Abdul Rehman Javed

ORCID: 0000-0002-0570-1813
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Anomaly Detection Techniques and Applications
  • Context-Aware Activity Recognition Systems
  • Internet Traffic Analysis and Secure E-voting
  • Spam and Phishing Detection
  • COVID-19 diagnosis using AI
  • Radio Frequency Integrated Circuit Design
  • Digital Media Forensic Detection
  • Cloud Data Security Solutions
  • Privacy-Preserving Technologies in Data
  • Sentiment Analysis and Opinion Mining
  • Blockchain Technology Applications and Security
  • User Authentication and Security Systems
  • Advancements in PLL and VCO Technologies
  • Advanced Wireless Communication Techniques
  • Artificial Intelligence in Healthcare
  • Vehicular Ad Hoc Networks (VANETs)
  • Cryptography and Data Security
  • Mobile Health and mHealth Applications
  • Brain Tumor Detection and Classification
  • Digital and Cyber Forensics
  • Smart Grid Energy Management
  • Speech and Audio Processing

Air University
2020-2024

Vellore Institute of Technology University
2024

Lovely Professional University
2024

Institute of Management Technology
2024

Lebanese American University
2022-2023

Western Norway University of Applied Sciences
2023

University of Technology Sydney
2022

ORCID
2021

Paderborn University
2015-2021

Kinnaird College for Women University
2021

Controller area network (CAN) is a communication protocol that provides reliable and productive transmission between in-vehicle nodes continuously. CAN bus broadly utilized standard channel to deliver sequential communications electronic control units (ECUs) due simple communication. Existing studies report how easily an attack can be performed on the of weak security mechanisms could lead system malfunctions. Hence inside vehicle latent problem. In this paper, we propose novel approach...

10.1109/tnse.2021.3059881 article EN IEEE Transactions on Network Science and Engineering 2021-02-19

Cloud computing provides the flexible architecture where data and resources are dispersed at various locations accessible from industrial environments. has changed using, storing, sharing of such as data, services, applications for applications. During last decade, industries have rapidly switched to cloud having more comprehensive access, reduced cost, increased performance. In addition, significant improvement been observed in internet things (IoT) with integration computing. However, this...

10.3390/electronics11010016 article EN Electronics 2021-12-22

Connected and Automated Vehicles (CAVs), owing to their characteristics such as seamless real-time transfer of data, are imperative infrastructural advancements realize the emerging smart world. The sensor-generated data are, however, vulnerable anomalies caused due faults, errors, and/or cyberattacks, which may cause accidents resulting in fatal casualties. To help avoiding situations by timely detecting anomalies, this study proposes an anomaly detection method that incorporates a...

10.1109/tits.2020.3025875 article EN IEEE Transactions on Intelligent Transportation Systems 2020-10-01

Depression is a prevalent sickness, spreading worldwide with potentially serious implications. Timely recognition of emotional responses plays pivotal function at present, the profound expansion social media and users internet. Mental illnesses are highly hazardous, stirring more than three hundred million people. Moreover, that why research focused on this subject. With advancements machine learning availability sample data relevant to depression, there possibility developing an early...

10.3390/electronics11050676 article EN Electronics 2022-02-23

Despite the numerous and noticeable inherited gains of Mobile Cloud Computing (MCC) in healthcare, its growth is being hindered by privacy security challenges. Such issues require utmost urgent attention to realize full scale efficient usage. There a need secure Health Information worldwide, regionally, locally. To fully avail health services, it crucial put place demanded practices for prevention breaches vulnerabilities. Hence, this research deliberated on provide requirement-oriented...

10.1109/access.2021.3049564 article EN cc-by IEEE Access 2021-01-01

Understanding brain diseases such as categorizing Brain-Tumor (BT) is critical to assess the tumors and facilitate patient with proper cure per their categorizations. Numerous imaging schemes exist for BT detection, Magnetic Resonance Imaging (MRI), generally utilized because of better quality images reality depending on non-ionizing radiation. This paper proposes an approach detect distinctive types using Gaussian Convolutional Neural Network (GCNN) two datasets. One datasets used classify...

10.1109/access.2022.3153108 article EN cc-by IEEE Access 2022-01-01

The emergence of Explainable Artificial Intelligence (XAI) has enhanced the lives humans and envisioned concept smart cities using informed actions, user interpretations explanations, firm decision-making processes. XAI systems can unbox potential black-box AI models describe them explicitly. study comprehensively surveys current future developments in technologies for cities. It also highlights societal, industrial, technological trends that initiate drive towards presents key to enabling...

10.3390/electronics12041020 article EN Electronics 2023-02-18

Abstract Receiving an accurate emotional response from robots has been a challenging task for researchers the past few years. With advancements in technology, like service interact with users of different cultural and lingual backgrounds. The traditional approach towards speech emotion recognition cannot be utilized to enable robot give efficient response. conventional uses same corpus both training testing classifiers detect emotions, but this generalized multi-lingual environments, which...

10.1007/s40747-020-00250-4 article EN cc-by Complex & Intelligent Systems 2021-01-11

With the alarmingly increasing rate of cybercrimes worldwide, there is a dire need to combat timely and effectively. Cyberattacks on computing machines leave certain artifacts target device storage that can reveal identity behavior cyber-criminals if processed analyzed intelligently. Forensic agencies law enforcement departments use several digital forensic toolkits, both commercial open-source, examine evidence. The proposed research survey focuses identifying current state-of-the-art...

10.1109/access.2022.3142508 article EN cc-by IEEE Access 2022-01-01

Deepfake content is created or altered synthetically using artificial intelligence (AI) approaches to appear real. It can include synthesizing audio, video, images, and text. Deepfakes may now produce natural-looking content, making them harder identify. Much progress has been achieved in identifying video deepfakes recent years; nevertheless, most investigations detecting audio have employed the ASVSpoof AVSpoof dataset various machine learning, deep learning algorithms. This research uses...

10.1109/access.2022.3231480 article EN IEEE Access 2022-01-01

Autonomous vehicles (AV) are game-changing innovations that promise a safer, more convenient, and environmentally friendly mode of transportation than traditional vehicles. Therefore, understanding AV technologies their impact on society is critical as we continue this revolutionary journey. Generally, there needs to be detailed study available assist researcher in its challenges. This research presents comprehensive survey encompassing various aspects AVs, such public adoption, driverless...

10.3390/technologies11050117 article EN cc-by Technologies 2023-09-04

Medical image analysis places a significant focus on breast cancer, which poses threat to women’s health and contributes many fatalities. An early precise diagnosis of cancer through digital mammograms can significantly improve the accuracy disease detection. Computer‐aided (CAD) systems must analyze medical imagery perform detection, segmentation, classification processes assist radiologists with accurately detecting lesions. However, early‐stage mammography detection is certainly...

10.1155/2023/7717712 article EN cc-by Computational Intelligence and Neuroscience 2023-01-01

Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-jacking, malware and phishing attacks now rampant. In this era of cyber warfare, the software industry is also growing with an increasing number being used in all domains life. This evolution has added to problems vendors users where they have prevent wide range attacks. Existing watermark detection solutions low rate software. order address issue, paper proposes novel blind Zero code based Watermark...

10.1109/access.2020.2988160 article EN cc-by IEEE Access 2020-01-01

Abstract The fast propagation of the Internet Things (IoT) devices has driven to development collaborative healthcare frameworks support next generation industry for quality medical healthcare. This paper presents a generalized framework named shared plan (CSHCP) cognitive health and fitness assessment people using ambient intelligent application machine learning techniques. CSHCP provides daily physical activity recognition, monitoring, generate based on collaboration among different...

10.1186/s13673-020-00245-7 article EN cc-by Human-centric Computing and Information Sciences 2020-09-11

Abstract Wireless sensor network (WSN) is a collection of huge number autonomous nodes having capabilities such as sensing, processing, and manipulation. In any WSN, routing protocols are the backbone for performing all type tasks controlling, transmission packets in ubiquitous environment. this article, LEACH protocol with Levenberg‐Marquardt neural (LEACH‐LMNN) considered to analyze overall lifetime. The aim LEACH‐LMNN comprises two parts: selection cluster head node using LMNN approach...

10.1002/ett.3997 article EN Transactions on Emerging Telecommunications Technologies 2020-06-02
Coming Soon ...