Ata Ullah

ORCID: 0000-0003-3603-1709
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Security in Wireless Sensor Networks
  • Energy Efficient Wireless Sensor Networks
  • Wireless Body Area Networks
  • Opportunistic and Delay-Tolerant Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Authentication Protocols Security
  • Caching and Content Delivery
  • Mobile Ad Hoc Networks
  • Privacy-Preserving Technologies in Data
  • Cooperative Studies and Economics
  • IPv6, Mobility, Handover, Networks, Security
  • Cloud Data Security Solutions
  • Energy Harvesting in Wireless Networks
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Internet of Things and AI
  • Autonomous Vehicle Technology and Safety
  • Network Security and Intrusion Detection
  • Wireless Communication Security Techniques
  • Mobile Crowdsensing and Crowdsourcing
  • Software Engineering Techniques and Practices
  • Context-Aware Activity Recognition Systems
  • Electricity Theft Detection Techniques
  • Smart Parking Systems Research

National University of Modern Languages
2015-2024

Hong Kong University of Science and Technology
2024

University of Hong Kong
2024

New Cross Hospital
2023

The Royal Wolverhampton NHS Trust
2023

International Islamic University Chittagong
2022

ORCID
2018-2022

Pakistan Agricultural Research Council
2021

University of Science and Technology Beijing
2018-2020

University of Malakand
2020

Internet of medical things (IoMT) is getting researchers' attention due to its wide applicability in healthcare. Smart healthcare sensors and IoT enabled devices exchange data collaborate with other smart without human interaction securely transmit collected sensitive towards the server nodes. Alongside communications, security privacy also quite challenging aggregate Fog cloud servers. We explored existing surveys identify a gap literature that survey fog-assisted secure collection schemes...

10.1109/access.2021.3052850 article EN cc-by IEEE Access 2021-01-01

With the rapid growth in connected vehicles and related innovative applications, it is getting keen interest among researchers. Vehicular ad-hoc networks (VANETs) comprise of interconnected with sensing capabilities to exchange traffic, weather emergency information. Intelligent transportation system (ITS) supports better coordination providing reliable services. In VANET, topology dynamic due high mobility vehicles, therefore, existing topology-based schemes are not suitable. this paper, we...

10.1109/tits.2019.2893067 article EN IEEE Transactions on Intelligent Transportation Systems 2019-02-06

The Internet of Things (IoT) is gaining attention because its broad applicability, especially by integrating smart devices for massive communication during sensing tasks. IoT-assisted Wireless Sensor Networks (WSN) are suitable various applications like industrial monitoring, agriculture, and transportation. In this regard, routing challenging to find an efficient path using transmitting the packets towards big data repositories while ensuring energy utilization. This paper presents Robust...

10.32604/cmc.2021.015533 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-01-01

With the ever-growing demand of electric power, it is quite challenging to detect and prevent Non-Technical Loss (NTL) in power industries. NTL committed by meter bypassing, hooking from main lines, reversing tampering meters. Manual on-site checking reporting remains an unattractive strategy due required manpower associated cost. The use machine learning classifiers has been attractive option for detection. It enhances data-oriented analysis high hit ratio along with less cost requirements....

10.1109/access.2019.2962510 article EN cc-by IEEE Access 2019-12-26

With the rapid growth in connected vehicles, FoG-assisted vehicular ad hoc network (VANET) is an emerging and novel field of research. For information sharing, a number messages are exchanged various applications, including traffic monitoring area-specific live weather social aspects monitoring. It quite challenging where vehicles' speed, direction, density neighbors on move not consistent. In this scenario, congestion avoidance also to avoid communication loss during busy hours or emergency...

10.1109/access.2018.2887075 article EN cc-by-nc-nd IEEE Access 2018-12-18

Tuberculosis (TB) is an infectious disease that can lead towards death if left untreated. TB detection involves extraction of complex manifestation features such as lung cavity, air space consolidation, endobronchial spread, and pleural effusions from chest x-rays (CXRs). Deep learning based approach named convolutional neural network (CNN) has the ability to learn CXR images. The main problem CNN does not consider uncertainty classify CXRs using softmax layer. It lacks in presenting true...

10.1109/access.2020.2970023 article EN cc-by IEEE Access 2020-01-01

10.1007/s12652-020-02728-y article EN Journal of Ambient Intelligence and Humanized Computing 2021-01-02

Abstract We live in the era of Intelligent Transport Systems (ITS), which is an extension Vehicular AdHoc Networks (VANETs). In VANETs, vehicles act as nodes connected with each other and sometimes a public station. Vehicles continuously exchange collect information to provide innovative transportation services; for example, traffic management, navigation, autonomous driving, generation alerts. However, VANETs are extremely challenging data collection, due their high mobility dynamic network...

10.1007/s40747-021-00629-x article EN cc-by Complex & Intelligent Systems 2022-01-10

Cognitive radio network (CRN) is getting growing interest of the researchers due to its wide applicability for spectrum sharing with massive number active devices in Internet Things (IoT). In existing schemes, a large part may remain underutilized which was assigned service providers as primary users (PU). Secondary user (SU) be alternative use spectrum. The main challenge that SU keeps on sending packets an incremental manner until free channel found real conditions. It results excessive...

10.1016/j.aej.2024.01.071 article EN cc-by-nc-nd Alexandria Engineering Journal 2024-02-10

Physical unclonable function (PUF) is hardware-specific security primitive for providing cryptographic functionalities that are applicable secure communication among the embedded devices. The physical structure of PUF considered to be easy manufacture but hard or impossible replicate due variations in its manufacturing process. However, a large community analytics believes hardware-based has paved way realisation dependable security. In this study, authors have thoroughly explored...

10.1049/iet-cds.2019.0175 article EN IET Circuits Devices & Systems 2020-02-08

With the continuous development of Artificial Intelligence (AI), autonomous driving has become a popular research area. AI enables system to make judgment, which makes studies on reaches period booming development. However, due defects AI, it is not easy realize general intelligence, also limits driving. In this paper, we summarize existing architectures and taxonomy. Then introduce concept hybrid human-artificial intelligence (H-AI) into semi-autonomous system. For making better use H-AI,...

10.1109/tits.2021.3074695 article EN IEEE Transactions on Intelligent Transportation Systems 2021-05-04

Internet of Medical Things (IoMT) is becoming an essential part remote health monitoring due to the evolution medical wireless sensors and intelligent communication technologies. IoT-based healthcare applications are employed in centers provide continuous a patient. However, recent smart devices have limited resources handle huge amount data. IoMT faces several challenging issues, like security, privacy, anonymity, interoperability. In data aggregation communication, privacy security...

10.1109/access.2021.3101668 article EN cc-by IEEE Access 2021-01-01

Internet of Things (IoT) comprises large number smart devices that can exchange sensed data by availing online services. Smart directly interact with the human beings for sensing healthcare parameters and transmitting to a central repository. During exchange, it is mandatory secure messages between sender receiver handle malicious based attacks. For providing communication, signature-based schemes are explored in literature but need more lightweight operations ensuring desired security...

10.1109/access.2018.2844406 article EN cc-by-nc-nd IEEE Access 2018-01-01

Abstract Power companies are responsible for producing and transferring the required amount of electricity from grid stations to individual households. Many countries suffer huge losses in billions dollars due non-technical loss (NTL) power supply companies. To deal with NTL, many machine learning classifiers have been employed recent time. However, few has studied about performance evaluation metrics that used NTL detection evaluate how good or bad classifier is predicting loss. This paper...

10.1007/s12652-019-01649-9 article EN cc-by Journal of Ambient Intelligence and Humanized Computing 2020-01-18

Internet of Things (IoT) comprises huge number connected smart devices to exchange sensed data across different networks. With the rapid growth in security applications development, Physical Unclonable Functions (PUF) has gain interest researchers. PUF exploits random factors IC manufacturing process generate a variety mismatches. It helps unique challenge-response pairs store repository and then use for secure associations between IoT. Memory based Analog electronic PUFs are mostly used...

10.1109/smartiot.2018.00037 article EN 2018-08-01

Mobile ad-hoc networks (MANETs) comprise a large number of mobile wireless nodes that can move in random fashion with the capability to join or leave network anytime. Due rapid growth devices on Internet Things (IoT), messages are transmitted during information exchange dense areas. It cause congestion results increasing transmission delay and packet loss. This problem is more severe larger traffic high mobility enforces dynamic topology. To resolve these issues, we present bandwidth aware...

10.1109/access.2019.2918990 article EN cc-by-nc-nd IEEE Access 2019-01-01

Internet of Things (IoT) comprises a huge number connected devices that can communicate within the same network and across networks. IoT-enabled wireless sensor networks (WSNs) are getting growing interest due to its wide applicability in healthcare, patient monitoring, transportation, surveillance. The main issue is mostly deployed hostile environments where an attacker may physically destroy CHs or other technical fault occur. It isolates cluster causes loss sensitive data from region....

10.1109/jiot.2021.3098635 article EN IEEE Internet of Things Journal 2021-07-20

Internet of Things (IoT) is a network physical objects or things that can communicate and share information. In IoT-enabled Wireless Medical Sensor Network (WMSN), the smart sensing devices remote patient monitoring data towards central repositories. During medical aggregation transmission, security mandatory to guard against intruders. The main problem in existing base schemes complex multiplication operations are used for batch key creation. These computationally expensive require huge...

10.1109/access.2022.3160231 article EN cc-by IEEE Access 2022-01-01

Internet-of-Things (IoT) include a large number of devices that can communicate across different networks. Cyber-Physical Systems (CPS) also includes connected to the internet where wearable are included. Both systems enable researchers develop healthcare with additional intelligence as well prediction capabilities both for lifestyle and in hospitals. It offers much persistence platform ubiquitous by using sensors transfer information over servers, smartphones, other smart Telecare Medical...

10.3390/app7101069 article EN cc-by Applied Sciences 2017-10-16

Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable security attacks due their constrained resources. In a similar manner, the internet-based used in Internet Things (IoT) facing severe and privacy issues because direct accessibility connection internet. Complex resource-intensive schemes infeasible reduce network lifetime. this regard, we have explored polynomial distribution-based key establishment identified an issue...

10.3390/s17040670 article EN cc-by Sensors 2017-03-24

Cloud computing has become a significant model in the IT industry. In this emerging model, resources such as software, hardware, networking, and storage can be accessed anywhere world on pay-per-use basis. However, storing sensitive data un-trusted servers is challenging issue for model. To guarantee confidentiality proper access control of outsourced data, classical encryption techniques are used. schemes not feasible cloud because their lack flexibility, scalability, fine-grained control....

10.1109/tst.2016.7399287 article EN Tsinghua Science & Technology 2016-02-01
Coming Soon ...