Saqib Ali's research while affiliated with University of Agriculture Faisalabad and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (22)


ChainApparel process flow model
Stakeholders at different geographic locations
Blockchain network environment for stakeholders
Customer placed an order to the manufacturer
Manufacturer order accept/decline form

+5

ChainApparel: A Trustworthy Blockchain and IoT-Based Traceability Framework for Apparel Industry 4.0
  • Article
  • Full-text available

November 2023

·

29 Reads

Computers, Materials & Continua

Computers, Materials & Continua

·

Saqib Ali

·

Guojun Wang

·

[...]

·

Trustworthiness and product traceability are essential factors in the apparel industry 4.0 for establishing successful business relationships among stakeholders such as customers, manufacturers, suppliers, and consumers. Each stakeholder has implemented different technology-based systems to record and track product transactions. However, these systems work in silos, and there is no intra-system communication, leading to a lack of complete supply chain traceability for all apparel stakeholders. Moreover, apparel stakeholders are reluctant to share their business information with business competitors; thus, they involve third-party auditors to ensure the quality of the final product. Furthermore, the apparel manufacturing industry faces challenges with counterfeit products, making it difficult for consumers to determine the authenticity of the products. Therefore, in this paper, a trustworthy apparel product traceability framework called ChainApparel is developed using the Internet of Things (IoT) and blockchain to address these challenges of authenticity and traceability of apparel products. Specifically, multiple smart contracts are designed and developed for registration, process execution, audit, fault, and product traceability to authorize, validate, and trace every business transaction among the apparel stakeholders. Further, the real-time performance analysis of ChainApparel is carried out regarding transaction throughput and latency by deploying the compute nodes at different geographical locations using Hyperledger Fabric. The results conclude that ChainApparel accomplished significant performance under diverse workloads while ensuring complete traceability along the complex supply chain of the apparel industry. Thus, the ChainApparel framework helps make the apparel product more trustworthy and transparent in the market while safeguarding trust among the industry stakeholders.

Download
Share

Membership inference attack on differentially private block coordinate descent

October 2023

·

17 Reads

The extraordinary success of deep learning is made possible due to the availability of crowd-sourced large-scale training datasets. Mostly, these datasets contain personal and confidential information, thus, have great potential of being misused, raising privacy concerns. Consequently, privacy-preserving deep learning has become a primary research interest nowadays. One of the prominent approaches adopted to prevent the leakage of sensitive information about the training data is by implementing differential privacy during training for their differentially private training, which aims to preserve the privacy of deep learning models. Though these models are claimed to be a safeguard against privacy attacks targeting sensitive information, however, least amount of work is found in the literature to practically evaluate their capability by performing a sophisticated attack model on them. Recently, DP-BCD is proposed as an alternative to state-of-the-art DP-SGD, to preserve the privacy of deep-learning models, having low privacy cost and fast convergence speed with highly accurate prediction results. To check its practical capability, in this article, we analytically evaluate the impact of a sophisticated privacy attack called the membership inference attack against it in both black box as well as white box settings. More precisely, we inspect how much information can be inferred from a differentially private deep model’s training data. We evaluate our experiments on benchmark datasets using AUC, attacker advantage, precision, recall, and F1-score performance metrics. The experimental results exhibit that DP-BCD keeps its promise to preserve privacy against strong adversaries while providing acceptable model utility compared to state-of-the-art techniques.


Automated Segmentation to Make Hidden Trigger Backdoor Attacks Robust against Deep Neural Networks

April 2023

·

66 Reads

·

1 Citation

Applied Sciences

The successful outcomes of deep learning (DL) algorithms in diverse fields have prompted researchers to consider backdoor attacks on DL models to defend them in practical applications. Adversarial examples could deceive a safety-critical system, which could lead to hazardous situations. To cope with this, we suggested a segmentation technique that makes hidden trigger backdoor attacks more robust. The tiny trigger patterns are conventionally established by a series of parameters encompassing their DNN size, location, color, shape, and other defining attributes. From the original triggers, alternate triggers are generated to control the backdoor patterns by a third party in addition to their original designer, which can produce a higher success rate than the original triggers. However, the significant downside of these approaches is the lack of automation in the scene segmentation phase, which results in the poor optimization of the threat model. We developed a novel technique that automatically generates alternate triggers to increase the effectiveness of triggers. Image denoising is performed for this purpose, followed by scene segmentation techniques to make the poisoned classifier more robust. The experimental results demonstrated that our proposed technique achieved 99% to 100% accuracy and helped reduce the vulnerabilities of DL models by exposing their loopholes.


A Levenberg–Marquardt Based Neural Network for Short-Term Load Forecasting

January 2023

·

183 Reads

·

3 Citations

Computers, Materials & Continua

Computers, Materials & Continua

Short-term load forecasting (STLF) is part and parcel of the efficient working of power grid stations. Accurate forecasts help to detect the fault and enhance grid reliability for organizing sufficient energy transactions. STLF ranges from an hour ahead prediction to a day ahead prediction. Various electric load forecasting methods have been used in literature for electricity generation planning to meet future load demand. A perfect balance regarding generation and utilization is still lacking to avoid extra generation and misusage of electric load. Therefore, this paper utilizes Levenberg–Marquardt (LM) based Artificial Neural Network (ANN) technique to forecast the short-term electricity load for smart grids in a much better, more precise, and more accurate manner. For proper load forecasting, we take the most critical weather parameters along with historical load data in the form of time series grouped into seasons, i.e., winter and summer. Further, the presented model deals with each season’s load data by splitting it into weekdays and weekends. The historical load data of three years have been used to forecast week-ahead and day-ahead load demand after every thirty minutes making load forecast for a very short period. The proposed model is optimized using the Levenberg-Marquardt backpropagation algorithm to achieve results with comparable statistics. Mean Absolute Percent Error (MAPE), Root Mean Squared Error (RMSE), R², and R are used to evaluate the model. Compared with other recent machine learning-based mechanisms, our model presents the best experimental results with MAPE and R² scores of 1.3 and 0.99, respectively. The results prove that the proposed LM-based ANN model performs much better in accuracy and has the lowest error rates as compared to existing work.



Differentially Private Block Coordinate Descent

December 2022

·

10 Reads

·

2 Citations

Journal of King Saud University - Computer and Information Sciences

Deep learning models have revolutionized AI tasks by producing accurate predictions. These models′ success largely depends on precise training using large-scale datasets, mostly crowdsourced from the target population. The training datasets may contain sensitive personal information, and the model parameters can encode this information on internal wirings of hidden layers, thus bearing the risk of a privacy breach. The modern trend of sharing trained models has grown the privacy breach risk manifold. The performance of existing privacy-preserving deep learning models trying to address this issue is unsatisfactory. Consequently, only a marginal proportion of these privacy-preserved models have been adopted in the industry. Therefore, we developed the first differentially private version of the block coordinate descent (BCD) algorithm. Our proposed mechanism considerably cuts the privacy cost by injecting an appropriate amount of noise in block variables. It achieves high accuracy comparable to its non-private equivalents. It improves the convergence speed and provides a provable privacy guarantee by performing privacy accounting using advanced composition and moments accountant methods. We empirically evaluate the robustness of our proposed mechanism on benchmark datasets. The results demonstrate the competitive performance in terms of both privacy cost reduction and speedy convergence against the state-of-the-art differential privacy-based mechanisms.


Classification of quality defects [10]
Distribution of respondents according to the cost under satisfaction level
Fagan Inspection: A Defects Finding Mechanism in Software Requirements Specification (SRS) Document

March 2022

·

11 Reads

·

3 Citations

VFAST Transactions on Software Engineering

The preparation of Software Requirement Specification (SRS) document is a critical task as the successful completion of software depends heavely upon the SRS. The requirements gathering phase in Software Development Life Cycle SDLC is equally important as it witnesses the creation of an SRS document. The quality of an SRS document is dubious as there is a scarcity of proficient inspection methods for detecting the defects in the software. There are various reading based inspection techniques such as Checklist Based Reading technique (CBR), Defect Based Reading technique (DBR) and Perspective Based Reading technique (PBR). There are certain problems with these techniques such as the CBR only covers potential types of defects, The DBR focused on various defects but the problem is that it is not structured in nature. Likewise, PBR is not suitable as it mainly focused on use-cases. As owing to the absence of a suitable inspection technique, the main focus of this study is to highlight the Fagan based inspection technique. This technique is not only formal and lightweight but it also overcome the limitations of reading base d techniques. The Fagan is a structured approach and finds defects in specification, programming code, design and also others during the SDLC. During analysis a questionnaire based survey is conducted in almost 300 national and international software industries. As a result, 150 responses are received. The likert scale is used for developing the questionnaire. SPSS tool is also utilized for data entry and analysis. The consequences are drawn by developing hypothesis and using the Chi-square test. More satisfactory results are gained at international level than at the national level. The satisfaction level of defect detection is 59.2%, time saved is 48.3% and cost reduction is 40.0%. Thus, the obtained outcome is positive and satisfies the requirements.


Exploiting Requirement Validation Techniques for Assessing the Software’s Quality in Pakistan

September 2021

·

2 Reads

VFAST Transactions on Software Engineering

There are five significant steps in software requirements engineering and the requirement validation (RV) step is one of them. Requirements validation ensures the reliability, stability, and consistency of the software. The persons involved in performing the requirements validation are stakeholders and external reviewers. The requirements validation techniques (RVTs) not only help in finding the errors but also help in guaranteeing the quality of the software. As quality is important, therefore, the main focus of this paper is to determine the ways of quality improvement in software requirements. A questionnaire-based survey is used to identify the most suitable RVTs for improving the quality. The results are compiled by developing a hypothesis and the Chi-square test method. The results showed that the cost reduction quality parameter is the most satisfactory because it reduces the cost up to 44.6% by using RVTs in Pakistan and foreign countries. Another important outcome is the level of effectiveness of RVTs which is much better in foreign countries as compared to Pakistan.


Fig. 1. Geometrical facial recognition [8].
Fig. 2. Photometric stereo image [10].
Fig. 3. Distinguishes the two classes in SVM.
A Comparative Analysis Using Different Machine Learning: An Efficient Approach for Measuring Accuracy of Face Recognition

March 2021

·

255 Reads

·

4 Citations

Feature extracting and training module can be done by using face recognition neural learning techniques. Moreover, these techniques are widely employed to extract features from human images. Some detection systems are capable to scan the full body, iris detection, and finger print detection systems. These systems have deployed for safety and security intension. In this research work, we compare different machine learning algorithms for face recognition. Four supervised face recognition machine-learning classifiers such as Principal Component Analysis (PCA), 1-nearest neighbor (1-NN), Linear Discriminant Analysis (LDA), and Support Vector Machine (SVM) are considered. The efficiency of multiple classification systems is also demonstrated and tested in terms of their ability to identify a face correctly. Face Recognition is a technique to identify faces of people whose images are stored in some databases and available in the form of datasets. Extensive experiments conducted on these datasets. The comparative analysis clearly shows that which machine-learning algorithm is the best in terms of accuracy of image detection. Despite the fact, other identification methods are also very effective; face recognition has remained a major focus of research due to its non-meddling nature and being the easy method of personal identification for people. The findings of this work would be useful identification of a suitable machine-learning algorithm in order to achieve better face recognition accuracy.


The Future Prospects of Adversarial Nets

February 2021

·

32 Reads

Machine learning has obtained remarkable achievement in longstanding tasks in various domains of artificial intelligence. However, machine learning certainly has some security threats, such as adversarial examples that hamper the machine learning models from correctly classifying the data. The adversarial examples are minor perturbations in the actual inputs to detract the model from its original task. Adversarial Attacks and their defenses are found in parallel when it comes to the literature of machine learning adversaries. In this paper, we have tried to inspect the adversarial attack types and their defenses by comprehensively classifying different techniques.


Citations (12)


... The problem often arises when the developer needs to adequately explore or define user requirements, leading to a mismatch between the software product or service and the needs of end-users or the business. There are several possible reasons for this problem, including a lack of thorough exploration of needs, inadequate development of clear and detailed requirements, failure to identify end-user or business needs appropriately, incomplete coverage of all requirements in the development process, and failure to update requirements throughout the development process to match changing needs [4], [5], [9]. These factors can lead to software development not meeting the intended users' or business's requirements or needs. ...

Reference:

Elevated Novice Developer Productivity and Self-efficacy by Promoting UX Journey in Software Requirement Elicitation
Fagan Inspection: A Defects Finding Mechanism in Software Requirements Specification (SRS) Document

VFAST Transactions on Software Engineering

... This intuitively limits the amount of information that model is learning from any given example. Then noise is added, so the sample is from Gaussian distribution [96] and standard deviation of C sigma. As shown in the algorithm, high parameters C and sigma can be tuned to give epsilon delta guarantees for each step of gradient descent. ...

Differentially Private Block Coordinate Descent
  • Citing Article
  • December 2022

Journal of King Saud University - Computer and Information Sciences

... FN transforms the facial images into a densely packed Euclidean space in which separations increase the distance between the faces. The purpose of this research [5] is to investigate deep learning-based face representation under a variety of situations, including lower and upper face occlusions, misalignment, varying angles of head poses, shifting illuminations, and incorrect facial feature localisation. In this study, two prominent Deep learning models termed Lightened CNN and VGG-Face were used to extract face representation. ...

A Comparative Analysis Using Different Machine Learning: An Efficient Approach for Measuring Accuracy of Face Recognition

... Furthermore, GMM (Gaussian Mixture Model) method, SVM (Support Vector Machine), Neural Networks, which are all Machine Learning techniques, have been used to identify abnormal activities (Luo et al., 2017;Tariq et al., 2020). ...

Intelligent Surveillance in Smart City Using 3D Road Monitoring
  • Citing Conference Paper
  • December 2020

... This capability empowers the model to adeptly capture long-range dependencies within the input sequence, resulting in the creation of more informative representations. Younas et al. [37] proposed two LLMs, Multilingual BERT (mBERT) and XML-RoBERTa (XML-R), for the analysis of code-mixed language comments on a Twitter dataset. Experimental results demonstrated that mBERT and XML-R achieved accuracy (A) scores of 69% and 71%, respectively. ...

Sentiment Analysis of Code-Mixed Roman Urdu-English Social Media Text using Deep Learning Approaches
  • Citing Conference Paper
  • December 2020

... IoT: by connecting various elements in the production chain to collect real-time data on product location, condition, and movements throughout their movements (Faridi et al., 2021). Smart QR codes and barcodes: Associating detailed information with each product uniquely. ...

Blockchain and IoT Based Textile Manufacturing Traceability System in Industry 4.0
  • Citing Chapter
  • February 2021

... These developments highlight the importance of considering different factors that affect the acceptability and effectiveness of ride-sharing models in urban environments. Furthermore, sentiment analysis from ride-sharing platform reviews has developed into a potent tool for learning about user preferences and experiences, thereby greatly advancing the subject of Kansei engineering (Ali et al., 2020). Several factors affect ride-sharing demand, including social and economic factors and the ease of using services (Gupta & George, 2022;M. ...

Aspect Based Sentiment Analysis of Ridesharing Platform Reviews for Kansei Engineering

IEEE Access

... Bolgov & Filatova, 2022;Parkhimovich & Minina, 2017). The second stream concerns "openness" in the sense of transparency in data tracing systems-for example blockchain ledgers or distributed ledger technologythat underpin decentralised financial systems (Ali et al., 2019) and DeFi (Grassi et al., 2022b;Smith, 2021). The third stream is open data as the basis for developing new areas of financial crime and fraud (De Koker & Goldbarsht, 2022). ...

Libra Critique Towards Global Decentralized Financial System
  • Citing Chapter
  • November 2019

... The architecture proposed in this paper, albeit similar in terms of technologies, has several distinguishing factors. First, most of the existing solutions model only the infrastructure and/or the way in which each of its elements is related with each other, such as in [62]. On the contrary, in this work, we store not only this kind of information (relative location), but also the absolute location of the infrastructure in terms of their geographical coordinates. ...

Semantic Knowledge Based Graph Model in Smart Cities
  • Citing Chapter
  • November 2019

... Blockchain technology offers a robust solution to the challenges seen in traditional land registration systems [12]. Its decentralized nature [49] and use of smart contracts [50] enhance transparency, reduce fraud [37,51], and streamline transaction processes [8,52]. The immutable ledger ensures data integrity [52], making unauthorized alterations virtually impossible [8]. ...

A Blockchain-Based Decentralized Data Storage and Access Framework for PingER
  • Citing Conference Paper
  • August 2018