Computer Programming-I
Cyber-Physical Systems Security
Computer Programming-II
Discrete Mathematics for Computing
Data Communications and Computer Networks
Cooperative Training
University of Peshawar
Peshawar , Pakistan
University of Surrey
Surrey , Britain
4/26/2013 - 12/31/2020
Peshawar ,Pakistan
1/1/2021 - 7/31/2021
Pak-Austria Fachhochschule Institute of Applied Sciences and Technology
Haripur ,Pakistan
8/29/2021 - 1/23/2024
Prince Sultan University
Riyadh,Saudi Arabia
Scientific Reports 2026-12-01
Secure, scalable, and interoperable healthcare data exchange using layer-2 ZK-rollups, smart contracts, and IPFS
A hybrid machine learning approach for detecting DDoS attacks in software-defined networks
Computers and Security 2026-02-01
SETPA: Structural evasion techniques for PDF malware detection systems
Fractals 2026-01-01
QUALITATIVE ANALYSIS AND NUMERICAL SIMULATIONS OF THE CAPUTO FRACTIONAL POROUS MEDIUM EQUATION IN (n + 1)-DIMENSIONS
Frontiers in Artificial Intelligence 2026-01-01
LSML-SF: a lightweight stacked ML approach for spreading factor allocation in mobile IoT LoRaWAN networks
A COMPREHENSIVE QUALITATIVE ANALYSIS OF A NOVEL EBOLA VIRUS DISEASE
Scientific Reports 2025-12-01
Multi-domain Urdu fake news detection using pre-trained ensemble model
Benchmarking Hook and Bait Urdu news dataset for domain-agnostic and multilingual fake news detection using large language models
An attention-enhanced few-shot model for event detection in online social networks
Information (Switzerland) 2025-12-01
GenIIoT: Generative Models Aided Proactive Fault Management in Industrial Internet of Things
SoftwareX 2025-12-01
NER-FAM: Named entity recognition with faceted aggregation for multimedia web search engines
Reinforcement-based leveraging transfer learning for multiclass optical coherence tomography images classification
GAINSeq: glaucoma pre-symptomatic detection using machine learning models driven by next-generation sequencing data
Complex and Intelligent Systems 2025-12-01
Advancing Urdu named entity recognition: deep learning for aspect targeting
Retraction Note: DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets (Scientific Reports, (2024), 14, 1, (13839), 10.1038/s41598-024-64419-4)
GEAAD: generating evasive adversarial attacks against android malware defense
Mathematical and Computational Applications 2025-08-01
A Comparative Analysis of Numerical Methods for Mathematical Modelling of Intravascular Drug Concentrations Using a Two-Compartment Pharmacokinetic Model
European Journal of Pure and Applied Mathematics 2025-07-01
Stability and Sensitivity Analysis of Cyberattack Propagation Models in Computer Network
Machine Learning-Enhanced Simulation of Multi-Vector Email Malware Spread in Organizational Networks
Numerical and Statistical Sensitivity Analysis of Deterministic and Stochastic SVEITR Model for Measles Infection
Results in Engineering 2025-06-01
Enhancing Wi-Fi 6 spectrum access control with a heuristic OFDMA back-off mechanism
Journal of Visualized Experiments 2025-06-01
Augmented Multimodal Fusion for Optimized Brain Tumor Detection: Evaluation and Comparative Analysis
Computer Networks 2025-05-01
The Scalable Octagonal-Cross-By-Pass-Torus topology for the on-chip-communication
Frontiers in Blockchain 2025-01-01
Blockchain-based access management framework for interoperable digital twins in industrial IoT
Frontiers in Computer Science 2025-01-01
A hybrid voice cloning for inclusive education in low-resource environments
Journal of Network and Computer Applications 2025-01-01
FCG-MFD: Benchmark function call graph-based dataset for malware family detection
IEEE Access 2025-01-01
FLSH: A Framework Leveraging Similarity Hashing for Android Malware and Variant Detection
Next-Generation Automation in Neuro-Oncology: Advanced Neural Networks for MRI-Based Brain Tumor Segmentation and Classification
IEEE Transactions on Network Science and Engineering 2025-01-01
UAV-NIDD: A Dynamic Dataset for Cybersecurity and Intrusion Detection in UAV Networks
Frontiers in Communications and Networks 2025-01-01
XGBoost-driven adaptive spreading factor allocation for energy-efficient LoRaWAN networks
2025 4th International Conference on Communication, Computing and Digital Systems, C-CODE 2025 2025-01-01
Urdu Aspect-Category-Opinion-Sentiment (UACOS) Quadruple Extraction: A Transfer Learning Approach
Machine learning-based spreading factor optimization in LoRaWAN networks
Frontiers in Education 2025-01-01
Implementing artificial intelligence in academic and administrative processes through responsible strategic leadership in the higher education institutions
Computers, Materials and Continua 2025-01-01
A Comprehensive Review of Face Detection/Recognition Algorithms and Competitive Datasets to Optimize Machine Vision
PeerJ Computer Science 2025-01-01
Estimating compressive strength of CO2 incorporated concrete with data augmentation and explainable regression modeling
IEEE Transactions on Instrumentation and Measurement 2025-01-01
SpermDet: Structure-Aware Network with Local Context Enhancement and Dual-Path Fusion for Object Detection in Sperm Images
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST 2025-01-01
Lightweight Multi-tier IDS for UAV Networks: Enhancing UAV Zero-Day Attack Detection with Honeypot Threat Intelligence
Journal of Imaging 2024-12-01
MediScan: A Framework of U-Health and Prognostic AI Assessment on Medical Imaging
AI (Switzerland) 2024-12-01
Seeing Beyond Noise: Improving Cryptocurrency Forecasting with Linear Bias Correction
Scientific Reports 2024-12-01
DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets
Technologies 2024-11-01
Fake News Detection Revisited: An Extensive Review of Theoretical Frameworks, Dataset Assessments, Model Constraints, and Forward-Looking Research Agendas
Journal of King Saud University - Computer and Information Sciences 2024-11-01
Enhanced UrduAspectNet: Leveraging Biaffine Attention for superior Aspect-Based Sentiment Analysis
SoftwareX 2024-09-01
End-to-end vertical web search pseudo relevance feedback queries recommendation software
Technologies 2024-09-01
Blockchain-Based Healthcare Records Management Framework: Enhancing Security, Privacy, and Interoperability
Algorithms 2024-08-01
An Efficient AdaBoost Algorithm for Enhancing Skin Cancer Detection and Classification
Technologies 2024-08-01
iKern: Advanced Intrusion Detection and Prevention at the Kernel Level Using eBPF
Mathematics 2024-07-01
Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation
Technologies 2024-07-01
Securing Blockchain-Based Supply Chain Management: Textual Data Encryption and Access Control
Expert Systems with Applications 2024-03-15
HDA-IDS: A Hybrid DoS Attacks Intrusion Detection System for IoT by using semi-supervised CL-GAN
Journal of Epidemiology and Global Health 2024-03-01
Dynamics of Malaria Incidence in Khyber Pakhtunkhwa, Pakistan: Unveiling Rapid Growth Patterns and Forecasting Future Trends
Proceedings - 2024 8th International Conference on Cryptography, Security and Privacy, CSP 2024 2024-01-01
Ransomware Defense Empowered: Deep Learning for Real-Time Family Identification with a Proprietary Dataset
2024 7th World Conference on Computing and Communication Technologies, WCCCT 2024 2024-01-01
Content Based Email Spam Filtering and Detection using Hybrid Supervised Learning Approach
IEEE Access 2024-01-01
TransResUNet: Revolutionizing Glioma Brain Tumor Segmentation Through Transformer-Enhanced Residual UNet
Cost-Effective Resilience: A Comprehensive Survey and Tutorial on Assessing Open-Source Cybersecurity Tools for Multi-Tiered Defense
IEEE Transactions on Consumer Electronics 2024-01-01
PDQN: User Preference-Based Charging Station Recommendation
XEmoAccent: Embracing Diversity in Cross-Accent Emotion Recognition Using Deep Learning
PeerJ Computer Science 2024-01-01
A two-phase transfer learning framework for gastrointestinal diseases classification
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST 2024-01-01
Quantum Computing Challenges and Impact on Cyber Security
Proceedings - IEEE Global Communications Conference, GLOBECOM 2024-01-01
Vehicular Intrusion Detection System Based on Hybrid Quantum Neural Networks
Computers, Materials and Continua 2024-01-01
An Assisted Diagnosis of Alzheimer’s Disease Incorporating Attention Mechanisms Med-3D Transfer Modeling
Novel Prognostic Methods for System Degradation Using LSTM
Federated Learning for Sarcasm Detection: A Study of Attention-Enhanced BILSTM, GRU, and LSTM Architectures
A Concise and Varied Visual Features-Based Image Captioning Model with Visual Selection
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics 2024-01-01
An Urban Electric Vehicle Charging System via Hybrid Heterogeneous Modes
Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle
Journal of Network and Computer Applications 2023-10-01
Autonomous valet parking optimization with two-step reservation and pricing strategy
PLoS ONE 2023-09-01
BlockAuth: A blockchain-based framework for secure vehicle authentication and authorization
SoftwareX 2023-02-01
AMED: Aggregated multimedia exploratory and discovery search software
Communication, Computation and Perception Technologies for Internet of Vehicles 2023-01-01
Security and Privacy-Preserving for Automated Electric Vehicle
PLoS ONE 2023-01-01
An SUI-based approach to explore visual search results cluster-graphs
IEEE Access 2023-01-01
Simulative Survey of Flooding Attacks in Intermittently Connected Vehicular Delay Tolerant Networks
PeerJ Computer Science 2023-01-01
I-Cubid: a nonlinear cubic graph-based approach to visualize and in-depth browse Flickr image results
IEEE Geoscience and Remote Sensing Letters 2023-01-01
GAB-Net: A Robust Detector for Remote Sensing Object Detection Under Dramatic Scale Variation and Complex Backgrounds
Proceedings - 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom/BigDataSE/CSE/EUC/iSCI 2023 2023-01-01
A Scalable Pattern Matching Implementation on Hardware using Data Level Parallelism
18th IEEE International Conference on Emerging Technologies, ICET 2023 2023-01-01
Rekhta: An Open-Source High-Quality Urdu Text-to-Speech Synthesis Dataset
FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks
Fingerprint image enhancement using multiple filters
Computers, Materials and Continua 2023-01-01
Appearance Based Dynamic Hand Gesture Recognition Using 3D Separable Convolutional Neural Network
Sampling Fingerprints From Multimedia Content Resource Clusters
Energies 2022-12-01
Electric Vehicle Charging Modes, Technologies and Applications of Smart Charging
Sensors 2022-12-01
Improving Convergence Speed of Bat Algorithm Using Multiple Pulse Emissions along Multiple Directions
IEEE Access 2022-01-01
An Explanatory Study on User Behavior in Discovering Aggregated Multimedia Web Content
Applied Sciences (Switzerland) 2022-01-01
Toward Efficient Mobile Electric Vehicle Charging under Heterogeneous Battery Switching Technology
PeerJ Computer Science 2022-01-01
Digital society social interactions and trust analysis model
Journal of Sensors 2022-01-01
An Energy-Efficient Framework for WBAN in Health Care Domain
Electronics (Switzerland) 2021-12-01
A privacy preserved, trust relationship (Ptr) model for internet of vehicles
Applied Sciences (Switzerland) 2021-07-02
Research and applied perspective to blockchain technology: A comprehensive survey
IET Intelligent Transport Systems 2021-07-01
An improved multiple manoeuver management protocol for platoon mobility in vehicular ad hoc networks
Journal of Network and Computer Applications 2021-02-01
From smart parking towards autonomous valet parking: A survey, challenges and future Works
IEEE Access 2021-01-01
Proof of Pseudonym: Blockchain-Based Privacy Preserving Protocol for Intelligent Transport System
IEEE Transactions on Automation Science and Engineering 2020-10-01
Mobile Charging as a Service: A Reservation-Based Approach
IEEE Transactions on Vehicular Technology 2020-06-01
Towards efficient battery swapping service operation under battery heterogeneity
International Journal of Advanced Computer Science and Applications 2020-01-01
A flood forecasting model based on wireless sensor and actor networks
IEEE Access 2020-01-01
XDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things
Journal of Network and Computer Applications 2019-12-01
BCON: Blockchain based access CONtrol across multiple conflict of interest domains
IET Networks 2019-09-01
E2MR: Energy-efficient multipath routing protocol for underwater wireless sensor networks
Computers and Security 2019-09-01
Blockchain based permission delegation and access control in Internet of Things (BACI)
IEEE Systems Journal 2019-09-01
A Decentralized Deadline-Driven Electric Vehicle Charging Recommendation
IEEE Internet of Things Journal 2019-08-01
Guest Editorial Special Issue on Toward Securing Internet of Connected Vehicles (IoV) from Virtual Vehicle Hijacking
PLoS ONE 2019-08-01
ASPA: Advanced Strong Pseudonym based Authentication in Intelligent Transport System
Future Generation Computer Systems 2019-04-01
Privacy by Architecture Pseudonym Framework for Delay Tolerant Network
Peer-to-Peer Networking and Applications 2019-03-01
DSCB: Dual sink approach using clustering in body area network
Lecture Notes in Networks and Systems 2019-01-01
Flood-Prediction Techniques Based on Geographical Information System Using Wireless Sensor Networks
IEEE Access 2019-01-01
Robust and Efficient Energy Harvested-Aware Routing Protocol with Clustering Approach in Body Area Networks
FRID: Flood attack mitigation using resources efficient intrusion detection techniques in delay tolerant networks
IET Intelligent Transport Systems 2019-01-01
Beacon trust management system and fake data detection in vehicular ad-hoc networks
Eurasip Journal on Wireless Communications and Networking 2018-12-01
A survey of local/cooperative-based malicious information detection techniques in VANETs
Software Services and Cyber Infrastructure 2018-11-15
Intelligent transportation systems enabled ict framework for electric vehicle charging in smart city
Journal of Renewable and Sustainable Energy 2018-11-01
Energy management strategy for integrating photovoltaic energy in AC microgrid
Applied Sciences (Switzerland) 2018-10-17
Issues, challenges, and research opportunities in intelligent transport system for security and privacy
Future Generation Computer Systems 2018-10-01
Multi-criteria based zone head selection in Internet of Things based wireless sensor networks
IET Wireless Sensor Systems 2018-08-01
Radius-based multipath courier node routing protocol for acoustic communications
Computers and Security 2018-08-01
A taxonomy on misbehaving nodes in delay tolerant networks
IEEE Wireless Communications and Networking Conference, WCNC 2018-06-08
Towards autonomy: Cost-effective scheduling for long-range autonomous valet parking (LAVP)
Systems 2018-04-01
An EV charging management system concerning drivers' trip duration and mobility uncertainty
Vehicular Communications 2018-04-01
A comparative study of scenario-driven multi-hop broadcast protocols for VANETs
Metrology and Measurement Systems 2018-01-01
Statistical estimation and mathematical modelling of tropospheric radio refractivity based on meteorological data
IEEE Access 2018-01-01
SPATA: Strong pseudonym-based authentication in intelligent transport system
Wireless Communications and Mobile Computing 2018-01-01
Industrial Internet of Things Based Efficient and Reliable Data Dissemination Solution for Vehicular Ad Hoc Networks
Science China Information Sciences 2017-10-01
Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey
Proceedings of the 2017 2nd Workshop on Recent Trends in Telecommunications Research, RTTR 2017 2017-03-27
A comparative simulation based analysis of location based routing protocols in underwater wireless sensor networks
Mathematical Problems in Engineering 2017-01-01
Multicriteria Based Next Forwarder Selection for Data Dissemination in Vehicular Ad Hoc Networks Using Analytical Network Process
Journal of Sensors 2017-01-01
A survey of routing issues and associated protocols in underwater wireless sensor networks
Part A 2016-01-01
Design and development of a data logger based on IEEE 802.15.4/ZigBee and GSM
Proceedings of the Pakistan Academy of Sciences 2015-09-01
QoS assurance in higher mobility mobile Ad Hoc networks using multipath admission control protocol
Proceedings of the Pakistan Academy of Sciences 2015-01-01
Speaker-Dependent human emotion recognition in unimodal and bimodal scenarios
Bimodal human emotion classification in the Speaker-Dependent scenario
IEEE Wireless Communications Letters 2013-01-01
A reliable and efficient geographic routing scheme for delay/disruption tolerant networks
IEEE Wireless Communications and Networking Conference, WCNC 2012-08-01
A mobility vector based routing algorithm for delay tolerant networks using history geographic information
Proceedings - 2011 9th International Conference on Frontiers of Information Technology, FIT 2011 2011-12-01
Optimizing predictive prefetching in multi-client single-server environment
2011 18th IEEE Symposium on Communications and Vehicular Technology in the Benelux, SCVT 2011 2011-12-01
Flow aware admission control-multipath protocol with multiple constraints (FAAC-MM) for assurance of multiple QoS metrics in MANETs
Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference 2011-12-01
QoS assurance in MANETs using flow aware admission control - Multipath protocol
Proceedings of the IADIS International Conferences - Informatics 2011, Wireless Applications and Computing 2011, Telecommunications, Networks and Systems 2011, Part of the IADIS, MCCSIS 2011 2011-12-01
QoS provisioning in contention aware MANETs using flow-aware admission control protocol
Proceedings - International Conference on Computer Networks and Information Technology 2011-11-07
Reducing user latency in web prefetching using integrated techniques
2011 9th Annual International Conference on Privacy, Security and Trust, PST 2011 2011-08-31
Pseudonymised communication in delay tolerant networks
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2010-12-01
ID Based Cryptography and anonymity in Delay/Disruption Tolerant Networks
IWSSC'09 - 2009 International Workshop on Satellite and Space Communications - Conference Proceedings 2009-12-11
Security analysis for delay/disruption tolerant satellite and sensor networks
Cyber Security, Blockchain Technology, Privacy, Intelligent Transport System, ICT interventions in SDG, E governance