Personal information

Activities

Employment (5)

University of Wolverhampton: Wolverhampton, GB

2024-09 to present | Lecturer (School of Engineering, Computing and Mathematical Sciences)
Employment
Source: Self-asserted source
Dr. Zeeshan Ahmad

Robert Gordon University: Aberdeen, Scotland, GB

2023-09 to 2024-09 | Research Fellow (National Subsea Centre)
Employment
Source: Self-asserted source
Dr. Zeeshan Ahmad

King Khalid University: Abha, Asir, SA

2010-09 to 2023-08 | Lecturer (Dept. of Electrical Engineering)
Employment
Source: Self-asserted source
Dr. Zeeshan Ahmad

RWTH Aachen University: Aachen, Nordrhein-Westfalen, DE

2008 to 2010 | Research Assistant (Institute of Theoretical Information Technology)
Employment
Source: Self-asserted source
Dr. Zeeshan Ahmad

COMSATS Institute of Information Technology: Wah Cantt., PK

2004-09-01 to 2005-12-31 | Lecturer, Research Associate (Department of Electrical Engineering)
Employment
Source: Self-asserted source
Dr. Zeeshan Ahmad

Education and qualifications (4)

Universiti Malaysia Sarawak: Kuching, MY

2019-09 to 2023-02 | PhD (Network Technologies)
Education
Source: Self-asserted source
Dr. Zeeshan Ahmad

Virtual University of Pakistan: Lahore, PK

2017 to 2019 | MS Computer Science (Computer Networks)
Education
Source: Self-asserted source
Dr. Zeeshan Ahmad

University College Kalmar: Kalmar, SE

2006 to 2008 | MS Electrical Engineering (Telecommunication)
Education
Source: Self-asserted source
Dr. Zeeshan Ahmad

COMSATS University Islamabad: Islamabad, PK

2001 to 2005 | BS Computer Engineering (Department of Electrical Engineering)
Education
Source: Self-asserted source
Dr. Zeeshan Ahmad

Professional activities (3)

IEEE: New York, NY, US

2020 to present
Membership
Source: Self-asserted source
Dr. Zeeshan Ahmad

International Association of Engineers (IAENG): Hong Kong, CN

2017 to present | Member
Service
Source: Self-asserted source
Dr. Zeeshan Ahmad

Pakistan Engineering Council: Islamabad, PK

2005 to present | Professional Engineer (Life Time Member)
Membership
Source: Self-asserted source
Dr. Zeeshan Ahmad

Works (23)

Exponential Degradation Model Based Remaining Life Prediction for Tools of Milling Machine

2024 | Book chapter
Contributors: Murshedul Arifeen; Andrei Petrovski; Md. Junayed Hasan; Zeeshan Ahmad
Source: check_circle
Crossref

HEADS: Hybrid Ensemble Anomaly Detection System for Internet-of-Things Networks

2024 | Book chapter
Contributors: Zeeshan Ahmad; Andrei Petrovski; Murshedul Arifeen; Adnan Shahid Khan; Syed Aziz Shah
Source: check_circle
Crossref

Mutual Information Based Ensemble Anomaly Detection Strategy for Cyber-Physical Systems

2024 | Book chapter
Contributors: Zeeshan Ahmad; Andrei Petrovski; Igor Kotenko; Syed Aziz Shah; Yin Li
Source: check_circle
Crossref

TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network

International Journal of Network Management
2024-05 | Journal article
Contributors: Najmun Nisa; Adnan Shahid Khan; Zeeshan Ahmad; Johari Abdullah
Source: check_circle
Crossref

MS‐ADS: Multistage Spectrogram image‐based Anomaly Detection System for IoT security

Transactions on Emerging Telecommunications Technologies
2023-08 | Journal article
Contributors: Zeeshan Ahmad; Adnan Shahid Khan; Kartinah Zen; Farhan Ahmad
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks

IEEE Access
2022 | Journal article
Contributors: Adnan Shahid Khan; Yasir Javed; Rashad Mahmood Saqib; Zeeshan Ahmad; Johari Abdullah; Kartinah Zen; Irshad Ahmed Abbasi; Nayeem Ahmad Khan
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review

Applied Sciences
2022-03-31 | Journal article
Contributors: Jamil Asim; Adnan Shahid Khan; Rashad Mahmood Saqib; Johari Abdullah; Zeeshan Ahmad; Shehla Honey; Shehroz Afzal; Malak S. Alqahtani; Mohamed Abbas
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network

IEEE Access
2021 | Journal article
Contributors: Adnan Shahid Khan; Zeeshan Ahmad; Johari Abdullah; Farhan Ahmad
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Heart Rate Detection and Classification from Speech Spectral Features Using Machine Learning

Archives of Acoustics
2021 | Journal article
Contributors: Usman, Mohammed; Zubair, Mohammed; Ahmad, Zeeshan; Zaidi, Monji; Ijyas, Thafasal; Parayangat, Muneer; Wajid, Mohd; Shiblee, Mohammad; Ali, Syed Jaffar
Source: check_circle
Web of Science Researcher Profile Sync

Anomaly Detection Using Deep Neural Network for IoT Architecture

Applied Sciences
2021-07-30 | Journal article
Contributors: Zeeshan Ahmad; Adnan Shahid Khan; Kashif Nisar; Iram Haider; Rosilah Hassan; Muhammad Reazul Haque; Seleviawati Tarmizi; Joel J. P. C. Rodrigues
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

Internet of Vehicles Over Named Data Networking: Current Status and Future Challenges

Studies in Systems, Decision and Control
2020 | Book
EID:

2-s2.0-85069790314

Contributors: Kerrche, C.A.; Ahmad, F.; Elhoseny, M.; Adnane, A.; Ahmad, Z.; Nour, B.
Source: Self-asserted source
Dr. Zeeshan Ahmad via Scopus - Elsevier
grade
Preferred source (of 2)‎

Network intrusion detection system: A systematic study of machine learning and deep learning approaches

Transactions on Emerging Telecommunications Technologies
2020-10-16 | Journal article
Part of ISSN: 2161-3915
Part of ISSN: 2161-3915
Source: Self-asserted source
Dr. Zeeshan Ahmad
grade
Preferred source (of 3)‎

Blockchain in internet-of-things: Architecture, applications and research directions

2019 International Conference on Computer and Information Sciences, ICCIS 2019
2019 | Conference paper
EID:

2-s2.0-85067045577

Contributors: Ahmad, F.; Ahmad, Z.; Kerrache, C.A.; Kurugollu, F.; Adnane, A.; Barka, E.
Source: Self-asserted source
Dr. Zeeshan Ahmad via Scopus - Elsevier
grade
Preferred source (of 2)‎

Detecting benign and pre-cancerous tongue lesions using deep convolutional neural networks for early signs of oral cancer

Basic & Clinical Pharmacology & Toxicology
2019 | Journal article
Contributors: Shamim, Mohammed Z.; Syed, Sadatullah; Shiblee, Mohammad; Usman, Mohammed; Zaidi, Monji; Ahmad, Zeeshan; Muqeet, Mohammed; Habeeb, Mohammed
Source: check_circle
Web of Science Researcher Profile Sync

Heart rate estimation from speech signals using machine learning and cloud computing

Basic & Clinical Pharmacology & Toxicology
2019 | Journal article
Contributors: Usman, Mohammed; Zubair, Mohammed; Ahmad, Zeeshan; Zaidi, Monji; Ijyas, Thafasal; Muneer, Parayangat; Wajid, Mohammad; Shiblee, Mohammad; Rodrigues, Paul; Jaffar, Syed
Source: check_circle
Web of Science Researcher Profile Sync

Towards an efficient vehicular clouds using mobile brokers

2019 International Conference on Computer and Information Sciences, ICCIS 2019
2019 | Conference paper
EID:

2-s2.0-85067015508

Contributors: Kerrache, C.A.; Ahmad, F.; Ahmad, Z.; Lagraa, N.; Kurugollu, F.; Benamar, N.
Source: Self-asserted source
Dr. Zeeshan Ahmad via Scopus - Elsevier
grade
Preferred source (of 2)‎

Dataset of Raw and Pre-processed Speech Signals, Mel Frequency Cepstral Coefficients of Speech and Heart Rate Measurements

2019 5th International Conference on Signal Processing, Computing and Control (ISPCC)
2019-10 | Conference paper
Source: Self-asserted source
Dr. Zeeshan Ahmad
grade
Preferred source (of 2)‎

On the Achievable Rate Region of the Interference Channel in the Presence of a Single Decode-and-Forward Relay

Conference: in International conference on Modern Communication & Computing Technologies (MCCT’14)
2014-02-26 | Conference paper
Source: Self-asserted source
Dr. Zeeshan Ahmad

TDMA network design using decode-and-forward relays with finite set modulation

2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications
2008-09 | Conference paper
Source: Self-asserted source
Dr. Zeeshan Ahmad
grade
Preferred source (of 2)‎

A comprehensive study on DNA based Security scheme Using Deep Learning in Healthcare

Source: check_circle
Web of Science Researcher Profile Sync

Conceptual Review of DoS Attacks in Software Defined Networks

Source: check_circle
Web of Science Researcher Profile Sync

Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure

Source: check_circle
Web of Science Researcher Profile Sync

S-ADS: Spectrogram Image-based Anomaly Detection System for IoT networks

Source: check_circle
Web of Science Researcher Profile Sync

Peer review (11 reviews for 4 publications/grants)

Review activity for Connection science. (2)
Review activity for Cybernetics and systems. (1)
Review activity for IEEE access : (5)
Review activity for Transactions on emerging telecommunications technologies. (3)