Jawad Ahmad
jawad ahmad

Dr Jawad Ahmad

Lecturer

Biography

Dr Jawad Ahmad (SMIEEE) is a highly experienced teacher with a decade of teaching and research experience in prestigious institutes. He has taught at renowned institutions such as Edinburgh Napier University (UK) and Glasgow Caledonian University (UK) etc. He has also served as a supervisor for several PhD, MSc, and undergraduate students, providing guidance and support for their dissertations. He has published in renowned journals including IEEE Transactions, ACM Transactions, Elsevier and Springer with over 150 research papers and 4500 citations. For the past three years, his name has appeared on the list of the world's top 2% scientists in Cybersecurity, as published by Clarivate (a list endorsed by Stanford University, USA). Furthermore, in 2020, he was recognized as a Global Talent in the area of Cybersecurity by the Royal Academy of Engineering (UK). To date, he has secured research and funding grants totalling £195K. In terms of academic achievements, he has earned a Gold medal for his outstanding performance in MSc and a Bronze medal for his achievements in BSc.

Esteem

Conference Organising Activity

  • Best Paper Award.
  • Session Chair (Artificial Intelligence and Data Science Track).
  • Track Chair (Cyber Security Track).
  • Best Paper Award.

 

Editorial Activity

  • Guest Editor.

 

Fellowships and Awards

  • Gold Medal Award
  • Bronze Medal Award

 

Reviewing

  • Outstanding Contributions in Reviewing Award

 

Date


135 results

A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection

Journal Article
Alshehri, M. S., Saidani, O., Alrayes, F. S., Abbasi, S. F., & Ahmad, J. (2024)
A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection. IEEE Access, 12, 45762-45772. https://doi.org/10.1109/access.2024.3380816
The Industrial Internet of Things (IIoT) comprises a variety of systems, smart devices, and an extensive range of communication protocols. Hence, these systems face susceptibi...

Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records

Conference Proceeding
Noyon, M. S. I., Moradpoor, N., Maglaras, L., & Ahmad, J. (in press)
Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records.

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT

Journal Article
Alshehri, M. S., Ahmad, J., Almakdi, S., Qathrady, M. A., Ghadi, Y. Y., & Buchanan, W. J. (2024)
SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT. IEEE Access, 12, https://doi.org/10.1109/access.2024.3371992
The rise of Internet of Things (IoT) has led to increased security risks, particularly from botnet attacks that exploit IoT device vulnerabilities. This situation necessitates...

British Sign Language Detection Using Ultra-Wideband Radar Sensing and Residual Neural Network

Journal Article
Saeed, U., Shah, S. A., Ghadi, Y. Y., Hameed, H., Shah, S. I., Ahmad, J., & Abbasi, Q. H. (2024)
British Sign Language Detection Using Ultra-Wideband Radar Sensing and Residual Neural Network. IEEE Sensors Journal, 24(7), 11144-11151. https://doi.org/10.1109/jsen.2024.3364389
This study represents a significant advancement in Sign Language Detection (SLD), a crucial tool for enhancing communication and fostering inclusivity among the hearing-impair...

A novel medical image data protection scheme for smart healthcare system

Journal Article
Rehman, M. U., Shafique, A., Khan, M. S., Driss, M., Boulila, W., Ghadi, Y. Y., …Ahmad, J. (in press)
A novel medical image data protection scheme for smart healthcare system. CAAI Transactions on Intelligence Technology, https://doi.org/10.1049/cit2.12292
The Internet of Multimedia Things (IoMT) refers to a network of interconnected multimedia devices that communicate with each other over the Internet. Recently, smart healthcar...

Energy efficiency considerations in software‐defined wireless body area networks

Journal Article
Masood, F., Khan, W. U., Alshehri, M. S., Alsumayt, A., & Ahmad, J. (2024)
Energy efficiency considerations in software‐defined wireless body area networks. Engineering Reports, 6(3), Article e12841. https://doi.org/10.1002/eng2.12841
Wireless body area networks (WBAN) provide remote services for patient monitoring which allows healthcare practitioners to diagnose, monitor, and prescribe them without their ...

Multi-modal Features Representation-based Convolutional Neural Network Model for Malicious Website Detection

Journal Article
Alsaedi, M., Ghaleb, F. A., Saeed, F., Ahmad, J., & Alasli, M. (2024)
Multi-modal Features Representation-based Convolutional Neural Network Model for Malicious Website Detection. IEEE Access, 12, 7271 - 7284. https://doi.org/10.1109/access.2023.3348071
Web applications have proliferated across various business sectors, serving as essential tools for billions of users in their daily lives activities. However, many of these ap...

Sustainable Collaboration: Federated Learning for Environmentally Conscious Forest Fire Classification in Green Internet of Things (IoT)

Journal Article
Siddique, A. A., Alasbali, N., Driss, M., Boulila, W., Alshehri, M. S., & Ahmad, J. (2024)
Sustainable Collaboration: Federated Learning for Environmentally Conscious Forest Fire Classification in Green Internet of Things (IoT). Internet of Things, 25, Article 101013. https://doi.org/10.1016/j.iot.2023.101013
Forests are an invaluable natural resource, playing a crucial role in the regulation of both local and global climate patterns. Additionally, they offer a plethora of benefits...

DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm

Journal Article
Latif, S., Boulila, W., Koubaa, A., Zou, Z., & Ahmad, J. (2024)
DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm. Journal of Network and Computer Applications, 221, 103784. https://doi.org/10.1016/j.jnca.2023.103784
In the dynamic field of the Industrial Internet of Things (IIoT), the networks are increasingly vulnerable to a diverse range of cyberattacks. This vulnerability necessitates ...

A novel routing optimization strategy based on reinforcement learning in perception layer networks

Journal Article
Tan, H., Ye, T., ur Rehman, S., ur Rehman, O., Tu, S., & Ahmad, J. (2023)
A novel routing optimization strategy based on reinforcement learning in perception layer networks. Computer Networks, 237, Article 110105. https://doi.org/10.1016/j.comnet.2023.110105
Wireless sensor networks have become incredibly popular due to the Internet of Things’ (IoT) rapid development. IoT routing is the basis for the efficient operation of the per...

Current Post Grad projects

Previous Post Grad projects