Jawad Ahmad

Orcid: 0000-0001-6289-8248

Affiliations:
  • Edinburgh Napier University, School of Computing, UK
  • Glasgow Caledonian University, School of Engineering and Built Environment, UK (PhD 2019)
  • HITEC University Taxila, Pakistan (former)


According to our database1, Jawad Ahmad authored at least 123 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Sustainable collaboration: Federated learning for environmentally conscious forest fire classification in Green Internet of Things (IoT).
Internet Things, April, 2024

Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0.
IEEE Trans. Consumer Electron., February, 2024

ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption.
Expert Syst. Appl., February, 2024

DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm.
J. Netw. Comput. Appl., January, 2024

HLSBD2: a quantum secure hybrid level source based data deduplication for the cloud.
J. Ambient Intell. Humaniz. Comput., January, 2024

A Single Channel-Based Neonatal Sleep-Wake Classification using Hjorth Parameters and Improved Gradient Boosting.
CoRR, 2024

TIPS: Threat Sharing Information Platform for Enhanced Security.
CoRR, 2024

RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations.
CoRR, 2024

A novel medical image data protection scheme for smart healthcare system.
CAAI Trans. Intell. Technol., 2024

A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection.
IEEE Access, 2024

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model With Learnable Skip Connections for Efficient Botnet Attack Detection in IoT.
IEEE Access, 2024

Multi-Modal Features Representation-Based Convolutional Neural Network Model for Malicious Website Detection.
IEEE Access, 2024

UAVs and Blockchain Synergy: Enabling Secure Reputation-Based Federated Learning in Smart Cities.
IEEE Access, 2024

ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance.
Proceedings of the International Conference on Information Networking, 2024

ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

Image Encryption Using A Novel Orbital-Extraction Permutation Technique and Chaotic Key Generation.
Proceedings of the 7th IEEE International Conference on Advanced Technologies, 2024

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography.
Proceedings of the 7th IEEE International Conference on Advanced Technologies, 2024

2023
An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant.
IEEE Trans. Intell. Transp. Syst., December, 2023

Enhancing IoT network security through deep learning-powered Intrusion Detection System.
Internet Things, December, 2023

TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks.
Comput. Networks, December, 2023

A novel routing optimization strategy based on reinforcement learning in perception layer networks.
Comput. Networks, December, 2023

AI-Enabled Traffic Control Prioritization in Software-Defined IoT Networks for Smart Agriculture.
Sensors, October, 2023

A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder.
ACM Trans. Multim. Comput. Commun. Appl., 2023

An Efficient Automated Technique for Classification of Breast Cancer Using Deep Ensemble Model.
Comput. Syst. Sci. Eng., 2023

An Automated Classification Technique for COVID-19 Using Optimized Deep Learning Features.
Comput. Syst. Sci. Eng., 2023

An Immutable Framework for Smart Healthcare Using Blockchain Technology.
Comput. Syst. Sci. Eng., 2023

Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm.
Comput. Syst. Sci. Eng., 2023

A Novel Internet of Medical Thing Cryptosystem Based on Jigsaw Transformation and Ikeda Chaotic Map.
Comput. Syst. Sci. Eng., 2023

Noise-Crypt: Image Encryption with Non-linear Noise, Hybrid Chaotic Maps, and Hashing.
CoRR, 2023

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.
CoRR, 2023

Resolving the Decreased Rank Attack in RPL's IoT Networks.
CoRR, 2023

MAGRU-IDS: A Multi-Head Attention-Based Gated Recurrent Unit for Intrusion Detection in IIoT Networks.
IEEE Access, 2023

ABDNN-IDS: Attention-Based Deep Neural Networks for Intrusion Detection in Industrial IoT.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Distributed Twins in Edge Computing: Blockchain and IOTA.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Contactless Human Activity Recognition using Deep Learning with Flexible and Scalable Software Define Radio.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Contactless Breathing Waveform Detection Through RF Sensing: Radar vs. Wi-Fi Techniques.
Proceedings of the Tenth IEEE International Conference on Communications and Networking, 2023

PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

2022
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations.
Wirel. Pers. Commun., 2022

Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme.
Wirel. Pers. Commun., 2022

A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis.
IEEE Trans. Netw. Sci. Eng., 2022

Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network.
IEEE Trans. Ind. Informatics, 2022

A new color image encryption technique using DNA computing and Chaos-based substitution box.
Soft Comput., 2022

HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.
Sensors, 2022

A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering.
Sensors, 2022

Multiple Participants' Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing.
Sensors, 2022

Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model.
Sensors, 2022

Classification of Skin Cancer Lesions Using Explainable Deep Learning.
Sensors, 2022

Ransomware: Analysing the Impact on Windows Active Directory Domain Services.
Sensors, 2022

Chest X-ray Classification for the Detection of COVID-19 Using Deep Learning Techniques.
Sensors, 2022

Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.
Sensors, 2022

Semantic Segmentation and Edge Detection - Approach to Road Detection in Very High Resolution Satellite Images.
Remote. Sens., 2022

Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform.
Remote. Sens., 2022

A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map.
Multim. Tools Appl., 2022

DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things.
J. King Saud Univ. Comput. Inf. Sci., 2022

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.
Entropy, 2022

A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution.
Entropy, 2022

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.
Complex., 2022

A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution.
IEEE Access, 2022

A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
Detection of COVID-19 Using Transfer Learning and Grad-CAM Visualization on Indigenously Collected X-ray Dataset.
Sensors, 2021

Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions.
Sensors, 2021

Granular Data Access Control with a Patient-Centric Policy Update for Healthcare.
Sensors, 2021

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT.
Sensors, 2021

An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks.
Sensors, 2021

An Efficient Approach Based on Privacy-Preserving Deep Learning for Satellite Image Classification.
Remote. Sens., 2021

A blockchain-based architecture for secure and trustworthy operations in the industrial Internet of Things.
J. Ind. Inf. Integr., 2021

Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions.
Trans. Emerg. Telecommun. Technol., 2021

A novel CNN-LSTM-based approach to predict urban expansion.
Ecol. Informatics, 2021

Evolution of Target Localization in Wireless Sensor Network (WSN): A Review.
CoRR, 2021

Intrusion Detection using Machine Learning Techniques: An Experimental Comparison.
CoRR, 2021

GuideMe: A Mobile Application based on Global Positioning System and Object Recognition Towards a Smart Tourist Guide.
CoRR, 2021

Voting Classifier-based Intrusion Detection for IoT Networks.
CoRR, 2021

Browsers' Private Mode: Is It What We Were Promised?
Comput., 2021

Detecting the Security Level of Various Cryptosystems Using Machine Learning Models.
IEEE Access, 2021

A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things.
IEEE Access, 2021

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

On the Inadequacy of Multimodal Maps for Cryptographic Hash Applications with Phase-Space Modulation.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

Deep Learning Models for Intelligent Healthcare: Implementation and Challenges.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

Comparing the Performance of Different Classifiers for Posture Detection.
Proceedings of the Body Area Networks. Smart IoT and Big Data for Intelligent Health Management, 2021

Detecting Alzheimer's Disease Using Machine Learning Methods.
Proceedings of the Body Area Networks. Smart IoT and Big Data for Intelligent Health Management, 2021

2020
A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping.
Symmetry, 2020

Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning.
Sensors, 2020

A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos.
Remote. Sens., 2020

Energy demand forecasting of buildings using random neural networks.
J. Intell. Fuzzy Syst., 2020

Chaos-based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks.
Trans. Emerg. Telecommun. Technol., 2020

A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map.
Entropy, 2020

Deep Learning Techniques for Future Intelligent Cross-Media Retrieval.
CoRR, 2020

An authentication protocol based on chaos and zero knowledge proof.
CoRR, 2020

A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids.
Cogn. Comput., 2020

Robust Image Hashing Scheme using Laplacian Pyramids.
Comput. Electr. Eng., 2020

Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution.
IEEE Access, 2020

A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network.
IEEE Access, 2020

DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption.
IEEE Access, 2020

EEG-Based Neonatal Sleep-Wake Classification Using Multilayer Perceptron Neural Network.
IEEE Access, 2020

DRaNN: A Deep Random Neural Network Model for Intrusion Detection in Industrial IoT.
Proceedings of the 2020 International Conference on UK-China Emerging Technologies, 2020

A Novel Approach for Classifying Diabetes' Patients Based on Imputation and Machine Learning.
Proceedings of the 2020 International Conference on UK-China Emerging Technologies, 2020

5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum.
Proceedings of the Intelligent Computing, 2020

Intrusion Detection and Attack Classification Leveraging Machine Learning Technique.
Proceedings of the 14th International Conference on Innovations in Information Technology, 2020

2019
Chaos based efficient selective image encryption.
Multidimens. Syst. Signal Process., 2019

DNA key based visual chaotic image encryption.
J. Intell. Fuzzy Syst., 2019

A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids.
Entropy, 2019

RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection.
Comput., 2019

Intrusion Detection Using Swarm Intelligence.
Proceedings of the UK/China Emerging Technologies, 2019

A Partial Ligt-weight Image Encryption Scheme.
Proceedings of the UK/China Emerging Technologies, 2019

Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2019

2018
A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation.
Neural Comput. Appl., 2018

Real-Time Lightweight Chaotic Encryption for 5G IoT Enabled Lip-Reading Driven Secure Hearing-Aid.
CoRR, 2018

An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera.
Proceedings of the Intelligent Systems and Applications, 2018

Detection and prevention of Black Hole Attacks in IOT & WSN.
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018

A Novel Random Neural Network Based Approach for Intrusion Detection Systems.
Proceedings of the 2018 10th Computer Science and Electronic Engineering Conference, 2018

DNA Sequence Based Medical Image Encryption Scheme.
Proceedings of the 2018 10th Computer Science and Electronic Engineering Conference, 2018

Secure Occupancy Monitoring System for IoT Using Lightweight Intertwining Logistic Map.
Proceedings of the 2018 10th Computer Science and Electronic Engineering Conference, 2018

An Intelligent Real-Time Occupancy Monitoring System with Enhanced Encryption and Privacy.
Proceedings of the 17th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2018

2017
A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices.
Neural Comput. Appl., 2017

A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S<sub>8</sub> permutation.
J. Intell. Fuzzy Syst., 2017

An Improved Image Encryption Scheme Based on a Non-Linear Chaotic Algorithm and Substitution Boxes.
Informatica, 2017

Energy demand prediction through novel random neural network predictor for large non-domestic buildings.
Proceedings of the 2017 Annual IEEE International Systems Conference, 2017

A new technique for designing 8 × 8 substitution box for image encryption applications.
Proceedings of the 2017 9th Computer Science and Electronic Engineering Conference, 2017

2016
A secure image encryption scheme based on chaotic maps and affine transformation.
Multim. Tools Appl., 2016

2015
An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes.
Wirel. Pers. Commun., 2015


  Loading...