
Junaid Arshad- PhD
- Associate Professor at Birmingham City University
Junaid Arshad
- PhD
- Associate Professor at Birmingham City University
About
101
Publications
60,928
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,971
Citations
Introduction
Current institution
Additional affiliations
January 2016 - August 2017
Publications
Publications (101)
Poisoning attacks are a primary threat to machine learning (ML) models, aiming to compromise their performance and reliability by manipulating training datasets. This paper introduces a novel attack—outlier-oriented poisoning (OOP) attack, which manipulates labels of most distanced samples from the decision boundaries. To ascertain the severity of...
Poisoning attacks represent one of the most common and practical adversarial attempts on machine learning systems. In this paper, we have conducted a deep behavioural analysis of six machine learning algorithms, analyzing poisoning impact and correlation between poisoning levels and classification accuracy. Adopting an empirical approach, we highli...
Purpose
Advances in machine learning (ML) have made significant contributions to the development of intelligent and autonomous systems leading to concerns about resilience of such systems against cyberattacks. This paper aims to report findings from a quantitative analysis of literature within ML security to assess current research trends in ML sec...
Poisoning attacks are a primary threat to machine learning models, aiming to compromise their performance and reliability by manipulating training datasets. This paper introduces a novel attack - Outlier-Oriented Poisoning (OOP) attack, which manipulates labels of most distanced samples from the decision boundaries. The paper also investigates the...
Electric vehicles (EVs) have attracted significant attention in recent years primarily due to minimal adverse impact on the environment and efficiency of running costs. Although use of EVs brings noticeable benefits to users and the overall society, deployment of EVs, new carbon control regulations and interactive utility models are creating a comp...
With the growing popularity of the Internet of Things (IoT), billions of devices are anticipated to be deployed in various industries without establishing trust between them. In environments without pre-established trust, reputation systems provide an effective method of assessing the trustworthiness of IoT devices. There has been considerable lite...
Current conventional agricultural practices have exacerbated the depletion of soil, loss of biodiversity, and intensified the substantial challenges of food security including monoculture dependence, resource intensiveness, access and distribution issues. This has raised consumers awareness towards monitoring the resources
of their food consumption...
Robo or unsolicited calls have become a persistent issue in telecommunication networks, posing significant challenges to individuals, businesses, and regulatory authorities. These calls not only trick users into disclosing their private and financial information, but also affect their productivity through unwanted phone ringing. A proactive approac...
Machine learning has become prevalent in transforming diverse aspects of our daily lives through intelligent digital solutions. Advanced disease diagnosis, autonomous vehicular systems, and automated threat detection and triage are some prominent use cases. Furthermore, the increasing use of machine learning in critical national infrastructures suc...
With the rapid increase in the number of connected and autonomous vehicles, there is a growing concern about the potential road accidents and collisions caused by malicious vehicles. A reputation system can help to mitigate these concerns and allow users to have safe journeys by providing a way to identify and estimate the behaviour of individual v...
Supply chain networks are complex structures which introduce significant challenges regarding transparency in production and traceability of components, making product certification non-trivial. Visibility within quality assurance processes is critical to this and is particularly important for autonomous & driver-less vehicles which rely on correct...
Supply chain networks are complex structures which introduce significant challenges regarding transparency in production and traceability of components, making product certification non-trivial. Visibility within quality assurance processes is critical to this and is particularly important for autonomous & driver-less vehicles which rely on correct...
Cyber attacks on the Internet of Things (IoT) have seen a significant increase in recent years. This is primarily due to the widespread adoption and prevalence of IoT within domestic and critical national infrastructures, as well as inherent security vulnerabilities within IoT endpoints. Therein, botnets have emerged as a major threat to IoT-based...
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and transmitting into the centralized database for advanced analytics and analysis. This integrated...
Over the past decade, there has been a rapidly rising trend of malware (ransomware) that limits user access by encrypting the data and demanding the ransom against the decryption key. In most cases, such encryption may lead to a permanent data loss. In order to prevent this unwanted encryption, we propose a method based on Moving Target Defense (MT...
Blockchain has introduced new opportunities with the potential to enhance systems and services across diverse application domains. Fundamental characteristics of blockchains such as immutability, decentralisation, transparency and traceability have a profound role in this. However, integration with contemporary systems and among disparate blockchai...
Reputation systems are an important means to facilitate trustworthy interactions between on-and off-chain services and users. However, contemporary reputation systems are typically dependent on a trusted central authority to preserve privacy of raters or on adding noise into the user feedback. Moreover, the accuracy of reputation values relies on t...
The rise of 5G networks promises a wide range of cutting-edge services with the aim of achieving high performance and reliability. Cutting-edge applications facilitated by 5G architecture make use of various enabling technologies, which introduce various new and emerging security threats and attacks. Threat modeling is a proactive approach to ident...
Cloud computing is an important technology for businesses and individual users to obtain computing resources over the Internet on-demand and flexibly. Although cloud computing has been adopted across diverse applications, the owners of time-and-performance critical applications require cloud service providers’ guarantees about their services, such...
The COVID-19 pandemic has severely impacted many industries, in particular the healthcare sector exposing systemic vulnerabilities in emergency preparedness, risk mitigation, and supply chain management. A major challenge during the pandemic was related to the increased demand for Personal Protective Equipment (PPE), resulting in critical shortages...
Healthcare has evolved significantly in recent years primarily due to the advancements in and increasing adoption of technology in healthcare processes such as data collection, storage, diagnostics, and treatment. The emergence of the industrial internet of things (IIoT) has further evolved e-Health by facilitating the development of connected heal...
Smartphone applications have gained popularity in recent years due to the large footprint of mobile phone usage and availability of a large number of value-added applications. The official app stores (google, IOS, Microsoft, Amazon) provide a platform for hosting, publishing, distributing, and managing the mobile applications developed by companies...
Resource-constrained blockchain clients and the Internet of Things (IoT) devices pose limitations in terms of processing and storing the entire blockchain ledger and mining blocks. Such clients and devices rely on a view of the blockchain provided by full nodes acting as gateways. However, gateway nodes sometimes can provide a distorted view of the...
Purpose
Alongside the remarkable evolution of cellular communication to 5G networks, significant security and privacy challenges have risen which can affect the widespread adoption of advanced communication technologies. In this context, the purpose of this paper is to examine research within security and privacy for 5G-based systems highlighting c...
Blockchains are a key disruptive technology of recent times with applications across several application domains such as finance, supply chain, healthcare and Industry 4.0. With growing application types, scalability of blockchains has emerged as a key challenge in achieving the potential of this technology. This paper attempts to outline this chal...
Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the abil...
Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the abil...
Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the abil...
UAVs have numerous emerging applications in various domains of life. However, it is extremely challenging to gain the required level of public acceptance of UAVs without proving safety and security for human life. Conventional UAVs mostly depend upon the centralised server to perform data processing with complex machine learning algorithms. In fact...
DNA technology is rapidly moving towards digitization. Scientists use software tools and applications for sequencing, synthesizing, analyzing and sharing of DNA and genomic data, operate lab equipment and store genetic information in shared datastores. Using cutting-edge computing methods and techniques, researchers have decoded human genome, creat...
A large number of shipments are moved everyday domestically and internationally. A considerable number of items such as food, commodities, and pharmaceutical drugs are prone to damage in transit. This can be caused due to various reasons such as improper storage conditions and exposure to air or sunlight. The Internet of Things (IoT) has been used...
Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the abil...
Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the abil...
COVID-19 has emerged as a highly contagious disease which has caused a devastating impact across the world with a very large number of infections and deaths. Timely and accurate testing is paramount to an effective response to this pandemic as it helps identify infections and therefore mitigate (isolate/cure) them. In this paper, we investigate thi...
Healthcare supply chains are complex structures spanning across multiple organizational
and geographical boundaries, providing critical backbone to services vital for everyday life. The inherent complexity of such systems can introduce impurities including inaccurate information, lack of transparency and limited data provenance. Counterfeit drugs i...
Blockchain is a disruptive technology that has been used to address a wide range of challenges in diverse domains including voting, logistics, healthcare and finance. Transaction malleability is one of the critical threats for blockchain, which can facilitate double-spending attacks by tampering with the state of a blockchain. This paper investigat...
Electronic voting or e-voting has been used in varying forms since 1970s with fundamental benefits over paper-based systems such as increased efficiency and reduced errors. However, challenges remain to the achieving of wide spread adoption of such systems, especially with respect to improving their resilience against potential faults. Blockchain i...
Blockchains have emerged as one of the most disruptive technologies of the previous decade with applications in diverse domains such as e-government, finance, and healthcare. However, scalability remains a significant challenge within blockchains affecting its wide-spread adoption. As such, scalable blockchains can enhance performance with respect...
COVID-19 has emerged as a highly contagious disease which has caused a devastating impact across the world with a very large number of infections and deaths. Timely and accurate testing is paramount to an effective response to this pandemic as it helps identify infections and therefore mitigate (isolate/cure) them. In this paper, we investigate thi...
An enormous amount of drug supply is regularly wasted due to several reasons related to incorrect prescription, purchase of unnecessary quantities, drug intolerance, allergy, or interactions. On the other hand, these medicines may be needed by patients who cannot afford to purchase them. To address this challenge, we propose a fully decentralized s...
div>The COVID-19 pandemic has severely impacted many industries, in particular the healthcare sector exposing systemic vulnerabilities in emergency preparedness, risk mitigation, and supply chain management. A major challenge during the pandemic was related to the increased demand of Personal Protective Equipment (PPE) resulting in critical shortag...
div>The COVID-19 pandemic has severely impacted many industries, in particular the healthcare sector exposing systemic vulnerabilities in emergency preparedness, risk mitigation, and supply chain management. A major challenge during the pandemic was related to the increased demand of Personal Protective Equipment (PPE) resulting in critical shortag...
Connected vehicles is a leading use‐case within the Industrial Internet of Things (IIoT), which is aimed at automating a range of driving tasks such as navigation, accident avoidance, content sharing, and auto‐driving. Such systems leverage vehicular ad hoc networks (VANETs) and include vehicle to vehicle and vehicle to roadside infrastructure comm...
Additive Manufacturing (AM) is a major advancement in the digitization of manufacturing and production operations. Additive manufacturing uses three dimensional digital design, software and
hardware equipment to precisely deposit layered materials for on-demand product manufacturing. The distinct advantages in enabling additive manufacturing inclu...
Today’s smartphones are equipped with a large number of powerful value-added sensors and features such as a low power Bluetooth sensor, powerful embedded sensors such as the digital compass, accelerometer, GPS sensors, Wi-Fi capabilities, microphone, humidity sensors, health tracking sensors, and a camera, etc. These value-added sensors have revolu...
COVID-19 has emerged as a highly contagious disease which has caused a devastating impact across the world with a very large number of infections and deaths. Timely and accurate testing is paramount to an effective response to this pandemic as it helps identify infections and therefore mitigate (isolate/cure) them. In this paper, we investigate thi...
COVID-19 has emerged as a highly contagious disease which has caused a devastating impact across the world with a very large number of infections and deaths. Timely and accurate testing is paramount to an effective response to this pandemic as it helps identify infections and therefore mitigate (isolate/cure) them. In this paper, we investigate thi...
Today's smartphones come with a large number of powerful additional devices such as a low power Bluetooth sensor, powerful embedded sensors such as the digital compass, accelerometer, GPS sensors, Wi-Fi capabilities, microphone, humidity sensors, health tracking sensors, and camera. These value-added sensors revolutionize many sectors of today's co...
Blockchain has been adopted to address significant challenges, such as trust in diverse domains, including voting, logistics and finance. However, transaction malleability has been identified as a threat for blockchain, which can potentially lead to an inconsistent state that can result in further attacks such as double-spending. In this context, t...
Internet of Things (IoT) forms the foundation of next generation infrastructures, enabling development of future cities that are inherently sustainable. Intrusion detection for such paradigms is a non-trivial challenge which has attracted further significance due to extraordinary growth in the volume and variety of security threats for such systems...
Industrial Internet of Things (IIoT) exemplifies IoT with applications in manufacturing, surveillance, automotive, smart buildings, homes and transport. It leverages sensor technology, cutting edge communication and data analytics technologies and the open Internet to consolidate IT and operational technology (OT) aiming to achieve cost and perform...
Voting is one of the fundamental pillars of modern democracy. Continuous efforts have been made to strengthen the processes and methods involved to achieve verifiable, transparent voting systems. In recent years, blockchain has been increasingly used to address multi-dimensional challenges across widespread application domains including healthcare,...
The volume and variety of data collected for modern organisations has increased significantly over the last decade necessitating the detection and prevention of disclosure of sensitive data. Data loss prevention is an embedded process used to protect against disclosure of sensitive data to external uncontrolled environments. A typical Data Loss Pre...
Telephony technologies (mobile, VoIP, and fixed) have potentially improved the way we communicate in our daily life and have been widely adopted for business and personal communications. At the same time, scammers, criminals, and fraudsters have also find the telephony network an attractive and affordable medium to target end-users with the adverti...
Smart connected devices are widely used in healthcare to achieve improved well‐being, quality of life, and security of citizens. While improving quality of healthcare, such devices generate data containing sensitive patient information where unauthorized access constitutes breach of privacy leading to catastrophic outcomes for an individual as well...
In this paper, we propose a blockchain-based solution and framework for document sharing and version control to facilitate multiuser collaboration and track changes in a trusted, secure, and decentralized manner, with no involvement of a centralized trusted entity or third party. This solution is based on utilizing Ethereum smart contracts to gover...
Preventive healthcare requires continuous monitoring of the blood pressure (BP) of patients, which is not feasible using conventional methods. Photoplethysmogram (PPG) signals can be effectively used for this purpose as there is a physiological relation between the pulse width and BP and can be easily acquired using a wearable PPG sensor. However,...
Internet of Things (IoT) represent a network of resource-constrained sensor devices connected through the open Internet, susceptible to misuse by intruders. Traditional standalone intrusion detection systems (IDS) are tasked with monitoring device behaviours to identify malicious activities. These systems not only require extensive network and syst...
Internet of Things (IoT) is a disruptive technology with applications across diverse domains such as transportation and logistics systems, smart grids, smart homes, connected vehicles, and smart cities. Alongside the growth of these infrastructures, the volume and variety of attacks on these infrastructures has increased highlighting the significan...
Tactile Internet evolves communications to encompass sensory information such as smell and haptic sensations combining ultra-low latency with extremely high availability, reliability, and security. Tactile Internet is realized through underpinning technologies such as Multi-access Edge and Fog computing which facilitate decentralized infrastructure...
Spam and unwanted content has been a significant challenge for the Internet technologies (email, social networks, search engines, etc.) for decades. However, in recent years, the advent of modern and cheap telephony technologies and larger user base (more than six billion users) has attracted scammers to use telephony for distributing unwanted cont...
Electronic voting or e-voting has been used in varying forms since 1970s with fundamental benefits over paper-based systems such as increased efficiency and reduced errors. However, challenges remain to the achieving of wide spread adoption of such systems, especially with respect to improving their resilience against potential faults. Blockchain i...
To support scientists of different disciplines, different fields of Computer Science have developed tools and infras-tructures with the aim of giving them access to vast computational resources in the easiest possible way. Such extremely complex structures have evolved naturally in the last decades both in depth and breath and, in addition to scien...
Scientific workflows orchestrate the execution of complex experiments frequently using distributed computing platforms. Meta-workflows represent an emerging type of such workflows which aim to reuse existing workflows from potentially different workflow systems to achieve more complex and experimentation minimizing workflow design and testing effor...
The number of unsolicited and advertisement telephony calls over traditional and Internet telephony has rapidly increased over recent few years. Every year, the telecommunication regulators, law enforcement agencies and telecommunication operators receive a very large number of complaints against these unsolicited, unwanted calls. These unwanted ca...
Background
In Quantum Chemistry, many tasks are reoccurring frequently, e.g. geometry optimizations, benchmarking series etc. Here, workflows can help to reduce the time of manual job definition and output extraction. These workflows are executed on computing infrastructures and may require large computing and data resources. Scientific workflows...
Scientific workflows orchestrate the execution of complex experiments on high performance computing platforms. Meta-workflows represent an emerging type of such workflows which aim to integrate multiple embedded workflows from potentially different workflow systems to achieve complex experimentation. Workflow interoperability plays a profound role...
The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents t...
Clouds represent a major paradigm shift from contemporary systems, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of flexible computing infrastructures that are available on demand. Clouds, however, introducing novel challenges particularly with respec...
Cloud computing presents exciting opportunities to foster research for scientific communities; virtual machine technology has a profound role in this. Among other benefits, virtual machine technology enables Clouds to offer large scale and flexible computing infrastructures that are available on demand to address the diverse requirements of scienti...
Cloud computing is an emerging computing paradigm which introduces novel opportunities to establish large scale, flexible computing infrastructures. However, security underpins extensive adoption of Cloud computing. This paper presents efforts to address one of the significant issues with respect to security of Clouds i.e. intrusion detection and s...
IMS defines a generic architecture and framework that enables the convergence of voice, video, data and mobile network technology over an IP-based infrastructure. The heterogeneity and complexity of IMS network will bring a number of challenges to the integration of products in mutli-vendor and multi-protocol environment. Faults in a large, multi-t...
Clouds represent a major paradigm shift from contemporary systems, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of flexible computing infrastructures that are available on demand. Clouds, however, introduce novel challenges particularly with respect...
The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. In this paper, we pres...
Virtual machines have attracted significant attention especially within the high performance computing community. However,
there remain problems with respect to security in general and intrusion detection and diagnosis in particular which underpin
the realization of the potential offered by this emerging technology. In this paper, one such problem...
Cloud computing is an emerging paradigm with virtual machine as its enabling technology. As with any other Internet-based
technology, security underpins widespread success of Cloud computing. However, Cloud computing introduces new challenges with
respect to security mainly due to the unique characteristics inherited via virtual machine technology....
Grid computing facilitates resource sharing typically to support distributed virtual organizations (VO). The multi-institutional nature of a grid environment introduces challenging security issues, especially with regard to authentication and authorization. This article presents a state-of-the-art review of major grid authentication and authorizati...
Single sign-on and delegation of privileges are fundamental tenets upon which e-Infrastructures and Grid-based research more
generally have been based. The realisation of single sign-on and delegation of privileges in accessing resources such as the
UK e-Science National Grid Service is typically facilitated by X.509-based Public Key Infrastructure...
Cloud computing is an emerging computing paradigm which introduces novel opportunities to establish large scale, flexible computing infrastructures. However, security underpins extensive adoption of Cloud computing. This paper presents efforts to address one of the significant issues with respect to security of Clouds i.e. intrusion detection and s...
Authentication and authorization for Grids is a challenging security issue. In this paper, key issues for the establishment
of Grid authentication and authorization infrastructures are discussed, and an overview of major Grid authentication and authorization
technologies is presented. Related to this, recent developments in Grid authentication and...
With the increasing prevalence of virtualization and cloud technologies, virtual security appliances have emerged and become a new way for traditional security appliances to be rapidly distributed and deployed in IT infrastructure. However, virtual security appliances are challenged with achieving optimal performance, as the physical resource is sh...
The authors present an architecture for simulation modeling using the resources of grid computing. The use of the grid provides access to the substantial data storage and processing power, which are necessary to translate such models from computational tools into genuine planning aids. As well as providing access to virtualized compute resources, t...
Cloud computing is a promising technology to facilitate development of large-scale, on-demand, flexible computing infrastructures. However, improving dependability of cloud computing is critical for realization of its potential. In this paper, we describe our efforts to quantify security for Clouds to facilitate provision of assurance for quality o...
An e-Social Science infrastructure generally has security requirements to protect their restricted resources or services. As a widely accepted authentication and authorization technology, Shibboleth supports the sharing of resources on inter-institutional federation. Guanxi is an open source implementation of the Shibboleth protocol and architectur...
This paper reports the results of an experiment to combine research and teaching in Corpus Linguistics, using an AI-inspired intelligent agent architecture, but casting students as the intelligent agents (Atwell 2007). Computing students studying Computational Modelling and Technologies for Knowledge Management were given the data-mining coursework...
With the passage of time and increase in the need for mobility wireless or mobile networks emerged to replace the wired networks. This new generation of networks is different from the earlier one in many aspects like network infrastructure, resources and routing protocols, routing devices etc. These networks are bandwidth and resource constrained w...
Improving dependability of Cloud computing is critical to the realization of its potential as a technology to facilitate the development of large-scale, flexible computing infrastructures, available on-demand to meet computation requirements of compute intensive workloads. However, unique characteristics such as; Diversity, Flexibility and Mobility...