Ahmad Y. Javaid

Orcid: 0000-0003-4719-4941

According to our database1, Ahmad Y. Javaid authored at least 66 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Impact of Smartphone-Based Interactive Learning Modules on Cybersecurity Learning at the High-School Level.
Proceedings of the IEEE Global Engineering Education Conference, 2023

Changes in High-School Student Attitude and Perception Towards Cybersecurity Through the Use of an Interactive Animated Visualization Framework.
Proceedings of the IEEE Global Engineering Education Conference, 2023

IEEE CNS 23 Poster: Cooperative Omnidirectional Beamformation for THz Band Phy-Security.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
A Survey on Databases for Multimodal Emotion Recognition and an Introduction to the VIRI (Visible and InfraRed Image) Database.
Multimodal Technol. Interact., 2022

Multi-Modal Data Fusion in Enhancing Human-Machine Interaction for Robotic Applications: A Survey.
CoRR, 2022

Game theoretic solution for an Unmanned Aerial Vehicle network host under DDoS attack.
Comput. Networks, 2022

Cybersecurity Based Simulation of Connected Automated Vehicles for Instructional Use.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

A Secure Software Engineering Design Framework for Educational Purpose.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

An Approach to Improve the Robustness of Machine Learning based Intrusion Detection System Models Against the Carlini-Wagner Attack.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

An Early Detection of Android Malware Using System Calls based Machine Learning Model.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Recent advances and challenges in uncertainty visualization: a survey.
J. Vis., 2021

NATICUSdroid: A malware detection framework for Android using native and custom permissions.
J. Inf. Secur. Appl., 2021

TLU-Net: A Deep Learning Approach for Automatic Steel Surface Defect Detection.
CoRR, 2021

Permission-Educator: App for Educating Users About Android Permissions.
Proceedings of the Intelligent Human Computer Interaction, 2021

2020
Link-Signature-Based Discriminatory Channel Estimation (LS-DCE) for Physical Layer Security in Stationary and Mobile OFDM Transceivers.
IEEE Trans. Veh. Technol., 2020

A Multimodal Facial Emotion Recognition Framework through the Fusion of Speech with Visible and Infrared Images.
Multimodal Technol. Interact., 2020

IVACS: Intelligent Voice Assistant for Coronavirus Disease (COVID-19) Self-Assessment.
CoRR, 2020

Machine Learning-based PHY-authentication for Mobile OFDM Transceivers.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Multimedia Transmission for V2X Communication over Legacy LTE-A Network Infrastructure - A Performance Evaluation.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Practice-Oriented Smartphone Security Exercises for Developing Cybersecurity Mindset in High School Students.
Proceedings of the IEEE International Conference on Teaching, 2020

A Novel Approach to Air Corridor Estimation and Visualization for Autonomous Multi-UAV Flights.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

A Study of Common Concerns Inhibiting Teacher Enactment of Computational Thinking into Project-based Mathematics and Career Technical Education.
Proceedings of the 12th International Conference on Computer Supported Education, 2020

2019
Application specific drone simulators: Recent advances and challenges.
Simul. Model. Pract. Theory, 2019

Recognition of Emotion Intensities Using Machine Learning Algorithms: A Comparative Study.
Sensors, 2019

A Near Real-Time Automatic Speaker Recognition Architecture for Voice-Based User Interface.
Mach. Learn. Knowl. Extr., 2019

A comprehensive micro unmanned aerial vehicle (UAV/Drone) forensic framework.
Digit. Investig., 2019

Effects of Voice-Based Synthetic Assistant on Performance of Emergency Care Provider in Training.
Int. J. Artif. Intell. Educ., 2019

Evolving Rule-Based Explainable Artificial Intelligence for Unmanned Aerial Vehicles.
IEEE Access, 2019

Development of Cognitive Training Program With EEG Headset.
IEEE Access, 2019

Machine Learning-based Primary User Emulation Attack Detection In Cognitive Radio Networks using Pattern Described Link-Signature (PDLS).
Proceedings of the 2019 Wireless Telecommunications Symposium, 2019

Performance Investigation of Polar Codes over Nakagami-M Fading and Real Wireless Channel Measurements.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

A Study on Recent Applications of Blockchain Technology in Vehicular Adhoc Network (VANET).
Proceedings of the National Cyber Summit, 2019

2018
Facial Emotion Recognition: A Survey and Real-World User Experiences in Mixed Reality.
Sensors, 2018

A low-cost solution for unmanned aerial vehicle navigation in a global positioning system-denied environment.
Int. J. Distributed Sens. Networks, 2018

Cyber-attack Mitigation and Impact Analysis for Low-power IoT Devices.
CoRR, 2018

Open Source Android Vulnerability Detection Tools: A Survey.
CoRR, 2018

Common Metrics to Benchmark Human-Machine Teams (HMT): A Review.
IEEE Access, 2018

An Upper Bound on PHY-Layer Key Generation for Secure Communications Over a Nakagami-M Fading Channel With Asymmetric Additive Noise.
IEEE Access, 2018

Security Enhancement of Over-the-Air Update for Connected Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Study on State-of-the-art Cloud Services Integration Capabilities with Autonomous Ground Vehicles.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Simulation and Analysis of DDoS Attack on Connected Autonomous Vehicular Network using OMNET++.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Detection and Identification of Background Sounds to Improvise Voice Interface in Critical Environments.
Proceedings of the 2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2018

A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

A Google Chromium Browser Extension for Detecting XSS Attack in HTML5 Based Websites.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

Real-World Man-in-the-Middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

A Web-Based Lightweight Testbed for Supporting Network Security Hands-on Labs.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

Remote Desktop Backdoor Implementation with Reverse TCP Payload Using Open Source Tools for Instructional Use.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

A Real-World Password Cracking Demonstration Using Open Source Tools for Instructional Use.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

Man-in-the-Middle (MITM) Attack Based Hijacking of HTTP Traffic Using Open Source Tools.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

Software Cracking: An Exploration of the Physical Realities of Software.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

2017
Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation.
Simul., 2017

A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN).
EAI Endorsed Trans. Security Safety, 2017

Multi-modal data fusion of Voice and EMG data for robotic control.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Modified RSSI Fingerprinting Algorithm with Reliability Factor for Wi-Fi based Indoor Navigation System.
Proceedings of the 6th International Conference on Sensor Networks (SENSORNETS 2017), 2017

Normal and anomalous traffic flow pattern analysis for organizational networks.
Proceedings of the 30th IEEE Canadian Conference on Electrical and Computer Engineering, 2017

2016
A Deep Learning Approach for Network Intrusion Detection System.
EAI Endorsed Trans. Security Safety, 2016

Comparative Analysis of Simulation and Real-World Energy Consumption for Battery-Life Estimation of Low-Power IoT (Internet of Things) Deployment in Varying Environmental Conditions Using Zolertia Z1 Motes.
Proceedings of the Sensor Systems and Software - 7th International Conference, S-Cube 2016, 2016

Distributed network traffic feature extraction for a real-time IDS.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

2015
An efficient compression scheme based on adaptive thresholding in wavelet domain using particle swarm optimization.
Signal Process. Image Commun., 2015

Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation.
EAI Endorsed Trans. Scalable Inf. Syst., 2015

GNSSim: An Open Source GNSS/GPS Framework for Unmanned Aerial Vehicular Network Simulation.
EAI Endorsed Trans. Mob. Commun. Appl., 2015

2014
UAVNet Simulation in UAVSim: A Performance Evaluation and Enhancement.
Proceedings of the Testbeds and Research Infrastructure: Development of Networks and Communities, 2014

Performance evaluation of VoIP broadcasting over LTE for varying speeds and distances of mobile nodes.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2014

2013
UAVSim: A simulation testbed for unmanned aerial vehicle network cyber security analysis.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2010
A novel approach for resource allocation in broadband access networks.
Proceedings of the ICWET '10 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 26, 2010


  Loading...