Abdul Waheed

Abdul Waheed
Northern University · Faculty of Engineering and Information Technology

PhD Computer Science
Looking for Collaborators, a new position, feedback or something else. Email: abdul@netlab.snu.ac.kr

About

99
Publications
19,721
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
677
Citations
Citations since 2016
49 Research Items
295 Citations
2016201720182019202020212022020406080100120140
2016201720182019202020212022020406080100120140
2016201720182019202020212022020406080100120140
2016201720182019202020212022020406080100120140
Introduction
Abdul is a member of the Crypto-Net Research Group, Hazara University. He has completed his Ph.D. research from NetLab-INMC under the School of Electrical and Computer Engineering (ECE), Seoul National University (SNU), South Korea, in 2019, under the HEC Research Program. He also serves as a Dean Faculty of Engineering and Information Technology (FEIT), & AP department of Computer Sciences, Northern University, Nowshera, KP. He has numerous publications in various journals and conferences.
Education
April 2016 - April 2021
PhD Computer Science
Field of study
  • Computer Science

Publications

Publications (99)
Article
Full-text available
Machine-to-machine communication allows smart devices like sensors, actuators, networks, gateways, and other controllers to communicate with one another. The industrial Internet of things (IIoT) has become a vital component. Many industrial devices are connected to perform a task automatically in machine-to-machine communication, but they are not p...
Article
Full-text available
Automatic sarcasm detection in textual data is a crucial task in sentiment analysis. This problem is complex because sarcastic comments usually carry the opposite meaning and are context-driven. The issue of sarcasm detection in comments written in Perso-Arabic-scripted Urdu text is even more challenging due to limited online linguistic resources....
Article
Full-text available
Information Technology (IT) is one of the fast-growing industries. On the one hand, IT organizations get benefits from their skilled and talented employees to increase their annual growth and productivity. On the other hand, IT and software organizations are facing a lot of challenges because of high employee turnover intention. The main causes of...
Article
Full-text available
In Distributed Hash Table (DHT)-based Mobile Ad Hoc Networks (MANETs), a logical structured network (i.e., follows a tree, ring, chord, 3D, etc., structure) is built over the ad hoc physical topology in a distributed manner. The logical structures guide routing processes and eliminate flooding at the control and the data plans, thus making the syst...
Article
Full-text available
The defocus or motion effect in images is one of the main reasons for the blurry regions in digital images. It can affect the image artifacts up to some extent. However, there is a need for automatic defocus segmentation to separate blurred and sharp regions to extract the information about defocus-blur objects in some specific areas, for example,...
Article
Full-text available
Software-defined network (SDN) and vehicular ad-hoc network (VANET) combined pro-vided a software-defined vehicular network (SDVN). To increase the quality of service (QoS) of vehicle communication and to make the overall process efficient, researchers are working on VANET communication systems. Current research work has made many strides, but due...
Article
Full-text available
The ever-growing ecosystem of the Internet of Things (IoT) integrating with the ever-evolving wireless communication technology paves the way for adopting new applications in a smart society. The core concept of smart society emphasizes utilizing information and communication technology (ICT) infrastructure to improve every aspect of life. Among th...
Article
Full-text available
Spatial and temporal information on urban infrastructure is essential and requires various land-cover/land-use planning and management applications. Besides, a change in infrastructure has a direct impact on other land-cover and climatic conditions. This study assessed changes in the rate and spatial distribution of Peshawar district's infrastructu...
Article
Full-text available
Driver's stress detection is a critical research area that helps reduce the likelihood of traffic accidents and driver's health complexities due to prolonged stress. Previous work in this area is heavily based on traditional machine learning models that classify the driver's stress levels using handcrafted features extraction techniques. Extracting...
Article
Full-text available
Nowadays, cloud-based storage systems play a vital role in IoT data storage, processing, and sharing. Despite its contribution, the current cloud-based architecture may cause severe data leakage or jeopardize user privacy. Meanwhile, the cloud-based architecture heavily relies on a trusted third-party auditor (TPA) and runs in a centralized control...
Article
Full-text available
One of the most common causes of mortality for women globally is breast cancer. Early breast cancer identification could make it possible for people to receive the appropriate treatment to save their lives and return to their routine lives. Breast cancer diagnosis by histopathology is referred to as the gold standard. In recent years, convolutional...
Article
Full-text available
Spatial and temporal information on urban infrastructure is essential and requires various land-cover/land-use planning and management applications. Besides, a change in infrastructure has a direct impact on other land-cover and climatic conditions. This study assessed changes in the rate and spatial distribution of Peshawar district’s infrastructu...
Article
Full-text available
Emerging Unmanned Aerial Vehicles (UAVs) have applications for traffic monitoring, public safety, surveillance, agriculture, health services. Collaborative UAVs can form flying ad hoc networks, although such networks are especially vulnerable to security vulnerabilities due to open access media and limited power. Very recently, Khan et al. presen...
Article
Full-text available
Recently, Attribute-Based Encryption (ABE) is used as a baseline technology for keyword searching mechanisms to cater users' security and privacy-related concerns who outsource their data to the powerful and resource-rich cloud server. Almost all the existing Attribute-Based Keyword Searching (ABKS) schemes either operate on a single-keyword or mul...
Article
Full-text available
Wireless Body Area Networks (WBANs) are emerging in the livestock industry for remote monitoring of cattle using wireless body sensors (WBS). The random mobility of animals acting as nodes causes the network’s topology to change rapidly, originating from scalability and reliability issues. Stable transmission of acquired data to the base station re...
Article
Full-text available
Wireless Sensor Network (WSN) is a particular network built from small sensor nodes. These sensor nodes have unique features. That is, it can sense and process data in WSN. WSN has tremendous applications in many fields. Despite the significance of WSN, this kind of network faced several issues. The biggest problems rising in WSN are energy consump...
Article
Full-text available
In the last decade, due to wireless technology’s enhancement, the people’s interest is highly increased in Wireless Body Sensor Networks (WBSNs). WBSNs consist of many tiny biosensor nodes that are continuously monitoring diverse physiological signals such as BP (systolic and diastolic), ECG, EMG, SpO2, and activity recognition and transmit these s...
Article
Full-text available
Citation: Adnan, M.; Iqbal, J.; Waheed, A.; Amin, N.U.; Zareei, M.; Umer, A.; Mohamed, E.M. Towards the Design of Efficient and Secure Architecture for Software-Defined Vehicular Networks. Abstract: Recently, by the rapid development of Vehicular Ad Hoc Networks (VANETs) and the advancement of Software Defined Networking (SDN) as an emerging techno...
Article
Full-text available
The next-generation wireless networks are expected to provide higher capacity, system throughput with improved energy efficiency. One of the key technologies, to meet the demand for high-rate transmission, is device-to-device (D2D) communication which allows users who are close to communicating directly instead of transiting through base stations,...
Article
Full-text available
The defocus blur concept adds an artistic effect and enables an enhancement in the visualization of image scenery. Moreover, some specialized computer vision fields, such as object recognition or scene restoration enhancement, might need to perform segmentation to separate the blurred and non-blurred regions in partially blurred images. This study...
Article
Full-text available
Acute Myeloid Leukemia (AML) is a kind of fatal blood cancer with a high death rate caused by abnormal cells’ rapid growth in the human body. The usual method to detect AML is the manual microscopic examination of the blood sample, which is tedious and time-consuming and requires a skilled medical operator for accurate detection. In this work, we p...
Article
To make the electoral process more secure, comfortable, and universal, it is essential to use modern cryptographic techniques for ensuring the anonymity of information in the electronic voting system. In many emerging applications like electronic voting data anonymity as well as un-traceability are the most essential security properties. To ensure...
Article
Full-text available
Modern vehicles are equipped with various sensors, onboard units, and devices such as Application Unit (AU) that support routing and communication. In VANETs, traffic management and Quality of Service (QoS) are the main research dimensions to be considered while designing VANETs architectures. To cope with the issues of QoS faced by the VANETs, we...
Article
Full-text available
The electronic applications of financial institutions like banks and insurance companies use either tokenbased, biometric-based, or knowledge-based password scheme to keep the confidential information of their customers safe from hackers. The knowledge-based password scheme’s resistance, particularly its reformation-based password scheme against sh...
Article
Full-text available
With the rising number of patients along with the same time, the comparative evolution in wireless technology has made Body Sensor Networks (BSNs) flourishing in the market. In BSNs, tiny biosensor nodes are deployed inside/outside of a human body to continuously monitor patient vital signs such as heartbeat rate, blood pressure, respiratory rate,...
Article
Cursive text recognition of Arabic script-based languages like Urdu is extremely complicated due to its diverse and complex characteristics. Evolutionary approaches like genetic algorithms have been used in the past for various optimization as well as pattern recognition tasks, reporting exceptional results. The proposed Urdu ligature recognition s...
Article
With the rising number of patients along with the same time, the comparative evolution in wireless technology has made Body Sensor Networks (BSNs) flourishing in the market. In BSNs, tiny biosensor nodes are deployed inside/outside of a human body to continuously monitor patient vital signs such as heartbeat rate, blood pressure, respiratory rate,...
Article
Congestion control is one of the main obstacles in cyberspace traffic. Overcrowding in internet traffic may cause several problems; such as high packet hold-up, high packet dropping, and low packet output. In the course of data transmission for various applications in the Internet of things, such problems are usually generated relative to the input...
Article
Full-text available
Color-based image segmentation classifies pixels of digital images in numerous groups for further analysis in computer vision, pattern recognition, image understanding, and image processing applications. Various algorithms have been developed for image segmentation, but clustering algorithms play an important role in the segmentation of digital ima...
Article
Full-text available
Proxy signcryption is essential security primitive for emerging secure communication such as e-business, mobile agents, online voting, contract signing, and online auction. It combines the functionality of a proxy signature and encryption to achieve basic security features maintaining a low computational and communicational cost. Ming proposed Prox...
Article
Full-text available
Proxy signcryption is essential security primitive for emerging secure communication fields, namely, e-business, mobile agents, online voting, contract signing, and online auction. It combines the functionality of a proxy signature and encryption to achieve basic security features maintaining a low computational and communicational cost. Ming propo...
Article
Full-text available
Wireless Body Area Network is an emerging technology that is used primarily in the area of healthcare applications. It is a low-cost network having the capability of transportability and adaptability. It can be used in location independent and long-term remote monitoring of people without disturbing their daily activities. In a typical WBAN system,...
Article
Full-text available
In body sensor networks, both wearable and implantable biosensors are deployed in a patient body to monitor and collect patient health record information. The health record information is then transmitted toward the medical server via a base station for analysis, diagnosis, and treatment by medical experts. Advancement in wireless technology althou...
Article
Wireless Body Area Networks (WBANs) are rapidly evolving research field for patients' health monitoring and immediate medical response. In WBANs, tiny biosensor nodes deployed on body sense physiological data of patients and transmit it to Medical Server (MS) via Base Station (BS) for utilization by the Medical Officers (MOs). The security of human...
Article
GMSCF is a variant of multicast generalized signcryption designed for the authentication of messages in multi mode i.e. encryption only mode, signature only mode and signcryption only mode. These multimode messages are verified by the firewall before communicating to the multi receiver. In this paper, we propose a novel multi receiver generalized s...
Article
Full-text available
Secure data transmission is a challenging issue in modern data communication. ID based generalized signcryption is a cost effective security primitive which provides authentication or confidentiality, or jointly confidentiality and authentication. Wei’s proposed an ID based generalized signcryption scheme for authentication and confidentiality of b...
Article
Certificateless generalized signcryption adaptively work as certificateless signcryption, signature or encryption scheme having single algorithm for suitable storage-constrained environments. Recently, Zhou et al. proposed a novel Certificates generalized scheme, and proved its ciphertext indistinguishability under adaptive chosen ciphertext attack...
Conference Paper
The World Wide Web has emerged as the most important and essential tool for the society. Today, people heavily rely on rich resources available in the web for communication, business, maps, and social networking etc. In addition, people seek web content in their preferred regional language besides English. The global statistics of the world wide we...
Conference Paper
Full-text available
A fully automated run-time parallelization of an application without any input from the user is the ultimate target of research efforts in High Performance Computing. As run-time methodologies are typically sensitive to analysis and modification overheads, there should be a stricter selection criteria rather than analyzing all code. A hotspot metho...
Article
Full-text available
Virtualization has emerged as an attractive software solution for many problems in server domain. Recently, it has started to enrich embedded systems domain by offering features such as hardware consolidation, security, and isolation. Our objective is to bring virtualization to high-end MIPS64 based systems, such as network routers, switches, wirel...
Conference Paper
Full-text available
Embedded systems are proliferating with their growing hardware capabilities. Their application areas include internet of things, cellular devices, network devices, etc. Application development and testing natively on such embedded hardware is expensive, time consuming, and challenging. In this case, system emulation is a cost-effective alternative....
Article
Due to its cost efficiency signcryption attract cryptographic research community interest. To fulfill the need of secure multicast environment many multicast signcryption scheme has been proposed. Till date, Ahmad et al proposed multi recipient signcryption scheme, is the most cost effective multi receiver scheme. This paper present cryptanalysis o...
Article
Full-text available
Dynamic binary translation (DBT) has been used in various applications that range from system-level virtualization to cross-platform application execution. It has also been used in kernel profiling/tracing and security applications. In this paper, we discuss multiple DBT strategies that were implemented during the development of a type-II hyperviso...
Conference Paper
Full-text available
Efficacy of automatic parallelization techniques that rely on source code analysis alone is often limited due to lack of information about runtime characteristics of target applications. In order to exploit runtime application behavior for its parallelization, we need: (1) tools/techniques for dynamic instrumentation and profiling; and (2) a method...
Article
Full-text available
This paper presents our experience of developing Octeon MIPS64r2 'User Mode Emulation' (UME) support into open source 'Quick Emulator' (QEMU). QEMU can emulate numerous target architectures. Like many other open source projects, available documentation of the software is either scant or stale. Modifying and extending such code becomes especially ch...
Article
Thread level speculation (TLS) is an emerging parallel computing paradigm to enable parallelization with minimal programmer interaction on state-of-the-art multi-core systems. However, when applied indiscriminately, thread squashing and re-execution can incur significant overhead and TLS may result in performance degradation compared to sequential...
Article
There is a growing trend to insert application intelligence into network devices. Processors in this type of Application Oriented Networking (AON) devices are required to handle both packet-level network I/O intensive operations as well as XML message-level CPU intensive operations. In this paper, we investigate the performance effect of symmetric...
Conference Paper
Full-text available
The website census is an effort to enumerate all the websites on the World Wide Web (WWW) without using crawling. Crawling is a traditional way of website discovery. It is conceptually simple but the very size of the WWW makes the implementation complex and resource demanding. The enormous amount of bandwidth, a huge persistent storage pool, a suff...