Jawad Ahmad

Orcid: 0000-0001-6289-8248

Affiliations:
  • Edinburgh Napier University, School of Computing, UK
  • Glasgow Caledonian University, School of Engineering and Built Environment, UK (PhD 2019)
  • HITEC University Taxila, Pakistan (former)


According to our database1, Jawad Ahmad authored at least 159 papers between 2015 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Generative adversarial networks-enabled anomaly detection systems: A survey.
Expert Syst. Appl., 2026

2025
RFiDAR: Contactless RFID and Radar Data Fusion for Enhanced Human Activity Recognition.
IEEE Internet Things Mag., July, 2025

A Practical Distortion Simulator for Screen-Shooting Resilient Image Watermarking in Consumer Electronic Applications.
IEEE Trans. Consumer Electron., May, 2025

DDCM: Cracking Anonymized Facial Images Using Denoising Diffusion Cryptanalytic Model.
IEEE Trans. Consumer Electron., May, 2025

Clustering-Based Resource Management for Consumer Cost Optimization in IoT Edge Computing Environments.
IEEE Trans. Consumer Electron., May, 2025

Privacy-Preserving Credit Card Approval Using Homomorphic SVM: Toward Secure Inference in FinTech Applications.
CoRR, May, 2025

A Novel Feature-Aware Chaotic Image Encryption Scheme For Data Security and Privacy in IoT and Edge Networks.
CoRR, May, 2025

Nash Equilibrium Between Consumer Electronic Devices and DoS Attacker for Distributed IoT-enabled RSE Systems.
CoRR, April, 2025

Efficient IoT Intrusion Detection with an Improved Attention-Based CNN-BiLSTM Architecture.
CoRR, March, 2025

X-Cross: Image Encryption Featuring Novel Dual-Layer Block Permutation and Dynamic Substitution Techniques.
CoRR, March, 2025

A Chaotic Image Encryption Scheme Using Novel Geometric Block Permutation and Dynamic Substitution.
CoRR, March, 2025

Performance Evaluation of Threshold Signing Schemes in Cryptography.
CoRR, March, 2025

A Hybrid Neural Network with Smart Skip Connections for High-Precision, Low-Latency EMG-Based Hand Gesture Recognition.
CoRR, March, 2025

Image Encryption Using DNA Encoding, Snake Permutation and Chaotic Substitution Techniques.
CoRR, March, 2025

Sustainable Environmental Monitoring: Multistage Fusion Algorithm for Remotely Sensed Underwater Super-Resolution Image Enhancement and Classification.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2025

A Stochastic Prototypical Network for Few-Shot Intrusion Detection in CAN-Based IoV Network.
IEEE Open J. Commun. Soc., 2025

Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques.
Mach. Learn. Knowl. Extr., 2025

An interpretable deep learning framework for intrusion detection in industrial Internet of Things.
Internet Things, 2025

Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE.
IACR Cryptol. ePrint Arch., 2025

Decentralized EEG-based detection of major depressive disorder via transformer architectures and split learning.
Frontiers Comput. Neurosci., 2025

Generalizing location-centric variations to enhance contactless human activity recognition.
Frontiers Comput. Neurosci., 2025

Privacy-enhanced skin disease classification: integrating federated learning in an IoT-enabled edge computing.
Frontiers Comput. Sci., 2025

A novel transformer-based explainable AI approach using SHAP for intrusion detection in vehicular ad hoc networks.
Comput. Networks, 2025

Enhancing Security in DNP3 Communication for Smart Grids: A Segmented Neural Network Approach.
IEEE Access, 2025

Efficient Downward Routing in IoT Networks: A Novel Leaf-Centric Mode for RPL.
Proceedings of the International Wireless Communications and Mobile Computing, 2025

A Lightweight and Robust Security Mechanism for RPL-based Resource-Constrained IoT Networks.
Proceedings of the International Wireless Communications and Mobile Computing, 2025

2024
Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology.
IEEE Trans. Consumer Electron., November, 2024

ML-FAS: Multi-Level Face Anonymization Scheme and Its Application to E-Commerce Systems.
IEEE Trans. Consumer Electron., August, 2024

Sustainable collaboration: Federated learning for environmentally conscious forest fire classification in Green Internet of Things (IoT).
Internet Things, April, 2024

Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0.
IEEE Trans. Consumer Electron., February, 2024

ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption.
Expert Syst. Appl., February, 2024

DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm.
J. Netw. Comput. Appl., January, 2024

HLSBD2: a quantum secure hybrid level source based data deduplication for the cloud.
J. Ambient Intell. Humaniz. Comput., January, 2024

A Single Channel-Based Neonatal Sleep-Wake Classification using Hjorth Parameters and Improved Gradient Boosting.
CoRR, 2024

TIPS: Threat Sharing Information Platform for Enhanced Security.
CoRR, 2024

RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations.
CoRR, 2024

A novel medical image data protection scheme for smart healthcare system.
CAAI Trans. Intell. Technol., 2024

SACNN-IDS: A self-attention convolutional neural network for intrusion detection in industrial internet of things.
CAAI Trans. Intell. Technol., 2024

A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection.
IEEE Access, 2024

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model With Learnable Skip Connections for Efficient Botnet Attack Detection in IoT.
IEEE Access, 2024

Multi-Modal Features Representation-Based Convolutional Neural Network Model for Malicious Website Detection.
IEEE Access, 2024

UAVs and Blockchain Synergy: Enabling Secure Reputation-Based Federated Learning in Smart Cities.
IEEE Access, 2024

QoS Improvement using Federated Learning-based Position Prediction for mobile IoT.
Proceedings of the 10th IEEE World Forum on Internet of Things, 2024

Enhancing AI-Generated Image Detection with a Novel Approach and Comparative Analysis.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

Attention-Based Hybrid Deep Learning Model for Intrusion Detection in IIoT Networks.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 28th International Conference KES-2024, 2024

A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 28th International Conference KES-2024, 2024

Empowering Healthcare with Deep Learning: An Application for Early Detection of Skin Cancer.
Proceedings of the Intelligent Systems and Pattern Recognition, 2024

Image Encryption in Frequency Domain Using Hybrid Chaotic Maps, Hashing, and Lifting Wavelet Transform.
Proceedings of the Intelligent Systems and Pattern Recognition, 2024

ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance.
Proceedings of the International Conference on Information Networking, 2024

ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records.
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024

Image Encryption Using A Novel Orbital-Extraction Permutation Technique and Chaotic Key Generation.
Proceedings of the 7th IEEE International Conference on Advanced Technologies, 2024

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography.
Proceedings of the 7th IEEE International Conference on Advanced Technologies, 2024

2023
An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant.
IEEE Trans. Intell. Transp. Syst., December, 2023

Enhancing IoT network security through deep learning-powered Intrusion Detection System.
Internet Things, December, 2023

TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks.
Comput. Networks, December, 2023

A novel routing optimization strategy based on reinforcement learning in perception layer networks.
Comput. Networks, December, 2023

AI-Enabled Traffic Control Prioritization in Software-Defined IoT Networks for Smart Agriculture.
Sensors, October, 2023

A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder.
ACM Trans. Multim. Comput. Commun. Appl., 2023

An Efficient Automated Technique for Classification of Breast Cancer Using Deep Ensemble Model.
Comput. Syst. Sci. Eng., 2023

An Automated Classification Technique for COVID-19 Using Optimized Deep Learning Features.
Comput. Syst. Sci. Eng., 2023

An Immutable Framework for Smart Healthcare Using Blockchain Technology.
Comput. Syst. Sci. Eng., 2023

Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm.
Comput. Syst. Sci. Eng., 2023

A Novel Internet of Medical Thing Cryptosystem Based on Jigsaw Transformation and Ikeda Chaotic Map.
Comput. Syst. Sci. Eng., 2023

Noise-Crypt: Image Encryption with Non-linear Noise, Hybrid Chaotic Maps, and Hashing.
CoRR, 2023

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.
CoRR, 2023

Resolving the Decreased Rank Attack in RPL's IoT Networks.
CoRR, 2023

MAGRU-IDS: A Multi-Head Attention-Based Gated Recurrent Unit for Intrusion Detection in IIoT Networks.
IEEE Access, 2023

ABDNN-IDS: Attention-Based Deep Neural Networks for Intrusion Detection in Industrial IoT.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Distributed Twins in Edge Computing: Blockchain and IOTA.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Contactless Human Activity Recognition using Deep Learning with Flexible and Scalable Software Define Radio.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Contactless Breathing Waveform Detection Through RF Sensing: Radar vs. Wi-Fi Techniques.
Proceedings of the Tenth IEEE International Conference on Communications and Networking, 2023

PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

2022
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations.
Wirel. Pers. Commun., 2022

Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme.
Wirel. Pers. Commun., 2022

A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis.
IEEE Trans. Netw. Sci. Eng., 2022

Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network.
IEEE Trans. Ind. Informatics, 2022

A new color image encryption technique using DNA computing and Chaos-based substitution box.
Soft Comput., 2022

HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.
Sensors, 2022

A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering.
Sensors, 2022

Multiple Participants' Discrete Activity Recognition in a Well-Controlled Environment Using Universal Software Radio Peripheral Wireless Sensing.
Sensors, 2022

Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model.
Sensors, 2022

Classification of Skin Cancer Lesions Using Explainable Deep Learning.
Sensors, 2022

Ransomware: Analysing the Impact on Windows Active Directory Domain Services.
Sensors, 2022

Chest X-ray Classification for the Detection of COVID-19 Using Deep Learning Techniques.
Sensors, 2022

Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.
Sensors, 2022

Semantic Segmentation and Edge Detection - Approach to Road Detection in Very High Resolution Satellite Images.
Remote. Sens., 2022

Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform.
Remote. Sens., 2022

A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map.
Multim. Tools Appl., 2022

DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things.
J. King Saud Univ. Comput. Inf. Sci., 2022

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.
Entropy, 2022

A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution.
Entropy, 2022

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.
Complex., 2022

A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution.
IEEE Access, 2022

A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
Detection of COVID-19 Using Transfer Learning and Grad-CAM Visualization on Indigenously Collected X-ray Dataset.
Sensors, 2021

Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions.
Sensors, 2021

Granular Data Access Control with a Patient-Centric Policy Update for Healthcare.
Sensors, 2021

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT.
Sensors, 2021

An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks.
Sensors, 2021

An Efficient Approach Based on Privacy-Preserving Deep Learning for Satellite Image Classification.
Remote. Sens., 2021

A blockchain-based architecture for secure and trustworthy operations in the industrial Internet of Things.
J. Ind. Inf. Integr., 2021

Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions.
Trans. Emerg. Telecommun. Technol., 2021

A novel CNN-LSTM-based approach to predict urban expansion.
Ecol. Informatics, 2021

Evolution of Target Localization in Wireless Sensor Network (WSN): A Review.
CoRR, 2021

Intrusion Detection using Machine Learning Techniques: An Experimental Comparison.
CoRR, 2021

GuideMe: A Mobile Application based on Global Positioning System and Object Recognition Towards a Smart Tourist Guide.
CoRR, 2021

Voting Classifier-based Intrusion Detection for IoT Networks.
CoRR, 2021

Browsers' Private Mode: Is It What We Were Promised?
Comput., 2021

Detecting the Security Level of Various Cryptosystems Using Machine Learning Models.
IEEE Access, 2021

A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things.
IEEE Access, 2021

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

On the Inadequacy of Multimodal Maps for Cryptographic Hash Applications with Phase-Space Modulation.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

Deep Learning Models for Intelligent Healthcare: Implementation and Challenges.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

Comparing the Performance of Different Classifiers for Posture Detection.
Proceedings of the Body Area Networks. Smart IoT and Big Data for Intelligent Health Management, 2021

Detecting Alzheimer's Disease Using Machine Learning Methods.
Proceedings of the Body Area Networks. Smart IoT and Big Data for Intelligent Health Management, 2021

2020
A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping.
Symmetry, 2020

Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning.
Sensors, 2020

A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos.
Remote. Sens., 2020

Energy demand forecasting of buildings using random neural networks.
J. Intell. Fuzzy Syst., 2020

Chaos-based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks.
Trans. Emerg. Telecommun. Technol., 2020

A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map.
Entropy, 2020

Deep Learning Techniques for Future Intelligent Cross-Media Retrieval.
CoRR, 2020

An authentication protocol based on chaos and zero knowledge proof.
CoRR, 2020

A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids.
Cogn. Comput., 2020

Robust Image Hashing Scheme using Laplacian Pyramids.
Comput. Electr. Eng., 2020

Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution.
IEEE Access, 2020

A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network.
IEEE Access, 2020

DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption.
IEEE Access, 2020

EEG-Based Neonatal Sleep-Wake Classification Using Multilayer Perceptron Neural Network.
IEEE Access, 2020

DRaNN: A Deep Random Neural Network Model for Intrusion Detection in Industrial IoT.
Proceedings of the 2020 International Conference on UK-China Emerging Technologies, 2020

A Novel Approach for Classifying Diabetes' Patients Based on Imputation and Machine Learning.
Proceedings of the 2020 International Conference on UK-China Emerging Technologies, 2020

5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum.
Proceedings of the Intelligent Computing, 2020

Intrusion Detection and Attack Classification Leveraging Machine Learning Technique.
Proceedings of the 14th International Conference on Innovations in Information Technology, 2020

2019
Chaos based efficient selective image encryption.
Multidimens. Syst. Signal Process., 2019

DNA key based visual chaotic image encryption.
J. Intell. Fuzzy Syst., 2019

A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids.
Entropy, 2019

RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection.
Comput., 2019

Intrusion Detection Using Swarm Intelligence.
Proceedings of the UK/China Emerging Technologies, 2019

A Partial Ligt-weight Image Encryption Scheme.
Proceedings of the UK/China Emerging Technologies, 2019

Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2019

2018
A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation.
Neural Comput. Appl., 2018

Real-Time Lightweight Chaotic Encryption for 5G IoT Enabled Lip-Reading Driven Secure Hearing-Aid.
CoRR, 2018

An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera.
Proceedings of the Intelligent Systems and Applications, 2018

Detection and prevention of Black Hole Attacks in IOT & WSN.
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018

A Novel Random Neural Network Based Approach for Intrusion Detection Systems.
Proceedings of the 2018 10th Computer Science and Electronic Engineering Conference, 2018

DNA Sequence Based Medical Image Encryption Scheme.
Proceedings of the 2018 10th Computer Science and Electronic Engineering Conference, 2018

Secure Occupancy Monitoring System for IoT Using Lightweight Intertwining Logistic Map.
Proceedings of the 2018 10th Computer Science and Electronic Engineering Conference, 2018

An Intelligent Real-Time Occupancy Monitoring System with Enhanced Encryption and Privacy.
Proceedings of the 17th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2018

2017
A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices.
Neural Comput. Appl., 2017

A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S<sub>8</sub> permutation.
J. Intell. Fuzzy Syst., 2017

An Improved Image Encryption Scheme Based on a Non-Linear Chaotic Algorithm and Substitution Boxes.
Informatica, 2017

Energy demand prediction through novel random neural network predictor for large non-domestic buildings.
Proceedings of the 2017 Annual IEEE International Systems Conference, 2017

A new technique for designing 8 × 8 substitution box for image encryption applications.
Proceedings of the 2017 9th Computer Science and Electronic Engineering Conference, 2017

2016
A secure image encryption scheme based on chaotic maps and affine transformation.
Multim. Tools Appl., 2016

2015
An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes.
Wirel. Pers. Commun., 2015


  Loading...