Jawad Ahmad
jawad ahmad

Dr Jawad Ahmad

Lecturer

Biography

Dr Jawad Ahmad (SMIEEE) is a highly experienced teacher with a decade of teaching and research experience in prestigious institutes. He has taught at renowned institutions such as Edinburgh Napier University (UK) and Glasgow Caledonian University (UK) etc. He has also served as a supervisor for several PhD, MSc, and undergraduate students, providing guidance and support for their dissertations. He has published in renowned journals including IEEE Transactions, ACM Transactions, Elsevier and Springer with over 150 research papers and 4500 citations. For the past three years, his name has appeared on the list of the world's top 2% scientists in Cybersecurity, as published by Clarivate (a list endorsed by Stanford University, USA). Furthermore, in 2020, he was recognized as a Global Talent in the area of Cybersecurity by the Royal Academy of Engineering (UK). To date, he has secured research and funding grants totalling £195K. In terms of academic achievements, he has earned a Gold medal for his outstanding performance in MSc and a Bronze medal for his achievements in BSc.

Esteem

Conference Organising Activity

  • Best Paper Award.
  • Best Paper Award.
  • Track Chair (Cyber Security Track).
  • Session Chair (Artificial Intelligence and Data Science Track).

 

Editorial Activity

  • Guest Editor.

 

Fellowships and Awards

  • Gold Medal Award
  • Bronze Medal Award

 

Reviewing

  • Outstanding Contributions in Reviewing Award

 

Date


135 results

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022)
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can...

HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles

Journal Article
Ullah, S., Khan, M. A., Ahmad, J., Jamal, S. S., e Huma, Z., Hassan, M. T., …Buchanan, W. J. (2022)
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles. Sensors, 22(4), Article 1340. https://doi.org/10.3390/s22041340
Internet of Vehicles (IoV) is an application of the Internet of Things (IoT) network that connects smart vehicles to the internet, and vehicles with each other. With the emerg...

Chest X-ray Classification for the Detection of COVID-19 Using Deep Learning Techniques

Journal Article
Khan, E., Rehman, M. Z. U., Ahmed, F., Alfouzan, F. A., Alzahrani, N. M., & Ahmad, J. (2022)
Chest X-ray Classification for the Detection of COVID-19 Using Deep Learning Techniques. Sensors, 22(3), Article 1211. https://doi.org/10.3390/s22031211
Recent technological developments pave the path for deep learning-based techniques to be used in almost every domain of life. The precision of deep learning techniques make it...

Semantic Segmentation and Edge Detection—Approach to Road Detection in Very High Resolution Satellite Images

Journal Article
Ghandorh, H., Boulila, W., Masood, S., Koubaa, A., Ahmed, F., & Ahmad, J. (2022)
Semantic Segmentation and Edge Detection—Approach to Road Detection in Very High Resolution Satellite Images. Remote Sensing, 14(3), Article 613. https://doi.org/10.3390/rs14030613
Road detection technology plays an essential role in a variety of applications, such as urban planning, map updating, traffic monitoring and automatic vehicle navigation. Rece...

A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution

Journal Article
Arif, J., Khan, M. A., Ghaleb, B., Ahmad, J., Munir, A., Rashid, U., & Al-Dubai, A. Y. (2022)
A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access, 10, 12966-12982. https://doi.org/10.1109/access.2022.3146792
Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorith...

Ransomware: Analysing the Impact on Windows Active Directory Domain Services

Journal Article
McDonald, G., Papadopoulos, P., Pitropakis, N., Ahmad, J., & Buchanan, W. J. (2022)
Ransomware: Analysing the Impact on Windows Active Directory Domain Services. Sensors, 22(3), Article 953. https://doi.org/10.3390/s22030953
Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enter...

Multiple Participants’ Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing

Journal Article
Saeed, U., Yaseen Shah, S., Aziz Shah, S., Liu, H., Alhumaidi Alotaibi, A., Althobaiti, T., …H. Abbasi, Q. (2022)
Multiple Participants’ Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing. Sensors, 22(3), Article 809. https://doi.org/10.3390/s22030809
Wireless sensing is the utmost cutting-edge way of monitoring different health-related activities and, concurrently, preserving most of the privacy of individuals. To meet fut...

Multiple Participants’ Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing

Journal Article
Saeed, U., Yaseen Shah, S., Aziz Shah, S., Liu, H., Alhumaidi Alotaibi, A., Althobaiti, T., …Abbasi, Q. H. (2022)
Multiple Participants’ Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing. Sensors, 22(3), Article 809. https://doi.org/10.3390/s22030809
Wireless sensing is the utmost cutting-edge way of monitoring different health-related activities and, concurrently, preserving most of the privacy of individuals. To meet fut...

Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model

Journal Article
Rehman, M. U., Shafique, A., Khan, K. H., Khalid, S., Alotaibi, A. A., Althobaiti, T., …Abbasi, Q. H. (2022)
Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model. Sensors, 22(2), Article 461. https://doi.org/10.3390/s22020461
This article presents non-invasive sensing-based diagnoses of pneumonia disease, exploiting a deep learning model to make the technique non-invasive coupled with security pres...

Machine learning empowered COVID-19 patient monitoring using non-contact sensing: An extensive review

Journal Article
Saeed, U., Shah, S. Y., Ahmad, J., Imran, M. A., Abbasi, Q. H., & Shah, S. A. (2022)
Machine learning empowered COVID-19 patient monitoring using non-contact sensing: An extensive review. Journal of Pharmaceutical Analysis, 12(2), 193-204. https://doi.org/10.1016/j.jpha.2021.12.006
The severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), which caused the coronavirus disease 2019 (COVID-19) pandemic, has affected more than 400 million people worl...

Current Post Grad projects

Previous Post Grad projects