Ali Kashif Bashir
YOU?
Author Swipe
View article: Co-evolutionary Dynamics of Attack and Defence in Cybersecurity
Co-evolutionary Dynamics of Attack and Defence in Cybersecurity Open
In the evolving digital landscape, it is crucial to study the dynamics of cyberattacks and defences. This study uses an Evolutionary Game Theory (EGT) framework to investigate the evolutionary dynamics of attacks and defences in cyberspace…
View article: Dynamic cluster-based cooperative cache management at the network edges in NDN-based Internet of Things
Dynamic cluster-based cooperative cache management at the network edges in NDN-based Internet of Things Open
View article: Do LLMs trust AI regulation? Emerging behaviour of game-theoretic LLM agents
Do LLMs trust AI regulation? Emerging behaviour of game-theoretic LLM agents Open
There is general agreement that fostering trust and cooperation within the AI development ecosystem is essential to promote the adoption of trustworthy AI systems. By embedding Large Language Model (LLM) agents within an evolutionary game-…
View article: Data driven vehicular heterogeneity based intelligent collision avoidance system for Internet of Vehicles (IoV)
Data driven vehicular heterogeneity based intelligent collision avoidance system for Internet of Vehicles (IoV) Open
View article: Media and responsible AI governance: a game-theoretic and LLM analysis
Media and responsible AI governance: a game-theoretic and LLM analysis Open
This paper investigates the complex interplay between AI developers, regulators, users, and the media in fostering trustworthy AI systems. Using evolutionary game theory and large language models (LLMs), we model the strategic interactions…
View article: Q‐<scp>GEV</scp> Based Novel Trainable Clustering Scheme for Reducing Complexity of Data Clustering
Q‐<span>GEV</span> Based Novel Trainable Clustering Scheme for Reducing Complexity of Data Clustering Open
This paper presents a new data clustering technique aimed at enhancing the performance of the trainable path‐cost algorithm and reducing the computational complexity of data clustering models. The proposed method facilitates the discovery …
View article: Bridging biosciences and deep learning for revolutionary discoveries: a comprehensive review
Bridging biosciences and deep learning for revolutionary discoveries: a comprehensive review Open
Deep learning (DL), a pivotal artificial intelligence (AI) innovation, has dramatically transformed biosciences, aligning with the surge in complex data volumes to foster notable progress across disciplines such as genomics, genetics, and …
View article: Systematic Literature Review: 21st-Century English Learning Media Utilizing Augmented Reality
Systematic Literature Review: 21st-Century English Learning Media Utilizing Augmented Reality Open
The rapid advancement of technology has significantly impacted education, particularly in the field of language learning. Among the most promising innovations is Augmented Reality (AR), a technology that enhances the real world with digita…
View article: Covariate-adjusted construction of gene regulatory networks using a combination of generalized linear model and penalized maximum likelihood
Covariate-adjusted construction of gene regulatory networks using a combination of generalized linear model and penalized maximum likelihood Open
Many machine learning techniques have been used to construct gene regulatory networks (GRNs) through precision matrix that considers conditional independence among genes, and finally produces sparse version of GRNs. This construction can b…
View article: Smart Steering Wheel: Design of IoMT‐Based Non‐Invasive Driver Health Monitoring System to Enhance Road Safety
Smart Steering Wheel: Design of IoMT‐Based Non‐Invasive Driver Health Monitoring System to Enhance Road Safety Open
The integration of Internet of Things (IoT) technology and medical devices in healthcare is termed the Internet of Medical Things (IoMT). This advancement holds promise for numerous applications aimed at mitigating the risk of loss of life…
View article: A Robust Image Encryption Protocol for Secure Data Sharing in Brain Computer Interface Applications
A Robust Image Encryption Protocol for Secure Data Sharing in Brain Computer Interface Applications Open
Brain-computer interface (BCI) technology has emerged as a transformative means to link human neural activity with electronic devices. BCIs, which facilitate bidirectional communication between the brain and computers, are categorized as i…
View article: Source Localization via Doppler Shifts Using Mobile Sensors in ICNets Within Industry 5.0
Source Localization via Doppler Shifts Using Mobile Sensors in ICNets Within Industry 5.0 Open
Source localization plays a significant role in industrial 5.0 applications by availing of the communication networks. For the industrial communication networks (ICNets), Doppler shifts can be measured inexpensively by equipping with some …
View article: Bitemporal Remote Sensing Change Detection With State-Space Models
Bitemporal Remote Sensing Change Detection With State-Space Models Open
Change detection in very-high-resolution remote sensing images has gained significant attention, particularly with the rise of deep learning techniques such as convolutional neural networks and Transformers. The Mamba structure, successful…
View article: Neurosymbolic AI Empowered Consumer Electronics Healthcare for WiFi-Based Human Activity Recognition
Neurosymbolic AI Empowered Consumer Electronics Healthcare for WiFi-Based Human Activity Recognition Open
View article: YOLOv8-RD: High-Robust Pine Wilt Disease Detection Method Based on Residual Fuzzy YOLOv8
YOLOv8-RD: High-Robust Pine Wilt Disease Detection Method Based on Residual Fuzzy YOLOv8 Open
Pine wilt disease (PWD) poses a severe threat to the health of pine trees and has resulted in substantial losses to global pine forest resources. Due to the minute size of the pathogens and the concealed symptoms of PWD, early detection th…
View article: AI-optimized elliptic curve with Certificate-Less Digital Signature for zero trust maritime security
AI-optimized elliptic curve with Certificate-Less Digital Signature for zero trust maritime security Open
View article: Transforming satellite imagery into vector maps using modified GANs
Transforming satellite imagery into vector maps using modified GANs Open
Vector maps find widespread utility across diverse domains due to their capacity to not only store but also represent discrete data boundaries such as building footprints, disaster impact analysis, digitization, urban planning, location po…
View article: Student Satisfaction with The Use of Chat-GPT as A Learning Resource
Student Satisfaction with The Use of Chat-GPT as A Learning Resource Open
This study investigates student satisfaction with the use of Chat-GPT as a learning resource in higher education. This study used a mixed methods approach, combining quantitative surveys and qualitative interviews to assess students' exper…
View article: Identifying COVID-19 survivors living with post-traumatic stress disorder through machine learning on Twitter
Identifying COVID-19 survivors living with post-traumatic stress disorder through machine learning on Twitter Open
The COVID-19 pandemic has disrupted people’s lives and caused significant economic damage around the world, but its impact on people’s mental health has not been paid due attention by the research community. According to anecdotal data, th…
View article: Evaluation of Road Pavement Failure: A Case Study of Federal Medical Center Jabi Road, Abuja
Evaluation of Road Pavement Failure: A Case Study of Federal Medical Center Jabi Road, Abuja Open
Background of Study: In Nigeria, roads frequently degrade soon after construction, especially if the work is not done properly. However, some roads last for a long time before they deteriorate. This current study examined the factors that …
View article: Machine Learning-based Predictive Inventory for a Vending Machine Warehouse
Machine Learning-based Predictive Inventory for a Vending Machine Warehouse Open
View article: Application of deep learning for livestock behaviour recognition: A systematic literature review
Application of deep learning for livestock behaviour recognition: A systematic literature review Open
View article: An intelligent resource allocation strategy with slicing and auction for private edge cloud systems
An intelligent resource allocation strategy with slicing and auction for private edge cloud systems Open
The convergence of transformative technologies, including the Internet of Things (IoT), Big Data, and Artificial Intelligence (AI), has driven private edge cloud systems to the forefront of research efforts. The access to massive terminals…
View article: From Overfitting to Robustness: Quantity, Quality, and Variety Oriented Negative Sample Selection in Graph Contrastive Learning
From Overfitting to Robustness: Quantity, Quality, and Variety Oriented Negative Sample Selection in Graph Contrastive Learning Open
Graph contrastive learning (GCL) aims to contrast positive-negative counterparts to learn the node embeddings, whereas graph data augmentation methods are employed to generate these positive-negative samples. The variation, quantity, and q…
View article: Deep learning for economic transformation: a parametric review
Deep learning for economic transformation: a parametric review Open
Deep learning (DL) is increasingly recognized for its effectiveness in analyzing and forecasting complex economic systems, particularly in the context of Pakistan's evolving economy. This paper investigates DL's transformative role in mana…
View article: SCS: A Secure Cloud Storage Framework with Enhanced Integrity and Auditability Using Consortium Blockchain System
SCS: A Secure Cloud Storage Framework with Enhanced Integrity and Auditability Using Consortium Blockchain System Open
The widespread use of cloud storage enables users to access their resources remotely via a self-service model. Utilizing pay-per-use storage services provided by cloud service providers (CSPs) requires users to commit financially to their …
View article: Special issue: Advances in blockchain assisted secure Internet of Medical Things
Special issue: Advances in blockchain assisted secure Internet of Medical Things Open
View article: Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology
Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology Open
The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft, data safety, automated decision-making for IoT-based devices, and the security of the device itself.Curren…
View article: Fortifying Federated Learning in IIoT: Leveraging Blockchain and Digital Twin Innovations for Enhanced Security and Resilience
Fortifying Federated Learning in IIoT: Leveraging Blockchain and Digital Twin Innovations for Enhanced Security and Resilience Open
Ensuring robustness against adversarial attacks is imperative for Machine Learning (ML) systems within the critical infrastructures of the Industrial Internet of Things (IIoT). This paper addresses vulnerabilities in IIoT systems, particul…
View article: Secure and Reliable Routing in the Internet of Vehicles Network: AODV-RL with BHA Attack Defense
Secure and Reliable Routing in the Internet of Vehicles Network: AODV-RL with BHA Attack Defense Open
Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles (IoV). However, intricate security challenges are intertwined with technological progress: Vehicular ad hoc Networks (VANE…