Aftab Khan
YOU?
Author Swipe
View article: Collaborative intrusion detection in resource-constrained IoT environments: Challenges, methods, and future directions a review
Collaborative intrusion detection in resource-constrained IoT environments: Challenges, methods, and future directions a review Open
View article: Optimizing Convolutional Neural Networks for Real-Time Object Detection in Autonomous Vehicles
Optimizing Convolutional Neural Networks for Real-Time Object Detection in Autonomous Vehicles Open
This study explores the optimization and reliability of convolutional neural network (CNN) models, namely YOLOv5, for real-time object detection in autonomous vehicles under varying environmental conditions. The study intends to evaluate t…
View article: Investigating a survey on assessing artificial intelligence technology: A key to futuristic perception of education
Investigating a survey on assessing artificial intelligence technology: A key to futuristic perception of education Open
View article: Perceptions of artificial intelligence: A study on academic fraternity of Sonipat district, Haryana, India
Perceptions of artificial intelligence: A study on academic fraternity of Sonipat district, Haryana, India Open
View article: Large Generative AI Models meet Open Networks for 6G: Integration, Platform, and Monetization
Large Generative AI Models meet Open Networks for 6G: Integration, Platform, and Monetization Open
Generative artificial intelligence (GAI) has emerged as a pivotal technology for content generation, reasoning, and decision-making, making it a promising solution on the 6G stage characterized by openness, connected intelligence, and serv…
View article: Investigating Quantum Machine Learning Frameworks and Simulating Quantum Approaches
Investigating Quantum Machine Learning Frameworks and Simulating Quantum Approaches Open
Quantum machine learning (QML) has emerged as a promising field, combining the power of quantum computing with classical machine learning techniques to solve complex computational tasks. As the demand for efficient quantum simulations grow…
View article: FLAME: Adaptive and Reactive Concept Drift Mitigation for Federated Learning Deployments
FLAME: Adaptive and Reactive Concept Drift Mitigation for Federated Learning Deployments Open
This paper presents Federated Learning with Adaptive Monitoring and Elimination (FLAME), a novel solution capable of detecting and mitigating concept drift in Federated Learning (FL) Internet of Things (IoT) environments. Concept drift pos…
View article: Computing Within Limits: An Empirical Study of Energy Consumption in ML Training and Inference
Computing Within Limits: An Empirical Study of Energy Consumption in ML Training and Inference Open
Machine learning (ML) has seen tremendous advancements, but its environmental footprint remains a concern. Acknowledging the growing environmental impact of ML this paper investigates Green ML, examining various model architectures and hyp…
View article: Mitigating System Bias in Resource Constrained Asynchronous Federated Learning Systems
Mitigating System Bias in Resource Constrained Asynchronous Federated Learning Systems Open
Federated learning (FL) systems face performance challenges in dealing with heterogeneous devices and non-identically distributed data across clients. We propose a dynamic global model aggregation method within Asynchronous Federated Learn…
View article: Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs
Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs Open
The way we travel is changing rapidly and Cooperative Intelligent Transportation Systems (C-ITSs) are at the forefront of this evolution. However, the adoption of C-ITSs introduces new risks and challenges, making cybersecurity a top prior…
View article: UMBRELLA: A One-Stop Shop Bridging the Gap From Lab to Real-World IoT Experimentation
UMBRELLA: A One-Stop Shop Bridging the Gap From Lab to Real-World IoT Experimentation Open
UMBRELLA (A Living Laboratory: https://www.umbrellaiot.com/) is an open, large-scale IoT ecosystem deployed across South Gloucestershire, UK. It is intended to accelerate innovation across multiple technology domains. UMBRELLA is built to …
View article: Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs
Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs Open
The way we travel is changing rapidly, and Cooperative Intelligent Transportation Systems (C-ITSs) are at the forefront of this evolution. However, the adoption of C-ITSs introduces new risks and challenges, making cybersecurity a top prio…
View article: FROST: Towards Energy-efficient AI-on-5G Platforms -- A GPU Power Capping Evaluation
FROST: Towards Energy-efficient AI-on-5G Platforms -- A GPU Power Capping Evaluation Open
The Open Radio Access Network (O-RAN) is a burgeoning market with projected growth in the upcoming years. RAN has the highest CAPEX impact on the network and, most importantly, consumes 73% of its total energy. That makes it an ideal targe…
View article: Multi-sensor, multi-device smart building indoor environmental dataset
Multi-sensor, multi-device smart building indoor environmental dataset Open
View article: Federated Deep Learning for Intrusion Detection in IoT Networks
Federated Deep Learning for Intrusion Detection in IoT Networks Open
The vast increase of Internet of Things (IoT) technologies and the ever-evolving attack vectors have increased cyber-security risks dramatically. A common approach to implementing AI-based Intrusion Detection systems (IDSs) in distributed …
View article: FLARE: Detection and Mitigation of Concept Drift for Federated Learning based IoT Deployments
FLARE: Detection and Mitigation of Concept Drift for Federated Learning based IoT Deployments Open
Intelligent, large-scale IoT ecosystems have become possible due to recent advancements in sensing technologies, distributed learning, and low-power inference in embedded devices. In traditional cloud-centric approaches, raw data is transm…
View article: A Federated Learning-enabled Smart Street Light Monitoring Application: Benefits and Future Challenges
A Federated Learning-enabled Smart Street Light Monitoring Application: Benefits and Future Challenges Open
Data-enabled cities are recently accelerated and enhanced with automated learning for improved Smart Cities applications. In the context of an Internet of Things (IoT) ecosystem, the data communication is frequently costly, inefficient, no…
View article: A dataset of images of public streetlights with operational monitoring using computer vision techniques
A dataset of images of public streetlights with operational monitoring using computer vision techniques Open
A dataset of street light images is presented. Our dataset consists of ∼350 k images, taken from 140 UMBRELLA nodes installed in the South Gloucestershire region in the UK. Each UMBRELLA node is installed on the pole of a lamppost and is e…
View article: Images of Public Streetlights with Operational Monitoring using Computer Vision Techniques
Images of Public Streetlights with Operational Monitoring using Computer Vision Techniques Open
This dataset consists of ~350k JPEG images of streetlight columns installed on a public road infrastructure located in the city of Bristol, UK. Each streetlight is photographed by a Raspberry Pi Camera Module v1, installed on each lamppost…
View article: Images of Public Streetlights with Operational Monitoring using Computer Vision Techniques
Images of Public Streetlights with Operational Monitoring using Computer Vision Techniques Open
This dataset consists of ~350k JPEG images of streetlight columns installed on a public road infrastructure located in the city of Bristol, UK. Each streetlight is photographed by a Raspberry Pi Camera Module v1, installed on each lamppost…
View article: An Intrusion Detection System Based on Deep Belief Networks
An Intrusion Detection System Based on Deep Belief Networks Open
View article: Towards Multi-Criteria Heuristic Optimization for Computational Offloading in Multi-Access Edge Computing
Towards Multi-Criteria Heuristic Optimization for Computational Offloading in Multi-Access Edge Computing Open
In recent years, there has been considerable interest in computational offloading algorithms. The interest is mainly driven by the potential savings that offloading offers in task completion time and mobile device energy consumption. This …
View article: Deep Transfer Learning for WiFi Localization
Deep Transfer Learning for WiFi Localization Open
This paper studies a WiFi indoor localisation technique based on using a deep learning model and its transfer strategies. We take CSI packets collected via the WiFi standard channel sounding as the training dataset and verify the CNN model…
View article: Wireless Localisation in WiFi using Novel Deep Architectures
Wireless Localisation in WiFi using Novel Deep Architectures Open
This paper studies the indoor localisation of WiFi devices based on a commodity chipset and standard channel sounding. First, we present a novel shallow neural network (SNN) in which features are extracted from the channel state informatio…
View article: Identification of the Key Parameters for Computational Offloading in Multi-Access Edge Computing
Identification of the Key Parameters for Computational Offloading in Multi-Access Edge Computing Open
Computational offloading is a strategy by which mobile device (MD) users can access the superior processing power of a Multi-Access Edge Computing (MEC) server network. This paper investigates the impact of CPU workloads (on both the user …
View article: Table of Contents
Table of Contents Open
View article: Standing on the Shoulders of Giants: AI-Driven Calibration of Localisation Technologies
Standing on the Shoulders of Giants: AI-Driven Calibration of Localisation Technologies Open
High accuracy localisation technologies exist but are prohibitively expensive to deploy for large indoor spaces such as warehouses, factories, and supermarkets to track assets and people. However, these technologies can be used to lend the…
View article: Dataset: Indoor Localization with Narrow-band, Ultra-Wideband, and Motion Capture Systems
Dataset: Indoor Localization with Narrow-band, Ultra-Wideband, and Motion Capture Systems Open
Localization Dataset README In this, data for BLE and UWB calibration is included through the use of UWB and OptiTrack Motion capture system respectively. There are two sets of data each covering two scenarios; these being…
View article: Dataset: Indoor Localization with Narrow-band, Ultra-Wideband, and Motion Capture Systems
Dataset: Indoor Localization with Narrow-band, Ultra-Wideband, and Motion Capture Systems Open
Localization Dataset README In this, data for BLE and UWB calibration is included through the use of UWB and OptiTrack Motion capture system respectively. There are two sets of data each covering two scenarios; these being…
View article: The Advantage of Computation Offloading in Multi-Access Edge Computing
The Advantage of Computation Offloading in Multi-Access Edge Computing Open
Computation offloading plays a critical role in reducing task completion time for mobile devices. The advantages of computation offloading to cloud resources in Mobile Cloud Computing have been widely considered. In this paper, we have inv…