Jawad Ahmad

jawad ahmad

Dr Jawad Ahmad

Lecturer

Biography

Dr Jawad Ahmad is an experienced teacher with more than 10 years of cutting-edge teaching and research experience in prestigious institutes including Edinburgh Napier University (UK), Glasgow Caledonian University (UK), Hongik University (South Korea) and HITEC University Taxila (Pakistan). During his professional career in the UK, South Korea, and Pakistan, he has taught numerous industry-relevant courses such as Programming for Cyber Security, Cryptography, Operating Systems, Computer Systems and Mathematics for Computing. He has supervised several PhD, MSc and undergraduate students in their dissertations. He was a postgraduate student coordinator and curriculum development committee member at HITEC University Taxila Pakistan. He has co-authored more than 100+ research papers (2000+ Google Citations), including in leading international journals and peer-reviewed international conference proceedings. In 2020, he was recognised as a Global Talent in the area of Cyber Security by the UK Research and Innovation Body and Royal Academy of Engineering. His name was included in World’s Top 2% highly cited scientists. He earned a gold medal and bronze medal for best performance in MS (Electrical Engineering) and BS (Electronics Engineering), respectively.

Esteem

Conference Organising Activity

  • Best Paper Award.
  • Best Paper Award.
  • Session Chair (Artificial Intelligence and Data Science Track).
  • Track Chair (Cyber Security Track).

 

Editorial Activity

  • Guest Editor.

 

Fellowships and Awards

  • Gold Medal Award
  • Bronze Medal Award

 

Reviewing

  • Outstanding Contributions in Reviewing Award

 

Date


99 results

A Deep Learning-Based Semantic Segmentation Architecture for Autonomous Driving Applications

Journal Article
Masood, S., Ahmed, F., Alsuhibany, S. A., Ghadi, Y. Y., Siyal, M. Y., Kumar, H., …Ahmad, J. (2022)
A Deep Learning-Based Semantic Segmentation Architecture for Autonomous Driving Applications. Wireless Communications and Mobile Computing, 2022, Article 8684138. https://doi.org/10.1155/2022/8684138
In recent years, the development of smart transportation has accelerated research on semantic segmentation as it is one of the most important problems in this area. A large re...

Modified SHARK Cipher and Duffing Map-Based Cryptosystem

Journal Article
Rabie, O., Ahmad, J., & Alghazzawi, D. (2022)
Modified SHARK Cipher and Duffing Map-Based Cryptosystem. Mathematics, 10(12), Article 2034. https://doi.org/10.3390/math10122034
Recent years have seen a lot of interest in the study of chaotic structures and their accompanying cryptography frameworks. In this research, we came up with a new way to encr...

A Secure and Lightweight Chaos Based Image Encryption Scheme

Journal Article
Ali Khan, F., Ahmed, J., Alqahtani, F., Alsuhibany, S. A., Ahmed, F., & Ahmad, J. (2022)
A Secure and Lightweight Chaos Based Image Encryption Scheme. Computers, Materials & Continua, 73(1), 279-294. https://doi.org/10.32604/cmc.2022.028789
In this paper, we present an image encryption scheme based on the multi-stage chaos-based image encryption algorithm. The method works on the principle of confusion and diffus...

A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos

Journal Article
Kamran, M. I., Khan, M. A., Alsuhibany, S. A., Ghadi, Y. Y., Arshad, Arif, J., & Ahmad, J. (2022)
A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos. Computers, Materials & Continua, 73(1), 657-672. https://doi.org/10.32604/cmc.2022.028876
The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th genera...

A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering

Journal Article
Ullah, S., Ahmad, J., Khan, M. A., Alkhammash, E. H., Hadjouni, M., Ghadi, Y. Y., …Pitropakis, N. (2022)
A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering. Sensors, 22(10), Article 3607. https://doi.org/10.3390/s22103607
The Internet of Things (IoT) is a widely used technology in automated network systems across the world. The impact of the IoT on different industries has occurred in recent ye...

Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning

Journal Article
Ghaleb, F. A., Alsaedi, M., Saeed, F., Ahmad, J., & Alasli, M. (2022)
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning. Sensors, 22(9), Article 3373. https://doi.org/10.3390/s22093373
Web applications have become ubiquitous for many business sectors due to their platform independence and low operation cost. Billions of users are visiting these applications ...

Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform

Journal Article
Abd, M. H., Al-Suhail, G. A., Tahir, F. R., Ali Ali, A. M., Abbood, H. A., Dashtipour, K., …Ahmad, J. (2022)
Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform. Remote Sensing, 14(9), Article 1984. https://doi.org/10.3390/rs14091984
There is no doubt that chaotic systems are still attractive issues in various radar applications and communication systems. In this paper, we present a new 0.3 GHz mono-static...

Optimal Pitch Angle Controller for DFIG-Based Wind Turbine System Using Computational Optimization Techniques

Journal Article
Khurshid, A., Mughal, M. A., Othman, A., Al-Hadhrami, T., Kumar, H., Khurshid, I., …Ahmad, J. (2022)
Optimal Pitch Angle Controller for DFIG-Based Wind Turbine System Using Computational Optimization Techniques. Electronics, 11(8), Article 1290. https://doi.org/10.3390/electronics11081290
With the advent of high-speed and parallel computing, the applicability of computational optimization in engineering problems has increased, with greater validation than conve...

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map

Journal Article
Alharbi, A. R., Ahmad, J., Arshad, Shaukat, S., Masood, F., Ghadi, Y. Y., …Buchanan, W. J. (2022)
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complexity, 2022, Article 7047282. https://doi.org/10.1155/2022/7047282
With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain...

A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map

Journal Article
Masood, F., Boulila, W., Alsaeedi, A., Khan, J. S., Ahmad, J., Khan, M. A., & Rehman, S. U. (in press)
A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map. Multimedia Tools and Applications, https://doi.org/10.1007/s11042-022-12844-w
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. Benefiting from inherent properties such as ergodicity and key-sensitivity;...

Current Post Grad projects