Jawad Ahmad
jawad ahmad

Dr Jawad Ahmad

Lecturer

Biography

Dr Jawad Ahmad (SMIEEE) is a highly experienced teacher with a decade of teaching and research experience in prestigious institutes. He has taught at renowned institutions such as Edinburgh Napier University (UK) and Glasgow Caledonian University (UK) etc. He has also served as a supervisor for several PhD, MSc, and undergraduate students, providing guidance and support for their dissertations. He has published in renowned journals including IEEE Transactions, ACM Transactions, Elsevier and Springer with over 150 research papers and 4500 citations. For the past three years, his name has appeared on the list of the world's top 2% scientists in Cybersecurity, as published by Clarivate (a list endorsed by Stanford University, USA). Furthermore, in 2020, he was recognized as a Global Talent in the area of Cybersecurity by the Royal Academy of Engineering (UK). To date, he has secured research and funding grants totalling £195K. In terms of academic achievements, he has earned a Gold medal for his outstanding performance in MSc and a Bronze medal for his achievements in BSc.

Esteem

Conference Organising Activity

  • Session Chair (Artificial Intelligence and Data Science Track).
  • Best Paper Award.
  • Best Paper Award.
  • Track Chair (Cyber Security Track).

 

Editorial Activity

  • Guest Editor.

 

Fellowships and Awards

  • Gold Medal Award
  • Bronze Medal Award

 

Reviewing

  • Outstanding Contributions in Reviewing Award

 

Date


135 results

A new technique for designing 8 × 8 substitution box for image encryption applications

Conference Proceeding
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., Khan, M. A., & Hwang, S. O. (2017)
A new technique for designing 8 × 8 substitution box for image encryption applications. In 2017 9th Computer Science and Electronic Engineering (CEEC)https://doi.org/10.1109/ceec.2017.8101591
To create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secur...

A novel substitution box for encryption based on Lorenz equations

Conference Proceeding
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017)
A novel substitution box for encryption based on Lorenz equations. In 2017 International Conference on Circuits, System and Simulation (ICCSS)https://doi.org/10.1109/cirsyssim.2017.8023176
Complexity of an encryption algorithm is highly dependent on nonlinear components that drive actual security. Only nonlinear component in all traditional encryption algorithms...

Energy demand prediction through novel random neural network predictor for large non-domestic buildings

Conference Proceeding
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., Javed, A., & Phillipson, M. (2017)
Energy demand prediction through novel random neural network predictor for large non-domestic buildings. In 2017 Annual IEEE International Systems Conference (SysCon)https://doi.org/10.1109/syscon.2017.7934803
Buildings are among the largest consumers of energy in the world. In developed countries, buildings currently consumes 40% of the total energy and 51% of total electricity con...

Secure speech communication algorithm via DCT and TD-ERCS chaotic map

Conference Proceeding
Habib, Z., Khan, J. S., Ahmad, J., Khan, M. A., & Khan, F. A. (2017)
Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 2017 4th International Conference on Electrical and Electronic Engineering (ICEEE)https://doi.org/10.1109/iceee2.2017.7935827
Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have ...

A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation

Journal Article
Ahmad, J., Khan, M. A., Ahmed, F., & Khan, J. S. (2018)
A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Computing and Applications, 30(12), 3847-3857. https://doi.org/10.1007/s00521-017-2970-3
Content protection is considered as an important issue in today’s world. Therefore, encryption of such contents is a challenging task for researchers. They are focusing on pro...

An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box

Journal Article
Khan, M. A., Ahmad, J., Javaid, Q., & Saqib, N. A. (2017)
An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. Journal of Modern Optics, 64(5), 531-540. https://doi.org/10.1080/09500340.2016.1246680
Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to...

TD-ERCS map-based confusion and diffusion of autocorrelated data

Journal Article
Khan, J. S., Ahmad, J., & Khan, M. A. (2017)
TD-ERCS map-based confusion and diffusion of autocorrelated data. Nonlinear Dynamics, 87(1), 93-107. https://doi.org/10.1007/s11071-016-3028-2
In this article, we proposed a new scheme to encrypt highly autocorrelated image pixel data. In existing literature, single substitution was used to break autocorrelation in i...

A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices

Journal Article
Ahmad, J., Khan, M. A., Hwang, S. O., & Khan, J. S. (2016)
A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Computing and Applications, 28(S1), 953-967. https://doi.org/10.1007/s00521-016-2405-6
With the evolution of technologies, the size of an image data has been significantly increased. However, traditional image encryption schemes cannot handle the emerging proble...

A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps

Journal Article
Rehman, A. U., Khan, J. S., Ahmad, J., & Hwang, S. O. (2016)
A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps. 3D research, 7(1), https://doi.org/10.1007/s13319-016-0084-9
Substitution box is a unique and nonlinear core component of block ciphers. A better designing technique of substitution box can boost up the quality of ciphertexts. In this p...

A new chaos-based secure image encryption scheme using multiple substitution boxes

Conference Proceeding
Khan, J. S., ur Rehman, A., Ahmad, J., & Habib, Z. (2015)
A new chaos-based secure image encryption scheme using multiple substitution boxes. In 2015 Conference on Information Assurance and Cyber Security (CIACS)https://doi.org/10.1109/ciacs.2015.7395561
Due to development in Internet and networking technology, multimedia data is broadly transmitted via wired and wireless medium. Thus security is a major concern in modern comm...

Current Post Grad projects

Previous Post Grad projects