmospheric light and transmission map. For atmospheric light estimation, the s...
Article
Full-text available
Teleradiology plays a vital role in the medical field, which permits transmitting medical and imaging data over a communication network. It ensures data reliability and provides convenient communication for clinical interpretation and diagnostic purposes. The transmission of this medical data over a network raises the problems of legal, ethical iss...
Article
Full-text available
The proliferation of 5th generation networks (5G) towards Vehicle-to-Everything (V2X) communication has paved the way for driverless Autonomous Vehicles (AVs) in vehicular Critical Energy Infrastructures (CEI). Though technological advancements improve AVs, the Safety-Critical Messages (SCMs) still play a vital role in reducing crashes, preventing...
Article
Full-text available
Differential evolution (DE) algorithm is utilized to find an optimized solution in multidimensional real applications like 5G/6G networked devices and support unlimited connectivity for terrestrial networks due to high efficiency, robustness, and easy achievements. With the development of new emerging networks and the rise of big data, the DE algor...
Article
Full-text available
Understanding the behavior of human motion in social environments is important for various domains of a smart city, e.g, smart transportation, automatic navigation of service robots, efficient navigation of autonomous cars and surveillance systems. Examining past trajectories or environmental factors alone are not enough to address this problem. We...
Article
Full-text available
The popularity of Android devices has increased exponentially with an increase in the number of mobile devices. Millions of online apps are used in these devices. Energy consumption of a device is a major concern for end-users, who want a long usage time on a single battery charge. The energy consumed by the app must be optimized by developers, and...
Article
Full-text available
Crime forecasting has been one of the most complex challenges in law enforcement today, especially when an analysis tends to evaluate inferable and expanded crime rates, although a few methodologies for subsequent equivalents have been embraced before. In this work, we use a strategy for a time series model and machine testing systems for crime est...
Article
Full-text available
In recent years, vehicle theft has been increasing remarkably. It is a stigma to our society. The impacts of vehicle theft have been drastically affecting the social safety and economic condition of the whole world because of unavailability of a proper theft detection mechanism. The few existing vehicle anti-theft systems suffer from major problems...
Article
Full-text available
Blockchain has revolutionized numerous fields, which include financial services, health care, the Internet of things, academia and supply chain management. Blockchain technology enables us to have an immutable, distributed ledger for managing the transactions of untrusted users. However, the technology has many open challenges, such as privacy leak...
Article
Peer-to-peer (P2P) computing involves exchanging resources and files by computers connected through a network rather than a central server. In P2P, over mobile ad hoc networks (MANETs), the fundamental necessity is the linkage of the overlay participating peers (OPPs) for the efficient operation of the DHT-based P2P overlay protocol over MANETs. Th...
Article
The introduction of the Internet of Things (IoT) paradigm serves as pervasive resource access and sharing platform for different real-time applications. Decentralized resource availability, access, and allocation provide a better quality of user experience regardless of the application type and scenario. However, privacy remains an open issue in th...
Article
Smart city has brought the unprecedented development and application of Internet of things (IoT) devices. Meanwhile, since both of the quantity and the type of IoT devices are growing rapidly, how to quickly identify the type of IoT devices is of paramount importance, especially in the fields of IoT Device Security, IoT Forensics, Cyber Defense, an...
Article
Ambient temperature is closely related to human health. Maintaining a comfortable and stable temperature is crucial for the treatment, rehabilitation and daily e-health care of patients, where the Internet of Things has been widely applied for this purpose. However, the existing research always separates the network design from temperature monitori...