- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Privacy, Security, and Data Protection
- Blockchain Technology Applications and Security
- Cloud Data Security Solutions
- Vehicular Ad Hoc Networks (VANETs)
- Access Control and Trust
- Data Quality and Management
- IoT and Edge/Fog Computing
- Internet Traffic Analysis and Secure E-voting
- Data Management and Algorithms
- Advanced Steganography and Watermarking Techniques
- Cloud Computing and Resource Management
- Mobile Crowdsensing and Crowdsourcing
- Data Mining Algorithms and Applications
- Scientific Computing and Data Management
- AI in cancer detection
- Software Engineering Research
- Digital Media Forensic Detection
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Parallel Computing and Optimization Techniques
- User Authentication and Security Systems
- Chaos-based Image/Signal Encryption
- Real-Time Systems Scheduling
Quaid-i-Azam University
2022-2025
University of Agriculture Faisalabad
2024
Southern University of Science and Technology
2020-2024
Shenyang Aerospace University
2024
University of Glasgow
2024
University of Science and Technology of China
2024
Middle East Technical University
2024
University of Faisalabad
2024
COMSATS University Islamabad
2014-2022
University of Sargodha
2021
Abstract Automatic medical image analysis is one of the key tasks being used by community for disease diagnosis and treatment planning. Statistical methods are major algorithms consist few steps including preprocessing, feature extraction, segmentation, classification. Performance such statistical an important factor their successful adaptation. The results these depend on quality images fed to processing pipeline: better images, higher results. Preprocessing pipeline phase that attempts...
Drones are increasingly utilized for a variety of purposes, spanning military to civilian applications. The rise in drone usage underscores privacy and security challenges concerning flight boundaries, data collection public private domains, storage dissemination. Such issues highlight the drones' capability communicate securely store over potentially insecure channels. Recognizing these gaps research, this paper introduces an efficient secure surveillance model Internet (IoD). Our ensures...
The advancement of computer- and internet-based technologies has transformed the nature services in healthcare by using mobile devices conjunction with cloud computing. classical phenomenon patient-doctor diagnostics is extended to a more robust advanced concept E-health, where remote online/offline treatment can be performed. In this article, we propose framework which incorporates cloud-based decision support system for detection classification malignant cells breast cancer, while cytology...
A cloud computing environment provides a cost-effective way for the end user to store and access private data over remote storage using some Internet connection. The has anywhere at any time. However, do not remain secure all Since are accessible only by interference of third party, it is prone breach authentication integrity data. Moreover, allows simultaneous users retrieve their online different connections, which leads exposure, leakage, loss user’s sensitive in locations. Many...
The privacy preservation has received considerable attention from organizations as the growing population is apprehensive regarding personal data being preserved.There are several and security issues in existing systems, such identity location disclosure, availability, authenticity. Smart parking systems utilize third-party recommender to offer customized space recommendations its users based on user’s past experience. However, indiscriminately sharing a with third party recommendation...
In data publishing, privacy and utility are essential for owners users respectively, which cannot coexist well.This incompatibility puts the researchers under an obligation to find newer reliable preserving tradeoff-techniques.Data providers like many public private organizations (e.g.hospitals banks) publish microdata of individuals various research purposes.Publishing may compromise individuals.To prevent individuals, must be published after removing personal identifiers name social...
Abstract Visual inspection for the quantification of malaria parasitaemiain (MP) and classification life cycle stage are hard time taking. Even though, automated techniques MP their reported in literature. However, either imperfect or cannot deal with special issues such as anemia hemoglobinopathies due to clumps red blood cells (RBCs). The focus current work is examine thin smear microscopic images stained Giemsa by digital image processing techniques, grading on independent factors (RBCs...
Abstract Atomic recognition of the Exudates (EXs), major symbol diabetic retinopathy is essential for automated retinal images analysis. In this article, we proposed a novel machine learning technique early detection and classification EXs in color fundus images. The challenge observed selection optimal features to reduce computational time space complexity provide high degree accuracy. To address these challenges, article an evolutionary algorithm based solution feature selection, which...
Data publication and sharing are critical components of assessing network infrastructures in the Internet Things for quality-of-service enhancement. Especially, advancement communication technology (e.g., 5G/6G) enables improvement current bottlenecks Industrial Things. Recent approaches remove raw data their source to achieve a privacy guarantee. However, already anonymized; these still reveal victim's extra information using linkage attacks. When updated combined or noise is introduced as...
Abstract Every individual in our technologically evolved world needs proper data security. The procedure of exchanging medical information is increasingly concerned with privacy. Many techniques have been offered for preserving These use approaches such as ‐anonymity, ‐diversity, and others. However, solutions are vulnerable to attribute disclosure, homogeneity, background knowledge risks due their syntactic nature. In this work, we describe a safe secure architecture semantic approach...
In the current era, due to widespread availability of Internet, it is extremely easy for people communicate and share multimedia contents with each other. However, at same time, secure transfer personal copyrighted material has become a critical issue. Consequently, means data are most urgent need time. Steganography science art protecting secret from an unauthorised access. The steganographic approaches conceal into cover file type audio, video, text and/or image. actual challenge in...
Risk management in distributed software development (DSD) is a well-researched area, providing different methods for assessing risks and suggesting control strategies. However, some of these are narrow scope, only considering few risks, too complex to be used practice whereas others provide many rules guidelines which often implicit. Moreover, the knowledge related DSD scattered over publications make it difficult find relevant information practice. This research aims develop an automated...
The growing use of electronic health records in the medical domain results generating a large amount data that is stored form clinical notes. These notes are enriched with entities like disease, treatment, tests, drugs, genes, and proteins. extraction from challenging task as written natural language. has many useful applications such analysis, privacy, decision support systems, disease analysis. Although various machine learning deep models developed to extract notes, developing an accurate...