Iftikhar Ahmad

ORCID: 0000-0003-3719-2387
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Anomaly Detection Techniques and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Vehicular Ad Hoc Networks (VANETs)
  • AI in cancer detection
  • Machine Learning in Bioinformatics
  • User Authentication and Security Systems
  • Video Surveillance and Tracking Methods
  • Digital Imaging for Blood Diseases
  • Face and Expression Recognition
  • Gene expression and cancer classification
  • Image Retrieval and Classification Techniques
  • Advanced Authentication Protocols Security
  • Advanced Image and Video Retrieval Techniques
  • Software System Performance and Reliability
  • IoT and Edge/Fog Computing
  • Autonomous Vehicle Technology and Safety
  • Biometric Identification and Security
  • UAV Applications and Optimization
  • Remote Sensing in Agriculture
  • Model-Driven Software Engineering Techniques
  • Multimodal Machine Learning Applications
  • Radiomics and Machine Learning in Medical Imaging
  • Viral Infections and Vectors

King Abdulaziz University
2019-2024

University of Washington
2024

Abdul Wali Khan University Mardan
2016-2023

University of Swat
2023

University of Glasgow
2023

Tieto (Finland)
2022

Anhui Agricultural University
2020-2022

University of Swabi
2021

Ayub Medical College
2020

University of Engineering and Technology Taxila
2006-2018

Insect pests are a major element influencing agricultural production. According to the Food and Agriculture Organization (FAO), an estimated 20–40% of pest damage occurs each year, which reduces global production becomes challenge crop These insect cause sooty mold disease by sucking sap from crop’s organs, especially leaves, fruits, stems, roots. To control these pests, pesticides frequently used because they fast-acting scalable. Due environmental pollution health awareness, less use is...

10.3390/app121910167 article EN cc-by Applied Sciences 2022-10-10

Cybersecurity has been widely used in various applications, such as intelligent industrial systems, homes, personal devices, and cars, led to innovative developments that continue face challenges solving problems related security methods for IoT devices. Effective methods, deep learning intrusion detection, have introduced. Recent research focused on improving algorithms improved IoT. This explores detection implemented using learning, compares the performance of different identifies best...

10.3390/s22218417 article EN cc-by Sensors 2022-11-02

Intrusion detection in computer networks is of great importance because its effects on the different communication and security domains. The network intrusion a challenge. Moreover, remains challenging task as massive amount data required to train state-of-the-art machine learning models detect threats. Many approaches have already been proposed recently detection. However, they face critical challenges owing continuous increase new threats that current systems do not understand. This paper...

10.3390/math10030530 article EN cc-by Mathematics 2022-02-08

A solo attack may cause a big loss in computer and network systems, its prevention is, therefore, very inevitable. Precise detection is important to prevent such losses. Such pivotal part of any security tools like intrusion system, firewalls etc. Therefore, an approach provided this paper analyze denial service by using supervised neural network. The methodology used sampled data from Kddcup99 dataset, database that standard for judgment tools. system uses multiple layered perceptron...

10.1145/1626195.1626252 article EN 2009-01-01

As a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, has achieved great progress recent years. Still, new threats arrive inform of better, more realistic sophisticated spoofing attacks. The objective 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is challenge researchers create counter measures effectively detecting variety submitted propositions are evaluated Replay-Attack database results presented this paper.

10.1109/icb.2013.6613026 article EN 2013-06-01

Last few years, vehicular network has been taken more attention of researchers and automotive industries due to life saving factor. Vehicular Ad hoc Network (VANET) needs security implement the wireless environment serves users with safety non applications. Attackers generate different attacks in this network. In paper, we propose five classes every class is expected provide better perspective for VANET security. The main contribution paper proposed solution classification identification VANET.

10.1109/siecpc.2011.5876939 article EN 2011-04-01

Real-time security requirements continue to increase due the occurrence of various suspicious activities in open and closed environments. Day-to-day threats may seriously affect everyone lives. Many techniques have been introduced this regard, but still some issues remain unaddressed. The work presented paper provides video surveillance with improved accuracy less computational complexity. most significant part system consists face localization, detection recognition. obtains underlined...

10.1109/access.2019.2937810 article EN cc-by IEEE Access 2019-01-01

Social distancing is crucial to restrain the spread of diseases such as COVID-19, but complete adherence safety guidelines not guaranteed. Monitoring social through mass surveillance paramount develop appropriate mitigation plans and exit strategies. Nevertheless, it a labor-intensive task that prone human error tainted with plausible breaches privacy. This paper presents privacy-preserving adaptive distance estimation crowd monitoring solution for camera systems. We novel person...

10.3390/s22020418 article EN cc-by Sensors 2022-01-06

Artificial intelligence (AI) has provided significant help in many fields of life. This study proposed a framework that helped understanding customers’ attitudes about the adoption Robo-advisors. The role Technology Readiness Index moderated as one primary relationships. A total 208 potential users Robo-advisor services data confirmed validity model. model input for structural equation modeling and analysis hypotheses. results indicated consumers showed positive services, with moderating...

10.3390/math11061311 article EN cc-by Mathematics 2023-03-08

It is crucial to ensure proper surveillance for the safety and security of people their assets. The development an aerial system might be very effective in catering challenges systems. Current systems are expensive complex. A cost-effective efficient solution required, which easily accessible anyone with a moderate budget. In surveillance, quadcopters equipped state-of-the-art image processing technology that captures detailed photographs every object underneath. quadcopter-based proposed...

10.1155/2021/6184756 article EN cc-by Security and Communication Networks 2021-09-16

Recently, the number of Internet Things (IoT)-connected devices has increased daily. Consequently, cybersecurity challenges have due to natural diversity IoT, limited hardware resources, and security capabilities. Intrusion detection systems (IDSs) play a substantial role in securing IoT networks. Several researchers focused on machine learning (ML) deep (DL) develop intrusion techniques. Although ML is good for classification, other methods perform better feature transformation. However, at...

10.3390/math12071055 article EN cc-by Mathematics 2024-03-31

The possibility of medical image segmentation within the domain a federated learning, Federated Learning (FL) may transform situation and help solve critical challenges that exist in common centralized machine learning models. While effective, traditional models are limited by issues like need huge surveys, high costs data assignment, privacy concerns over sensible wellbeing data. Since improvements imaging field continue, adoption FL is strategic response to such limitations can be...

10.20944/preprints202502.1031.v1 preprint EN 2025-02-14

Abstract Cell classification refers to detecting normal and diseased cells from small amount of data. Sometimes, becomes difficult because some fall into more than one categories/classes. Current state‐of‐the‐art cell methods have been developed on the bases tumor but these cannot classify or cells. This study investigated performance two traditional machine learning deep (normal classification) categorize Millions undergo controlled growth uncontrolled may be involved in disease causation...

10.1002/ett.4017 article EN Transactions on Emerging Telecommunications Technologies 2020-07-06

The prevention of any type cyber attack is indispensable because a single may break the security computer and network systems. hindrance such attacks entirely dependent on their detection. detection major part tool as Intrusion Detection System (IDS), Prevention (IPS), Adaptive Security Alliance (ASA), check points firewalls. Consequently, in this paper, we are contemplating feasibility an approach to probing that basis others Our adopts supervised neural phenomenon majorly used for...

10.1109/isiea.2009.5356382 article EN 2009-10-01

Essential Proteins are demonstrated to exert vital functions on cellular processes and indispensable for the survival reproduction of organism. Traditional centrality methods perform poorly complex protein-protein interaction (PPI) networks. Machine learning approaches based high-throughput data lack exploitation temporal spatial dimensions biological information.We put forward a deep framework predict essential proteins by integrating features obtained from PPI network, subcellular...

10.1186/s12859-022-04868-8 article EN cc-by BMC Bioinformatics 2022-08-04

Cardiac disease diagnosis and identification is problematic mostly by inaccurate segmentation of the cardiac left ventricle (LV). Besides, LV challenging since it involves complex variable structures in terms components intricacy time-based crescendos. In addition, full quantification myocardium border even more because different shapes sizes zone. The foremost purpose this research to design a precise automatic technique employing deep learning models for using magnetic resonance imaging...

10.3390/math10040627 article EN cc-by Mathematics 2022-02-17

Haemaphysalis ticks are globally distributed with the greatest diversity in Oriental region. This study aimed to primarily provide information on morphology, host record, and preliminary phylogenetic position of a poorly known tick danieli. Herds comprised goats sheep were examined for this species Upper Dir, Khyber Pakhtunkhwa, Pakistan. A total 127 ticks, including males (n = 15, 11.8%) females 112, 88.2%), collected, morphologically identified as H. The morphological identification was...

10.3390/pathogens11121495 article EN cc-by Pathogens 2022-12-08

In this study we address the problem of face segmentation in thumbnail images. While there have been several approaches for detection, none performs detection such low resolution and with pixel accuracy. paper, propose convolutional networks (CSNs) that can be trained to learn human faces. Unlike deep classifiers as Convolutional Neural Network (CNNs), CSNs unique design solely minimal complexity. Furthermore, a self-data organization (SDO) order create "expert" each which is specialized...

10.1109/icip.2016.7532770 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2016-08-17

Sensing plays a vital role in enabling smart cities. The mobile surveillance of different sectors, the retransmission radio signals, and package delivery are main applications conducted by unmanned vehicles Multiple or miniaturized real-time flying machines with onboard sensors, whether land- air-based, communicate each other to form sensor network. Almost all these battery-operated. Therefore, power preservation is an extremely important factor be taken into consideration. This paper...

10.3390/drones6110351 article EN cc-by Drones 2022-11-14

Detecting cyber intrusions in network traffic is a tough task for cybersecurity. Current methods struggle with the complexity of understanding patterns data. To solve this, we present Hybrid Deep Learning Intrusion Detection Model (HD-IDM), new way that combines GRU and LSTM classifiers. good at catching quick patterns, while handles long-term ones. HD-IDM blends these models using weighted averaging, boosting accuracy, especially complex patterns. We tested on four datasets:...

10.3390/math11214501 article EN cc-by Mathematics 2023-10-31
Coming Soon ...