Jawad Ahmad
jawad ahmad

Dr Jawad Ahmad

Lecturer

Biography

Dr Jawad Ahmad (SMIEEE) is a highly experienced teacher with a decade of teaching and research experience in prestigious institutes. He has taught at renowned institutions such as Edinburgh Napier University (UK) and Glasgow Caledonian University (UK) etc. He has also served as a supervisor for several PhD, MSc, and undergraduate students, providing guidance and support for their dissertations. He has published in renowned journals including IEEE Transactions, ACM Transactions, Elsevier and Springer with over 150 research papers and 4500 citations. For the past three years, his name has appeared on the list of the world's top 2% scientists in Cybersecurity, as published by Clarivate (a list endorsed by Stanford University, USA). Furthermore, in 2020, he was recognized as a Global Talent in the area of Cybersecurity by the Royal Academy of Engineering (UK). To date, he has secured research and funding grants totalling £195K. In terms of academic achievements, he has earned a Gold medal for his outstanding performance in MSc and a Bronze medal for his achievements in BSc.

Esteem

Conference Organising Activity

  • Session Chair (Artificial Intelligence and Data Science Track).
  • Best Paper Award.
  • Best Paper Award.
  • Track Chair (Cyber Security Track).

 

Editorial Activity

  • Guest Editor.

 

Fellowships and Awards

  • Gold Medal Award
  • Bronze Medal Award

 

Reviewing

  • Outstanding Contributions in Reviewing Award

 

Date


135 results

A Heuristic Intrusion Detection System for Internet-of-Things (IoT)

Conference Proceeding
Qureshi, A., Larijani, H., Ahmad, J., & Mtetwa, N. (2019)
A Heuristic Intrusion Detection System for Internet-of-Things (IoT). In Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume 1. , (86-98). https://doi.org/10.1007/978-3-030-22871-2_7
Today, digitally connected devices are involved in every aspect of life due to the advancements in Internet-of-Things (IoT) paradigm. Recently, it has been a driving force for...

Occupancy detection in non-residential buildings – A survey and novel privacy preserved occupancy monitoring solution

Journal Article
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., & Javed, A. (2018)
Occupancy detection in non-residential buildings – A survey and novel privacy preserved occupancy monitoring solution. Applied Computing and Informatics, https://doi.org/10.1016/j.aci.2018.12.001
Buildings use approximately 40% of global energy and are responsible for almost a third of the worldwide greenhouse gas emissions. They also utilise about 60% of the world’s e...

An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera

Conference Proceeding
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., & Javed, A. (2019)
An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera. In Proceedings of SAI Intelligent Systems Conference (957-969). https://doi.org/10.1007/978-3-030-01057-7_71
Real-time occupancy monitoring information is an important component in building energy management and security. Advances in technology enables us to develop vision-based syst...

Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map

Conference Proceeding
Abbasi, S. F., Ahmad, J., Khan, J. S., Khan, M. A., & Sheikh, S. A. (2019)
Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map. https://doi.org/10.1007/978-3-030-01177-2_56
Transmission of images over the Internet is exponentially increased in the last decade. However, Internet is considered as an insecure channel and hence may cause serious priv...

A Novel Random Neural Network Based Approach for Intrusion Detection Systems

Conference Proceeding
Qureshi, A., Larijani, H., Ahmad, J., & Mtetwa, N. (2018)
A Novel Random Neural Network Based Approach for Intrusion Detection Systems. https://doi.org/10.1109/ceec.2018.8674228
Computer security and privacy of user specific data is a prime concern in day to day communication. The mass use of internet connected systems has given rise to many vulnerabi...

DNA Sequence Based Medical Image Encryption Scheme

Conference Proceeding
Khan, J. S., Ahmad, J., Abbasi, S. F., Ali, A., & Kayhan, S. K. (2018)
DNA Sequence Based Medical Image Encryption Scheme. In 2018 10th Computer Science and Electronic Engineering (CEEC)https://doi.org/10.1109/ceec.2018.8674221
Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdropper...

Intertwining and NCA Maps Based New Image Encryption Scheme

Conference Proceeding
Khan, F. A., Ahmed, J., Ahmad, J., Khan, J. S., & Stankovic, V. (2018)
Intertwining and NCA Maps Based New Image Encryption Scheme. In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE)https://doi.org/10.1109/iccecome.2018.8658919
In this digital era, the Internet is a main source of communication. Due to exponential advancement in Internet technologies, transmission of multimedia data is very common no...

Chaos based efficient selective image encryption

Journal Article
Khan, J. S., & Ahmad, J. (2019)
Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing, 30(2), 943-961. https://doi.org/10.1007/s11045-018-0589-x
Due to social networks, demand for sharing multimedia data is significantly increased in last decade. However, lower complexity and frequent security breaches on public networ...

Detection and prevention of Black Hole Attacks in IOT & WSN

Conference Proceeding
Ali, S., Khan, M. A., Ahmad, J., Malik, A. W., & ur Rehman, A. (2018)
Detection and prevention of Black Hole Attacks in IOT & WSN. In 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC)https://doi.org/10.1109/fmec.2018.8364068
Wireless Sensor Network is the combination of small devices called sensor nodes, gateways and software. These nodes use wireless medium for transmission and are capable to sen...

A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S8 permutation

Journal Article
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017)
A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S8 permutation. Journal of Intelligent and Fuzzy Systems, 33(6), 3753-3765. https://doi.org/10.3233/JIFS-17656
Internet is used as the main source of communication throughout the world. However due to public nature of internet data are always exposed to different types of attacks. To a...

Current Post Grad projects

Previous Post Grad projects