Muazzam A. Khan Khattak

Muazzam A. Khan Khattak
Quaid-i-Azam University | QAU · Department of Computer Science

PhD
Looking for potential collaborators. You can reach me at khattakmuazzam@gmail.com.

About

165
Publications
40,901
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,893
Citations
Citations since 2016
136 Research Items
1804 Citations
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
Introduction
Cybersecurity, machine learning, image encryption, intrusion detection.

Publications

Publications (165)
Article
Full-text available
The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to their resource-constrained nature. Extensive research efforts have been dedicated to securing these systems, but various vulnerabilities remain. Notably, it is challenging to maintain the confidentiality, integrity, and availability of mobile ad hoc net...
Article
Full-text available
Vehicular fog computing is an emerging paradigm for delay-sensitive computations. In this highly dynamic resource-sharing environment, optimal offloading decision for effective resource utilization is a challenging task. In recent years, deep reinforcement learning has emerged as an effective approach for dealing with resource allocation problems b...
Article
Full-text available
The Internet of Things (IoT) is a complete ecosystem encompassing various communication technologies, sensors, hardware, and software. IoT cutting-edge technologies and Artificial Intelligence (AI) have enhanced the traditional healthcare system considerably. The conventional healthcare system faces many challenges, including avoidable long wait ti...
Conference Paper
Semantic segmentation is one of the challenging tasks in computer vision. Before the advent of deep learning, hand-crafted features were used to semantically extract the region-of-interest (ROI). Deep learning has recently achieved enormous response in semantic image segmentation. The previously developed U-Net inspired architectures operate with c...
Article
Full-text available
Hypertensive retinopathy severity classification is proportionally related to tortuosity severity grading. No tortuosity severity scale enables a computer-aided system to classify the tortuosity severity of a retinal image. This work aimed to introduce a machine learning model that can identify the severity of a retinal image automatically and henc...
Article
Full-text available
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. {Benefiting from inherent properties} such as ergodicity and key-sensitivity; this can potentially improve non-linearity in encrypted data. This paper introduces a hybrid scheme that encrypt color images using multiple chaotic maps such as the two-di...
Article
Full-text available
The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT devices collect data from the surrounding environment and communicate with other devices using different communication protocols such as CoAP, MQTT, DDS, etc. Study shows that t...
Preprint
Full-text available
The Internet of Things (IoT) is a grid of interconnected pre-programmed electronic devices to provide intelligent services for daily life tasks. However, the security of such networks is a considerable obstacle to successful implementation. Therefore, developing intelligent security systems for IoT is the need of the hour. This study investigates t...
Conference Paper
Full-text available
Video memorability prediction has become an important research topic in computer vision in recent years. The movie's input is highly remembered that gains much attention with unbounded time constraints. Episodic memory is a fascinating research area that needs much attention using video processing tools and techniques. Episodic memories are long-la...
Article
Full-text available
The Internet of Things (IoT) is a widely used technology in automated network systems across the world. The impact of the IoT on different industries has occurred in recent years. Many IoT nodes collect, store, and process personal data, which is an ideal target for attackers. Several researchers have worked on this problem and have presented many...
Preprint
Cognitive radio (CR) empowered massive Internet of Things (CR-mIoT) is a networking paradigm, wherein cognitive capabilities are embedded in IoT devices and has attracted a lot of attention from the CR and IoT research communities. Conventionally, in cognitive radio networks (CRNs), secondary users (SUs) sense all the channels in a band sequentiall...
Article
Artificial intelligence (AI) and computer vision (CV) methods become reliable to extract features from radiological images, aiding COVID-19 diagnosis ahead of the pathogenic tests and saving critical time for disease management and control. Thus, this review article focuses on cascading numerous deep learning-based COVID-19 computerized tomography...
Article
Full-text available
The Internet of Things (IoT) is a mesh network of interconnected objects with unique identifiers that can transmit data and communicate with one another without the need for human intervention. The IoT has brought the future closer to us. It has opened up new and vast domains for connecting not only people, but also all kinds of simple objects and...
Article
Full-text available
Internet of Vehicles (IoV) is an application of the Internet of Things (IoT) network that connects smart vehicles to the internet, and vehicles with each other. With the emergence of IoV technology, customers have placed great attention on smart vehicles. However, the rapid growth of IoV has also caused many security and privacy challenges that can...
Article
Cancer is the second deadliest disease globally that can affect any human body organ. Early detection of cancer can increase the chances of survival in humans. Morphometric appearances of histopathology images make it difficult to segment nuclei effectively. We proposed a model to segment overlapped nuclei from H&E stained images. U-Net model achie...
Article
Full-text available
Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images' privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement. However, these algorithms suffer from a low key-space, significant computational overhead, and a lag in resistance again...
Article
Full-text available
With the exponential rise in government and private health-supported schemes, the number of fraudulent billing cases is also increasing. Detection of fraudulent transactions in healthcare systems is an exigent task due to intricate relationships among dynamic elements, including doctors, patients, and services. Hence, to introduce transparency in h...
Article
Full-text available
The revolution of IoT highly impacts on different applications such as remote sensing, smart cities, and remote digital healthcare. People use IoT devices for performing business transactions, daily tasks, and healthcare monitoring. IoT devices generate huge amounts of data assets that have potential applications. Biometrics is a potential applicat...
Article
Full-text available
A vehicular fog network is an emerging paradigm adopted to facilitate delay-sensitive and innovative applications. Since vehicular environments are inherently dynamic, it becomes a challenge to effectively utilize all available resources. Often a centralized resource distribution model is adopted for effective resource utilization but this comes wi...
Article
Full-text available
The Internet of vehicles (IoV) depicts a reality where ordinary things are connected to vehicular ad-hoc networks (VANETs), allowing them to transmit and collaborate. By placing these regular objects in VANETs and making them available at any time, this network and data sharing may raise real privacy and security issues. Thus, group-based communica...
Conference Paper
Full-text available
The retina manifests a vital role in tracing chronic retinal disorders. It is located near the optic nerve that transforms the captured light into neural signals. The most prominent chronic eye diseases exhibit themselves in the retina. The analysis of a retina for detecting disease symptoms is quite challenging. Most of the prior methods developed...
Conference Paper
Full-text available
The retinal vasculature has a vital role in predicting chronic diabetic and hypertensive retinopathy. Recently, the advent of deep learning algorithms has brought a revolution in ocular disease prediction. The researchers frequently design complex and intricate techniques to efficiently segment vessels, micro-vessels and achieve better response on...
Article
Full-text available
Citation: Khan, A.; Umar, A.I.; Munir, A.; Shirazi, S.H.; Khan, M.A.; Adnan, M. A QoS-Aware Machine Learning-Based Framework for AMI Applications in Smart Grids. Energies 2021, 14, 8171. https://doi.
Article
Full-text available
Accurate detection and pixel‐wise classification of brain tumors in Magnetic Resonance Imaging (MRI) scans are vital for their diagnosis, prognosis study and treatment planning. Manual segmentation of tumors from MRI is highly subjective and tedious. With recent advances in deep learning, automatic brain tumor segmentation is an emerging research d...
Chapter
Ocean exploration has received much attention lately and became very important research area since last one decade for pollution detection, target tracking, navigation and ocean monitoring for military surveillance purposes. For underwater communication network of sensors needs to be established to collect information. Underwater networks are diffe...
Article
Full-text available
The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication component is considered to be highly susceptible to side-channel attacks (SCAs) because it consumes th...
Article
Full-text available
Wireless sensor networks (WSNs) are spatially scattered networks equipped with an extensive number of nodes to check and record different ecological states such as humidity, temperature, pressure, and lightning states. WSN network provides different services to a client such as monitoring, detection, and runtime decision-making against events occur...
Article
Full-text available
A large number of smart devices in Internet of Things (IoT) environments communicate via different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely used publish–subscribe-based protocol for the communication of sensor or event data. The publish–subscribe strategy makes it more attractive for intruders and thus increases t...
Conference Paper
Offensive security activities such as penetration testing is employed to simulate attack scenarios in order to test vulnerabilities. However, in past research defense evasion was not considered in the whole approach which decreases the realism factor of testing. In this paper we propose a novel approach for concealing malwares from static analysis...
Chapter
Software-defined network (SDN) is an emerging networking paradigm that segregates functionalities of control and data plane to reduce their complexity and provides more control, scalability, and centralized management. OpenFlow (OF) is a widely used protocol that builds a global and shared view of the network. Therefore, for SDN applications, the c...
Article
Full-text available
The magnetic levitation (MAGLEV) train uses magnetic field to suspend, guide, and propel vehicle onto the track. The MAGLEV train provides a sustainable and cleaner solution for train transportation by significantly reducing the energy usage and greenhouse gas emissions as compared to traditional train transportation systems. In this paper, we prop...
Article
Full-text available
In Alzheimer’s disease (AD) progression, it is imperative to identify the subjects with mild cognitive impairment before clinical symptoms of AD appear. This work proposes a technique for decision support in identifying subjects who will show transition from mild cognitive impairment (MCI) to Alzheimer’s disease (AD) in the future. We used robust p...
Article
Full-text available
The domain of Internet of Things (IoT) has witnessed immense adaptability over the last few years by drastically transforming human lives to automate their ordinary daily tasks. This is achieved by interconnecting heterogeneous physical devices with different functionalities. Consequently, the rate of cyber threats has also been raised with the exp...
Conference Paper
Full-text available
The state-of-the-art deep neural networks trained on a large amount of data can better diagnose cardiac arrhythmias than cardiologists. However, the requirement of the high-volume training data is not pragmatic. In this research, the identification and classification of three ECG patterns are analyzed from a transfer learning prospect. The features...
Conference Paper
The bio-inspired concept of deep learning has brought a revolution in artificial intelligence. It has challenged several areas including computer vision, signal processing, healthcare, transportation, security, robotics and machine translation. The core idea is to make learning algorithms efficient and convenient to use for solving daily life probl...
Preprint
Full-text available
Wireless Sensor Network holds a pivotal position and gained a lot of attention from researchers in recent years. Sensor nodes have been used in vast applications such as environment monitoring, security purpose applications, and target tracking. This latter comprises of detection and monitoring of the target movement. In this paper, we explore in d...
Conference Paper
Full-text available
The Internet of Electric Vehicle (IoEV) energy trading is where the Electric Vehicles (EVs) provide energy to vehicles, grids, community, and buildings. A scalable, efficient, secure, and best price selection scheme is needed that supports the IoEV energy trading transaction. The traditional blockchain is used in the existing researches to achieve...
Article
Full-text available
In the last decade, due to wireless technology’s enhancement, the people’s interest is highly increased in Wireless Body Sensor Networks (WBSNs). WBSNs consist of many tiny biosensor nodes that are continuously monitoring diverse physiological signals such as BP (systolic and diastolic), ECG, EMG, SpO2, and activity recognition and transmit these s...
Article
Full-text available
Deep learning has an enormous impact on medical image analysis. Many computer-aided diagnostic systems equipped with deep networks are rapidly reducing human intervention in healthcare. Among several applications, medical image semantic segmentation is one of the core areas of active research to delineate the anatomical structures and other regions...
Article
Full-text available
Smart cities play a vital role to develop a sustainable infrastructure with efficient management of the Internet of things devices. The infrastructure is used to support various applications for smart hospitals, smart factories, and intelligent transportation systems. With the extensive deployment of Internet of things devices, unprecedented growth...
Article
Full-text available
Unlike commercial networks, the tactical networks drive in a critical environment and without a backbone infrastructure. These networks involve mission-critical operations that are dependent on the rapid and reliable transfer of delay-sensitive data to conduct command and control (C2). Owing to the decentralized and dynamic nature, tactical network...
Article
Full-text available
Wireless sensor network (WSN) comprises of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, and pressure, and to cooperatively forward the collected information to the destination through the network infrastructure. As sensor nodes are energy constraint devices, therefore, the imp...
Article
In the task of data routing in Internet of Things enabled volatile underwater environments, providing better transmission and maximizing network communication performance are always challenging. Many network issues such as void holes and network isolation occur because of long routing distances between nodes. Void holes usually occur around the sin...
Preprint
Full-text available
Internet of Things (IoT) is transforming human lives by paving the way for the management of physical devices on the edge. These interconnected IoT objects share data for remote accessibility and can be vulnerable to open attacks and illegal access. Intrusion detection methods are commonly used for the detection of such kinds of attacks but with th...
Article
An increasing trend in healthcare organizations to outsource EHRs’ data to the cloud highlights new challenges regarding the privacy of given individuals. Healthcare organizations outsource their EHRs data in a hybrid cloud that elevates the problem of security and privacy in terms of EHRs’ access to an unlimited number of recipients in a hybrid cl...
Article
Blockchain has penetrated numerous domains such as, industries, government agencies, online voting, and healthcare, etc. Among these domains, healthcare is one of the trending and most important one, which consists of a control system and an Electronic Health Records (EHRs). Diabetes is one of the most rapidly growing chronic diseases that increase...
Article
Full-text available
Nowadays, people pay more and more emotional to the emotional analysis of specific goals. Due to the long training time of many networks, this paper proposes a neural network with specific Objective sentiment analysis. Compared with the current neural network, the algorithm proposed in this paper has a shorter training time, which can effectively m...