AA
- Dr. Adnan is an enthusiastic and dedicated professional with extensive research & development (R&D) experience both in industry and academia. He has a proven track record of high impact published research & inventions such as US Patents, Tier1/Q1 Journals, IEEE Transactions, IEEE Reputable Magazines, Book Chapters, Conferences and Conference proceedings, and has served as Project Investigator (PI) and Co-PI of multi-million dollars funding. He was recently ranked among the top 2% of scientists globally by the Stanford Institute, USA. He is strong in academic research coupled with industrial experience (i.e., his research has been pushed to commercial products, frameworks, and patents). He is a Senior Member, IEEE, Professional Member, ACM, and member of the technical program committees and editorial boards for various renown IEEE transactions, Journals, and conferences. He strongly believes in honesty, humbleness, adaptability, and commitment.
- With 15+ years in R&D, teaching, and academic leadership, I have thrived in diverse settings, advancing from Lecturer to Associate Professor and visiting Professor at top 100 and 500 QS-ranked international universities. He has taught and mentored at both undergraduate and postgraduate levels, supervised Master's and PhD research, and designed outcome-based curricula for programs in Cybersecurity and Ethical Hacking, adhering to ACM/IEEE standards. His leadership has been instrumental in achieving international accreditations like ABET and in developing bachelor's programs in Data & Cybersecurity, as well as master's programs in AI & Cybersecurity and Information Security. These initiatives meet the growing demand for expertise in digital security and AI, empowering students to lead in these emerging fields.
- Demonstrated history of R&D and working experience in diverse cyber security and AI domains to majorly contribute to (i.e., Scientific Leadership, Development, Implementation, Internal coordination, Planning, Designing, Specific work package leading & implementation, writing and complete evaluation) of acquiring varied H2020-ICT-2018-2020, Vinnova, ITEA3, ICT national and international funding proposals and commercial products. Turning research Idea into a proposal worth funding, writing various funding proposals, and working in close collaboration with diverse Swedish & international industry key partners such as Volvo, ABB, Ericson, and international key ICT players for instance, Cisco and IBM.
Additional profile links
Publications
- Comparative study of SPI success factors in global and in-house environment for large-scale software companies
- 5G/SDR-Assisted Cognitive Communication in UAV Swarms: Architecture and Applications
- DHSDJArch: An Efficient Design of Distributed Heterogeneous Stream-Disk Join Architecture
- DHSDJArch: An Efficient Design of Distributed Heterogeneous Stream-Disk Join Architecture
- Enhancing Performance of Movie Recommendations Using LSTM With Meta Path Analysis
- Enhancing Performance of Movie Recommendations Using LSTM With Meta Path Analysis
- Multi-IsnadSet MIS for Sahih Muslim Hadith with chain of Narrators, based on multiple ISNAD.
- DWSD: Dense Waste Segmentation Dataset
- DWSD: Dense Waste Segmentation Dataset
- Multi-IsnadSet MIS for Sahih Muslim Hadith with chain of Narrators, based on multiple ISNAD.
- Optimizing Document Classification: Unleashing the Power of Genetic Algorithms
- Exploring the Significance of Publication-Age-Based Parameters for Evaluating Researcher Impact
- Risk Factors and Practices for the Development of Open Source Software From Developers' Perspective
- SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework
- Optimizing Document Classification: Unleashing the Power of Genetic Algorithms
- Exploring the Significance of Publication-Age-Based Parameters for Evaluating Researcher Impact
- Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning
- MalDroid: Secure DL‐enabled intelligent malware detection framework
- Secure Distributed Mobile Volunteer Computing with Android
- Criminal Behavior Identification Using Social Media Forensics
- Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning
- Analyzing the Impact of Active Attack on the Performance of the AMCTD Protocol in Underwater Wireless Sensor Networks
- Toward Performance and Energy-Efficient Edge-of-Things
- The Integration of WoT and Edge Computing: Issues and Challenges
- A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks
- DHSDJArch: An Efficient Design of Distributed Heterogeneous Stream-Disk Join Architecture
- Comprehensive Evaluation of Publication and Citation Metrics for Quantifying Scholarly Influence
- SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework
- The Impact of Mitigation Strategies for Socio-Cultural Distance Issues in GSD: An Empirical Study
- Exploring the Significance of Publication-Age-Based Parameters for Evaluating Researcher Impact
- Optimizing Document Classification: Unleashing the Power of Genetic Algorithms
- Deep Learning-Based Classification of Chest Diseases Using X-rays, CT Scans, and Cough Sound Images
- An Empirical Study to Investigate the Impact of Factors Influencing Knowledge Sharing in Virtual Teams
- Evaluating the Effectiveness of Author-Count Based Metrics in Measuring Scientific Contributions
- Enhancing Performance of Movie Recommendations Using LSTM With Meta Path Analysis
- Risk Factors and Practices for the Development of Open Source Software From Developers' Perspective
- SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework
- Risk Factors and Practices for the Development of Open Source Software From Developers' Perspective
- Deep AI-Powered Cyber Threat Analysis in IIoT
- Machine Learning Approach for Effective Ranking of Researcher Assessment Parameters
- SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework
- LPN-IDD: A Lightweight Pyramid Network for Image Deraining and Detection
- Comparative study of SPI success factors in global and in-house environment for large-scale software companies
- Comparative study of SPI success factors in global and in-house environment for large-scale software companies
- Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning
- Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
- Towards assessing reliability of next‐generation Internet of Things dashboard for anxiety risk classification
- Design and performance of an AI-enabled threat intelligence framework for IoT-enabled autonomous vehicles
- Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection
- Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
- A Dynamic DL-Driven Architecture to Combat Sophisticated Android Malware
- Requirements engineering issues causing software development outsourcing failure
- Correction to "Performance Evaluation of LoRaWAN for Green Internet of Things"
- Research Perspectives and Challenges of Blockchain for Data-Intensive and Resource-Constrained Devices
- MalDroid: Secure DL‐enabled intelligent malware detection framework
- MalDroid: Secure DL‐enabled intelligent malware detection framework
- A Conceptual Model to Support the Transmuters in Acquiring the Desired Knowledge of a Data Scientist
- A Conceptual Model to Support the Transmuters in Acquiring the Desired Knowledge of a Data Scientist
- A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks
- Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN
- A Priori Multiobjective Self-Adaptive Multi-Population Based Jaya Algorithm to Optimize DERs Operations and Electrical Tasks
- CFFD-MAC: A Hybrid MAC for Collision Free Full-Duplex Communication in Wireless Ad-Hoc Networks
- A Dynamic Robust DL-Based Model for Android Malware Detection
- Security-Aware Data-Driven Intelligent Transportation Systems
- Dynamic Link Adaptation For Filterband Multicarrier In Networks With Diverse Service Quality And Throughput Requirements
- Dynamic Priority Real-Time Scheduling on Power Asymmetric Multicore Processors
- Symptom Analysis Using Fuzzy Logic for Detection and Monitoring of COVID-19 Patients
- Dynamic link adaptation for filterband multicarrier in networks with diverse service quality and throughput requirements
- Secure IIoT-Enabled Industry 4.0
- An Approach towards IoT-Based Predictive Service for Early Detection of Diseases in Poultry Chickens
- Power and Performance Efficient SDN-Enabled Fog Architecture
- Enhanced Energy Savings with Adaptive Watchful Sleep Mode for Next Generation Passive Optical Network
- Fake news outbreak 2021: Can we stop the viral spread?
- Multi-Modality and Feature Fusion-Based COVID-19 Detection Through Long Short-Term Memory
- Empirical evaluation and study of text stemming algorithms
- A Conceptual Model to Support the Transmuters in Acquiring the Desired Knowledge of a Data Scientist
- A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT)
- An Empirical Investigation of Factors Causing Scope Creep in Agile Global Software Development Context: A Conceptual Model for Project Managers
- Ride or Not to Ride: Does the Customer Deviate toward Ridesharing?
- Measuring Learnability through Virtual Reality Laboratory Application: A User Study
- FineCodeAnalyzer: Multi-Perspective Source Code Analysis Support for Software Developer Through Fine-Granular Level Interactive Code Visualization
- Model to Cope With Requirements Engineering Issues for Software Development Outsourcing
- Research Perspectives and Challenges of Blockchain for Data-Intensive and Resource-Constrained Devices
- Prediction of Pakistani Honey Authenticity Through Machine Learning
- TARS: A Novel Mechanism for Truly Autonomous Resource Selection in LTE-V2V Mode 4
- Lightweight Internet of Things Botnet Detection Using One-Class Classification
- Design and Implementation of Real-Time Kitchen Monitoring and Automation System Based on Internet of Things
- Orchestrating SDN Control Plane towards Enhanced IoT Security
- Proactive Defense for Fog-to-Things Critical Infrastructure
- FIPAM: Fuzzy Inference Based Placement and Migration Approach for NFV-Based IoTs
- Requirements engineering issues causing software development outsourcing failure
- Correction to "Performance Evaluation of LoRaWAN for Green Internet of Things"
- Research Perspectives and Challenges of Blockchain for Data-Intensive and Resource-Constrained Devices
- A Tacit-Knowledge-Based Requirements Elicitation Model Supporting COVID-19 Context
- Correction to “Performance Evaluation of LoRaWAN for Green Internet of Things”
- Collaborative Detection of Black Hole and Gray Hole Attacks for Secure Data Communication in VANETs
- Automatic Modulation Recognition Based on the Optimized Linear Combination of Higher-Order Cumulants
- An Attention-Based ResNet Architecture for Acute Hemorrhage Detection and Classification: Toward a Health 4.0 Digital Twin Study
- A Priori Multiobjective Self-Adaptive Multi-Population Based Jaya Algorithm to Optimize DERs Operations and Electrical Tasks
- A Priori Multiobjective Self-Adaptive Multi-Population Based Jaya Algorithm to Optimize DERs Operations and Electrical Tasks
- Impact analysis and change propagation in service-oriented enterprises: A systematic review
- Secure and dependable software defined networks
- Erratum: Correction: Optimizing SIEM Throughput on the Cloud Using Parallelization (PloS one (2016) 11 11 (e0162746))
- Optimizing SIEM throughput on the cloud using parallelization
- Optimizing SIEM Throughput on the Cloud Using Parallelization
- Optimizing SIEM Throughput on the Cloud Using Parallelization
- A novel association rule mining approach using TID intermediate itemset
- QoS-aware service provisioning in fog computing
- Requirements engineering issues causing software development outsourcing failure
- SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT)
- Securing Cyberspace of Future Smart Cities with 5G Technologies
- A formal framework for web service broker to compose QoS measures
- Towards experiencing the pair programming as a practice of the Rational Unified Process (RUP)
- Remote Data Auditing in Cloud Computing Environments
- Formal Verification of the xDAuth Protocol
- A survey on Test Suite Reduction frameworks and tools
- A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
- A Novel Internet of Things-Centric Framework to Mine Malicious Frequent Patterns
- Taxonomy of Factors Causing Integration Failure during Global Software Development
- Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare
- Social Internet of Vehicles: Complexity, Adaptivity, Issues and Beyond
- Evaluation of propagation path delay using 3D scattered model in LoRaWAN
- Energy and performance aware fog computing: A case of DVFS and green renewable energy
- A dynamic replication aware load balanced scheduling for data grids in distributed environments of internet of things
- An improved Urdu stemming algorithm for text mining based on multi-step hybrid approach
- A Comprehensive Analysis of Congestion Control Protocols in Wireless Sensor Networks
- Towards efficient sink mobility in underwater wireless sensor networks
- Distance-based and low energy adaptive clustering protocol for wireless sensor networks
- Distributed controller clustering in software defined networks
- Survey on network virtualization using openflow: Taxonomy, opportunities, and open issues
- Reducing Power Consumption in Wireless Body Area Networks: A Novel Data Segregation and Classification Technique
- Implications of deep learning for the automation of design patterns organization
- Towards augmented proactive cyberthreat intelligence
- Toward secure software defined vehicular networks: Taxonomy, requirements, and open issues
- Formal modeling and verification of security controls for multimedia systems in the cloud
- A high-level domain-specific language for SIEM (design, development and formal verification)
- Trust and Reputation Management in Healthcare Systems: Taxonomy, Requirements and Open Issues
- Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges
- Performance Evaluation of LoRaWAN for Green Internet of Things
- Evaluation of Propagation Path Delay Using 3D Scattered Model in LoRaWAN
- A Dynamic Replication Aware Load Balanced Scheduling for Data Grids in Distributed Environments of Internet of Things
- Scheduling Algorithms for High-Performance Computing: An Application Perspective of Fog Computing
- Internet Traffic Flow Analysis in Fog Computing: An Experimental Case Study
- Exploring IoT Applications for Disaster Management: Identifying Key Factors and Proposing Future Directions
- Seven Pillars to Achieve Energy Efficiency in High-Performance Computing Data Centers
- Big Data in Healthcare: A Survey
- A novel association rule mining approach using TID intermediate itemset (vol 13, e0179703, 2018)
- A comparative review of Urdu stemmers: Approaches and challenges
- Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks
- Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks
- Towards Dynamic Remote Data Auditing in Computational Clouds
- Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions
- Cognitive Radio Sensor Networks
- Securing software defined networks: taxonomy, requirements, and open issues
- Network-centric performance analysis of runtime application migration in mobile cloud computing
- Geographic wormhole detection in wireless sensor networks
- Towards Dynamic Remote Data Auditing in Computational Clouds
- Navigating the Stock Market: The Role of State-of-the-Art Deep Learning Techniques
- An Improvised Certificate-Based Proxy Signature Using Hyperelliptic Curve Cryptography for Secure UAV Communications
- Micro-Expression Recognition using Convolutional Variational Attention Transformer (ConVAT) with Multihead Attention Mechanism
- DWSD: Dense waste segmentation dataset
- Convolutional Attention Based Mechanism for Facial Microexpression Recognition
- Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques
- A novel intrusion detection framework for optimizing IoT security
- Multi-IsnadSet MIS for Sahih Muslim Hadith with chain of narrators, based on multiple ISNAD
- Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
- Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network
- Advanced Quantum Control with Ensemble Reinforcement Learning: A Case Study on the XY Spin Chain
- NFTs for the Unassailable Authentication of IoT Devices in Cyber-Physical Systems: An Implementation Study
- Bridging Innovation and Security: Advancing Cyber-Threat Detection in Sustainable Smart Infrastructure
- Hybrid deep learning based threat intelligence framework for Industrial IoT systems
Usage metrics
Co-workers & collaborators
- AA
Ahmad Sami Al-Shamayleh
- MZ
Muhammad Zaman
- MI
Muhammad Imran
- MU
Mueen Uddin
Senior Lecturer - Malaysia
- KX
Kaiwei Xu
- ZX
Zhijie Xu