Junaid Qadir

Junaid Qadir
Qatar University · Department of Computer Science and Engineering

Professor

About

297
Publications
232,004
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,324
Citations
Introduction
Junaid Qadir is a Professor of Computer Engineering at the Qatar University in Doha. He is also affiliated with the Information Technology University (ITU) in Lahore, Pakistan, where he serves as a Professor in the Electrical Engineering Department. His primary research interests are in the areas of computer systems and networking, applied machine learning and artificial intelligence, and using ICT for development (ICT4D).
Additional affiliations
May 2008 - December 2015
National University of Sciences and Technology
Position
  • Professor (Assistant)

Publications

Publications (297)
Article
Many well-intentioned students fail to thrive in a university environment, not due to lack of effort, but because of a deficient mindset and/or methodology. While a wide variety of problems can result in suboptimal learning performance, there are seven main categories of learning impediments that hinder student learning with alarming regularity. Yo...
Article
Full-text available
In a multirate wireless network, a node can dynamically adjust its link transmission rate by switching between different modulation schemes. In the current IEEE802.11a/b/g standards, this rate adjustment is defined for unicast traffic only. In this paper, we consider a wireless mesh network (WMN), where a node can dynamically adjust its link-layer...
Article
Full-text available
Cognitive radio networks (CRNs) are networks of nodes equipped with cognitive radios that can optimize performance by adapting to network conditions. While cognitive radio networks (CRN) are envisioned as intelligent networks, relatively little research has focused on the network level functionality of CRNs. Although various routing protocols, inco...
Article
Full-text available
In recent times, there have been a lot of efforts for improving the ossified Internet architecture in a bid to sustain unstinted growth and innovation. A major reason for the perceived architectural ossification is the lack of ability to program the network as a system. This situation has resulted partly from historical decisions in the original In...
Article
Apart from mobile cellular networks, IEEE 802.11-based wireless local area networks (WLANs) represent the most widely deployed wireless networking technology. With the migration of critical applications onto data networks, and the emergence of multimedia applications such as digital audio/video and multimedia games, the success of IEEE 802.11 depen...
Article
Full-text available
The twenty-first century technological advances driven by exponential rise of artificial intelligence (AI) technology have ushered in a new era that offers many of us hitherto unimagined luxuries and facilities. However, under the guise of this progressive discourse, particularly in the backdrop of current neo-liberal late-capitalist postmodern wor...
Article
One of the key challenges in federated learning (FL) is the detection of malicious parameter updates. In a typical FL setup, the presence of malicious client(s) can potentially demolish the overall training of the shared global model by influencing the aggregation process of the server. In this paper, we present a hybrid learning-based method for t...
Article
Retinal images acquired using fundus cameras are often visually blurred due to imperfect imaging conditions, refractive medium turbidity, and motion blur. In addition, ocular diseases such as the presence of cataracts also result in blurred retinal images. The presence of blur in retinal fundus images reduces the effectiveness of the diagnosis proc...
Article
In recent years, deep learning (DL) techniques have provided state-of-the-art performance in medical imaging. However, good quality (annotated) medical data is in general hard to find due to the usually high cost of medical images, limited availability of expert annotators (e.g., radiologists), and the amount of time required for annotation. In add...
Preprint
Metaverse has evolved as one of the popular research agendas that let the users learn, socialize, and collaborate in a networked 3D immersive virtual world. Due to the rich multimedia streaming capability and immersive user experience with high-speed communication, the metaverse is an ideal model for education, training, and skill development tasks...
Conference Paper
Full-text available
In a volatile, uncertain, complex, and ambiguous (VUCA) 21st-century world, there is a great need for drawing upon capacity for holistic thinking and wisdom. We need to leverage multiple transdisciplinary thinking that allows a multiplexity of ways of thinking and knowing to deal with multi-layered complex reality. Our society is rife with elusive...
Preprint
p>Quantum computing uses fundamentally different ways of information processing compared to traditional computing systems such as the use of qubits (quantum bits) and the quantum properties of subatomic particles such as interference, entanglement and superposition to extend the computational capabilities to hitherto unprecedented levels. Although...
Article
Modern cities are complex adaptive systems in which there is a lot of dependency and interaction between the various stakeholders, components, and subsystems. The use of digital Information and Communications Technology (ICT) has opened up the vision of smart cities in which the city dwellers can have a better quality of life and the city can be be...
Article
While the technique of Deep Neural Networks (DNNs) has been instrumental in achieving state-of-the-art results for various Natural Language Processing (NLP) tasks, recent works have shown that the decisions made by DNNs cannot always be trusted. Recently Explainable Artificial Intelligence (XAI) methods have been proposed as a method for increasing...
Article
Full-text available
Rapid progress in adversarial learning has enabled the generation of realistic-looking fake visual content. To distinguish between fake and real visual content, several detection techniques have been proposed. The performance of most of these techniques however drops off significantly if the test and the training data are sampled from different dis...
Article
Full-text available
The domain of Artificial Intelligence (AI) ethics is not new, with discussions going back at least 40 years. Teaching the principles and requirements of ethical AI to students is considered an essential part of this domain, with an increasing number of technical AI courses taught at several higher-education institutions around the globe including c...
Preprint
div>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. However, research has shown that the adversarial vulnerabilities of deep learning networks manifest themselves when DL is used for NLP ta...
Preprint
div>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. However, research has shown that the adversarial vulnerabilities of deep learning networks manifest themselves when DL is used for NLP ta...
Article
Full-text available
Purpose Along with the various beneficial uses of artificial intelligence (AI), there are various unsavory concomitants including the inscrutability of AI tools (and the opaqueness of their mechanisms), the fragility of AI models under adversarial settings, the vulnerability of AI models to bias throughout their pipeline, the high planetary cost of...
Article
As the globally increasing population drives rapid urbanization in various parts of the world, there is a great need to deliberate on the future of the cities worth living. In particular, as modern smart cities embrace more and more data-driven artificial intelligence services, it is worth remembering that (1) technology can facilitate prosperity,...
Article
Internet of Medical Things (IoMT) supports traditional healthcare systems by providing enhanced scalability, efficiency, reliability, and accuracy of healthcare services. It enables the development of smart hardware as well as software platforms that operate on the basis of communication systems and the algorithms that process the data collected by...
Preprint
BACKGROUND Contact tracing has been globally adopted in the fight to control the infection rate of COVID-19. Thanks to digital technologies, such as smartphones and wearable devices, contacts of COVID-19 patients can be easily traced and informed about their potential exposure to the virus. To this aim, several mobile applications have been develop...
Article
Background: Contact tracing has been globally adopted in the fight to control the infection rate of COVID-19. Thanks to digital technologies, such as smartphones and wearable devices, contacts of COVID-19 patients can be easily traced and informed about their potential exposure to the virus. To this aim, several mobile applications have been develo...
Article
The spread of COVID-19 and the lockdowns that followed led to an increase in activity on online social networks. This has resulted in users sharing unfiltered and unreliable information on social networks like WhatsApp, Twitter, Facebook, etc. In this work, we give an extended overview of how Pakistan's population used public WhatsApp groups for sh...
Preprint
Full-text available
p>Quantum computing is an emerging field of research that can provide a “quantum leap” in terms of computing performance and thereby enable many new exciting healthcare applications such as rapid DNA sequencing, drug research and discovery, personalized medicine, molecular simulations, diagnosis assistance, efficient radiotherapy. In this paper, we...
Article
Full-text available
Objective: Scarcity of good quality electroencephalography (EEG) data is one of the roadblocks for accurate seizure prediction. This work proposes a deep convolutional generative adversarial network (DCGAN) to generate synthetic EEG data. Another objective of our study is to use transfer-learning (TL) for evaluating the performance of four well-kn...
Preprint
Link for paper: https://www.techrxiv.org/articles/preprint/Survey_of_Deep_Representation_Learning_for_Speech_Emotion_Recognition/16689484 ============================================================= Traditionally, speech emotion recognition (SER) research has relied on manually handcrafted acoustic features using feature engineering. However, the...
Preprint
Paper link: https://www.techrxiv.org/articles/preprint/Survey_of_Deep_Representation_Learning_for_Speech_Emotion_Recognition/16689484 ============================================================= Traditionally, speech emotion recognition (SER) research has relied on manually handcrafted acoustic features using feature engineering. However, the desi...
Article
Link for paper: https://www.techrxiv.org/articles/preprint/Survey_of_Deep_Representation_Learning_for_Speech_Emotion_Recognition/16689484 ============================================================= Traditionally, speech emotion recognition (SER) research has relied on manually handcrafted acoustic features using feature engineering. However, the...
Article
Full-text available
Deep Reinforcement Learning (DRL) has numerous applications in the real world thanks to its ability to achieve high performance in a range of environments with little manual oversight. Despite its great advantages, DRL is susceptible to adversarial attacks, which precludes its use in real-life critical systems and applications (e.g., smart grids, t...
Preprint
Full-text available
In response to various privacy risks, researchers and practitioners have been exploring different paradigms that can leverage the increased computational capabilities of consumer devices to train machine (ML) learning models in a distributed fashion without requiring the uploading of the training data from individual devices to central facilities....
Preprint
In response to various privacy risks, researchers and practitioners have been exploring different paradigms that can leverage the increased computational capabilities of consumer devices to train machine (ML) learning models in a distributed fashion without requiring the uploading of the training data from individual devices to central facilities....
Preprint
Retinal images acquired using fundus cameras are often visually blurred due to imperfect imaging conditions, refractive medium turbidity, and motion blur. In addition, ocular diseases such as the presence of cataract also result in blurred retinal images. The presence of blur in retinal fundus images reduces the effectiveness of the diagnosis proce...
Preprint
Full-text available
Retinal images acquired using fundus cameras are often visually blurred due to imperfect imaging conditions, refractive medium turbidity, and motion blur. In addition, ocular diseases such as the presence of cataract also result in blurred retinal images. The presence of blur in retinal fundus images reduces the effectiveness of the diagnosis proce...
Article
Full-text available
Building operations represent a significant percentage of the total primary energy consumed in most countries due to the proliferation of Heating, Ventilation and Air-Conditioning (HVAC) installations in response to the growing demand for improved thermal comfort. Reducing the associated energy consumption while maintaining comfortable conditions i...
Article
Full-text available
With the hyperconnectivity and ubiquity of the Internet, the fake news problem now presents a greater threat than ever before. One promising solution for countering this threat is to leverage deep learning (DL)-based text classification methods for fake-news detection. However, since such methods have been shown to be vulnerable to adversarial atta...
Preprint
Full-text available
Analyzing fake-news detectors under adversarial threat using the Text-Attack Library for a number of model hyper-parameters and attack settings.
Article
Full-text available
The coronavirus disease 2019 (COVID-19) is a severe global pandemic that has claimed millions of lives and continues to overwhelm public health systems in many countries. The spread of COVID-19 pandemic has negatively impacted the human mobility patterns such as daily transportation-related behavior of the public. There is a requirement to understa...
Article
Full-text available
This paper discusses the design, implementation and field trials of WiMesh, a resilient wireless mesh network-based disaster communication system purpose-built for underdeveloped and rural parts of the world. Mesh networking is a mature area, and the focus of this paper is not on proposing novel models, protocols or other mesh solutions. Instead, t...
Preprint
Arabic Natural Language Processing for Qur’anic Research: A Systematic Review
Preprint
Arabic Natural Language Processing for Qur’anic Research: A Systematic Review
Preprint
With the advent of machine learning (ML) applications in daily life, the questions about liability, trust, and interpretability of their outputs are raising, especially for healthcare applications. The black-box nature of ML models is a roadblock for clinical utilization. Therefore, to gain the trust of clinicians and patients, researchers need to...
Preprint
With the advent of machine learning (ML) applications in daily life, the questions about liability, trust, and interpretability of their outputs are raising, especially for healthcare applications. The black-box nature of ML models is a roadblock for clinical utilization. Therefore, to gain the trust of clinicians and patients, researchers need to...
Preprint
Full-text available
Analyzing fake-news detectors under adversarial threat using the Text-Attack Library for a number of model hyper-parameters and attack settings.
Preprint
Full-text available
Building operations represent a significant percentage of the total primary energy consumed in most countries due to the proliferation of Heating, Ventilation and Air-Conditioning (HVAC) installations in response to the growing demand for improved thermal comfort. Reducing the associated energy consumption while maintaining comfortable conditions i...
Article
Full-text available
Building operations represent a significant percentage of the total primary energy consumed in most countries due to the proliferation of Heating, Ventilation and Air-Conditioning (HVAC) installations in response to the growing demand for improved thermal comfort. Reducing the associated energy consumption while maintaining comfortable conditions i...
Preprint
Analyzing fake-news detectors under adversarial threat using the Text-Attack Library for a number of model hyper-parameters and attack settings.
Preprint
Full-text available
Speech emotion sensing in communication networks has a wide range of applications in real life. In these applications, voice data are transmitted from the user to the central server for storage, processing, and decision making. However, speech data contain vulnerable information that can be used maliciously without the user's consent by an eavesdro...
Preprint
Analyzing fake-news detectors under adversarial threat using the Text-Attack Library for a number of model hyper-parameters and attack settings.
Preprint
Full-text available
In the modern world, the connectivity-as-we-go model is gaining popularity. Internet-of-Things (IoT) envisions a future in which human beings communicate with each other and with devices that have identities and virtual personalities, as well as sensing, processing, and networking capabilities, which will allow the developing of smart environments...
Preprint
Full-text available
Breast cancer is one of the most common cause of deaths among women. Mammography is a widely used imaging modality that can be used for cancer detection in its early stages. Deep learning is widely used for the detection of cancerous masses in the images obtained via mammography. The need to improve accuracy remains constant due to the sensitive na...
Preprint
Full-text available
Wheat is the main agricultural crop of Pakistan and is a staple food requirement of almost every Pakistani household making it the main strategic commodity of the country whose availability and affordability is the government's main priority. Wheat food availability can be vastly affected by multiple factors included but not limited to the producti...
Preprint
Full-text available
BACKGROUND Contact tracing has been globally adopted in the fight to control the infection rate of COVID-19. Thanks to digital technologies, such as smartphones and wearable devices, contacts of COVID-19 patients can be easily traced and informed about their potential exposure to the virus. To this aim, several interesting mobile applications have...
Conference Paper
Full-text available
Recently, there has been an alarming rise in the presence of false information online, which may be spread knowingly with mal-intent ("disinformation") or naively without knowing ("misinformation"). The spread of both these types of false information disintegrates public trust on the information ecology and can have deleterious effect on society (e...
Article
Full-text available
In the modern world, the connectivity-as-we-go model is gaining popularity. Internet-of-Things (IoT) envisions a future in which human beings communicate with each other and with devices that have identities and virtual personalities, as well as sensing, processing, and networking capabilities, which will allow the developing of smart environments...
Preprint
Full-text available
The coronavirus disease 2019 (COVID-19) is a severe global pandemic that has claimed millions of lives and continues to overwhelm public health systems in many countries. The spread of COVID-19 pandemic has negatively impacted the human mobility patterns such as daily transportation-related behavior of the public. There is a requirement to understa...
Article
Full-text available
With the world becoming flat with fluid boundaries, engineers have to be global in their outlook and their pedigree. Due to the need for international acceptance of engineering qualification, the incorporation of Outcome-Based Education (OBE) has become common and global accreditation treaties such as the Washington Accord have been ratified. Furth...
Preprint
Full-text available
Despite significant improvements over the last few years, cloud-based healthcare applications continue to suffer from poor adoption due to their limitations in meeting stringent security, privacy, and quality of service requirements (such as low latency). The edge computing trend, along with techniques for distributed machine learning such as feder...