
Muazzam A. Khan Khattak- PhD
- Professor/Director Science & Technology at Quaid-i-Azam University
Muazzam A. Khan Khattak
- PhD
- Professor/Director Science & Technology at Quaid-i-Azam University
Looking for potential collaborators. You can reach me at khattakmuazzam@gmail.com.
About
215
Publications
80,127
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,049
Citations
Introduction
Cybersecurity, machine learning, image encryption, intrusion detection.
Current institution
Publications
Publications (215)
Electromyography (EMG) is extensively used in key biomedical areas, such as prosthetics, and assistive and interactive technologies. This paper presents a new hybrid neural network named ConSGruNet for precise and efficient hand gesture recognition. The proposed model comprises convolutional neural networks with smart skip connections in conjunctio...
IoT-DS-AI nexus proposed in this book offers crucial services not only for individual health management, but also for entire population. The technologies assisting in continuous health monitoring and management using IoT sensors, ambient devices, mobile applications, data analytics and artificial intelligence algorithms hold potential to offer serv...
UN has developed Sustainable Development Goals (SDGs) for highlighting a uniform framework addressing global challenges. The focus of SDGs is to improve quality of life on the planet by dealing with issues related to poverty, hunger, education, inequality, climate change, environment and health. The goals are set to be achieved by 2030 and nations...
Personalized medicine promises to revolutionize the patient treatment by offering tailored medical services to the individual characteristics of each patient. It can improve the patient outcomes by reducing prescription errors and minimizing adverse drug reactions, as it focuses on prevention rather than reaction. The large volumes of data collecte...
It has been established so far that IoT-DS-AI nexus can offer significant assistance to the governments for achieving SDG-3. However, there are various challenges associated with the use of these technologies, mainly due to the involvement of human subject. The use of proposed nexus requires patients and general users to share lot of personal and f...
Smart phones have become part and parcel of the modern lifestyle. In addition to offering usual contacting service, these devices offer a wide variety of mobile applications ranging from games to money transfer and from home automation to fitness and chronic disease management. m-Health is the concept emerged with the development and usage of mobil...
Being able to continuously/remotely collect patient data has been the major motivation for developing wearable devices and mobile applications. These devices enable real-time monitoring of vital signs, physical activity, and other health metrics, providing valuable data for early detection of health issues, personalized treatment plans, and improve...
In the ever-evolving landscape of technology, digital imaging stands out for the changes it has step with both art and science of visual representation. The imaging has always been crucial in the processes of medical diagnosis and prognosis, and thus offers a great contribution towards SDG 3. Recently, several technologies including Machine Learnin...
Industry 4.0 represents the fourth industrial revolution, which is characterized by the incorporation of digital technologies, the Internet of Things (IoT), artificial intelligence, big data, and other advanced technologies into industrial processes. Industrial Machinery Health Management (IMHM) is a crucial element, based on the Industrial Interne...
This chapter explores the role of the Internet of Medical Things (IoMT) in enabling intelligent Cyber-Physical Systems (CPS) for healthcare solutions. It highlights the core components of IoMT, including medical devices, sensors, connectivity, and data analytics. The chapter addresses challenges and opportunities in IoMT implementation, such as pri...
Industry 4.0 represents the fourth industrial revolution, which is characterized by the incorporation of digital technologies, the Internet of Things (IoT), artificial intelligence, big data, and other advanced technologies into industrial processes.Industrial Machinery Health Management (IMHM) is a crucial element, based on the Industrial Internet...
Industrial Internet of Things (IIoT) is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial environments. Several IIoT nodes operate confidential data (such as medical, transportation, military, etc.) which are reachable targets for hostile intruders due to their openness and varie...
Multimedia data are becoming increasingly important in today's digital world, driven by the wide range of computer applications and corresponding technologies. With the advent of 5th generation (5G) technology, digital images are frequently transmitted via open, insecure channels on the Internet. As a result, the security of digital image data is s...
The rise in healthcare-related illnesses has generated a substantial amount of patient data, making the safeguarding of patient data privacy imperative. Existing privacy protection methods face challenges, including longer execution times, compromised data quality, and increased information loss as data dimensions expand. Effective attribute select...
Unmanned aerial vehicles (UAVs) can be used as drones’ edge Intelligence to assist with data collection, training models, and communication over wireless networks. UAV use for smart cities is rapidly growing in various industries, including tracking and surveillance, military defense, managing healthcare delivery, wireless communications, and more....
In the current era of digital communication, it has become increasingly apparent that transmitting images, often containing personal and/or confidential information, over the Internet is insecure, thus making image security a top priority. Many encryption algorithms have been proposed in the literature to address this issue. However, these algorith...
The increasing dependence on data analytics and artificial intelligence (AI) methodologies across various domains has prompted the emergence of apprehensions over data security and integrity. There exists a consensus among scholars and experts that the identification and mitigation of Multi-step attacks pose significant challenges due to the intric...
Mobile robots are increasingly employed in today’s environment. Perceiving the environment to perform a task plays a major role in the robots. The service robots are wisely employed in the fully (or) partially known user’s environment. The exploration and exploitation of the unknown environment is a tedious task. This paper introduces a novel Trimm...
The Internet of Things (IoT) is a grid of interconnected pre-programmed electronic devices to provide intelligent services for daily life tasks. However, the security of such networks is a considerable obstacle to successful implementation. Therefore, developing intelligent security systems for IoT is the need of the hour. This study investigates t...
Gender inclusion and female participation in STEM courses have always been challenging in a patriarchal country like Pakistan. Women are often underrepresented in engineering fields, as engineering fields are usually considered manly. Female students confront many challenges, be it workplace or educational institutes. Some of the self-perceived and...
Blockchain (BC) and Information for Operational and Tactical Analysis (IOTA) are distributed
ledgers that record a huge number of transactions in
multiple places at the same time using decentralized
databases. Both BC and IOTA facilitate Internet-ofThings (IoT) by overcoming the issues related to traditional centralized systems, such as privacy, se...
In recent years, the industrial network has seen a number of high-impact attacks. To counter these threats, several security systems have been implemented to detect attacks on industrial networks. However, these systems solely address issues once they have already transpired and do not proactively prevent them from occurring in the first place. The...
The Internet of Things (IoT) is a rapidly evolving technology with a wide range of potential applications, but the security of IoT networks remains a major concern. The existing system needs improvement in detecting intrusions in IoT networks. Several researchers have focused on intrusion detection systems (IDS) that address only one layer of the t...
Blockchain (BC) and Information for Operational and Tactical Analysis (IOTA) are distributed ledgers that record a huge number of transactions in multiple places at the same time using decentralized databases. Both BC and IOTA facilitate Internet-of-Things (IoT) by overcoming the issues related to traditional centralized systems, such as privacy, s...
Driven by Internet technology, the explosion of video content is growing exponentially. Hence, the need for video analysis and interpretation by human cognition is taken into account. Memorability is one of the cognitive measures that define the recall ability of watched visual content. Prior research works are done on image memorability, and video...
Nowadays, exponential growth in online production and extensive perceptual power of visual contents (i.e., images) complicate the users’ information needs. The research has shown that users are interested in satisfying their visual information needs by accessing the image objects. However, the exploration of images via existing search engines is ch...
The advancements in sensing technologies, information processing, and communication schemes have revolutionized the healthcare sector. Electronic Healthcare Records (EHR) facilitate the patients, doctors, hospitals, and other stakeholders to maintain valuable data and medical records. The traditional EHRs are based on cloud-based architectures and...
The industrial environment augments resource-constrained devices to bring services closer to autonomous devices. However, over time, these devices get overburdened due to computational workload, which results in degraded network performance. Therefore, the devices are programmed to share resources with nearby devices. However, due to real-time coll...
Nowadays, the growth of multimedia content over the web is exponential. The fingerprints are inconspicuously embedded in multimedia content. The fingerprints can be exploited to trace divergent information from multimedia resources. Sampling fingerprints, particularly from multimedia resources, is challenging since they are complex, heterogeneous,...
Unmanned ground vehicles (UGVs) are becoming the foremost part of rescue teams for protecting human lives from severe disasters and reducing human casualties by informing them about the risks ahead, such as mine detection and clearance. In mine detection, a centralized system is required so that the UGVs can communicate with each other efficiently...
The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to their resource-constrained nature. Extensive research efforts have been dedicated to securing these systems, but various vulnerabilities remain. Notably, it is challenging to maintain the confidentiality, integrity, and availability of mobile ad hoc net...
Vehicular fog computing is an emerging paradigm for delay-sensitive computations. In this highly dynamic resource-sharing environment, optimal offloading decision for effective resource utilization is a challenging task. In recent years, deep reinforcement learning has emerged as an effective approach for dealing with resource allocation problems b...
The Internet of Things (IoT) is a complete ecosystem encompassing various communication technologies, sensors, hardware, and software. IoT cutting-edge technologies and Artificial Intelligence (AI) have enhanced the traditional healthcare system considerably. The conventional healthcare system faces many challenges, including avoidable long wait ti...
Semantic segmentation is one of the challenging tasks in computer vision. Before the advent of deep learning, hand-crafted features were used to semantically extract the region-of-interest (ROI). Deep learning has recently achieved enormous response in semantic image segmentation. The previously developed U-Net inspired architectures operate with c...
Hypertensive retinopathy severity classification is proportionally related to tortuosity severity grading. No tortuosity severity scale enables a computer-aided system to classify the tortuosity severity of a retinal image. This work aimed to introduce a machine learning model that can identify the severity of a retinal image automatically and henc...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. {Benefiting from inherent properties} such as ergodicity and key-sensitivity; this can potentially improve non-linearity in encrypted data. This paper introduces a hybrid scheme that encrypt color images using multiple chaotic maps such as the two-di...
The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT devices collect data from the surrounding environment and communicate with other devices using different communication protocols such as CoAP, MQTT, DDS, etc. Study shows that t...
The Internet of Things (IoT) is a grid of interconnected pre-programmed electronic devices to provide intelligent services for daily life tasks. However, the security of such networks is a considerable obstacle to successful implementation. Therefore, developing intelligent security systems for IoT is the need of the hour. This study investigates t...
Video memorability prediction has become an important research topic in computer vision in recent years. The movie's input is highly remembered that gains much attention with unbounded time constraints. Episodic memory is a fascinating research area that needs much attention using video processing tools and techniques. Episodic memories are long-la...
The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation (4G) and 5th generation (5G) etc. Researchers have proposed many image encryption algorithms based on the classical random walk and chaos theory for sharing an image in a...
The Internet of Things (IoT) is a widely used technology in automated network systems across the world. The impact of the IoT on different industries has occurred in recent years. Many IoT nodes collect, store, and process personal data, which is an ideal target for attackers. Several researchers have worked on this problem and have presented many...
Cognitive radio (CR) empowered massive Internet of Things (CR-mIoT) is a networking paradigm, wherein cognitive capabilities are embedded in IoT devices and has attracted a lot of attention from the CR and IoT research communities. Conventionally, in cognitive radio networks (CRNs), secondary users (SUs) sense all the channels in a band sequentiall...
Artificial intelligence (AI) and computer vision (CV) methods become reliable to extract features from radiological images, aiding COVID-19 diagnosis ahead of the pathogenic tests and saving critical time for disease management and control. Thus, this review article focuses on cascading numerous deep learning-based COVID-19 computerized tomography...
The Internet of Things (IoT) is a mesh network of interconnected objects with unique
identifiers that can transmit data and communicate with one another without the need for human
intervention. The IoT has brought the future closer to us. It has opened up new and vast domains
for connecting not only people, but also all kinds of simple objects and...
Internet of Vehicles (IoV) is an application of the Internet of Things (IoT) network that connects smart vehicles to the internet, and vehicles with each other. With the emergence of IoV technology, customers have placed great attention on smart vehicles. However, the rapid growth of IoV has also caused many security and privacy challenges that can...
Cancer is the second deadliest disease globally that can affect any human body organ. Early detection of cancer can increase the chances of survival in humans. Morphometric appearances of histopathology images make it difficult to segment nuclei effectively. We proposed a model to segment overlapped nuclei from H&E stained images. U-Net model achie...
Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images' privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement. However, these algorithms suffer from a low key-space, significant computational overhead, and a lag in resistance again...
With the exponential rise in government and private health-supported schemes, the number of fraudulent billing cases is also increasing. Detection of fraudulent transactions in healthcare systems is an exigent task due to intricate relationships among dynamic elements, including doctors, patients, and services. Hence, to introduce transparency in h...
The revolution of IoT highly impacts on different applications such as remote sensing, smart cities, and remote digital healthcare. People use IoT devices for performing business transactions, daily tasks, and healthcare monitoring. IoT devices generate huge amounts of data assets that have potential applications. Biometrics is a potential applicat...
A vehicular fog network is an emerging paradigm adopted to facilitate delay-sensitive and innovative applications. Since vehicular environments are inherently dynamic, it becomes a challenge to effectively utilize all available resources. Often a centralized resource distribution model is adopted for effective resource utilization but this comes wi...
The Internet of vehicles (IoV) depicts a reality where ordinary things are connected to vehicular ad-hoc networks (VANETs), allowing them to transmit and collaborate. By placing these regular objects in VANETs and making them available at any time, this network and data sharing may raise real privacy and security issues. Thus, group-based communica...
The retina manifests a vital role in tracing chronic retinal disorders. It is located near the optic nerve that transforms the captured light into neural signals. The most prominent chronic eye diseases exhibit themselves in the retina. The analysis of a retina for detecting disease symptoms is quite challenging. Most of the prior methods developed...
The retinal vasculature has a vital role in predicting chronic diabetic and hypertensive retinopathy. Recently, the advent of deep learning algorithms has brought a revolution in ocular disease prediction. The researchers frequently design complex and intricate techniques to efficiently segment vessels, micro-vessels and achieve better response on...
Citation: Khan, A.; Umar, A.I.; Munir, A.; Shirazi, S.H.; Khan, M.A.; Adnan, M. A QoS-Aware Machine Learning-Based Framework for AMI Applications in Smart Grids. Energies 2021, 14, 8171. https://doi.
Ocean exploration has received much attention lately and became very important research area since last one decade for pollution detection, target tracking, navigation and ocean monitoring for military surveillance purposes. For underwater communication network of sensors needs to be established to collect information. Underwater networks are diffe...
The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication component is considered to be highly susceptible to side-channel attacks (SCAs) because it consumes th...
Wireless sensor networks (WSNs) are spatially scattered networks equipped with an extensive number of nodes to check and record different ecological states such as humidity, temperature, pressure, and lightning states. WSN network provides different services to a client such as monitoring, detection, and runtime decision-making against events occur...
A large number of smart devices in Internet of Things (IoT) environments communicate via different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely used publish–subscribe-based protocol for the communication of sensor or event data. The publish–subscribe strategy makes it more attractive for intruders and thus increases t...
Offensive security activities such as penetration testing is employed to simulate attack scenarios in order to test vulnerabilities. However, in past research defense evasion was not considered in the whole approach which decreases the realism factor of testing. In this paper we propose a novel approach for concealing malwares from static analysis...
Software-defined network (SDN) is an emerging networking paradigm that segregates functionalities of control and data plane to reduce their complexity and provides more control, scalability, and centralized management. OpenFlow (OF) is a widely used protocol that builds a global and shared view of the network. Therefore, for SDN applications, the c...
The magnetic levitation (MAGLEV) train uses magnetic field to suspend, guide, and propel vehicle onto the track. The MAGLEV train provides a sustainable and cleaner solution for train transportation by significantly reducing the energy usage and greenhouse gas emissions as compared to traditional train transportation systems. In this paper, we prop...
In Alzheimer’s disease (AD) progression, it is imperative to identify the subjects with mild cognitive impairment before clinical symptoms of AD appear. This work proposes a technique for decision support in identifying subjects who will show transition from mild cognitive impairment (MCI) to Alzheimer’s disease (AD) in the future. We used robust p...
The domain of Internet of Things (IoT) has witnessed immense adaptability over the last few years by drastically transforming human lives to automate their ordinary daily tasks. This is achieved by interconnecting heterogeneous physical devices with different functionalities. Consequently, the rate of cyber threats has also been raised with the exp...
The state-of-the-art deep neural networks trained on a large amount of data can better diagnose cardiac arrhythmias than cardiologists. However, the requirement of the high-volume training data is not pragmatic. In this research, the identification and classification of three ECG patterns are analyzed from a transfer learning prospect. The features...
The bio-inspired concept of deep learning has brought a revolution in artificial intelligence. It has challenged several areas including computer vision, signal processing, healthcare, transportation, security, robotics and machine translation. The core idea is to make learning algorithms efficient and convenient to use for solving daily life probl...
Wireless Sensor Network holds a pivotal position and gained a lot of attention from researchers in recent years. Sensor nodes have been used in vast applications such as environment monitoring, security purpose applications, and target tracking. This latter comprises of detection and monitoring of the target movement. In this paper, we explore in d...
In the last decade, due to wireless technology’s enhancement, the people’s interest is highly increased in Wireless Body Sensor Networks (WBSNs). WBSNs consist of many tiny biosensor nodes that are continuously monitoring diverse physiological signals such as BP (systolic and diastolic), ECG, EMG, SpO2, and activity recognition and transmit these s...
Deep learning has an enormous impact on medical image analysis. Many computer-aided diagnostic systems equipped with deep networks are rapidly reducing human intervention in healthcare. Among several applications, medical image semantic segmentation is one of the core areas of active research to delineate the anatomical structures and other regions...
Reliable and resource-aware communication is a challenging task in Internet of Things (IoT) networks. In these networks, seamless and interoperable communication among member devices is a challenging task that becomes more complex with the simultaneous communication of two or more devices with a centralized controller, that is, a cluster head or a...
Smart cities play a vital role to develop a sustainable infrastructure with efficient management of the Internet of things devices. The infrastructure is used to support various applications for smart hospitals, smart factories, and intelligent transportation systems. With the extensive deployment of Internet of things devices, unprecedented growth...
Unlike commercial networks, the tactical networks drive in a critical environment and without a backbone infrastructure. These networks involve mission-critical operations that are dependent on the rapid and reliable transfer of delay-sensitive data to conduct command and control (C2). Owing to the decentralized and dynamic nature, tactical network...
Wireless sensor network (WSN) comprises of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, and pressure, and to cooperatively forward the collected information to the destination through the network infrastructure. As sensor nodes are energy constraint devices, therefore, the imp...
In the task of data routing in Internet of Things enabled volatile underwater environments, providing better transmission and maximizing network communication performance are always challenging. Many network issues such as void holes and network isolation occur because of long routing distances between nodes. Void holes usually occur around the sin...
Internet of Things (IoT) is transforming human lives by paving the way for the management of physical devices on the edge. These interconnected IoT objects share data for remote accessibility and can be vulnerable to open attacks and illegal access. Intrusion detection methods are commonly used for the detection of such kinds of attacks but with th...
Accurate detection and pixel‐wise classification of brain tumors in Magnetic Resonance Imaging (MRI) scans are vital for their diagnosis, prognosis study and treatment planning. Manual segmentation of tumors from MRI is highly subjective and tedious. With recent advances in deep learning, automatic brain tumor segmentation is an emerging research d...
An increasing trend in healthcare organizations to outsource EHRs’ data to the cloud highlights new challenges regarding the privacy of given individuals. Healthcare organizations outsource their EHRs data in a hybrid cloud that elevates the problem of security and privacy in terms of EHRs’ access to an unlimited number of recipients in a hybrid cl...
Blockchain has penetrated numerous domains such as, industries, government agencies, online voting, and healthcare, etc. Among these domains, healthcare is one of the trending and most important one, which consists of a control system and an Electronic Health Records (EHRs). Diabetes is one of the most rapidly growing chronic diseases that increase...