- IoT and Edge/Fog Computing
- Service-Oriented Architecture and Web Services
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Energy Efficient Wireless Sensor Networks
- Blockchain Technology Applications and Security
- Context-Aware Activity Recognition Systems
- Security in Wireless Sensor Networks
- Smart Grid Security and Resilience
- Software-Defined Networks and 5G
- Mobile Ad Hoc Networks
- Advanced Software Engineering Methodologies
- Energy Harvesting in Wireless Networks
- Distributed systems and fault tolerance
- User Authentication and Security Systems
- Business Process Modeling and Analysis
- Opportunistic and Delay-Tolerant Networks
- Smart Cities and Technologies
- Cloud Computing and Resource Management
- Mobile Crowdsensing and Crowdsourcing
- Anomaly Detection Techniques and Applications
- Modular Robots and Swarm Intelligence
- Vehicular Ad Hoc Networks (VANETs)
- Information and Cyber Security
- Advanced Power Amplifier Design
Karachi School for Business and Leadership
2025
University of Agriculture Faisalabad
2025
National University of Computer and Emerging Sciences
2017-2024
University of the Punjab
2023
University of Peshawar
2018-2023
Mehran University of Engineering and Technology
2023
Philips (Netherlands)
2020
NXP (Netherlands)
2020
Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
2019
University of Bolton
2015
Due to a rapidly increasing aging population and its associated challenges in health social care, Ambient Assistive Living has become the focal point for both researchers industry alike. The need manage or even reduce healthcare costs while improving quality of service is high government agendas. Although, technology major role play achieving these aspirations, any solution must be designed, implemented validated using appropriate domain knowledge. In order overcome challenges, remote...
The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception what constitutes infrastructure. rising interconnectedness new industries driven by growing demand for seamless access to information world becomes more mobile connected Internet Things (IoT) grows. Critical are essential foundation today's society, interruption service any these sectors can reverberate through other even around globe. In hyper-connected world,...
Abstract The fast propagation of the Internet Things (IoT) devices has driven to development collaborative healthcare frameworks support next generation industry for quality medical healthcare. This paper presents a generalized framework named shared plan (CSHCP) cognitive health and fitness assessment people using ambient intelligent application machine learning techniques. CSHCP provides daily physical activity recognition, monitoring, generate based on collaboration among different...
The Internet of Things (IoT) has penetrated its roots in almost every domain life. Smart healthcare is one the major domains that extensively uses IoT infrastructures and solutions. IoT-based smart systems have immensely added value to with use wearable mobile devices. This leads a substantial health data sharing for improved, accurate, timely diagnosis. However, are highly vulnerable several security breaches various malignant attacks, such as privacy leakage, tempering, forgery, etc....
The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed smart ubiquitous objects that are seamlessly connected to the Internet. These deployed as Low power and Lossy Networks (LLN) provide innovative services in various application domains such cities, health, communities. LLN a form network where interconnected devices highly resource-constrained (i.e., power, memory, processing) characterized high loss rates, low data instability communication...
Abstract At the advent of advanced wireless technology and contemporary computing paradigms, Distributed Denial Service (DDoS) attacks on Web-based services have not only increased exponentially in number, but also degree sophistication; hence need for detecting these within ocean communication packets is extremely important. DDoS were initially projected toward network transport layers. Over years, attackers shifted their offensive strategies application layer. The layer are potentially...
Summary The rapid proliferation of Internet things (IoT) devices, such as smart meters and water valves, into industrial critical infrastructures control systems has put stringent performance scalability requirements on modern Supervisory Control Data Acquisition (SCADA) systems. While cloud computing enabled SCADA to cope with the increasing amount data generated by sensors, actuators, there been a growing interest recently deploy edge centers in fog architectures secure low‐latency...
The Internet of Things (IoT) and its relevant advances have attracted significant scholarly, governmental, industrial attention in recent years. Since the IoT specifications are quite different from what can deliver today, many groundbreaking techniques, such as Mobile Ad hoc Networks (MANETs) Wireless Sensor (WSN), gradually been integrated into IoT. Routing Protocol for Low power Lossy network (RPL) is de-facto routing protocol networks. Unfortunately, it susceptible to numerous internal...
Explainable artificial intelligence (XAI) is of paramount importance to various domains, including healthcare, fitness, skill assessment, and personal assistants, understand explain the decision-making process (AI) model. Smart homes embedded with smart devices sensors enabled many context-aware applications recognize physical activities. This study presents XAI-HAR , a novel XAI-empowered human activity recognition (HAR) approach based on key features identified from data collected located...
A multitude of smart things and wirelessly connected Sensor Nodes (SNs) have pervasively facilitated the use applications in every domain life. Along with bounties applications, there are hazards external internal attacks. Unfortunately, mitigating attacks is quite challenging, where network lifespan (w.r.t. energy consumption at node level), latency, scalability three main factors that influence efficacy security measures. Furthermore, most measures provide centralized solutions, ignoring...
Conventionally, the security of critical infrastructures was mainly focused on environmental threats. Cyber attacks, nevertheless, have shifted attention to various other threats and damages. The attackers try exploit vulnerabilities in networks Internet Things (IoT) technologies, since these technologies are integral part systems. Therefore, vulnerability Critical Infrastructure (CI) against cyber has led need devise modern measures. Unavailability or failure one CI can cause enormous...
Abstract Internet of Things (IoT) fostered a new epoch innovation by interconnecting digital devices to make human life more convenient and attractive. These smart objects are largely deployed as low power lossy networks (LLNs) use routing protocol for LLNs (RPL) routing. Unfortunately, it is extremely vulnerable large variety external internal attacks cause devastating calamitous effects. However, this article's scope revolves around only, where nodes already part legitimate network....