Muhammad Zeeshan

ORCID: 0000-0003-4417-1365
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Advanced MIMO Systems Optimization
  • Wireless Networks and Protocols
  • Advanced Wireless Network Optimization
  • Wireless Communication Networks Research
  • VLSI and FPGA Design Techniques
  • Cooperative Communication and Network Coding
  • Internet Traffic Analysis and Secure E-voting
  • VLSI and Analog Circuit Testing
  • Cognitive Radio Networks and Spectrum Sensing
  • Mobile Ad Hoc Networks
  • Smart Grid Security and Resilience
  • 3D IC and TSV technologies
  • Gait Recognition and Analysis
  • Advanced Steganography and Watermarking Techniques
  • IoT-based Smart Home Systems
  • Digital Media Forensic Detection
  • Anomaly Detection Techniques and Applications
  • Interconnection Networks and Systems
  • Network Traffic and Congestion Control
  • Video Surveillance and Tracking Methods
  • IPv6, Mobility, Handover, Networks, Security
  • Electricity Theft Detection Techniques
  • Advanced Wireless Communication Techniques

National University of Sciences and Technology
2016-2025

Air University
2024

University of Faisalabad
2024

Islamia University of Bahawalpur
2023

University of Malaya
2020

Virtual University of Pakistan
2017

University of the Sciences
2012

National University of Science and Technology
2011

NED University of Engineering and Technology
2005

Since its inception, the Internet of Things (IoT) has witnessed mushroom growth as a breakthrough technology. In nutshell, IoT is integration devices and data such that processes are automated centralized to certain extent. revolutionizing way business done transforming society whole. As this technology advances further, need exploit detection weakness awareness increases prevent unauthorized access critical resources functions, thereby rendering system unavailable. Denial Service (DoS)...

10.1109/access.2021.3137201 article EN cc-by IEEE Access 2021-12-21

Abstract Internet of Things (IoT) devices are well-connected; they generate and consume data which involves transmission back forth among various devices. Ensuring security the is a critical challenge as far IoT concerned. Since inherently low-power do not require lot compute power, Network Intrusion Detection System typically employed to detect remove malicious packets from entering network. In same context, we propose feature clusters in terms Flow, Message Queuing Telemetry Transport...

10.1186/s13638-021-01893-8 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2021-01-21

IoT devices are susceptible to numerous cyber-attacks due its low power, computational requirements and controlled environment that make it hard implement authentication cryptography in devices. In this work we propose artificial neural network based threat detection for solve the issues. We use supervised learning algorithm detect attacks furthermore controller discards commands after classifying as threat. Proposed ANN consist of input, hidden output layers. Input layer passes data signal...

10.1109/honet.2019.8908122 article EN 2019-10-01

This paper presents an overview of device identification techniques and the Manufacturer Usage Description (MUD) standard used for Internet things to reduce IoT attack surface. The ongoing diversity sheer increase in number connected devices have crumpled security efforts. There is a need reconsider redesign underlying concept developing systems resolve challenges. In this backdrop, profiling emerged as exciting technique that helps One known approaches fingerprint device. are many ways...

10.1109/access.2021.3065123 article EN cc-by IEEE Access 2021-01-01

Emotion recognition via gait analysis is an active and key area of research because its significant academic commercial potential. With recent developments in hardware technology, the use inertial sensors allows researchers to effectively capture human motion data for analysis. To this end, aim paper identify emotions from signals recorded by means body mounted smartphones. We extracted a manually-crafted set features computed which are used train precisely predict emotions. Specifically, we...

10.1109/jsen.2020.3004399 article EN IEEE Sensors Journal 2020-06-23

LTE standard defines strict requirements for service classes in order to provide end users with exceptional QoS characteristics including fast connectivity and high data rates. However there is no scheduling algorithm defined the task of protecting user satisfaction while maintaining class restrictions left upon provider currently an open issue. To address this challenge, work we proposed a two-level scheduler utility based game theoretic application first level that distributes physical...

10.1109/wcnc.2012.6214009 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2012-04-01

Lilium spp. is the most significant decorative plant and has high demand in floriculture market. We studied impact of different growth regulators on culture initiation, shoot proliferation, root formation for disease-free plants from vitro propagation. The explant basal scale was used varying concentrations BAP (6-Benzylaminopurine) alone combination with IAA (Indole-3-acetic acid) showed responses. It observed that MS media supplemented at 1.5 mg/l 1.0 exhibited maximum number shoots, i.e.,...

10.34016/pjbt.2024.21.02.927 article EN cc-by Pakistan Journal of Biotechnology 2024-05-23

Parkinson’s disease lacks a cure, yet symptomatic relief can be achieved through various treatments. This study dives into the critical aspect of anomalous event detection in activities daily living patients with and identification associated movement disorders, such as tremors, dyskinesia, bradykinesia. Utilizing inertial data acquired from most affected upper limb patients, this aims to create an optimal pipeline for patient monitoring. proposes two-stage disorder classification binary...

10.3390/a18040203 article EN cc-by Algorithms 2025-04-04

Cognitive radio technology solves the problem of spectrum underutilization by allowing unlicensed users to opportunistically access available without affecting activity licensed user. Channel assignment and routing in cognitive networks is especially challenging where nodes are equipped with only a single transceiver (as case commodity wireless that run IEEE 802.11 DCF MAC). We propose combined framework channel exploits diversity optimize performance increase network capacity. Specifically,...

10.1109/icet.2010.5638455 article EN 2010-10-01

Quality-of-service (QoS) requirements have always posed a challenge from scheduling perspective and it becomes more complicated with the emergence of new standards applications. Classical techniques like maximum throughput, proportional fair, exponential rule been used in common network scenarios but these fail to address diverse service for QoS provisioning long-term evolution (LTE). These LTE are implemented form delay budgets, priorities, packet loss rates. Scheduler design networks...

10.1186/1687-1499-2013-67 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2013-03-14

LTE standard defines classes with granular requirements in order to provide QoS fast connectivity and high data rates. The basic Release-8 of the subsequent modifications do not specify any scheduling algorithm making task improving user satisfaction more difficult. In our work, we proposed a two-level scheduler game theoretic application that distributes resources among fairness then implements delay based satisfy strict levels budget classes. A coalition is formed between different class...

10.1109/fit.2011.11 article EN Frontiers of Information Technology 2011-12-01

The ubiquitous use of IEEE 802.11 has aggravated the need to make efficient available bandwidth. Currently handoff decision in is made based on received signal strength but these results poor connectivity specifically when an access point overloaded. Overlapping regions where users can be connected multiple points, switching less loaded improve overall network capacity. In this article, we propose a decentralized approach for best selection which also prevents get We algorithm handover...

10.1109/honet.2018.8551335 article EN 2018-10-01

Throughput imbalances among contending flows are known to occur when any carrier sense multiple access (CSMA)-based protocol is employed in multi-hop wireless networks. These may vary from slight difference throughput complete starvation which some unable acquire channel accesses. The root cause of such the lack coordination CSMA medium control (MAC) protocols In this paper, we accurately predict per-flow general networks while addressing CSMA's problem. Unlike previous work, our analytical...

10.1186/s13638-016-0664-7 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2016-07-14

Increase in number of commodity devices using network connection raised the spectrum demand largely. The present static allocation policy gave birth to so called scarcity problem. Cognitive Radio enhances bandwidth usage through Dynamic Spectrum Access without affecting allocated spectrum, therefore offers a feasible solution problem scarcity. Enhancing efficiently, cognitive radio technology allows secondary users acquire underutilized licensed band. Smooth mobility networks is extremely...

10.1109/ngmast.2016.10 article EN 2016-08-01

Emotions are a crucial part of our daily lives, and they defined as an organism’s complex reaction to significant objects or events, which include subjective physiological components. Human emotion recognition has variety commercial applications, including intelligent automobile systems, affect-sensitive systems for customer service contact centres, the entertainment sector. In this work, we present novel deep neural network Convolutional Neural Network - Bidirectional Gated Recurrent Unit...

10.3390/app13084728 article EN cc-by Applied Sciences 2023-04-09

Internet of things (IoT) is an emerging paradigm that integrates several technologies. IoT network constitutes many interconnected devices include various sensors, actu-ators, services and other communicable objects. The increasing demand for its have created security vulnerabilities. Conventional approaches like intrusion detection systems are not up to the expectation fulfil challenges networks, due conventional technologies used in them. This article presents a survey prevention system...

10.14569/ijacsa.2020.0111283 article EN International Journal of Advanced Computer Science and Applications 2020-01-01

Internet of things increases the automation pace world but at same time, IoT poses many security challenges for industry. Intrusion detection and prevention systems have dominated market in conventional networks. The challenge to IDPS is huge resource utilization imparting performance penalties. Also, real-time training machine learning models has been an issue. In this research, we develop agent-based system using software-defined networking (SDN) technology its core. develops a baseline...

10.1109/honet53078.2021.9615449 article EN 2021-10-11

With the advancement in electronics technology, number of pins under ball grid array (BGA) are increasing on reduced size components. In small components, a challenging task is to solve escape routing problem where BGA towards component boundary. It often desirable perform ordered simultaneous (SER) facilitate area and produce elegant Printed Circuit Board (PCB) design. Some heuristic techniques help finding PCB solution for SER but larger problems these time consuming sub-optimal results....

10.14569/ijacsa.2017.080762 article EN cc-by International Journal of Advanced Computer Science and Applications 2017-01-01

Simultaneous Escape Routing (SER) is one of the most difficult problems in Printed Circuit Boards (PCBs) routing as pins from inside two ICs have to be escaped boundaries simultaneously. The ever evolving integrated circuits (ICs) manufacturing techniques made SER even more by increasing complexity these a whole new level. This increase has not only increased number an IC but also reduced size package making PCBs very hectic task. problem been addressed many studies literature and mostly,...

10.1109/honet.2017.8102207 article EN 2017-10-01

The substantial growth in energy utilization, and the expansion of renewable resources, mainly winds solar, poses challenges to environment security. Therefore, smart meters (SEMs) are bottom-line modules such renewable-energy-based networks (REBNs). Apart from measurement flows, capable give-and-take complete information on utilization status between end consumers utilities. Moreover, according individual consumer's commands, SEMs can also be utilized for monitoring control electrical...

10.3390/engproc2022020023 article EN cc-by 2022-08-02

Cognitive Radios are increasingly being used for better utilization of licensed spectrum. Most the work has been done on exploitation time and frequency domain while code space dimension have not intensively explored improving spectrum utilization. In this work, we investigate simultaneously optimizing adopting terminals with Genetic Algorithm based smart antenna. Our supports multiple simultaneous communications, i.e. more than one directed communication at a incorporating Channel...

10.1109/icc.2012.6364404 article EN 2012-06-01
Coming Soon ...