KINDI Center for Computing Research: Recent submissions
Now showing items 21-40 of 178
-
Retinal image enhancement using Laplacian pyramidal multi-scaling
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)Early detection of retinal diseases is important to avoid complications and permanent vision loss. In this paper retinal neovascularization and molecular degeneration has been emphasized. Neovascularization is in form of ... -
Evaluation of Loss Functions for Segmentation of Corneal Nerves
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Corneal confocal microscopy (CCM) has been advocated as a non-invasive technique for objective diagnosis of very early neuropathy in patients by scanning the corneal subbasal nerve plexus. The obtained images provide a ... -
Vulnerabilities and countermeasures in electrical substations
( Elsevier , 2021 , Article)The impending and continued threat of cyberattacks on modern utility grids has called for action from the different stakeholders of the electricity sector. This calls for a thorough investigation and review of the weaknesses ... -
Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients' information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the ... -
Policy specification and verification for blockchain and smart contracts in 5G networks
( Korean Institute of Communications Information Sciences , 2020 , Article)Blockchain offers unprecedented opportunities for innovation in financial transactions. A whole new world of opportunities for banking, lending, insurance, money transfer, investments, and stock markets awaits. However, ... -
Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks
( Hindawi Limited , 2021 , Article)Internet of Things (IoT) devices frequently utilize wireless networks operating in the Industrial, Scientific, and Medical (ISM) Sub-1 GHz spectrum bands. Compared with higher frequency bands, the Sub-1 GHz band provides ... -
Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to reshape many networking applications. Healthcare ... -
Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing
( Mary Ann Liebert Inc. , 2021 , Article)The Internet of Things (IoT) is permeating our daily lives through continuous environmental monitoring and data collection. The promise of low latency communication, enhanced security, and efficient bandwidth utilization ... -
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
( Elsevier B.V. , 2021 , Article)Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ... -
Bringing Coordination Languages Back to the Future Using Blockchain Smart Contracts
( Association for Computing Machinery , 2021 , Conference Paper)This paper presents a blockchain extension of the run-time Sensing as a Service SOA (3SOA) approach presented in [5]. 3SOA defines a practical approach for implementing service-oriented Internet of Things (IoT) using ... -
A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System
( Association for Computing Machinery , 2021 , Conference Paper)Historically, health data was stored locally on the hospital's server as patient health records, and we had to rely on the planned check-up during doctor's visits. Now, we can monitor health continuously and in real-time. ... -
Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches
( Hindawi Limited , 2022 , Article)Industry 4.0 is the next revolution in manufacturing technology that is going to change the production and distribution of goods and services within the following decade. Powered by different enabling technologies that are ... -
Machine learning for the security of healthcare systems based on Internet of Things and edge computing
( Elsevier , 2022 , Book chapter)Using the Internet of Medical Things (IoMT) for treatment and diagnosis has exponentially grown due to its diverse use cases and efficient planning with defined resources. IoMT in the e-healthcare system enables continuous ... -
Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach
( Elsevier Ltd , 2022 , Article)With the increase in sophistication and connectedness of the healthcare networks, their attack surfaces and vulnerabilities increase significantly. Malicious agents threaten patients’ health and life by stealing or altering ... -
Security concerns on machine learning solutions for 6G networks in mmWave beam prediction
( Elsevier B.V. , 2022 , Article)6G – sixth generation – is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning (ML) algorithms have been applied widely in various fields, such ... -
Towards robust autonomous driving systems through adversarial test set generation
( ISA - Instrumentation, Systems, and Automation Society , 2023 , Article)Correct environmental perception of objects on the road is vital for the safety of autonomous driving. Making appropriate decisions by the autonomous driving algorithm could be hindered by data perturbations and more ... -
Garbled computation in cloud
( Elsevier , 2016 , Article)With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ... -
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ... -
Watermarking: A review of software and hardware techniques
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Watermarking is a well-known technique traditionally used in banknotes and other documents to discourage counterfeiting. It usually consists of semi-transparent symbols embedded on paper. Similar concepts were applied to ... -
A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity Management
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)This paper presents a blockchain system that exploits the base modular features of the Hyperledger Fabric framework to allow for a new, patient-centric, practical data portability paradigm. The system empowers patients by ...