Shahbaz Khan
shahbaz khan

Shahbaz Khan

Student Experience

Biography

MUHAMMAD SHAHBAZ KHAN is an experienced academic and researcher. He received his B.S. and M.S. degrees in Electronics and Electrical Engineering from the NFC IET, Pakistan and HITEC University, Pakistan, respectively. He has more than 30 research publications in peer-reviewed Journals and conferences including IEEE Transactions and ACM Transactions. He served as a Lecturer in the Department of Electrical Engineering at HITEC University, Taxila, for eight years and is currently a researcher and demonstrator at Âé¶¹ÉçÇø. He is currently pursuing a Ph.D. in Computing (Cyber Security and AI) at Âé¶¹ÉçÇø, Edinburgh, UK. His research interests include applied cryptography, image encryption, post-quantum cryptography, trust and privacy, authentication, and intelligent healthcare.

Research Areas

Esteem

Conference Organising Activity

  • Technical Program Committe Member

 

Membership of Professional Body

  • IEEE Member

 

Date


21 results

Privacy-enhanced skin disease classification: integrating federated learning in an IoT-enabled edge computing

Journal Article
Alasbali, N., Ahmad, J., Siddique, A. A., Saidani, O., Al Mazroa, A., Raza, A., Ullah, R., & Khan, M. S. (2025)
Privacy-enhanced skin disease classification: integrating federated learning in an IoT-enabled edge computing. Frontiers in Computer Science, 7, Article 1550677. https://doi.org/10.3389/fcomp.2025.1550677
Introduction: The accurate and timely diagnosis of skin diseases is a critical concern, as many skin diseases exhibit similar symptoms in the early stages. Most existing autom...

Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis

Presentation / Conference Contribution
Weir, S., Khan, M. S., Moradpoor, N., & Ahmad, J. (2024, December)
Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis. Presented at 2024 17th International Conference on Security of Information and Networks (SIN), Sydney, Australia
This study explores advancements in AI-generated image detection, emphasizing the increasing realism of images, including deepfakes, and the need for effective detection metho...

A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments

Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Driss, M., & Buchanan, W. J. (2024, September)
A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments. Presented at 28th International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES 2024), Spain
With the widespread use of the Internet of Things (IoT), securing the storage and transmission of multimedia content across IoT devices is a critical concern. Chaos-based Pseu...

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography

Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Ali, M., Al Dubai, A., Pitropakis, N., & Buchanan, W. J. (2024, July)
VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. Presented at 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP), Sousse, Tunisia
In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. ...

PermutEx: Feature-Extraction-Based Permutation — A New Diffusion Scheme for Image Encryption Algorithms

Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Jaroucheh, Z., Pitropakis, N., & Buchanan, W. J. (2023, November)
PermutEx: Feature-Extraction-Based Permutation — A New Diffusion Scheme for Image Encryption Algorithms. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, United Kingdom
Traditional permutation schemes mostly focus on random scrambling of pixels, often neglecting the intrinsic image information that could enhance diffusion in image encryption ...

A novel medical image data protection scheme for smart healthcare system

Journal Article
Rehman, M. U., Shafique, A., Khan, M. S., Driss, M., Boulila, W., Ghadi, Y. Y., …Ahmad, J. (in press)
A novel medical image data protection scheme for smart healthcare system. CAAI Transactions on Intelligence Technology, https://doi.org/10.1049/cit2.12292
The Internet of Multimedia Things (IoMT) refers to a network of interconnected multimedia devices that communicate with each other over the Internet. Recently, smart healthcar...

A New S-Box Design System for Data Encryption Using Artificial Bee Colony Algorithm

Journal Article
Yasin Ghadi, Y., Alshehri, M. S., Almakdi, S., Saidani, O., Alturki, N., Masood, F., & Shahbaz Khan, M. (2023)
A New S-Box Design System for Data Encryption Using Artificial Bee Colony Algorithm. Computers, Materials & Continua, 77(1), 781-797. https://doi.org/10.32604/cmc.2023.042777
Securing digital image data is a key concern in today’s information-driven society. Effective encryption techniques are required to protect sensitive image data, with the Subs...

Noise-Crypt: Image Encryption with Non-linear Noise, Hybrid Chaotic Maps, and Hashing

Presentation / Conference Contribution
Asghar, L., Ahmed, F., Khan, M. S., Arshad, A., & Ahmad, J. (2023, October)
Noise-Crypt: Image Encryption with Non-linear Noise, Hybrid Chaotic Maps, and Hashing. Presented at 2023 International Conference on Engineering and Emerging Technologies (ICEET), Istanbul, Turkiye
To secure the digital images over insecure transmission channels, a new image encryption algorithm Noise-Crypt is proposed in this paper. Noise-Crypt integrates nonlinear rand...

CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption

Presentation / Conference Contribution
Ali, H., Khan, M. S., Driss, M., Ahmad, J., Buchanan, W. J., & Pitropakis, N. (2023, October)
CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption. Presented at 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), Hong Kong, Hong Kong
In the era of Industrial IoT (IIoT) and Industry 4.0, ensuring secure data transmission has become a critical concern. Among other data types, images are widely transmitted an...

FireXnet: an explainable AI-based tailored deep learning model for wildfire detection on resource-constrained devices

Journal Article
Ahmad, K., Khan, M. S., Ahmed, F., Driss, M., Boulila, W., Alazeb, A., …Ahmad, J. (2023)
FireXnet: an explainable AI-based tailored deep learning model for wildfire detection on resource-constrained devices. Fire Ecology, 19, Article 54. https://doi.org/10.1186/s42408-023-00216-0
Background: Forests cover nearly one-third of the Earth’s land and are some of our most biodiverse ecosystems. Due to climate change, these essential habitats are endangered b...

Current Post Grad projects