Jawad Ahmad

jawad ahmad

Dr Jawad Ahmad

Lecturer

Biography

Jawad Ahmad is an experienced researcher with more than 10 years of cutting-edge research and teaching experience in prestigious institutes including Edinburgh Napier University (UK), Glasgow Caledonian University (UK), Hongik University (South Korea) and HITEC University Taxila (Pakistan). He has co-authored more than 60 research papers including in leading international journals and peer-reviewed international conference proceedings. He was recognised as a Global Talent in the area of Cyber Security by Royal Academy of Engineering. He has taught various courses both at Undergraduate (UG) and Postgraduate (PG) levels during his career. He regularly organises timely special sessions and workshops for several flagship IEEE conferences. He is an invited reviewer for numerous world-leading high-impact journals such as IEEE Transactions on Emerging Topics in Computational Intelligence, Non-linear Dynamics, IEEE Access, Neural Computing & Applications and Journal of Information Security.

Esteem

Fellowships and Awards

  • PhD Studentship
  • Gold Medal Award
  • Bronze Medal Award

 

Reviewing

  • Outstanding Contributions in Reviewing Award

 

Date


57 results

An Efficient Approach Based on Privacy-Preserving Deep Learning for Satellite Image Classification

Journal Article
Alkhelaiwi, M., Boulila, W., Ahmad, J., Koubaa, A., & Driss, M. (2021)
An Efficient Approach Based on Privacy-Preserving Deep Learning for Satellite Image Classification. Remote Sensing, 13(11), https://doi.org/10.3390/rs13112221
Satellite images have drawn increasing interest from a wide variety of users, including business and government, ever since their increased usage in important fields ranging f...

Design of Portable Exoskeleton Forearm for Rehabilitation of Monoparesis Patients Using Tendon Flexion Sensing Mechanism for Health Care Applications

Journal Article
Imtiaz, M. S. B., Babar Ali, C., Kausar, Z., Shah, S. Y., Shah, S. A., Ahmad, J., …Abbasi, Q. H. (2021)
Design of Portable Exoskeleton Forearm for Rehabilitation of Monoparesis Patients Using Tendon Flexion Sensing Mechanism for Health Care Applications. Electronics, 10(11), https://doi.org/10.3390/electronics10111279
Technology plays a vital role in patient rehabilitation, improving the quality of life of an individual. The increase in functional independence of disabled individuals requir...

Granular Data Access Control with a Patient-Centric Policy Update for Healthcare

Journal Article
Khan, F., Khan, S., Tahir, S., Ahmad, J., Tahir, H., & Shah, S. A. (2021)
Granular Data Access Control with a Patient-Centric Policy Update for Healthcare. Sensors, 21(10), https://doi.org/10.3390/s21103556
Healthcare is a multi-actor environment that requires independent actors to have a different view of the same data, hence leading to different access rights. Ciphertext Policy...

A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations

Journal Article
Masood, F., Driss, M., Boulila, W., Ahmad, J., ur Rehman, S., Jan, S. U., …Buchanan, W. J. (in press)
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations. Wireless Personal Communications, https://doi.org/10.1007/s11277-021-08584-z
Medical images possess significant importance in diagnostics when it comes to healthcare systems. These images contain confidential and sensitive information such as patients’...

A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things

Journal Article
Huma, Z. E., Latif, S., Ahmad, J., Idrees, Z., Ibrar, A., Zou, Z., …Baothman, F. (2021)
A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things. IEEE Access, 9, 55595-55605. https://doi.org/10.1109/access.2021.3071766
The Industrial Internet of Things (IIoT) refers to the use of traditional Internet of Things (IoT) concepts in industrial sectors and applications. IIoT has several applicatio...

Detecting the Security Level of Various Cryptosystems Using Machine Learning Models

Journal Article
Shafique, A., Ahmed, J., Boulila, W., Ghandorh, H., Ahmad, J., & Rehman, M. U. (2021)
Detecting the Security Level of Various Cryptosystems Using Machine Learning Models. IEEE Access, 9, 9383-9393. https://doi.org/10.1109/access.2020.3046528
With recent advancements in multimedia technologies, the security of digital data has become a critical issue. To overcome the vulnerabilities of current security protocols, r...

A blockchain-based architecture for secure and trustworthy operations in the industrial Internet of Things

Journal Article
Latif, S., Idrees, Z., Ahmad, J., Zheng, L., & Zou, Z. (in press)
A blockchain-based architecture for secure and trustworthy operations in the industrial Internet of Things. Journal of Industrial Information Integration, https://doi.org/10.1016/j.jii.2020.100190
The industrial Internet of Things (IIoT) plays an important role in the industrial sector, where secure, scalable, and easily adopted technologies are being implemented for th...

Prediction of Critical Flashover Voltage of High Voltage Insulators Leveraging Bootstrap Neural Network

Journal Article
Niazi, M. T. K., Arshad, , Ahmad, J., Alqahtani, F., Baotham, F. A., & Abu-Amara, F. (2020)
Prediction of Critical Flashover Voltage of High Voltage Insulators Leveraging Bootstrap Neural Network. Electronics, 9(10), https://doi.org/10.3390/electronics9101620
Understanding the flashover performance of the outdoor high voltage insulator has been in the interest of many researchers recently. Various studies have been performed to inv...

EEG-Based Neonatal Sleep-Wake Classification Using Multilayer Perceptron Neural Network

Journal Article
Abbasi, S. F., Ahmad, J., Tahir, A., Awais, M., Chen, C., Irfan, M., …Chen, W. (2020)
EEG-Based Neonatal Sleep-Wake Classification Using Multilayer Perceptron Neural Network. IEEE Access, 8, 183025-183034. https://doi.org/10.1109/access.2020.3028182
Objective: Classification of sleep-wake states using multichannel electroencephalography (EEG) data that reliably work for neonates. Methods: A deep multilayer perceptron (MLP...

Privacy-Preserving Wandering Behavior Sensing in Dementia Patients Using Modified Logistic and Dynamic Newton Leipnik Maps

Journal Article
Shah, S. A., Ahmad, J., Masood, F., Shah, S. Y., Pervaiz, H., Taylor, W., …Abbasi, Q. H. (2021)
Privacy-Preserving Wandering Behavior Sensing in Dementia Patients Using Modified Logistic and Dynamic Newton Leipnik Maps. IEEE Sensors Journal, 21(3), 3669-3679. https://doi.org/10.1109/jsen.2020.3022564
The health status of an elderly person can be identified by examining the additive effects of aging along disease linked to it and can lead to the ’unstable incapacity’. This ...