Junaid Arshad

Junaid Arshad
  • PhD
  • Associate Professor at Birmingham City University

About

101
Publications
60,928
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,971
Citations
Current institution
Birmingham City University
Current position
  • Associate Professor
Additional affiliations
January 2016 - August 2017
University of West London
Position
  • Lecturer

Publications

Publications (101)
Article
Full-text available
Poisoning attacks are a primary threat to machine learning (ML) models, aiming to compromise their performance and reliability by manipulating training datasets. This paper introduces a novel attack—outlier-oriented poisoning (OOP) attack, which manipulates labels of most distanced samples from the decision boundaries. To ascertain the severity of...
Article
Full-text available
Poisoning attacks represent one of the most common and practical adversarial attempts on machine learning systems. In this paper, we have conducted a deep behavioural analysis of six machine learning algorithms, analyzing poisoning impact and correlation between poisoning levels and classification accuracy. Adopting an empirical approach, we highli...
Article
Purpose Advances in machine learning (ML) have made significant contributions to the development of intelligent and autonomous systems leading to concerns about resilience of such systems against cyberattacks. This paper aims to report findings from a quantitative analysis of literature within ML security to assess current research trends in ML sec...
Preprint
Full-text available
Poisoning attacks are a primary threat to machine learning models, aiming to compromise their performance and reliability by manipulating training datasets. This paper introduces a novel attack - Outlier-Oriented Poisoning (OOP) attack, which manipulates labels of most distanced samples from the decision boundaries. The paper also investigates the...
Article
Full-text available
Electric vehicles (EVs) have attracted significant attention in recent years primarily due to minimal adverse impact on the environment and efficiency of running costs. Although use of EVs brings noticeable benefits to users and the overall society, deployment of EVs, new carbon control regulations and interactive utility models are creating a comp...
Article
With the growing popularity of the Internet of Things (IoT), billions of devices are anticipated to be deployed in various industries without establishing trust between them. In environments without pre-established trust, reputation systems provide an effective method of assessing the trustworthiness of IoT devices. There has been considerable lite...
Article
Current conventional agricultural practices have exacerbated the depletion of soil, loss of biodiversity, and intensified the substantial challenges of food security including monoculture dependence, resource intensiveness, access and distribution issues. This has raised consumers awareness towards monitoring the resources of their food consumption...
Article
Full-text available
Robo or unsolicited calls have become a persistent issue in telecommunication networks, posing significant challenges to individuals, businesses, and regulatory authorities. These calls not only trick users into disclosing their private and financial information, but also affect their productivity through unwanted phone ringing. A proactive approac...
Article
Full-text available
Machine learning has become prevalent in transforming diverse aspects of our daily lives through intelligent digital solutions. Advanced disease diagnosis, autonomous vehicular systems, and automated threat detection and triage are some prominent use cases. Furthermore, the increasing use of machine learning in critical national infrastructures suc...
Article
With the rapid increase in the number of connected and autonomous vehicles, there is a growing concern about the potential road accidents and collisions caused by malicious vehicles. A reputation system can help to mitigate these concerns and allow users to have safe journeys by providing a way to identify and estimate the behaviour of individual v...
Preprint
Supply chain networks are complex structures which introduce significant challenges regarding transparency in production and traceability of components, making product certification non-trivial. Visibility within quality assurance processes is critical to this and is particularly important for autonomous & driver-less vehicles which rely on correct...
Article
Full-text available
Supply chain networks are complex structures which introduce significant challenges regarding transparency in production and traceability of components, making product certification non-trivial. Visibility within quality assurance processes is critical to this and is particularly important for autonomous & driver-less vehicles which rely on correct...
Article
Cyber attacks on the Internet of Things (IoT) have seen a significant increase in recent years. This is primarily due to the widespread adoption and prevalence of IoT within domestic and critical national infrastructures, as well as inherent security vulnerabilities within IoT endpoints. Therein, botnets have emerged as a major threat to IoT-based...
Article
Full-text available
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and transmitting into the centralized database for advanced analytics and analysis. This integrated...
Article
Over the past decade, there has been a rapidly rising trend of malware (ransomware) that limits user access by encrypting the data and demanding the ransom against the decryption key. In most cases, such encryption may lead to a permanent data loss. In order to prevent this unwanted encryption, we propose a method based on Moving Target Defense (MT...
Article
Blockchain has introduced new opportunities with the potential to enhance systems and services across diverse application domains. Fundamental characteristics of blockchains such as immutability, decentralisation, transparency and traceability have a profound role in this. However, integration with contemporary systems and among disparate blockchai...
Article
Full-text available
Reputation systems are an important means to facilitate trustworthy interactions between on-and off-chain services and users. However, contemporary reputation systems are typically dependent on a trusted central authority to preserve privacy of raters or on adding noise into the user feedback. Moreover, the accuracy of reputation values relies on t...
Article
Full-text available
The rise of 5G networks promises a wide range of cutting-edge services with the aim of achieving high performance and reliability. Cutting-edge applications facilitated by 5G architecture make use of various enabling technologies, which introduce various new and emerging security threats and attacks. Threat modeling is a proactive approach to ident...
Article
Full-text available
Cloud computing is an important technology for businesses and individual users to obtain computing resources over the Internet on-demand and flexibly. Although cloud computing has been adopted across diverse applications, the owners of time-and-performance critical applications require cloud service providers’ guarantees about their services, such...
Article
The COVID-19 pandemic has severely impacted many industries, in particular the healthcare sector exposing systemic vulnerabilities in emergency preparedness, risk mitigation, and supply chain management. A major challenge during the pandemic was related to the increased demand for Personal Protective Equipment (PPE), resulting in critical shortages...
Article
Full-text available
Healthcare has evolved significantly in recent years primarily due to the advancements in and increasing adoption of technology in healthcare processes such as data collection, storage, diagnostics, and treatment. The emergence of the industrial internet of things (IIoT) has further evolved e-Health by facilitating the development of connected heal...
Article
Smartphone applications have gained popularity in recent years due to the large footprint of mobile phone usage and availability of a large number of value-added applications. The official app stores (google, IOS, Microsoft, Amazon) provide a platform for hosting, publishing, distributing, and managing the mobile applications developed by companies...
Article
Full-text available
Resource-constrained blockchain clients and the Internet of Things (IoT) devices pose limitations in terms of processing and storing the entire blockchain ledger and mining blocks. Such clients and devices rely on a view of the blockchain provided by full nodes acting as gateways. However, gateway nodes sometimes can provide a distorted view of the...
Article
Full-text available
Purpose Alongside the remarkable evolution of cellular communication to 5G networks, significant security and privacy challenges have risen which can affect the widespread adoption of advanced communication technologies. In this context, the purpose of this paper is to examine research within security and privacy for 5G-based systems highlighting c...
Article
Blockchains are a key disruptive technology of recent times with applications across several application domains such as finance, supply chain, healthcare and Industry 4.0. With growing application types, scalability of blockchains has emerged as a key challenge in achieving the potential of this technology. This paper attempts to outline this chal...
Preprint
Full-text available
Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the abil...
Preprint
Full-text available
Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the abil...
Article
Full-text available
Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the abil...
Article
UAVs have numerous emerging applications in various domains of life. However, it is extremely challenging to gain the required level of public acceptance of UAVs without proving safety and security for human life. Conventional UAVs mostly depend upon the centralised server to perform data processing with complex machine learning algorithms. In fact...
Article
Full-text available
DNA technology is rapidly moving towards digitization. Scientists use software tools and applications for sequencing, synthesizing, analyzing and sharing of DNA and genomic data, operate lab equipment and store genetic information in shared datastores. Using cutting-edge computing methods and techniques, researchers have decoded human genome, creat...
Article
Full-text available
A large number of shipments are moved everyday domestically and internationally. A considerable number of items such as food, commodities, and pharmaceutical drugs are prone to damage in transit. This can be caused due to various reasons such as improper storage conditions and exposure to air or sunlight. The Internet of Things (IoT) has been used...
Preprint
Full-text available
Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the abil...
Preprint
Full-text available
Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the abil...
Preprint
Full-text available
COVID-19 has emerged as a highly contagious disease which has caused a devastating impact across the world with a very large number of infections and deaths. Timely and accurate testing is paramount to an effective response to this pandemic as it helps identify infections and therefore mitigate (isolate/cure) them. In this paper, we investigate thi...
Article
Full-text available
Healthcare supply chains are complex structures spanning across multiple organizational and geographical boundaries, providing critical backbone to services vital for everyday life. The inherent complexity of such systems can introduce impurities including inaccurate information, lack of transparency and limited data provenance. Counterfeit drugs i...
Article
Blockchain is a disruptive technology that has been used to address a wide range of challenges in diverse domains including voting, logistics, healthcare and finance. Transaction malleability is one of the critical threats for blockchain, which can facilitate double-spending attacks by tampering with the state of a blockchain. This paper investigat...
Chapter
Electronic voting or e-voting has been used in varying forms since 1970s with fundamental benefits over paper-based systems such as increased efficiency and reduced errors. However, challenges remain to the achieving of wide spread adoption of such systems, especially with respect to improving their resilience against potential faults. Blockchain i...
Chapter
Blockchains have emerged as one of the most disruptive technologies of the previous decade with applications in diverse domains such as e-government, finance, and healthcare. However, scalability remains a significant challenge within blockchains affecting its wide-spread adoption. As such, scalable blockchains can enhance performance with respect...
Article
Full-text available
COVID-19 has emerged as a highly contagious disease which has caused a devastating impact across the world with a very large number of infections and deaths. Timely and accurate testing is paramount to an effective response to this pandemic as it helps identify infections and therefore mitigate (isolate/cure) them. In this paper, we investigate thi...
Article
Full-text available
An enormous amount of drug supply is regularly wasted due to several reasons related to incorrect prescription, purchase of unnecessary quantities, drug intolerance, allergy, or interactions. On the other hand, these medicines may be needed by patients who cannot afford to purchase them. To address this challenge, we propose a fully decentralized s...
Preprint
Full-text available
div>The COVID-19 pandemic has severely impacted many industries, in particular the healthcare sector exposing systemic vulnerabilities in emergency preparedness, risk mitigation, and supply chain management. A major challenge during the pandemic was related to the increased demand of Personal Protective Equipment (PPE) resulting in critical shortag...
Preprint
Full-text available
div>The COVID-19 pandemic has severely impacted many industries, in particular the healthcare sector exposing systemic vulnerabilities in emergency preparedness, risk mitigation, and supply chain management. A major challenge during the pandemic was related to the increased demand of Personal Protective Equipment (PPE) resulting in critical shortag...
Article
Full-text available
Connected vehicles is a leading use‐case within the Industrial Internet of Things (IIoT), which is aimed at automating a range of driving tasks such as navigation, accident avoidance, content sharing, and auto‐driving. Such systems leverage vehicular ad hoc networks (VANETs) and include vehicle to vehicle and vehicle to roadside infrastructure comm...
Article
Full-text available
Additive Manufacturing (AM) is a major advancement in the digitization of manufacturing and production operations. Additive manufacturing uses three dimensional digital design, software and hardware equipment to precisely deposit layered materials for on-demand product manufacturing. The distinct advantages in enabling additive manufacturing inclu...
Article
Today’s smartphones are equipped with a large number of powerful value-added sensors and features such as a low power Bluetooth sensor, powerful embedded sensors such as the digital compass, accelerometer, GPS sensors, Wi-Fi capabilities, microphone, humidity sensors, health tracking sensors, and a camera, etc. These value-added sensors have revolu...
Preprint
Full-text available
COVID-19 has emerged as a highly contagious disease which has caused a devastating impact across the world with a very large number of infections and deaths. Timely and accurate testing is paramount to an effective response to this pandemic as it helps identify infections and therefore mitigate (isolate/cure) them. In this paper, we investigate thi...
Preprint
Full-text available
COVID-19 has emerged as a highly contagious disease which has caused a devastating impact across the world with a very large number of infections and deaths. Timely and accurate testing is paramount to an effective response to this pandemic as it helps identify infections and therefore mitigate (isolate/cure) them. In this paper, we investigate thi...
Preprint
Full-text available
Today's smartphones come with a large number of powerful additional devices such as a low power Bluetooth sensor, powerful embedded sensors such as the digital compass, accelerometer, GPS sensors, Wi-Fi capabilities, microphone, humidity sensors, health tracking sensors, and camera. These value-added sensors revolutionize many sectors of today's co...
Article
Blockchain has been adopted to address significant challenges, such as trust in diverse domains, including voting, logistics and finance. However, transaction malleability has been identified as a threat for blockchain, which can potentially lead to an inconsistent state that can result in further attacks such as double-spending. In this context, t...
Article
Full-text available
Internet of Things (IoT) forms the foundation of next generation infrastructures, enabling development of future cities that are inherently sustainable. Intrusion detection for such paradigms is a non-trivial challenge which has attracted further significance due to extraordinary growth in the volume and variety of security threats for such systems...
Article
Industrial Internet of Things (IIoT) exemplifies IoT with applications in manufacturing, surveillance, automotive, smart buildings, homes and transport. It leverages sensor technology, cutting edge communication and data analytics technologies and the open Internet to consolidate IT and operational technology (OT) aiming to achieve cost and perform...
Article
Voting is one of the fundamental pillars of modern democracy. Continuous efforts have been made to strengthen the processes and methods involved to achieve verifiable, transparent voting systems. In recent years, blockchain has been increasingly used to address multi-dimensional challenges across widespread application domains including healthcare,...
Article
The volume and variety of data collected for modern organisations has increased significantly over the last decade necessitating the detection and prevention of disclosure of sensitive data. Data loss prevention is an embedded process used to protect against disclosure of sensitive data to external uncontrolled environments. A typical Data Loss Pre...
Article
Telephony technologies (mobile, VoIP, and fixed) have potentially improved the way we communicate in our daily life and have been widely adopted for business and personal communications. At the same time, scammers, criminals, and fraudsters have also find the telephony network an attractive and affordable medium to target end-users with the adverti...
Article
Full-text available
Smart connected devices are widely used in healthcare to achieve improved well‐being, quality of life, and security of citizens. While improving quality of healthcare, such devices generate data containing sensitive patient information where unauthorized access constitutes breach of privacy leading to catastrophic outcomes for an individual as well...
Article
Full-text available
In this paper, we propose a blockchain-based solution and framework for document sharing and version control to facilitate multiuser collaboration and track changes in a trusted, secure, and decentralized manner, with no involvement of a centralized trusted entity or third party. This solution is based on utilizing Ethereum smart contracts to gover...
Article
Preventive healthcare requires continuous monitoring of the blood pressure (BP) of patients, which is not feasible using conventional methods. Photoplethysmogram (PPG) signals can be effectively used for this purpose as there is a physiological relation between the pulse width and BP and can be easily acquired using a wearable PPG sensor. However,...
Article
Full-text available
Internet of Things (IoT) represent a network of resource-constrained sensor devices connected through the open Internet, susceptible to misuse by intruders. Traditional standalone intrusion detection systems (IDS) are tasked with monitoring device behaviours to identify malicious activities. These systems not only require extensive network and syst...
Preprint
Internet of Things (IoT) is a disruptive technology with applications across diverse domains such as transportation and logistics systems, smart grids, smart homes, connected vehicles, and smart cities. Alongside the growth of these infrastructures, the volume and variety of attacks on these infrastructures has increased highlighting the significan...
Article
Tactile Internet evolves communications to encompass sensory information such as smell and haptic sensations combining ultra-low latency with extremely high availability, reliability, and security. Tactile Internet is realized through underpinning technologies such as Multi-access Edge and Fog computing which facilitate decentralized infrastructure...
Chapter
Spam and unwanted content has been a significant challenge for the Internet technologies (email, social networks, search engines, etc.) for decades. However, in recent years, the advent of modern and cheap telephony technologies and larger user base (more than six billion users) has attracted scammers to use telephony for distributing unwanted cont...
Article
Electronic voting or e-voting has been used in varying forms since 1970s with fundamental benefits over paper-based systems such as increased efficiency and reduced errors. However, challenges remain to the achieving of wide spread adoption of such systems, especially with respect to improving their resilience against potential faults. Blockchain i...
Conference Paper
Full-text available
To support scientists of different disciplines, different fields of Computer Science have developed tools and infras-tructures with the aim of giving them access to vast computational resources in the easiest possible way. Such extremely complex structures have evolved naturally in the last decades both in depth and breath and, in addition to scien...
Article
Full-text available
Scientific workflows orchestrate the execution of complex experiments frequently using distributed computing platforms. Meta-workflows represent an emerging type of such workflows which aim to reuse existing workflows from potentially different workflow systems to achieve more complex and experimentation minimizing workflow design and testing effor...
Article
Full-text available
The number of unsolicited and advertisement telephony calls over traditional and Internet telephony has rapidly increased over recent few years. Every year, the telecommunication regulators, law enforcement agencies and telecommunication operators receive a very large number of complaints against these unsolicited, unwanted calls. These unwanted ca...
Article
Full-text available
Background In Quantum Chemistry, many tasks are reoccurring frequently, e.g. geometry optimizations, benchmarking series etc. Here, workflows can help to reduce the time of manual job definition and output extraction. These workflows are executed on computing infrastructures and may require large computing and data resources. Scientific workflows...
Conference Paper
Scientific workflows orchestrate the execution of complex experiments on high performance computing platforms. Meta-workflows represent an emerging type of such workflows which aim to integrate multiple embedded workflows from potentially different workflow systems to achieve complex experimentation. Workflow interoperability plays a profound role...
Article
The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents t...
Article
Clouds represent a major paradigm shift from contemporary systems, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of flexible computing infrastructures that are available on demand. Clouds, however, introducing novel challenges particularly with respec...
Article
Cloud computing presents exciting opportunities to foster research for scientific communities; virtual machine technology has a profound role in this. Among other benefits, virtual machine technology enables Clouds to offer large scale and flexible computing infrastructures that are available on demand to address the diverse requirements of scienti...
Chapter
Cloud computing is an emerging computing paradigm which introduces novel opportunities to establish large scale, flexible computing infrastructures. However, security underpins extensive adoption of Cloud computing. This paper presents efforts to address one of the significant issues with respect to security of Clouds i.e. intrusion detection and s...
Conference Paper
IMS defines a generic architecture and framework that enables the convergence of voice, video, data and mobile network technology over an IP-based infrastructure. The heterogeneity and complexity of IMS network will bring a number of challenges to the integration of products in mutli-vendor and multi-protocol environment. Faults in a large, multi-t...
Conference Paper
Clouds represent a major paradigm shift from contemporary systems, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of flexible computing infrastructures that are available on demand. Clouds, however, introduce novel challenges particularly with respect...
Article
The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. In this paper, we pres...
Article
Virtual machines have attracted significant attention especially within the high performance computing community. However, there remain problems with respect to security in general and intrusion detection and diagnosis in particular which underpin the realization of the potential offered by this emerging technology. In this paper, one such problem...
Chapter
Full-text available
Cloud computing is an emerging paradigm with virtual machine as its enabling technology. As with any other Internet-based technology, security underpins widespread success of Cloud computing. However, Cloud computing introduces new challenges with respect to security mainly due to the unique characteristics inherited via virtual machine technology....
Article
Full-text available
Grid computing facilitates resource sharing typically to support distributed virtual organizations (VO). The multi-institutional nature of a grid environment introduces challenging security issues, especially with regard to authentication and authorization. This article presents a state-of-the-art review of major grid authentication and authorizati...
Conference Paper
Full-text available
Single sign-on and delegation of privileges are fundamental tenets upon which e-Infrastructures and Grid-based research more generally have been based. The realisation of single sign-on and delegation of privileges in accessing resources such as the UK e-Science National Grid Service is typically facilitated by X.509-based Public Key Infrastructure...
Article
Full-text available
Cloud computing is an emerging computing paradigm which introduces novel opportunities to establish large scale, flexible computing infrastructures. However, security underpins extensive adoption of Cloud computing. This paper presents efforts to address one of the significant issues with respect to security of Clouds i.e. intrusion detection and s...
Article
Authentication and authorization for Grids is a challenging security issue. In this paper, key issues for the establishment of Grid authentication and authorization infrastructures are discussed, and an overview of major Grid authentication and authorization technologies is presented. Related to this, recent developments in Grid authentication and...
Conference Paper
With the increasing prevalence of virtualization and cloud technologies, virtual security appliances have emerged and become a new way for traditional security appliances to be rapidly distributed and deployed in IT infrastructure. However, virtual security appliances are challenged with achieving optimal performance, as the physical resource is sh...
Article
Full-text available
The authors present an architecture for simulation modeling using the resources of grid computing. The use of the grid provides access to the substantial data storage and processing power, which are necessary to translate such models from computational tools into genuine planning aids. As well as providing access to virtualized compute resources, t...
Conference Paper
Cloud computing is a promising technology to facilitate development of large-scale, on-demand, flexible computing infrastructures. However, improving dependability of cloud computing is critical for realization of its potential. In this paper, we describe our efforts to quantify security for Clouds to facilitate provision of assurance for quality o...
Conference Paper
Full-text available
An e-Social Science infrastructure generally has security requirements to protect their restricted resources or services. As a widely accepted authentication and authorization technology, Shibboleth supports the sharing of resources on inter-institutional federation. Guanxi is an open source implementation of the Shibboleth protocol and architectur...
Conference Paper
Full-text available
This paper reports the results of an experiment to combine research and teaching in Corpus Linguistics, using an AI-inspired intelligent agent architecture, but casting students as the intelligent agents (Atwell 2007). Computing students studying Computational Modelling and Technologies for Knowledge Management were given the data-mining coursework...
Conference Paper
With the passage of time and increase in the need for mobility wireless or mobile networks emerged to replace the wired networks. This new generation of networks is different from the earlier one in many aspects like network infrastructure, resources and routing protocols, routing devices etc. These networks are bandwidth and resource constrained w...
Article
Full-text available
Improving dependability of Cloud computing is critical to the realization of its potential as a technology to facilitate the development of large-scale, flexible computing infrastructures, available on-demand to meet computation requirements of compute intensive workloads. However, unique characteristics such as; Diversity, Flexibility and Mobility...

Network

Cited By