Skip to main content

Dr. Muhammad Usman

Lecturer, Information Technology

Information Technology 04

Section/Portfolio:

Location:

Mt Helen Campus, Online

An Improved Congestion-Controlled Routing Protocol for IoT Applications in Extreme Environments

Machine Learning-Based Reliable Transmission for UAV Networks With Hybrid Multiple Access

Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G

Sign language digits and alphabets recognition by capsule networks

There exist communication barriers between the deaf people and the listeners. Sign language...

Guest editorial: Configuration security for industrial automation and control systems

The papers in this special section focus on configuration security for industrial automation and...

Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions

The Internet of Multimedia Things (IoMT) orchestration enables the integration of systems,...

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures

Security and privacy of users have become significant concerns due to the involvement of the...

Security-Aware Data-Driven Intelligent Transportation Systems

Intelligent transportation systems have been envisioned to bring more intelligence and...

SPEED: A Deep Learning Assisted Privacy-Preserved Framework for Intelligent Transportation Systems

Roadside cameras in an Intelligent Transportation System (ITS) are used for various purposes,...

A comprehensive survey of security threats and their mitigation techniques for next-generation SDN controllers

Software Defined Network (SDN) and Network Virtualization (NV) are emerged paradigms that...

A Distributed and Anonymous Data Collection Framework Based on Multilevel Edge Computing Architecture

Industrial Internet of Things applications demand trustworthiness in terms of quality of service...

A Mobile Multimedia Data Collection Scheme for Secured Wireless Multimedia Sensor Networks

Wireless Multimedia Sensor Networks (WMSNs) produce enormous amounts of big multimedia data. Due...

A survey on representation learning efforts in cybersecurity domain

In this technology-based era, network-based systems are facing new cyber-attacks on daily bases....

ESMLB: Efficient Switch Migration-Based Load Balancing for Multicontroller SDN in IoT

In software-defined networks (SDNs), the deployment of multiple controllers improves the...

PAAL: A Framework Based on Authentication, Aggregation, and Local Differential Privacy for Internet of Multimedia Things

Internet of Multimedia Things (IoMT) applications generate huge volumes of multimedia data that...

QASEC: A secured data communication scheme for mobile Ad-hoc networks

Mobile Adhoc NETworks (MANETs) are valuable for various applications due to an efficient,...

RaSEC: An Intelligent Framework for Reliable and Secure Multilevel Edge Computing in Industrial Environments

Industrial applications generate big data with redundant information that is transmitted over...

An Energy-Efficient and Congestion Control Data-Driven Approach for Cluster-Based Sensor Network

In Wireless Sensor Networks (WSNs), a dense deployment of sensor nodes produce data that contain...

A payload-based mutual authentication scheme for Internet of Things

The Internet of Things (IoT) is a vision that broadens the scope of the Internet by incorporating...

A survey on big multimedia data processing and management in smart cities

Integration of embedded multimedia devices with powerful computing platforms, e.g., machine...

Error Concealment for Cloud-Based and Scalable Video Coding of HD Videos

The encoding of HD videos faces two challenges: requirements for a strong processing power and a...

P2DCA: A Privacy-Preserving-Based Data Collection and Analysis Framework for IoMT Applications

The concept of Internet of Multimedia Things (IoMT) is becoming popular nowadays and can be used...

PFARS: Enhancing throughput and lifetime of heterogeneous WSNs through power-aware fusion, aggregation, and routing scheme

Heterogeneous wireless sensor networks (WSNs) consist of resource-starving nodes that face a...

SAMS: A seamless and authorized multimedia streaming framework for WMSN-Based IoMT

An Internet of Multimedia Things (IoMT) architecture aims to provide a support for real-time...

SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application

The Internet of Things (IoT) has the potential to transform communities around the globe into...

A Joint Framework for QoS and QoE for Video Transmission over Wireless Multimedia Sensor Networks

With the emergence of Wireless Multimedia Sensor Networks (WMSNs), the distribution of multimedia...

Performance evaluation of High Definition video streaming over Mobile Ad Hoc Networks

Video Service Providers (VSPs) can collect and analyze an enormous amount of multimedia data from...

Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait

The enormous developments in the field of wireless communication technologies have made the...

Cryptography-based secure data storage and sharing using HEVC and public clouds

Mobile devices are widely used for uploading/downloading media files such as audio, video and...

PAWN: a payload-based mutual authentication scheme for wireless sensor networks

Wireless sensor networks (WSNs) consist of resource-starving miniature sensor nodes deployed in a...

Time-Frequency Filter Bank: A Simple Approach for Audio and Music Separation

Blind Source Separation techniques are widely used in the field of wireless communication for a...

Data sharing in secure multimedia wireless sensor networks

The use of Multimedia Wireless Sensor Networks (MWSNs) is becoming common nowadays with a rapid...

Frame Interpolation for Cloud-Based Mobile Video Streaming

Cloud-based High Definition (HD) video streaming is becoming popular day by day. On one hand, it...

Survey of Error Concealment techniques: Research directions and open issues

Error Concealment (EC) techniques use either spatial, temporal or a combination of both types of...