


default search action
Jawad Ahmad 0001
Person information
- affiliation: Edinburgh Napier University, School of Computing, UK
- affiliation (PhD 2019): Glasgow Caledonian University, School of Engineering and Built Environment, UK
- affiliation (former): HITEC University Taxila, Pakistan
Other persons with the same name
- Jawad Ahmad — disambiguation page
- Jawad Ahmad 0002
— University of Engineering and Technology Peshawar, Pakistan
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j81]Wad Ghaban
, Jawad Ahmad
, Ali Akbar Siddique
, Mohammed S. Alshehri
, Anila Saghir
, Faisal Saeed
, Baraq Ghaleb
, Mujeeb Ur Rehman
:
Sustainable Environmental Monitoring: Multistage Fusion Algorithm for Remotely Sensed Underwater Super-Resolution Image Enhancement and Classification. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 18: 3640-3653 (2025) - 2024
- [j80]Mohammed Alsaedi, Fuad A. Ghaleb
, Faisal Saeed
, Jawad Ahmad
, Mohammed Alasli:
Multi-Modal Features Representation-Based Convolutional Neural Network Model for Malicious Website Detection. IEEE Access 12: 7271-7284 (2024) - [j79]Mohammed S. Alshehri
, Jawad Ahmad
, Sultan Almakdi
, Mimonah Al Qathrady, Yazeed Yasin Ghadi
, William J. Buchanan
:
SkipGateNet: A Lightweight CNN-LSTM Hybrid Model With Learnable Skip Connections for Efficient Botnet Attack Detection in IoT. IEEE Access 12: 35521-35538 (2024) - [j78]Mohammed S. Alshehri
, Oumaima Saidani
, Fatma S. Alrayes
, Saadullah Farooq Abbasi
, Jawad Ahmad
:
A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection. IEEE Access 12: 45762-45772 (2024) - [j77]Syed M. Aqleem Abbas
, Muazzam A. Khan Khattak, Wadii Boulila
, Anis Koubaa, Muhammad Shahbaz Khan
, Jawad Ahmad
:
UAVs and Blockchain Synergy: Enabling Secure Reputation-Based Federated Learning in Smart Cities. IEEE Access 12: 154035-154053 (2024) - [j76]Mujeeb Ur Rehman
, Arslan Shafique
, Muhammad Shahbaz Khan
, Maha Driss, Wadii Boulila
, Yazeed Yasin Ghadi
, Suresh Babu Changalasetty, Majed Alhaisoni, Jawad Ahmad:
A novel medical image data protection scheme for smart healthcare system. CAAI Trans. Intell. Technol. 9(4): 821-836 (2024) - [j75]Mimonah Al Qathrady, Safi Ullah
, Mohammed S. Alshehri, Jawad Ahmad, Sultan Almakdi, Samar M. Alqhtani, Muazzam Ali Khan, Baraq Ghaleb:
SACNN-IDS: A self-attention convolutional neural network for intrusion detection in industrial internet of things. CAAI Trans. Intell. Technol. 9(6): 1398-1411 (2024) - [j74]Donghua Jiang, Nestor Tsafack
, Wadii Boulila
, Jawad Ahmad
, J. J. Barba-Franco:
ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption. Expert Syst. Appl. 236: 121378 (2024) - [j73]Ali Akbar Siddique, Nada Alasbali
, Maha Driss
, Wadii Boulila
, Mohammed S. Alshehri, Jawad Ahmad
:
Sustainable collaboration: Federated learning for environmentally conscious forest fire classification in Green Internet of Things (IoT). Internet Things 25: 101013 (2024) - [j72]Waqas Ajmal Khan, Fawad Khan
, Shahzaib Tahir, Yinghui Zhang, Faisal Amjad, Jawad Ahmad:
HLSBD2: a quantum secure hybrid level source based data deduplication for the cloud. J. Ambient Intell. Humaniz. Comput. 15(1): 89-102 (2024) - [j71]Shahid Latif
, Wadii Boulila
, Anis Koubaa, Zhuo Zou, Jawad Ahmad
:
DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm. J. Netw. Comput. Appl. 221: 103784 (2024) - [j70]Ali Akbar Siddique
, Wadii Boulila
, Mohammed S. Alshehri
, Fawad Ahmed
, Thippa Reddy Gadekallu
, Nancy Victor
, Muhammed Tahir Qadri, Jawad Ahmad:
Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0. IEEE Trans. Consumer Electron. 70(1): 1923-1939 (2024) - [j69]Donghua Jiang
, Jawad Ahmad
, Zhufeng Suo
, Mashael M. Alsulami
, Yazeed Yasin Ghadi
, Wadii Boulila
:
ML-FAS: Multi-Level Face Anonymization Scheme and Its Application to E-Commerce Systems. IEEE Trans. Consumer Electron. 70(3): 5090-5100 (2024) - [j68]Muhammad Shahbaz Khan
, Jawad Ahmad
, Ahmed Al-Dubai
, Nikolaos Pitropakis
, Baraq Ghaleb
, Amjad Ullah
, Muhammad Attique Khan
, William J. Buchanan
:
Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology. IEEE Trans. Consumer Electron. 70(4): 7087-7101 (2024) - [c39]Muhammad Shahbaz Khan
, Jawad Ahmad, Muhammad Ali, Ahmed Al-Dubai, Nikolaos Pitropakis, William J. Buchanan:
VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. ATSIP 2024: 376-381 - [c38]Sikandar Khan, Safee Ullah, Jawad Ahmad, Amjad Ullah, Arshad Arshad, Muhammad Shahbaz Khan
:
Image Encryption Using A Novel Orbital-Extraction Permutation Technique and Chaotic Key Generation. ATSIP 2024: 414-419 - [c37]Md Shahed Islam Noyon, Naghmeh Moradpoor, Leandros Maglaras
, Jawad Ahmad:
Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records. DCOSS-IoT 2024: 516-523 - [c36]Zil e Huma, Jawad Ahmad, Hussam Al Hamadi
, Baraq Ghaleb, William J. Buchanan, Sana Ullah Jan:
ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT. ICCR 2024: 1-6 - [c35]Baraq Ghaleb, Ahmed Al-Dubai
, Imed Romdhani, Jawad Ahmad, Talal Aldhaheri, Sonali Kulkarni:
ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance. ICOIN 2024: 478-483 - [c34]Fizza Batool, Nadeem Kureshi, Rashiq Rafiq Marie, Fawad Ahmad, Muhammad Shahbaz Khan, Mouad Lemoudden, William J. Buchanan, Jawad Ahmad:
Image Encryption in Frequency Domain Using Hybrid Chaotic Maps, Hashing, and Lifting Wavelet Transform. ISPR (2) 2024: 262-273 - [c33]Safi Ullah, Wadii Boulila, Anis Koubaa, Jawad Ahmad:
Attention-Based Hybrid Deep Learning Model for Intrusion Detection in IIoT Networks. KES 2024: 3323-3332 - [c32]Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Nikolaos Pitropakis, Maha Driss, William J. Buchanan:
A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments. KES 2024: 4214-4223 - [c31]Stuart Weir, Muhammad Shahbaz Khan, Naghmeh Moradpoor, Jawad Ahmad:
Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis. SIN 2024: 1-7 - [c30]Saniya Zafar, Mohammed S. Alshehri, Syed Aziz Shah, Jawad Ahmad, Adnan Zafar, Aizaz Ahmad Khattak:
QoS Improvement using Federated Learning-based Position Prediction for mobile IoT. WF-IoT 2024: 1-6 - [i25]Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Baraq Ghaleb, Nikolaos Pitropakis, William J. Buchanan:
RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations. CoRR abs/2401.04707 (2024) - [i24]Lakshmi Rama Kiran Pasumarthy, Hisham Ali, William J. Buchanan, Jawad Ahmad, Audun Jøsang, Vasileios Mavroeidis, Mouad Lemoudden:
TIPS: Threat Sharing Information Platform for Enhanced Security. CoRR abs/2403.05210 (2024) - [i23]Muhammad Arslan, Muhammad Mubeen, Saadullah Farooq Abbasi
, Muhammad Shahbaz Khan, Wadii Boulila, Jawad Ahmad:
A Single Channel-Based Neonatal Sleep-Wake Classification using Hjorth Parameters and Improved Gradient Boosting. CoRR abs/2408.07925 (2024) - 2023
- [j67]Safi Ullah
, Wadii Boulila
, Anis Koubâa
, Jawad Ahmad
:
MAGRU-IDS: A Multi-Head Attention-Based Gated Recurrent Unit for Intrusion Detection in IIoT Networks. IEEE Access 11: 114590-114601 (2023) - [j66]Safi Ullah
, Jawad Ahmad, Muazzam Ali Khan, Mohammed S. Alshehri
, Wadii Boulila
, Anis Koubaa, Sana Ullah Jan, M. Munawwar Iqbal Ch:
TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks. Comput. Networks 237: 110072 (2023) - [j65]Haining Tan, Tao Ye, Sadaqat ur Rehman
, Obaid Ur Rehman
, Shanshan Tu, Jawad Ahmad
:
A novel routing optimization strategy based on reinforcement learning in perception layer networks. Comput. Networks 237: 110105 (2023) - [j64]Faneela, Muazzam Ali Khan, Suliman A. Alsuhibany, Walid El Shafai, Mujeeb Ur Rehman
, Jawad Ahmad:
An Immutable Framework for Smart Healthcare Using Blockchain Technology. Comput. Syst. Sci. Eng. 46(1): 165-179 (2023) - [j63]Muhammad Zia Ur Rehman
, Jawad Ahmad, Emad Sami Jaha, Abdullah Marish Ali, Mohammed A. Alzain, Faisal Saeed
:
An Efficient Automated Technique for Classification of Breast Cancer Using Deep Ensemble Model. Comput. Syst. Sci. Eng. 46(1): 897-911 (2023) - [j62]Mohammed S. Alshehri, Sultan Almakdi, Mimonah Al Qathrady, Jawad Ahmad:
Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm. Comput. Syst. Sci. Eng. 46(2): 2401-2414 (2023) - [j61]Sultan Almakdi, Mohammed S. Alshehri, Yousef Asiri, Mimonah Al Qathrady, Anas Ibrar
, Jawad Ahmad:
A Novel Internet of Medical Thing Cryptosystem Based on Jigsaw Transformation and Ikeda Chaotic Map. Comput. Syst. Sci. Eng. 46(3): 3017-3036 (2023) - [j60]Ejaz Khan, Muhammad Zia Ur Rehman
, Fawad Ahmed, Suliman A. Alsuhibany, Muhammad Zulfiqar Ali, Jawad Ahmad:
An Automated Classification Technique for COVID-19 Using Optimized Deep Learning Features. Comput. Syst. Sci. Eng. 46(3): 3799-3814 (2023) - [j59]Shahid Allah Bakhsh, Muhammad Almas Khan, Fawad Ahmed, Mohammed S. Alshehri, Hisham Ali, Jawad Ahmad
:
Enhancing IoT network security through deep learning-powered Intrusion Detection System. Internet Things 24: 100936 (2023) - [j58]Fahad Masood
, Wajid Ullah Khan, Sana Ullah Jan
, Jawad Ahmad
:
AI-Enabled Traffic Control Prioritization in Software-Defined IoT Networks for Smart Agriculture. Sensors 23(19): 8218 (2023) - [j57]Mahdi Jemmali
, Ali Kashif Bashir
, Wadii Boulila
, Loai Kayed B. Melhim
, Rutvij H. Jhaveri
, Jawad Ahmad
:
An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant. IEEE Trans. Intell. Transp. Syst. 24(12): 15633-15641 (2023) - [j56]Fawad Ahmed
, Muneeb Ur Rehman
, Jawad Ahmad
, Muhammad Shahbaz Khan
, Wadii Boulila
, Gautam Srivastava
, Jerry Chun-Wei Lin
, William J. Buchanan
:
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder. ACM Trans. Multim. Comput. Commun. Appl. 19(3s): 128:1-128:21 (2023) - [c29]Muhammad Shahbaz Khan
, Jawad Ahmad, Ahmed Al-Dubai
, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan:
PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms. CAMAD 2023: 188-193 - [c28]Hisham Ali, Mwrwan Abubakar, Jawad Ahmad, William J. Buchanan, Zakwan Jaroucheh:
PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks. CAMAD 2023: 200-205 - [c27]Umer Saeed
, Dingchang Zheng
, Behzad Ali Shah, Syed Ikram Shah, Sana Ullah Jan, Jawad Ahmad, Qammer H. Abbasi, Syed Aziz Shah
, Wadii Boulila
:
Contactless Breathing Waveform Detection Through RF Sensing: Radar vs. Wi-Fi Techniques. ComNet 2023: 1-10 - [c26]Muhammad Zakir Khan, Jawad Ahmad, Wadii Boulila
, Matthew Broadbent, Syed Aziz Shah
, Anis Koubaa, Qammer H. Abbasi:
Contactless Human Activity Recognition using Deep Learning with Flexible and Scalable Software Define Radio. IWCMC 2023: 126-131 - [c25]Anwar Sadad
, Muazzam Ali Khan, Baraq Ghaleb, Fadia Ali Khan, Maha Driss, Wadii Boulila
, Jawad Ahmad:
Distributed Twins in Edge Computing: Blockchain and IOTA. IWCMC 2023: 327-332 - [c24]Hassan Ali, Muhammad Shahbaz Khan
, Maha Driss, Jawad Ahmad, William J. Buchanan, Nikolaos Pitropakis:
CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption. VTC Fall 2023: 1-6 - [c23]Safi Ullah
, Wadii Boulila
, Anis Koubaa, Zahid Khan, Jawad Ahmad:
ABDNN-IDS: Attention-Based Deep Neural Networks for Intrusion Detection in Industrial IoT. VTC Fall 2023: 1-5 - [i22]Muhammad Zakir Khan, Jawad Ahmad, Wadii Boulila, Matthew Broadbent, Syed Aziz Shah, Anis Koubaa, Qammer H. Abbasi:
Contactless Human Activity Recognition using Deep Learning with Flexible and Scalable Software Define Radio. CoRR abs/2304.09756 (2023) - [i21]Anwar Sadad, Muazzam Ali Khan, Baraq Ghaleb, Fadia Ali Khan, Maha Driss, Wadii Boulila, Jawad Ahmad:
Distributed Twins in Edge Computing: Blockchain and IOTA. CoRR abs/2305.07453 (2023) - [i20]Baraq Ghaleb, Ahmed Al-Dubai, Amir Hussain, Jawad Ahmad, Imed Romdhani, Zakwan Jaroucheh:
Resolving the Decreased Rank Attack in RPL's IoT Networks. CoRR abs/2305.10025 (2023) - [i19]Muhammad Shahbaz Khan, Jawad Ahmad, Hisham Ali, Nikolaos Pitropakis, Ahmed Al-Dubai
, Baraq Ghaleb, William J. Buchanan:
SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data. CoRR abs/2308.10834 (2023) - [i18]Laiba Asghar, Fawad Ahmed, Muhammad Shahbaz Khan, Arshad Arshad, Jawad Ahmad:
Noise-Crypt: Image Encryption with Non-linear Noise, Hybrid Chaotic Maps, and Hashing. CoRR abs/2309.11471 (2023) - [i17]Hassan Ali, Muhammad Shahbaz Khan, Maha Driss, Jawad Ahmad, William J. Buchanan, Nikolaos Pitropakis:
CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption. CoRR abs/2309.11476 (2023) - [i16]Hisham Ali, Mwrwan Abubakar
, Jawad Ahmad, William J. Buchanan, Zakwan Jaroucheh:
PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks. CoRR abs/2310.05032 (2023) - [i15]Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan:
PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms. CoRR abs/2311.02795 (2023) - 2022
- [j55]Jameel Arif, Muazzam Ali Khan
, Baraq Ghaleb
, Jawad Ahmad
, Arslan Munir
, Umer Rashid
, Ahmed Yassin Al-Dubai
:
A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access 10: 12966-12982 (2022) - [j54]Adel R. Alharbi, Jawad Ahmad
, Arshad Ali
, Sajjad Shaukat Jamal
, Fawad Masood, Yazeed Yasin Ghadi
, Nikolaos Pitropakis, William J. Buchanan:
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complex. 2022: 7047282:1-7047282:15 (2022) - [j53]Yousef Alghamdi
, Arslan Munir
, Jawad Ahmad
:
A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution. Entropy 24(10): 1344 (2022) - [j52]Hisham Ali, Jawad Ahmad
, Zakwan Jaroucheh, Pavlos Papadopoulos
, Nikolaos Pitropakis
, Owen Lo, Will Abramson, William J. Buchanan
:
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy 24(10): 1379 (2022) - [j51]Jawad Ahmad, Syed Aziz Shah
, Shahid Latif
, Fawad Ahmed
, Zhuo Zou, Nikolaos Pitropakis:
DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8112-8121 (2022) - [j50]Fawad Masood
, Wadii Boulila
, Abdullah Alsaeedi, Jan Sher Khan
, Jawad Ahmad
, Muazzam Ali Khan, Sadaqat ur Rehman:
A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map. Multim. Tools Appl. 81(21): 30931-30959 (2022) - [j49]Hamza Ghandorh
, Wadii Boulila
, Sharjeel Masood
, Anis Koubaa
, Fawad Ahmed, Jawad Ahmad
:
Semantic Segmentation and Edge Detection - Approach to Road Detection in Very High Resolution Satellite Images. Remote. Sens. 14(3): 613 (2022) - [j48]Mariam H. Abd, Ghaida A. Al-Suhail
, Fadhil R. Tahir, Ahmed M. Ali Ali
, Hamza A. Abbood
, Kia Dashtipour
, Sajjad Shaukat Jamal
, Jawad Ahmad
:
Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform. Remote. Sens. 14(9): 1984 (2022) - [j47]Mujeeb Ur Rehman
, Arslan Shafique, Kashif Hesham Khan, Sohail Khalid
, Abdullah Alhumaidi Alotaibi, Turke Althobaiti
, Naeem Ramzan
, Jawad Ahmad
, Syed Aziz Shah
, Qammer H. Abbasi
:
Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model. Sensors 22(2): 461 (2022) - [j46]Umer Saeed
, Syed Yaseen Shah
, Syed Aziz Shah
, Haipeng Liu
, Abdullah Alhumaidi Alotaibi
, Turke Althobaiti
, Naeem Ramzan
, Sana Ullah Jan
, Jawad Ahmad
, Qammer H. Abbasi
:
Multiple Participants' Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing. Sensors 22(3): 809 (2022) - [j45]Grant McDonald, Pavlos Papadopoulos
, Nikolaos Pitropakis
, Jawad Ahmad
, William J. Buchanan
:
Ransomware: Analysing the Impact on Windows Active Directory Domain Services. Sensors 22(3): 953 (2022) - [j44]Ejaz Khan, Muhammad Zia Ur Rehman
, Fawad Ahmed, Faisal Abdulaziz Alfouzan
, Nouf M. Alzahrani
, Jawad Ahmad
:
Chest X-ray Classification for the Detection of COVID-19 Using Deep Learning Techniques. Sensors 22(3): 1211 (2022) - [j43]Safi Ullah
, Muazzam Ali Khan
, Jawad Ahmad
, Sajjad Shaukat Jamal
, Zil E. Huma, Muhammad Tahir Hassan, Nikolaos Pitropakis
, Arshad Ali
, William J. Buchanan
:
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles. Sensors 22(4): 1340 (2022) - [j42]Fuad A. Ghaleb
, Mohammed Alsaedi, Faisal Saeed
, Jawad Ahmad
, Mohammed Alasli:
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning. Sensors 22(9): 3373 (2022) - [j41]Safi Ullah
, Jawad Ahmad
, Muazzam Ali Khan, Eman H. Alkhammash
, Myriam Hadjouni
, Yazeed Ghadi
, Faisal Saeed
, Nikolaos Pitropakis
:
A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering. Sensors 22(10): 3607 (2022) - [j40]Muhammad Zia Ur Rehman
, Fawad Ahmed
, Suliman A. Alsuhibany
, Sajjad Shaukat Jamal
, Muhammad Zulfiqar Ali, Jawad Ahmad
:
Classification of Skin Cancer Lesions Using Explainable Deep Learning. Sensors 22(18): 6915 (2022) - [j39]Fawad Masood, Junaid Masood
, Lejun Zhang, Sajjad Shaukat Jamal, Wadii Boulila
, Sadaqat ur Rehman, Fadia Ali Khan, Jawad Ahmad:
A new color image encryption technique using DNA computing and Chaos-based substitution box. Soft Comput. 26(16): 7461-7477 (2022) - [j38]Shahid Latif
, Zil E. Huma
, Sajjad Shaukat Jamal
, Fawad Ahmed
, Jawad Ahmad
, Adnan Zahid
, Kia Dashtipour
, Muhammad Umar Aftab
, Muhammad Ahmad
, Qammer Hussain Abbasi
:
Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network. IEEE Trans. Ind. Informatics 18(9): 6435-6444 (2022) - [j37]Mujeeb Ur Rehman
, Arslan Shafique
, Yazeed Yasin Ghadi
, Wadii Boulila
, Sana Ullah Jan, Thippa Reddy Gadekallu
, Maha Driss, Jawad Ahmad
:
A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis. IEEE Trans. Netw. Sci. Eng. 9(6): 4322-4337 (2022) - [j36]Jan Sher Khan
, Sema Koç Kayhan, Saygin Siddiq Ahmed, Jawad Ahmad
, Hafza Ayesha Siddiqa, Fawad Ahmed
, Baraq Ghaleb, Ahmed Al-Dubai
:
Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme. Wirel. Pers. Commun. 125(1): 513-530 (2022) - [j35]Fawad Masood, Maha Driss
, Wadii Boulila
, Jawad Ahmad
, Sadaqat ur Rehman, Sana Ullah Jan
, Abdullah Qayyum
, William J. Buchanan
:
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations. Wirel. Pers. Commun. 127(2): 1405-1432 (2022) - [c22]Awais Aziz Shah, Ahsan Adeel, Jawad Ahmad, Ahmed Yassin Al-Dubai
, Mandar Gogate, Abhijeet Bishnu, Muhammad Diyan, Tassadaq Hussain, Kia Dashtipour, Tharm Ratnarajah, Amir Hussain:
A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids. DSC 2022: 1-6 - [i14]Grant McDonald, Pavlos Papadopoulos, Nikolaos Pitropakis, Jawad Ahmad, William J. Buchanan:
Ransomware: Analysing the Impact on Windows Active Directory Domain Services. CoRR abs/2202.03276 (2022) - [i13]Awais Aziz Shah, Ahsan Adeel, Jawad Ahmad, Ahmed Yassin Al-Dubai, Mandar Gogate, Abhijeet Bishnu, Muhammad Diyan, Tassadaq Hussain, Kia Dashtipour, Tharm Ratnarajah, Amir Hussain:
A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids. CoRR abs/2202.05662 (2022) - [i12]Fawad Ahmed, Muneeb Ur Rehman, Jawad Ahmad, Muhammad Shahbaz Khan, Wadii Boulila, Gautam Srivastava, Jerry Chun-Wei Lin
, William J. Buchanan:
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder. CoRR abs/2211.03662 (2022) - 2021
- [j34]Arslan Shafique
, Jameel Ahmed, Wadii Boulila
, Hamza Ghandorh
, Jawad Ahmad
, Mujeeb Ur Rehman
:
Detecting the Security Level of Various Cryptosystems Using Machine Learning Models. IEEE Access 9: 9383-9393 (2021) - [j33]Zil E. Huma
, Shahid Latif
, Jawad Ahmad
, Zeba Idrees
, Anas Ibrar
, Zhuo Zou
, Fehaid Alqahtani
, Fatmah Baothman
:
A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things. IEEE Access 9: 55595-55605 (2021) - [j32]Kris Hughes, Pavlos Papadopoulos
, Nikolaos Pitropakis
, Adrian Smales
, Jawad Ahmad
, William J. Buchanan
:
Browsers' Private Mode: Is It What We Were Promised? Comput. 10(12): 165 (2021) - [j31]Wadii Boulila
, Hamza Ghandorh
, Mehshan Ahmed Khan
, Fawad Ahmed, Jawad Ahmad:
A novel CNN-LSTM-based approach to predict urban expansion. Ecol. Informatics 64: 101325 (2021) - [j30]Shahid Latif
, Zeba Idrees
, Zil E. Huma
, Jawad Ahmad
:
Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions. Trans. Emerg. Telecommun. Technol. 32(11) (2021) - [j29]Shahid Latif
, Zeba Idrees
, Jawad Ahmad
, Lirong Zheng
, Zhuo Zou
:
A blockchain-based architecture for secure and trustworthy operations in the industrial Internet of Things. J. Ind. Inf. Integr. 21: 100190 (2021) - [j28]Munirah Alkhelaiwi, Wadii Boulila
, Jawad Ahmad
, Anis Koubaa
, Maha Driss
:
An Efficient Approach Based on Privacy-Preserving Deep Learning for Satellite Image Classification. Remote. Sens. 13(11): 2221 (2021) - [j27]Andrew Churcher
, Rehmat Ullah
, Jawad Ahmad
, Sadaqat ur Rehman
, Fawad Masood, Mandar Gogate
, Fehaid Alqahtani
, Boubakr Nour
, William J. Buchanan
:
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks. Sensors 21(2): 446 (2021) - [j26]Fawad Khan
, Saad Khan, Shahzaib Tahir, Jawad Ahmad
, Hasan Tahir
, Syed Aziz Shah
:
Granular Data Access Control with a Patient-Centric Policy Update for Healthcare. Sensors 21(10): 3556 (2021) - [j25]Muhammad Umair, Muhammad Shahbaz Khan
, Fawad Ahmed, Fatmah Baothman
, Fehaid Alqahtani, Muhammad Alian, Jawad Ahmad
:
Detection of COVID-19 Using Transfer Learning and Grad-CAM Visualization on Indigenously Collected X-ray Dataset. Sensors 21(17): 5813 (2021) - [j24]Muhammad Almas Khan
, Muazzam Ali Khan
, Sana Ullah Jan
, Jawad Ahmad
, Sajjad Shaukat Jamal
, Awais Aziz Shah
, Nikolaos Pitropakis
, William J. Buchanan
:
A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors 21(21): 7016 (2021) - [j23]Shahid Latif
, Maha Driss
, Wadii Boulila
, Zil E. Huma
, Sajjad Shaukat Jamal
, Zeba Idrees
, Jawad Ahmad
:
Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions. Sensors 21(22): 7518 (2021) - [c21]Kia Dashtipour, William Taylor, Shuja Ansari, Adnan Zahid, Mandar Gogate
, Jawad Ahmad, Khaled Assaleh, Kamran Arshad, Muhammad Ali Imran
, Qammer H. Abbasi:
Detecting Alzheimer's Disease Using Machine Learning Methods. BODYNETS 2021: 89-100 - [c20]Sagar Suresh Kumar, Kia Dashtipour, Mandar Gogate
, Jawad Ahmad, Khaled Assaleh, Kamran Arshad, Muhammad Ali Imran
, Qammer H. Abbasi, Wasim Ahmad:
Comparing the Performance of Different Classifiers for Posture Detection. BODYNETS 2021: 210-218 - [c19]Sadaqat ur Rehman, Shanshan Tu, Zubair Shah, Jawad Ahmad, Muhammad Waqas
, Obaid Ur Rehman
, Anis Koubaa, Qammer H. Abbasi:
Deep Learning Models for Intelligent Healthcare: Implementation and Challenges. ICAIS (1) 2021: 214-225 - [c18]Imad El Hanouti
, Hakim el Fadili, Fawad Ahmed, Jawad Ahmad:
On the Inadequacy of Multimodal Maps for Cryptographic Hash Applications with Phase-Space Modulation. ICMC 2021: 51-62 - [c17]Maha Driss
, Daniah Hasan, Wadii Boulila
, Jawad Ahmad:
Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions. KES 2021: 2385-2395 - [c16]Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan:
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. SIN 2021: 1-6 - [i11]Andrew Churcher, Rehmat Ullah, Jawad Ahmad, Sadaqat ur Rehman, Fawad Masood, Mandar Gogate, Fehaid Alqahtani, Boubakr Nour, William J. Buchanan:
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks. CoRR abs/2101.12270 (2021) - [i10]Wadii Boulila, Hamza Ghandorh, Mehshan Ahmed Khan, Fawad Ahmed, Jawad Ahmad:
A Novel CNN-LSTM-based Approach to Predict Urban Expansion. CoRR abs/2103.01695 (2021) - [i9]Muhammad Almas Khan, Muazzam Ali Khan, Shahid Latif
, Awais Aziz Shah, Mujeeb Ur Rehman, Wadii Boulila, Maha Driss, Jawad Ahmad:
Voting Classifier-based Intrusion Detection for IoT Networks. CoRR abs/2104.10015 (2021) - [i8]Maha Driss, Daniah Hasan, Wadii Boulila, Jawad Ahmad:
Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions. CoRR abs/2105.07722 (2021) - [i7]Wadii Boulila, Anmar Abuhamdah, Maha Driss, Slim Kammoun, Jawad Ahmad:
GuideMe: A Mobile Application based on Global Positioning System and Object Recognition Towards a Smart Tourist Guide. CoRR abs/2105.13426 (2021) - [i6]Kathryn-Ann Tait, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, Jawad Ahmad:
Intrusion Detection using Machine Learning Techniques: An Experimental Comparison. CoRR abs/2105.13435 (2021) - [i5]Muneeb Ahmed Khan, Muazzam Ali Khan, Maha Driss, Wadii Boulila, Jawad Ahmad:
Evolution of Target Localization in Wireless Sensor Network (WSN): A Review. CoRR abs/2107.04128 (2021) - [i4]Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan:
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. CoRR abs/2112.10092 (2021) - 2020
- [j22]Shahid Latif
, Zhuo Zou
, Zeba Idrees
, Jawad Ahmad
:
A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network. IEEE Access 8: 89337-89350 (2020) - [j21]Abdullah Qayyum
, Jawad Ahmad
, Wadii Boulila
, Saeed Rubaiee
, Arshad Ali
, Fawad Masood
, Fawad Khan
, William J. Buchanan
:
Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution. IEEE Access 8: 140876-140895 (2020) - [j20]Jan Sher Khan
, Wadii Boulila
, Jawad Ahmad
, Saeed Rubaiee
, Atique Ur Rehman
, Roobaea Alroobaea
, William J. Buchanan
:
DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption. IEEE Access 8: 159732-159744 (2020) - [j19]Saadullah Farooq Abbasi
, Jawad Ahmad
, Ahsen Tahir, Muhammad Awais
, Chen Chen
, Muhammad Irfan
, Hafza Ayesha Siddiqa, Abu Bakar Waqas, Xi Long
, Bin Yin
, Saeed Akbarzadeh
, Chunmei Lu, Laishuan Wang
, Wei Chen
:
EEG-Based Neonatal Sleep-Wake Classification Using Multilayer Perceptron Neural Network. IEEE Access 8: 183025-183034 (2020) - [j18]Hira Hamid, Fawad Ahmed
, Jawad Ahmad
:
Robust Image Hashing Scheme using Laplacian Pyramids. Comput. Electr. Eng. 84: 106648 (2020) - [j17]Ahsan Adeel
, Jawad Ahmad
, Hadi Larijani, Amir Hussain:
A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids. Cogn. Comput. 12(3): 589-601 (2020) - [j16]Fawad Masood
, Jawad Ahmad
, Syed Aziz Shah
, Sajjad Shaukat Jamal, Iqtadar Hussain:
A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map. Entropy 22(3): 274 (2020) - [j15]Shuja Ansari
, Jawad Ahmad
, Syed Aziz Shah
, Ali Kashif Bashir
, Tuleen Boutaleb
, Sinan Sinanovic
:
Chaos-based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks. Trans. Emerg. Telecommun. Technol. 31(5) (2020) - [j14]Jawad Ahmad, Ahsen Tahir, Hadi Larijani, Fawad Ahmed, Syed Aziz Shah
, Adam James Hall, William J. Buchanan
:
Energy demand forecasting of buildings using random neural networks. J. Intell. Fuzzy Syst. 38(4): 4753-4765 (2020) - [j13]Fawad Masood
, Wadii Boulila
, Jawad Ahmad
, Arshad Ali
, Syam Sankar
, Saeed Rubaiee
, William J. Buchanan
:
A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos. Remote. Sens. 12(11): 1893 (2020) - [j12]Syed Muhammad Asad
, Jawad Ahmad
, Sajjad Hussain
, Ahmed Zoha
, Qammer Hussain Abbasi
, Muhammad Ali Imran
:
Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning. Sensors 20(9): 2629 (2020) - [j11]Jawad Ahmad
, Fawad Masood
, Syed Aziz Shah
, Sajjad Shaukat Jamal, Iqtadar Hussain
:
A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping. Symmetry 12(3): 350 (2020) - [c15]Shahtaj Shaukat, Arshid Ali, Amreen Batool
, Fehaid Alqahtani, Jan Sher Khan
, Arshad Ali
, Jawad Ahmad:
Intrusion Detection and Attack Classification Leveraging Machine Learning Technique. IIT 2020: 198-202 - [c14]Jan Sher Khan
, Ahsen Tahir, Jawad Ahmad, Syed Aziz Shah, Qammer H. Abbasi, Gordon Russell, William J. Buchanan
:
5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum. SAI (3) 2020: 26-36 - [c13]Kaouthar Driss
, Wadii Boulila
, Amreen Batool
, Jawad Ahmad:
A Novel Approach for Classifying Diabetes' Patients Based on Imputation and Machine Learning. UCET 2020: 1-4 - [c12]Shahid Latif
, Zeba Idrees, Zhuo Zou, Jawad Ahmad:
DRaNN: A Deep Random Neural Network Model for Intrusion Detection in Industrial IoT. UCET 2020: 1-4 - [i3]Will Major, William J. Buchanan, Jawad Ahmad:
An authentication protocol based on chaos and zero knowledge proof. CoRR abs/2001.07897 (2020) - [i2]Sadaqat ur Rehman, Muhammad Waqas, Shanshan Tu, Anis Koubaa, Obaid Ur Rehman, Jawad Ahmad, Muhammad Hanif, Zhu Han:
Deep Learning Techniques for Future Intelligent Cross-Media Retrieval. CoRR abs/2008.01191 (2020)
2010 – 2019
- 2019
- [j10]Ayyaz-Ul-Haq Qureshi, Hadi Larijani
, Nhamoinesu Mtetwa, Abbas Javed
, Jawad Ahmad
:
RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection. Comput. 8(3): 59 (2019) - [j9]Iram Bashir, Fawad Ahmed
, Jawad Ahmad
, Wadii Boulila
, Nouf Alharbi:
A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids. Entropy 21(11): 1132 (2019) - [j8]Jan Sher Khan
, Jawad Ahmad
, Saygin Siddiq Ahmed, Hafza Ayesha Siddiqa, Saadullah Farooq Abbasi
, Sema Koç Kayhan:
DNA key based visual chaotic image encryption. J. Intell. Fuzzy Syst. 37(2): 2549-2561 (2019) - [j7]Jan Sher Khan
, Jawad Ahmad
:
Chaos based efficient selective image encryption. Multidimens. Syst. Signal Process. 30(2): 943-961 (2019) - [c11]Muhammad Ilyas, Jawad Ahmad
, Alistair Lawson, Jan Sher Khan
, Ahsen Tahir, Ahsan Adeel, Hadi Larijani, Abdelfateh Kerrouche, M. Guftar Shaikh, William J. Buchanan
, Amir Hussain:
Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning. BICS 2019: 76-85 - [c10]Jawad Ahmad
, Ahsen Tahir, Jan Sher Khan
, Muazzam Ali Khan, Fadia Ali Khan, Arshad Ali
, Zeeshan Habib:
A Partial Ligt-weight Image Encryption Scheme. UCET 2019: 1-3 - [c9]Ayyaz-Ul-Haq Qureshi, Hadi Larijani, Abbas Javed
, Nhamoinesu Mtetwa, Jawad Ahmad
:
Intrusion Detection Using Swarm Intelligence. UCET 2019: 1-5 - 2018
- [j6]Jawad Ahmad
, Muazzam Ali Khan, Fawad Ahmed
, Jan Sher Khan
:
A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Comput. Appl. 30(12): 3847-3857 (2018) - [c8]Jawad Ahmad
, Hadi Larijani, Rohinton Emmanuel
, Mike Mannion
, Abbas Javed
, Ali Ahmadinia
:
An Intelligent Real-Time Occupancy Monitoring System with Enhanced Encryption and Privacy. ICCI*CC 2018: 524-529 - [c7]Jan Sher Khan
, Jawad Ahmad
, Saadullah Farooq Abbasi
, Arshad Ali, Sema Koç Kayhan:
DNA Sequence Based Medical Image Encryption Scheme. CEEC 2018: 24-29 - [c6]Ayyaz-Ul-Haq Qureshi, Hadi Larijani, Jawad Ahmad
, Nhamoinesu Mtetwa:
A Novel Random Neural Network Based Approach for Intrusion Detection Systems. CEEC 2018: 50-55 - [c5]Jawad Ahmad
, Hadi Larijani, Rohinton Emmanuel
, Mike Mannion
, Ayyaz-Ul-Haq Qureshi:
Secure Occupancy Monitoring System for IoT Using Lightweight Intertwining Logistic Map. CEEC 2018: 208-213 - [c4]Shoukat Ali, Muazzam Ali Khan, Jawad Ahmad
, Asad Waqar Malik
, Anis Ur Rahman:
Detection and prevention of Black Hole Attacks in IOT & WSN. FMEC 2018: 217-226 - [c3]Jawad Ahmad
, Hadi Larijani, Rohinton Emmanuel
, Mike Mannion
, Abbas Javed
:
An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera. IntelliSys (2) 2018: 957-969 - [i1]Ahsan Adeel, Jawad Ahmad, Amir Hussain:
Real-Time Lightweight Chaotic Encryption for 5G IoT Enabled Lip-Reading Driven Secure Hearing-Aid. CoRR abs/1809.04966 (2018) - 2017
- [j5]Jan Sher Khan, Muazzam Ali Khan, Jawad Ahmad, Seong Oun Hwang, Waqas Ahmed:
An Improved Image Encryption Scheme Based on a Non-Linear Chaotic Algorithm and Substitution Boxes. Informatica 28(4): 629-649 (2017) - [j4]Fadia Ali Khan, Jameel Ahmed, Jan Sher Khan
, Jawad Ahmad
, Muazzam Ali Khan:
A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S8 permutation. J. Intell. Fuzzy Syst. 33(6): 3753-3765 (2017) - [j3]Jawad Ahmad
, Muazzam Ali Khan, Seong Oun Hwang, Jan Sher Khan
:
A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Comput. Appl. 28(S-1): 953-967 (2017) - [c2]Fadia Ali Khan, Jameel Ahmed, Jan Sher Khan
, Jawad Ahmad
, Muazzam Ali Khan, Seong Oun Hwang:
A new technique for designing 8 × 8 substitution box for image encryption applications. CEEC 2017: 7-12 - [c1]Jawad Ahmad
, Hadi Larijani, Rohinton Emmanuel
, Mike Mannion
, Abbas Javed
, Mark Phillipson:
Energy demand prediction through novel random neural network predictor for large non-domestic buildings. SysCon 2017: 1-6 - 2016
- [j2]Jawad Ahmad
, Seong Oun Hwang:
A secure image encryption scheme based on chaotic maps and affine transformation. Multim. Tools Appl. 75(21): 13951-13976 (2016) - 2015
- [j1]Jawad Ahmad
, Seong Oun Hwang, Arshad Ali
:
An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes. Wirel. Pers. Commun. 84(2): 901-918 (2015)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-13 00:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint