Waseem Abbas

ORCID: 0000-0002-9013-1463
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed Control Multi-Agent Systems
  • Gene Regulatory Network Analysis
  • Complex Network Analysis Techniques
  • Smart Grid Security and Resilience
  • Neural Networks Stability and Synchronization
  • Advanced Graph Neural Networks
  • Network Security and Intrusion Detection
  • Energy Efficient Wireless Sensor Networks
  • Opportunistic and Delay-Tolerant Networks
  • Infrastructure Resilience and Vulnerability Analysis
  • Optimization and Search Problems
  • Advanced Memory and Neural Computing
  • Mobile Ad Hoc Networks
  • Water Systems and Optimization
  • Graph theory and applications
  • Graph Theory and Algorithms
  • Game Theory and Applications
  • Stochastic Gradient Optimization Techniques
  • Opinion Dynamics and Social Influence
  • Information and Cyber Security
  • Security in Wireless Sensor Networks
  • Energy Harvesting in Wireless Networks
  • Underwater Vehicles and Communication Systems
  • Advanced Malware Detection Techniques
  • Mitochondrial Function and Pathology

National University of Sciences and Technology
2022-2025

Riphah International University
2023-2025

Dow University of Health Sciences
2022-2025

University of Lahore
2023-2024

The University of Texas at Dallas
2021-2024

Vanderbilt University
2014-2023

Islamia University of Bahawalpur
2023

International Islamic University, Islamabad
2023

Nishtar Medical College and Hospital
2023

University of Karachi
2022

To observe and control a networked system, especially in failure-prone circumstances, it is imperative that the underlying network structure be robust against node or link failures. A common approach for increasing robustness redundancy: deploying additional nodes establishing new links between nodes, which could prohibitively expensive. This paper addresses problem of improving structural networks without adding extra links. The main idea to ensure small subset referred as trusted remains...

10.1109/tcns.2017.2782486 article EN publisher-specific-oa IEEE Transactions on Control of Network Systems 2017-12-11

In this technical note, we study the controllability of diffusively coupled networks from a graph theoretic perspective. We consider leader-follower networks, where external control inputs are injected to only some agents, namely leaders. Our main result relates such systems distances between agents. More specifically, present topological lower bound on rank matrix. This is tight, and it applicable with arbitrary network topologies, coupling weights, number An algorithm for computing also...

10.1109/tac.2016.2546180 article EN IEEE Transactions on Automatic Control 2016-03-23

In this paper, we study resilient distributed diffusion for multi-task estimation in the presence of adversaries where networked agents must estimate distinct but correlated states interest by processing streaming data. We show that general strategies are not to malicious do adhere diffusion-based information rules. particular, exploiting adaptive weights used diffusing information, develop time-dependent attack models drive normal converge selected attacker. an attacker has complete...

10.1109/tsipn.2019.2957731 article EN publisher-specific-oa IEEE Transactions on Signal and Information Processing over Networks 2020-01-01

10.3182/20120914-2-us-4030.00052 article EN IFAC Proceedings Volumes 2012-09-01

In this paper, we propose a scheme for resilient distributed consensus problem through set of trusted nodes within the network. Currently, algorithms that solve demand networks to have high connectivity overrule effects adversaries, or require access some non-local information. our scheme, incorporate notion guarantee despite any number adversarial attacks, even in sparse networks. A subset nodes, which are more secured against constitute nodes. It is shown network becomes attacks whenever...

10.1109/isrcs.2014.6900100 article EN 2014-08-01

In recent years, we have seen a number of successful attacks against high-profile targets, some which even caused severe physical damage. These examples shown us that resourceful and determined attackers can penetrate virtually any system, those are secured by the "air-gap." Consequently, in order to minimize impact stealthy attacks, defenders focus not only on strengthening first lines defense but also deploying effective intrusion-detection systems. Intrusion-detection systems play key...

10.1145/2898375.2898399 article EN 2016-04-14

For better repute in software monopoly, qualityof product is one of the essential factors any corporation.Quality depends on satisfaction customer.Product quality measured by customer with thatproduct. The goal might be attained only overconvenient fundamentals and policies. enormous anddeveloping nations are making improvements every day forimproving products they manufactured toincrease their customers. Every corporationtries best to design that suits tocustomer needs. purpose quality,...

10.52015/nijec.v3i1.59 article EN cc-by-nc NUML International Journal of Engineering and Computing 2025-01-15

Evaluating synthetic accessibility of in silico molecules is an integral component the drug discovery process. While application machine learning models to predict whether small are easy or hard synthesize has gained attention recently, predetermined thresholds and data set imbalances present challenges for these binary classification approaches. In this study, we introduce a novel multiclass fold-ensembled approach minimum number steps needed molecule. By ensembling base trained on multiple...

10.1021/acs.jcim.4c01663 article EN Journal of Chemical Information and Modeling 2025-01-17

Background: During pregnancy the body of a female undergoes several hormonal and physiological changes which affect body’s biomechanics that in turn can contribute to different musculoskeletal issues. Pregnancy-related pain, particularly pelvic girdle lower back pain is common concern significantly affects quality life. This study investigates integration virtual reality (VR)-based physiotherapy with an understanding beta-human chorionic gonadotropin (beta hCG) dynamics address this issue....

10.71000/wqn3m811 article EN cc-by-nc-nd 2025-02-12

Iron deficiency anaemia (IDA) is a prevalent nutritional disorder characterized by inadequate iron availability, frequently resulting in impaired haemoglobin synthesis and reduced oxygen transport. Conventional supplementation, the primary treatment modality, often associated with challenges such as poor patient compliance due to gastrointestinal side effects suboptimal absorption, thus limiting its overall effectiveness. Recent evidence suggests that adjunctive therapies involving...

10.62019/73dfmw40 article EN Journal of medical & health sciences review. 2025-05-22

This article studies the problem of computing a minimum zero forcing set (ZFS) in undirected graphs and presents new approaches to reducing size ZFS via edge augmentation. The has numerous applications; for instance, it relates leader selection strong structural controllability networks defined over graphs. Computing is an NP-hard general. We show that greedy heuristic computation, though typically performs well, could give arbitrarily bad solutions some provide linear-time algorithm compute...

10.1109/tcns.2023.3285872 article EN IEEE Transactions on Control of Network Systems 2024-02-14

Fine-needle aspiration cytology (FNAC) is a widely utilized diagnostic tool for evaluating thyroid and head-and-neck masses. Its significance lies in its minimally invasive nature, cost-effectiveness, accuracy. This study examines the efficacy of FNAC identifying malignancies lesions while correlating findings with histopathological results. A retrospective analysis 198 cases was conducted at tertiary care centre. Patients underwent lesions, performed surgical excision examination. results...

10.62019/q048ss76 article EN Journal of medical & health sciences review. 2025-02-06

Background: Diabetes mellitus (DM) and thyroid dysfunction (TD) are among the most prevalent endocrine disorders globally, with a complex bidirectional relationship. Thyroid hormones play pivotal role in regulating carbohydrate metabolism pancreatic function. This study investigates prevalence patterns of patients type 2 diabetes (T2DM) compared to non-diabetic control group. Methods: A descriptive comparative was conducted at Al-Sehat Hospital, Timergara, Lower Dir, involving 330...

10.70749/ijbr.v3i2.738 article EN Indus journal of bioscience research. 2025-03-06

BACKGROUND: Enterococcus faecalis (E. faecalis) is a leading causative agent of urinary tract infections (UTIs) and poses significant public health concern due to its multidrug resistance. Understanding resistance mechanisms essential for improving treatment strategies. OBJECTIVE: This study aimed determine the prevalence, antibiotic susceptibility patterns, molecular characteristics genes in E. isolates from UTI patients Peshawar. METHODOLOGY: A cross-sectional was conducted on 137 urine...

10.69723/njms.04.01.0512 article EN cc-by-nc Northwest journal of medical sciences. 2025-03-31

Cyber-physical systems (CPSs) were envisaged as a way to manipulate the objects in physical world through computer intelligence. This is usually done by providing communication bridge between actuation and computing elements. sought after control hampered not only unavoidable certainty found but also limitations of contemporary networks. These hamper fine-grained elements that may be separated large-scale distances. In this regard, soft an emerging paradigm can help manage unreliability CPS...

10.1109/access.2019.2920317 article EN cc-by-nc-nd IEEE Access 2019-01-01

In this paper we study the controllability of networked systems with static network topologies using tools from algebraic graph theory. Each agent in acts a decentralized fashion by updating its state accordance nearest-neighbor averaging rule. order to control system, external inputs are injected into so called leader nodes, and influence is propagated throughout network. Our main result tight lower bound on rank matrix associated such systems. This derived distances nodes leaders, valid...

10.1109/cdc.2012.6426844 preprint EN 2012-12-01

Abstract Let G be a graph of minimum degree at least 2 with no induced subgraph isomorphic to K 1, 6 . We prove that if is not one eight exceptional graphs, then it possible assign two‐element subsets the vertices in such way for every and vertex label i assigned v or its neighbors. It follows has fractional domatic number 5/2. This motivated by problem robotics generalizes result Fujita, Yamashita, Kameda who proved same conclusion holds all 3‐regular graphs.

10.1002/jgt.21898 article EN Journal of Graph Theory 2015-08-07

We address the problem of distributed state estimation a linear dynamical process in an attack-prone environment. A network sensors, some which can be compromised by adversaries, aim to estimate process. In this context, we investigate impact making small subset nodes immune attacks, or “trusted”. Given set trusted nodes, identify separate necessary and sufficient conditions for resilient estimation. use such illustrate how even achieve desired degree robustness (where metric is specific...

10.1109/cdc.2018.8619772 article EN 2018-12-01

Recent experimental studies have shown that traffic management systems are vulnerable to cyber-attacks on sensor data. This paper the vulnerability of fixed-time control signalized intersections when sensors measuring flow information compromised and perturbed by an adversary. The problems formulated considering three malicious objectives: 1) worst-case network accumulation, which aims destabilize overall as much possible; 2) lane cause accumulation some target lanes; 3) risk-averse reach a...

10.1109/rweek.2016.7573320 article EN 2016-08-01
Coming Soon ...