Anik Islam AbhiUniversity of Calgary
Anik Islam Abhi
Ph.D.
Currently, I am working on privacy-preserving AI and cybersecurity for cyber-physical systems.
About
68
Publications
89,026
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,020
Citations
Introduction
Hello! I’m Anik Islam. I received my Ph.D. degree in IT Convergence Engineering from Kumoh National Institute of Technology. I have completed my graduation in Software engineering and completed post-graduation in computer science at American International University-Bangladesh (AIUB). I have been awarded “Summa Cum Laude” for maintaining a good CGPA in my post-graduation. You can find more in https://www.anikislamabhi.com/
Additional affiliations
March 2021 - January 2023
August 2017 - February 2021
Wireless and Emerging Network System Laboratory (WENS Lab.)
Position
- Research Assistant
Education
August 2017 - February 2021
January 2016 - February 2017
January 2010 - February 2014
Publications
Publications (68)
Contagious disease pandemics present a significant threat worldwide in terms of both human health and economic damage. New diseases emerge annually and place enormous burdens on many countries. Additionally, using humans to handle pandemic situations increases the chances of disease spreading. Therefore, various technologies that do not directly in...
This letter presents a federated learning-based data-accumulation scheme that combines drones and blockchain for remote regions where Internet of Things devices face network scarcity and potential cyber threats. The scheme contains a two-phase authentication mechanism in which requests are first validated using a cuckoo filter, followed by a timest...
Artificial intelligence of things (AIoT) has brought new promises of efficiency in our daily lives by integrating AI with the IoT. However, owing to limited resources (e.g., computational power), it is difficult to implement modern technology (e.g., AI) and improve its performance (i.e., the IoT). Moreover, cyberthreats and privacy challenges can h...
In consumer electronics, integrating the Internet of Things (IoT) and Artificial Intelligence (AI) has transformed everyday devices into smart, interconnected systems. However, this progress brings significant challenges in resource management, privacy, and security, particularly with the increasing reliance on data-centric technologies like Deep L...
Amidst the technological revolution, the convergence of Industrial Artificial Intelligence of Things (Industrial AIoT) signifies a profound transformation in industrial operations. Nonetheless, persistent concerns revolve around data privacy, security, and connectivity challenges. Drones emerge as pivotal aids for Industrial AIoTs, particularly in...
Unmanned any vehicles (UxVs), including aerial (UAVs), ground (UGVs), surface (USVs), and underwater (UUVs) vehicles, are transforming smart ecosystems by enhancing infrastructure, industry, and urban environments. However, the diverse technologies involved in UxVs make standardization and efficient management in ultra-dense networks challenging. Z...
This study proposes an intelligent approach to identifying an injured soldier on blockchain-integrated internet-of-battlefield things (IoBT) employing unmanned aerial vehicles (UAVs). The intelligent approach combines a unique deep learning (DL) model with a smartwatch-based heart-rate (HR) data collection technique. Different activation functions...
The convergence of Industrial Control Systems (ICS) and intelligent Internet of Things (IoT) technologies has rendered ICS more vulnerable to a growing range of cyber-attacks, that put the critical infrastructures in danger. Some examples are the recent attacks on gas/oil and water treatment industries. Existing attack detection methodologies prima...
Smart cities embrace unmanned autonomous vehicles (UxVs) for urban mobility and addressing challenges. UxVs include UAVs, UGVs, USVs, and UUVs, empowered by AI, particularly deep learning (DL), for autonomous missions. However, traditional DL has limitations in adapting to dynamic environments and raises data privacy concerns. Limited data availabi...
An increasing number of Intrusion Detection Systems (IDSs) rely on Artificial Intelligence (AI), specifically Machine Learning (ML) algorithms, to distinguish between benign and malicious data and detect cyber attacks. However, using ML algorithms exposes IDSs to Adversarial Machine Learning (AML) attacks during the training and test phase. These A...
Today's power systems utilize smart technology to improve the efficacy of power distribution. Using cyber-physical components in the power system such as smart grids can introduce vulnerabilities such as False Data Injection (FDI) that can cost millions. Deep learning (DL) is an emerging technology that mimics the human brain to process complex pro...
This paper proposes a blockchain-based firmware update method using unmanned aerial vehicles (UAVs) to solve one of the security issues arising in the Internet of Things (IoT) environment, which is the firmware security problem. It has high scalability and transaction speed using private blockchains and solves the limitations of internet connection...
New diseases (e.g., monkeypox) are showing up and taking the form of a pandemic within a short time. Early detection can assist in reducing the spread. However, because of privacy-sensitive data, users do not share it continually. Thus, it becomes challenging to employ modern technologies (e.g., deep learning). Moreover, cyber threats encircle both...
In this paper, an automated real-time traffic management scheme is proposed by using unmanned aerial vehicles (UAV) in an effective and secured way. However, owing to the low computational capability and limited battery capacity of a UAV, multi-access edge computing (MEC) is applied to enhance the performance of an automated UAV-based traffic manag...
In the modern era, the internet of vehicles (IoV) is being utilized in commercial applications and extensively explored in research. However, internal fault in IoV can cause accidents on the road. Moreover, privacy concerns can hamper the internal data sharing to build a model to detect the anomaly. Federated learning (FL) and blockchain are emergi...
This paper presents a deep learning (DL) model integrated automated and secure garbage management scheme using unmanned any vehicle (UxV) to minimize the human effort in terms of the traditional garbage management system. Different kinds of UxV (unmanned aerial vehicles, automated guided vehicles, unmanned surface vehicles, unmanned underwater vehi...
The modern era is filled with smart entities (e.g., smart vehicles) that have both sense and actuate capabilities. These entities can collect lots of data during their functional period and these data can be utilized for the wellbeing of citizens. However, these data are very sensitive raising issues like privacy. Moreover, network scarcity, bandwi...
Natural disasters visited countries every year more or less and left devastating situations behind, which affect both the economy and health. However, instantaneous actions can lessen casualties in the affected areas. Unmanned any vehicle (UxV) is a concept where unmanned vehicles come together and perform missions cooperatively. UxV can assist in...
Pandemics are very burdensome for every country in terms of health and economy. Technology is needed to come forward to lessen the burden. As finding cure instantly is not always possible, prevention method can be adopted to reduce the damages. Among the methods, home quarantine (HQ) can be beneficial. However, maintaining HQ is very difficult, esp...
With the advancement of technology (i.e., devices), which are considered non-traditional in terms of internet capabilities, are now being embedded in microprocessors to communicate and these devices are known as IoT devices. This technology has enabled household devices to have the ability to communicate with the internet and a network comprising o...
Internet of Things (IoT) established the foundation of the smart world via its diverse functionalities (e.g., remote data acquisition, automated task execution). This trend continues to military applications too by introducing internet of military things (IoMT). Due to being at infancy level, new technologies require to move forward and assist IoMT...
As the unmanned aerial vehicle (UAV) can play a vital role to collect information remotely in a military battlefield, researchers have shown great interest to reveal the domain of internet of battlefield Things (IoBT). In a rescue mission on a battlefield, UAV can collect data from different regions to identify the casualty of a soldier. One of the...
One of the biggest challenge in the world right now is to control the emission of carbon-dioxide (CO2) gas to reduce the greenhouse effect. Vehicles that are used in the transport sector are responsible to increase the level of CO2 in the atmosphere. Restriction can be applied for private vehicle users to limit the usage of CO2 gas in the society....
Bicycle is very popular in all over the world. Thus, the use of a bicycle is also increasing day by day. However, while moving to different places, they have to abandon their bicycle as taking a bicycle with them is not always possible. Therefore, they abandon their bicycle. Due to not having any recycle platform, bicycle stays there and after a ce...
The COVID-19 pandemic has introduced an unprecedented impact on global healthcare, economics, and general human well-being, industries, educations. Handling various tasks is become very challenging due to social distancing and limited traveling possibilities. Mixed reality (MR) technology can be helpful during this COVID-19 situations. MR can give...
Unregistered vehicle identification is one challenging issue to solve in the perspective of a smart city as it is responsible for different consequences like a traffic accident, vehicle hijacking, illegal drug transfer etc. A surveillance camera can try to capture the video and transfer it to the mobile edge computing (MEC) server for identificatio...
To stay up to date with world issues and cutting-edge technologies, the newspaper plays a crucial role. However, collecting news is not a very easy task. Currently, news publishers are collecting news from their correspondents through social networks, email, phone call, fax, etc. and sometimes they buy news from the agencies. However, the existing...
Voting is a very important issue that can be beneficial in terms of choosing the right leader in an election. A good leader can bring prosperity to a country and also can lead the country in the right direction every time. However, elections are surrounded by ballot forgery, coercion, and multiple voting issues. Moreover, while giving votes, a pers...
. Voting is a very important issue that can be beneficial in terms of choosing the right leader in an election. A good leader can bring prosperity to a country and al-so can lead the country in the right direction every time. However, elections are surrounded by ballot forgery, coercion, and multiple voting issues. Moreover, while giving votes, a p...
This paper introduces a blockchain-based secure healthcare scheme in which health data (HD) are collected from users via an unmanned aerial vehicle (UAV) and stored on the nearest server. In the proposed scheme, a UAV first establishes a relation with body sensor hives (BSHs) via a token and then shares a shared key with BSHs to enable low-power se...
Controlling greenhouse effect especially reducing carbon-di-oxide (CO2) gas emission rate is one of the biggest difficulties of the 21st Century. This paper comprehensively described the issues regarding the greenhouse effect and possible controlling mechanism of the Green House Effect to save the world. As excessive CO2 gas emission in the atmosph...
Unmanned aerial vehicles (UAVs) and unmanned ground vehicles (UGVs) has recently attracted a lot of attention in the research field with its diverse functionality. UAV and UGV can enhance efficiency in search and rescue (SAR) missions by operating side by side. However, communication between UAV and UGV, UAV and ground control system (GCS), and UGV...
Natural disasters are increasing day by day as the climate crisis becomes more serious. In a disastrous situation, search and rescue missions are very risky, time-consuming, and resource constraints. A hybrid drone-assisted mixed reality-based system (termed as "MR-Drone") is proposed for conducting search and rescue operations very quickly and eff...
This paper proposes a firmware update system using blockchain technology and drones to solve the firmware security problem caused by the development of IoT technology. The proposed system can reduce the network load caused by the firmware update of a large number of devices by preventing the forgery of the firmware using the blockchain and updating...
Trespassing in the marine area is a very critical issue. As a result, countries are losing revenue as well as it's a threat against the sovereignty of the country. As sea area is large, it's not always possible to monitor every part in real-time. Unmanned aerial vehicle (UAV) is a promising technology that can assist to alleviate this issue. Howeve...
Internet of things (IoT), mobile edge computing (MEC), and unmanned aerial vehicle (UAV) have attracted significant attention in both industry and academic research. By consolidating these technologies, IoT can be facilitated with improved connectivity, better data transmission, energy saving, and other advantages. However, the communication betwee...
With the advancement of technology, devices, which are considered non-traditional in terms of internet capabilities, are now being embedded in microprocessors to communicate and these devices are known as IoT devices. This technology has enabled household devices to have the ability to communicate with the internet and a network comprising of such...
Voting is a very important issue which can be beneficial in term of choosing the right leader in an election. A good leader can bring prosperity to a country and also can lead the country in the right direction every time. However, elections are surrounds with ballot forgery, coercion and multiple voting issues. Moreover, while giving votes, a pers...
In this study, we present a new scheme for smart education utilizing the concept of a blockchain for question sharing. A two-phase encryption technique for encrypting question papers (QSPs) is proposed. In the first phase, QSPs are encrypted using a timestamp, and in the second phase, previously encrypted QSPs are encrypted again using a timestamp,...
The weapons and ammunition management system using the blockchain according to an embodiment of the present invention performs user authentication using the user's biometric information and grants the weapons or ammunition in connection with a blockchain server connected to the blockchain network. Register the weapons or ammunition with the identif...
Mixed Reality (MR) applications are becoming very popular in different sectors such as communication, education and entertainment for its extensive application areas and also for the wide adoption of mobile and especially wearable devices. Due to weak computational efficiency and short battery life of these devices, MR applications performance can...
This paper presents a blockchain enabled secure data acquisition scheme utilizing an Unmanned Aerial Vehicle (UAV) swarm where data are collected from internet of things (IoT) devices and subsequently, forwarded to the nearest server through the UAV swarm. Before initiating data acquisition, the UAV swarm shares a shared key with IoT devices in ord...
Unmanned aerial vehicle (UAV) is an emerging technology that becomes popular not only in military operation but also in civil applications. Internet of things (IoT) is another popular technology which brings automation in our daily life. Like other areas, IoT also exposes its potential in healthcare. Using IoT sensors, it becomes easy to monitor th...
For decades, farming has been connected with the production of essential food crops. However, automation in farming is very critical. Moreover, the current automation process surrounds with data integrity, reliability, availability, and cyber threats. Blockchain is a data structure in which data are shared among peers. Blockchain holds properties l...
Parking is a big issue in cities. A smart parking scheme can lessen the traffic congestion and hassle for locating a free parking space. Internet of Things (IoT), unmanned aerial vehicle (UAV), and mobile edge computing (MEC) are emerging technologies that can provide great benefits in terms of managing parking space. However, communication in thes...
There are many applications for outdoor navigation but still less application for indoor navigation are available. In complex unknown indoor environments such as public buildings, railway stations, airports, hospitals, is difficult and time consuming to find the destination. In this paper, we design a mixed reality based indoor navigation system to...
Deep Learning algorithms are often used as black box type learning and they are too complex to understand. The widespread usability of Deep Learning algorithms to solve various machine learning problems demands deep and transparent understanding of the internal representation as well as decision making. Moreover, the learning models, trained on seq...
To meet with both the energy and spectral efficiency, cooperative non-orthogonal multiple access (NOMA) (termed as CNOMA) and simultaneous wireless information and power transfer (SWIPT) are integrated in this paper. Two different protocols such as CNOMA-SWIPT-PS and CNOMA-SWIPT-TS are proposed, by employing power-splitting (PS) and time-switching...
In order to stay up to date with world issues and cutting-edge technologies, the newspaper plays a crucial role. However, collecting news is not a very easy task. Currently, news publishers are collecting news from their correspondents through social networks, email, phone call, fax etc. and sometimes they buy news from the agencies. However, the e...
In order to stay up to date with world issues and cutting-edge technologies, the newspaper plays a crucial role. However, collecting news is not a very easy task. Currently, news publishers are collecting news from their correspondents through social networks, email, phone call, fax etc. and sometimes they buy news from the agencies. However, the e...
Voting is a very important issue which can be beneficial in term of choosing the right leader in an election. A good leader can bring prosperity to a country and also can lead the country in the right direction every time. However, elections are surrounds with ballot forgery, coercion and multiple voting issues. Moreover, while giving votes, a pers...
With the advancement of technology, devices, which are considered non-traditional in terms of internet capabilities, are now being embedded in microprocessors to communicate and these devices are known as IoT devices. This technology has enabled household devices to have the ability to communicate with the internet and a network comprising of such...
Unmanned aerial vehicle (UAV) has been regarded as one of promising research field because of its capability of performing critical operations. Mobile Edge Computing (MEC) is an emerging technology where the cloud has brought to the base station and utilizes radio access network in order to meetup network challenges. UAV combined MEC can perform re...
It is a big challenge for blind people to explore daily essential things. This paper comprehensively illustrates the implementation and design of a wearable, deep learning based object detection approach for helping visual impair and blind people. The aim of this paper is to assist people who face challenges to see the world using technical sensors...
Existing education systems are facing a threat of question paper leaking (QPL) in the exam which jeopardizes the quality of education. Therefore, it is high time to think about a more secure and flexible question sharing system which can prevent QPL issue in the future education system. Blockchain enables a way of creating and storing transactions,...
Non-orthogonal multiple access (NOMA) with successive interference cancellation receiver is considered as one of the most potent multiple access techniques to be adopted in future wireless communication networks. Data security in the NOMA transmission scheme is on much attention drawing issue. Blockchain is a distributed peer-to-peer network enable...
The present invention relates to a method of transmitting data in a wireless communication system using blockchain, the method comprising the steps of: registering each user terminal in a base station; and, when data transmission is requested from a first user terminal and a second user terminal, 1) encrypting data to be transmitted in an asymmetri...
According to the International Association of Public Transport (UITP), the current high speed of urbanization will equally bring rise in the challenges related to urban mobility in future. Thus, updating real-time traffic and road information is quite essential for limiting road accidents, enhance public and traffic safety. Most of the past researc...
Non-orthogonal multiple access (NOMA) with successive interference cancellation receiver is considered as one of the most potent multiple access techniques to be adopted in future wireless communication networks. Data security in the NOMA transmission scheme is on much attention drawing issue. Blockchain is a distributed peer-to-peer network enable...
Non-orthogonal multiple access (NOMA) is thought of as a challenging technique for providing the data rate and spectral efficiency requirement in the era of future wireless communication. This article studies the performance of a NOMA adopted two-cell downlink communication scenario where adjacent cells interfere into each other' s data transmissio...
Blockchain is a decentralized digital ledger of transactions which is managed by a network of untrusted nodes. Different properties of blockchain have drawn researchers’ attention in order to think about the solution in a different way. However, like other areas, researchers from networking areas have also adopted blockchain as a new promise for so...
The present invention relates to a method of preventing leakage of a test strip based on blockchain, and more particularly, to a test strip leakage preventing method based on a blockchain for generating and decoding an encrypted test strip.
Internet of Things (IoT) recently has the rising of both enormous numbers and types of
connected devices in a better connectivity towards the next wireless communication network (5G) that is bringing advantages to producing data efficiently, business and living standard. In this paper, we illustrate the integration of IoT devices and Social Network...
Internet of Things (IoT) imparts not only comfort to our life but also exposes new research areas like Social Internet of Things which can assist to manage things more efficiently. Another concept, Blockchain, is imparting in every research area because of its technology. In this context, the contribution of this paper follows: 1) we depict popular...
Caching is a very important issue in distributed web system in order to reduce access latency and server load. A request is a hit if it is available in the cache and if not then it will fetch from the server in order to cache and serve the request. Researches have shown that generic algorithms of caching can increase hit rate up to 40−50%, but addi...
Domestic violence is a silent crisis in the developing and underdeveloped countries, though developed countries also remain drowned in the curse of it. In developed countries, victims can easily report and ask help on the contrary in developing and underdeveloped countries victims hardly report the crimes and when it's noticed by the authority it's...
Questions
Questions (25)
The extensive deployment of Internet of Things (IoT) devices enables data
exchange of modern objects across our everyday lives, as a result, it introduces new use cases in smart cities, smart homes, smart grids, health, cyber-physical systems (CPS), and industrial IoT (IIoT). Thanks to the rise of Industry 4.0, which facilitates IoT developments by employing intelligent, interconnected cyber-physical systems to automate industrial operations. It is worth mentioning that IIoT improves efficiency, reliability, and economical benefits through IoT-enabled CPS however, it also introduces new challenges regarding security aspects by increasing the attack landscape. The complexity of an IIoT system also makes the efforts to secure the system harder. This is mainly because in IIOT significant amount of (heterogeneous) information is gathered from different sources, and each of them requires specific techniques and solutions.
IIoT can also be considered as a critical building block for the agri-food supply chain due to its pervasiveness, interoperability, and scalability. The key building blocks of a smart agri-food supply chain are as IoT and blockchain. Attacks in the IIoT may result in abnormal behaviour in the system, which may compromise physical security, damage equipment as well as can cause financial losses. Due to the distributed nature and size of IIoT networks, conventional cryptographic / security solutions may not be beneficial. Therefore, self-aware approaches are required to protect the distributed infrastructure from malicious network attacks and unauthorized access. Contemporary Artificial Intelligence (AI) techniques, such as deep learning, machine learning, and reinforcement learning, have already been found to be useful in detecting anomalous patterns from a large amount of data and, thus, capable of employing self-awareness to identify cyber-attacks from the captured data.
To enhance the knowledge of current IoT engineers and future IoT users, there is a need to summarize the state-of-the-art techniques and possible challenges in IIoT security. This handbook will focus on cutting-edge research from both academia and industry with an emphasis on the scientific and engineering techniques which employ modern AI techniques for securing IIOT. Specifically, this book welcomes two categories of papers: (1) invited articles from qualified experts, and (2) contributed papers from an open call with a list of addressed topics. Topics of interest include but are not limited to:
- Security and privacy challenges in IIOT
- Security challenges for smart city application in IIOT
- Secure Architecture for IIOT Environments
- Secure lightweight protocol for smart IIOT
- Blockchain and Security of IIOT
- Fog/Cloud-based secure AI architecture for IIOT
- AI for securing the IoT Healthcare
- AI-based smart and secure logistic system in IIOT
- AI-based Thread detection for Industrial Manufacturing Units
- Machine learning technique for secure edge computing in IIOT
- Secure IIOT operation in Critical Infrastructure
- Secure IIOT in the Oil and Gas industry
- Threat mitigation in smart grids
- Attack detection in IoT-enabled Water resource system
Each paper submitted will be reviewed by editors and independent experts based on the relevance to the topics of the book and its usefulness for a wider range of audience Research novelty (e.g. new techniques) and potential impact Readability. All chapters should follow the Springer manuscript format as follows:
Important Dates:
- Submission deadline: 1 Dec. 2023
- Authors’ notification: 1 Jan. 2024
- Camera-ready version due: 31 Apr. 2024
- Tentative publication date: Jul. 2024
For more information, please contact Dr. Hadis Karimipour (hadis.karimipour@ucalgary.ca)
So far we have seen a meta-learning example with an image dataset (e.g., Omniglot) that has only one attribute. However, they have multiple attributes if we want to use non-image datasets (e.g., diabetes prediction based on IoT sensors). If we want to generate tasks based on various datasets with different attributes, there is no good reference. How to convert that into the n-way k-shot format with multiple attributes?
I really appreciate any help you can provide.
I am trying to make a dataset based on MITRE ATT&CK (https://attack.mitre.org/) website to create AI-based threat intelligence. However, I didn't find any automated tools or readymade datasets for it.
Is there any dataset based on the MITRE ATT&CK?
Thanks in advance.
The SCPS Lab (https://www.scpslab.org/) is hiring for two Ph.D. positions in the following areas:
- Federated Defense Against Adversarial Attacks in IIoT.
- Threat and Anomaly Detection for Cloud Security.
The required skills for potential graduate students include:
- Strong background in cyber security.
- Strong background in machine learning and data analytic techniques.
- Background in detection and estimation theory.
- Strong oral and written communication skills.
To apply, please contact Dr. Hadis Karimipour (hadis.karimipour@ucalgary.ca) with your most recent C.V. and a list of two references.