Muhammad Umar Aftab

Muhammad Umar Aftab
  • PhD Student at University of Electronic Science and Technology of China

About

56
Publications
35,581
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
964
Citations
Current institution
University of Electronic Science and Technology of China
Current position
  • PhD Student

Publications

Publications (56)
Article
Full-text available
Industrial Internet of Things (IIoT) applications consist of resource constrained interconnected devices that make them vulnerable to data leak and integrity violation challenges. The mobility, dynamism, and complex structure of the network further make this issue more challenging. To control the information flow in such environments, access contro...
Article
Full-text available
The recent advancements in the Internet of Things have made it converge towards critical infrastructure automation, opening a new paradigm referred to as the Industrial Internet of Things (IIoT). In the IIoT, different connected devices can send huge amounts of data to other devices back and forth for a better decision-making process. In such use c...
Article
Full-text available
Intelligent transportation systems (ITSs) have become an indispensable component of modern global technological development, as they play a massive role in the accurate statistical estimation of vehicles or individuals commuting to a particular transportation facility at a given time. This provides the perfect backdrop for designing and engineering...
Article
Full-text available
The diseases transmitted through vectors such as mosquitoes are named vector-borne diseases (VBDs), such as malaria, dengue, and leishmaniasis. Malaria spreads by a vector named Anopheles mosquitos. Dengue is transmitted through the bite of the female vector Aedes aegypti or Aedes albopictus mosquito. The female Phlebotomine sandfly is the vector t...
Article
Full-text available
In the twenty-first century, machine learning is a significant part of daily life for everyone. Today, it is adopted in many different applications, such as object recognition, object classification, and medical purposes. This research aimed to use deep convolutional neural networks for the real-time detection of diseases in plant leaves. Typically...
Article
Full-text available
Social media has transformed into a crucial channel for political expression. Twitter, especially, is a vital platform used to exchange political hate in Pakistan. Political hate speech affects the public image of politicians, targets their supporters, and hurts public sentiments. Hate speech is a controversial public speech that promotes violence...
Article
Full-text available
The Internet of Things (IoT) connects many objects and allows continuous communication and data sharing has emerged as a revolutionary technology. However, expanding IoT devices has raised concerns regarding data security and access control. Traditional access control mechanisms face challenges in managing access rights, particularly in scenarios w...
Article
Full-text available
The estimation of crowd density is crucial for applications such as autonomous driving, visual surveillance, crowd control, public space planning, and warning visually distracted drivers prior to an accident. Having strong translational, reflective, and scale symmetry, models for estimating the density of a crowd yield an encouraging result. Howeve...
Article
Full-text available
In autonomous driving and Intelligent transportation systems, pedestrian detection is vital in reducing traffic accidents. However, detecting small-scale and occluded pedestrians is challenging due to the ineffective utilization of the low-feature content of small-scale objects. The main reasons behind this are the stochastic nature of weight initi...
Article
Full-text available
The incessant advancements in technology and the rapid growth of wireless sensors will lead to the Internet of Things (IoT), a global computing network in which everything will be connected to the Internet. This results in large amounts of data being gathered from the smart systems via IoT nodes. This data, therefore, requires processing and storag...
Article
With the recent advances in technology, smart cities are rapidly earning momentum. To provide better lives, smart cities should host several applications to increase the efficiency and accessibility of services. Since these services involve the conveyance of significant data among the smart cities’ cloud and the dwellers over the Internet, security...
Article
Full-text available
Community Question Answering (CQA) web service provides a platform for people to share knowledge. Quora, Stack Over ow, and Yahoo! Answers are few sites where questioners post their queries and answerers respond to their respective queries. Due to the ease of use and quick responsiveness of the CQA platform, these sites are being widely adopted by...
Article
Full-text available
Cloud computing is a long-standing dream of computing as a utility, where users can store their data remotely in the cloud to enjoy on-demand services and high-quality applications from a shared pool of configurable computing resources. Thus, the privacy and security of data are of utmost importance to all of its users regardless of the nature of t...
Article
Full-text available
Nowadays multiple wireless communication systems operate in industrial environments side by side. In such an environment performance of one wireless network can be degraded by the collocated hostile wireless network having higher transmission power or higher carrier sensing threshold. Unlike the previous research works which considered IEEE 802.15....
Article
Full-text available
The Vehicle Routing Problem (VRP) and its variants are found in many fields, especially logistics. In this study, we introduced an adaptive method to a complex VRP. It combines multi-objective optimization and several forms of VRPs with practical requirements for an urban shipment system. The optimizer needs to consider terrain and traffic conditio...
Article
Full-text available
Access control mechanisms define the level of access to the resources among specified users. It distinguishes the users as authorized or unauthorized based on appropriate policies. Several traditional and hybrid access control models have been proposed in previous researches over the last few decades. In this study, we provide a detailed survey of...
Preprint
The Vehicle Routing Problem (VRP) and its variants are found in many fields, especially logistics. In this study, we introduced an adaptive method to a complex VRP. It combines multi-objective optimization and several forms of VRPs with practical requirements for an urban shipment system. The optimizer needs to consider terrain and traffic conditio...
Article
Full-text available
Today, accurate and automated abnormality diagnosis and identification have become of paramount importance as they are involved in many critical and life-saving scenarios. To accomplish such frontiers, we propose three artificial intelligence models through the application of deep learning algorithms to analyze and detect anomalies in human heartbe...
Article
Full-text available
Vehicle Re-identification (re-id) over surveillance camera network with non-overlapping field of view is an exciting and challenging task in intelligent transportation systems (ITS). Due to its versatile applicability in metropolitan cities, it gained significant attention. Vehicle re-id matches targeted vehicle over non-overlapping views in multip...
Article
Full-text available
Localization of multiple targets is a challenging task due to immense complexity regarding data fusion received at the sensors. In this context, we propose an algorithm to solve the problem for an unknown number of emitters without prior knowledge to address the data fusion problem. The proposed technique combines the time difference of arrival (TD...
Article
Full-text available
The scheduling process that aims to assign tasks to members is a difficult job in project management. It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process. This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically. The generated schedule...
Article
Full-text available
Today, the trend of the Internet of Things (IoT) is increasing through the use of smart devices, vehicular networks, and household devices with internet-based networks. Specifically, the IoT smart devices and gadgets used in government and military are crucial to operational success. Communication and data sharing between these devices have increas...
Article
Full-text available
With the emergence of deep learning, computer vision has witnessed extensive advancement and has seen immense applications in multiple domains. Specifically, image captioning has become an attractive focal direction for most machine learning experts, which includes the prerequisite of object identification, location, and semantic understanding. In...
Preprint
Full-text available
Vehicle Re-identification (re-id) over surveillance camera network with non-overlapping field of view is an exciting and challenging task in intelligent transportation systems (ITS). Due to its versatile applicability in metropolitan cities, it gained significant attention. Vehicle re-id matches targeted vehicle over non-overlapping views in multip...
Article
Full-text available
The ongoing coronavirus 2019 (COVID-19) pandemic caused by the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) has resulted in a severe ramification on the global healthcare system, principally because of its easy transmission and the extended period of the virus survival on contaminated surfaces. With the advances in computer-aided di...
Article
Full-text available
The rapid growth of wireless communication and sensing technology will lead to an Internet of Vehicles (IoV) that builds a large network with interactions among the vehicles, roadside infrastructure, and the surrounding environment. This will allow a large amount of data to be gathered from vehicles through IoV nodes. On the other hand, the cloud p...
Article
Full-text available
Vehicle re-identification (Re-Id) is the key module in an intelligent transportation system (ITS). Due to its versatile applicability in metropolitan cities, this task has received increasing attention these days. It aims to identify whether the specific vehicle has already appeared over the surveillance network or not. Mostly, the vehicle Re-Id me...
Article
Generative Adversarial Network has proven to produce state-of-the-art results by framing a generative modeling task into a supervised learning problem. In this paper, we propose Attentively Conditioned Generative Adversarial Network (ACGAN) for semantic segmentation by designing a segmentor model that generates probability maps from images and a di...
Article
Full-text available
Generative Adversarial Network has proven to produce state-of-the-art results by framing a generative modeling task into a supervised learning problem. In this paper, we propose Attentively Conditioned Generative Adversarial Network (ACGAN) for semantic segmentation by designing a segmentor model that generates probability maps from images and a di...
Article
Full-text available
Secure localization of vehicles is gaining the attention of researchers from both academia and industry especially due to the emergence of’ internet of things (IoT). The modern vehicles are usually equipped with circuitries that gives connectivity with other vehicles and with cellular networks such as 4G/Fifth generation cellar network (5G). The ch...
Article
Full-text available
The generation of the textual description of the differences in images is a relatively new concept that requires the fusion of both computer vision and natural language techniques. In this paper, we present a novel Fully Convolutional CaptionNet (FCC) that employs an encoder-decoder framework to perform visual feature extractions, compute the featu...
Article
Full-text available
Automated learning analytics is becoming an essential topic in the educational area, which needs effective systems to monitor the learning process and provides feedback to the teacher. Recent advances in visual sensors and computer vision methods enable automated monitoring of behavior and affective states of learners at different levels, from univ...
Conference Paper
The emergence of deep learning as a commanding technique for learning heterogeneous layers of feature representations have consequently substituted traditional machine learning algorithms which are generally poor in analyzing compound sentences. Additionally, convolutional and recurrent neural networks have auspiciously yielded state-of-the-art res...
Article
Full-text available
Several deep learning techniques have been intensively reviewed for captioning tasks, enabling the possibility of textual understanding, and description of both simple and complex images. In advancing this knowledge, this paper proposes a multimodal end-to-end siamese difference captioning model (SDCM) to automatically generate a natural language d...
Article
Full-text available
A major development in the field of access control is the dominant role-based access control (RBAC) scheme. The fascination of RBAC lies in its enhanced security along with the concept of roles. In addition, attribute-based access control (ABAC) is added to the access control models, which is famous for its dynamic behavior. Separation of duty (SOD...
Article
Full-text available
The intelligent transportation system is currently an active research area, and vehicle re-identification (Re-Id) is a fundamental task to implement it. It determines whether the given vehicle image obtained from one camera has already appeared over a camera network or not. There are many possible practical applications where the vehicle Re-Id syst...
Conference Paper
RBAC and ABAC are well-known access control models due to their least privileges and dynamic behavior respectively. They also have some drawbacks like RBAC is unable to provide dynamic behavior and flexibility as well as ABAC is unable to provide tight security and ease of management of permissions as the RBAC can do. In this paper, a hybrid access...
Article
Full-text available
Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of autonomous collection of mobile nodes (Smart phones, Laptops, iPads, PDAs etc.). Network is self-configured to reconstruct its topology and routing table information for the exchange of data packets on the joining and leaving of each node on ad-hoc basis. This paper is base...
Conference Paper
Full-text available
Role based access control (RBAC) is well known due to its high security and ease in management for permissions. But it also has some deficiencies like role structure complexity and having no dynamic behavior. Attribute based access control (ABAC) is a dynamic access control model that provides ease of role structuring. Analyzing roles and permissio...
Article
Full-text available
The confluence of cheap wireless communication, sensing and computation has produced a new group of smart devices and by using thousands of these kind of devices in self-organizing networks has formed a new technology that is called wireless sensor networks (WSNs). WSNs use sensor nodes that placed in open areas or in public places and with a huge...
Conference Paper
Role based Access Control (RBAC) is known as an evolution in the field of access control. The strength of RBAC is considered due to the incorporation of concept of roles. Separation of Duty (SOD) is a constraint that implements least privilege principle in RBAC. Dynamic Separation of Duty (DSD) is a powerful constraint to control internal security...
Article
In networks selecting the shortest path and sending data over that path is called routing. The path selection can be done either manually or through some routing protocol. There are many protocols that are used for routing like Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), a...
Article
Institutional collaborative systems focus on providing the fast, and secure connections to students, teaching and non-teaching staff members. Access control is more important in these types of systems because different kind of users access the system on different levels. So a proper architecture must be there for these kinds of systems, for providi...

Network

Cited By