Jawad Ahmad
jawad ahmad

Dr Jawad Ahmad

Lecturer

Biography

Dr Jawad Ahmad is an experienced teacher with more than 10 years of cutting-edge teaching and research experience in prestigious institutes including Edinburgh Napier University (UK), Glasgow Caledonian University (UK), Hongik University (South Korea) and HITEC University Taxila (Pakistan). During his professional career in the UK, South Korea, and Pakistan, he has taught numerous industry-relevant courses such as Programming for Cyber Security, Cryptography, Operating Systems, Computer Systems and Mathematics for Computing. He has supervised several PhD, MSc and undergraduate students in their dissertations. He was a postgraduate student coordinator and curriculum development committee member at HITEC University Taxila Pakistan. He has co-authored more than 100+ research papers (2000+ Google Citations), including in leading international journals and peer-reviewed international conference proceedings. In 2020, he was recognised as a Global Talent in the area of Cyber Security by the UK Research and Innovation Body and Royal Academy of Engineering. His name was included in World’s Top 2% highly cited scientists. He earned a gold medal and bronze medal for best performance in MS (Electrical Engineering) and BS (Electronics Engineering), respectively.

Esteem

Conference Organising Activity

  • Best Paper Award.
  • Session Chair (Artificial Intelligence and Data Science Track).
  • Track Chair (Cyber Security Track).
  • Best Paper Award.

 

Editorial Activity

  • Guest Editor.

 

Fellowships and Awards

  • Gold Medal Award
  • Bronze Medal Award

 

Reviewing

  • Outstanding Contributions in Reviewing Award

 

Date


116 results

An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant

Journal Article
Jemmali, M., Bashir, A. K., Boulila, W., Melhim, L. K. B., Jhaveri, R. H., & Ahmad, J. (in press)
An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant. IEEE Transactions on Intelligent Transportation Systems, https://doi.org/10.1109/tits.2022.3219568
Nowadays, developing environmental solutions to ensure the preservation and sustainability of natural resources is one of the core research topics for providing a better life ...

Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things

Journal Article
Hasan, A., Khan, M. A., Shabir, B., Munir, A., Malik, A. W., Anwar, Z., & Ahmad, J. (2022)
Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things. Applied Sciences, 12(22), Article 11442. https://doi.org/10.3390/app122211442
The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to their resource-constrained nature. Extensive research efforts have been dedica...

Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring

Journal Article
Ghadi, Y. Y., Alsuhibany, S. A., Ahmad, J., Kumar, H., Boulila, W., Alsaedi, M., …Bhatti, S. A. (2022)
Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring. Journal of Healthcare Engineering, 2022, Article 7745132. https://doi.org/10.1155/2022/7745132
With the advancement of camera and wireless technologies, surveillance camera-based occupancy has received ample attention from the research community. However, camera-based o...

A Proposal of a New Chaotic Map for Application in the Image Encryption Domain

Journal Article
Abu-Amara, F., & Ahmad, J. (in press)
A Proposal of a New Chaotic Map for Application in the Image Encryption Domain. Journal of Information and Knowledge Management, https://doi.org/10.1142/s0219649222500885
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption scheme has pros and cons regarding its speed, complexity, and security. Thi...

A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder

Journal Article
Ahmed, F., Ur Rehman, M., Ahmad, J., Shahbaz Khan, M., Boulila, W., Srivastava, G., …Buchanan, W. J. (in press)
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder. ACM transactions on multimedia computing communications and applications, https://doi.org/10.1145/3570165
With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. ...

The Development of a Cross-Border Energy Trade Cooperation Model of Interconnected Virtual Power Plants Using Bilateral Contracts

Journal Article
Ullah, Z., Arshad, & Ahmad, J. (2022)
The Development of a Cross-Border Energy Trade Cooperation Model of Interconnected Virtual Power Plants Using Bilateral Contracts. Energies, 15(21), Article 8171. https://doi.org/10.3390/en15218171
By coordinating the operation of regionally interconnected virtual power plants (VPPs), the growing penetration problem of renewable energy sources (RESs) into the power syste...

An Efficient Lightweight Image Encryption Scheme Using Multichaos

Journal Article
Ullah, A., Shah, A. A., Khan, J. S., Sajjad, M., Boulila, W., Akgul, A., …Ahmad, J. (2022)
An Efficient Lightweight Image Encryption Scheme Using Multichaos. Security and Communication Networks, 2022, Article 5680357. https://doi.org/10.1155/2022/5680357
With an immense increase in Internet multimedia applications over the past few years, digital content such as digital images are stored and shared over global networks, the pr...

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022)
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively...

A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution

Journal Article
Alghamdi, Y., Munir, A., & Ahmad, J. (2022)
A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution. Entropy, 24(10), Article 1344. https://doi.org/10.3390/e24101344
Chaotic-maps-based image encryption methods have been a topic of research interest for a decade. However, most of the proposed methods suffer from slow encryption time or comp...

Classification of Skin Cancer Lesions Using Explainable Deep Learning

Journal Article
Zia Ur Rehman, M., Ahmed, F., Alsuhibany, S. A., Jamal, S. S., Zulfiqar Ali, M., & Ahmad, J. (2022)
Classification of Skin Cancer Lesions Using Explainable Deep Learning. Sensors, 22(18), Article 6915. https://doi.org/10.3390/s22186915
Skin cancer is among the most prevalent and life-threatening forms of cancer that occur worldwide. Traditional methods of skin cancer detection need an in-depth physical exami...

Current Post Grad projects

Previous Post Grad projects