Wajid Rafiq

Wajid Rafiq
The University of Calgary | HBI · Department of Electrical and Software Engineering

Doctor of Philosophy
Leading research team, working on Beyond 5G Network Slicing for Smart City Applications

About

44
Publications
24,069
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
600
Citations
Citations since 2016
44 Research Items
600 Citations
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250
Introduction
My research interests include end-to-end IoT services orchestration, edge computing, resource allocation in IoT, and security in virtualized networks. Currently, I am working at the Network Research Lab, the University of Montreal on IoT services orchestration using SDICN, optimal resource allocation for different latency applications, and security of IoT services.
Additional affiliations
March 2021 - June 2022
Université de Montréal
Position
  • PostDoc Position
Description
  • I worked as a postdoctoral researcher at the University of Montreal, Canada. I am involved in performing research on wide areas of edge computing, network security, and the internet of things.
January 2017 - March 2021
Victoria University
Position
  • Remote Position (Researche Associate)
Description
  • I worked remotely with a professor at Victoria University, Australia on a project on Securing Software Defined Networks against Flooding Attacks. We implemented a prototype solution that secures the SDNs against link flooding attacks. I am involved in drafting reports and research papers. This is an ongoing project the papers on this study have been published in IEEE Access, Elsevier-JNCA, and Wiley International Journal of Intelligent Systems.
Education
September 2017 - June 2020
Nanjing University
Field of study
  • Computer Science and Technology

Publications

Publications (44)
Preprint
p>Internet of Everything (IoE) connects billions of people, devices, objects and things to the Internet for autonomous services provisioning. IoE benefits from the value created by the compound impacts of connecting people, processes, things, and data. The interoperability among heterogeneous components facilitates seamless communication exchange f...
Preprint
p>Internet of Everything (IoE) connects billions of people, devices, objects and things to the Internet for autonomous services provisioning. IoE benefits from the value created by the compound impacts of connecting people, processes, things, and data. The interoperability among heterogeneous components facilitates seamless communication exchange f...
Article
Healthcare uses state-of-the-art technologies (such as wearable devices, blood glucose meters, electrocardiographs), which results in the generation of large amounts of data. Healthcare data is essential in patient management and plays a critical role in transforming healthcare services, medical scheme design, and scientific research. Missing data...
Article
IoT connects a large number of physical objects with the Internet that capture and exchange real-time information for service provisioning. Traditional network management schemes face challenges to manage vast amounts of network traffic generated by IoT services. Software-Defined Networking (SDN) and Information-Centric Networking (ICN) are two com...
Preprint
p>Quantum computing uses fundamentally different ways of information processing compared to traditional computing systems such as the use of qubits (quantum bits) and the quantum properties of subatomic particles such as interference, entanglement and superposition to extend the computational capabilities to hitherto unprecedented levels. Although...
Article
Network update enables Software-Defined Networks (SDNs) to optimize the data plane performance. The single update focuses on processing one update event at a time, i.e. , updating a set of flows from their initial routes to target routes, but it fails to handle continuously arriving update events in time incurred by high-frequency network changes...
Article
Full-text available
With the continuous increment of city volume and size, a number of traffic-related urban units (e.g., vehicles, roads, buildings, etc.) are emerging rapidly, which plays a heavy burden on the scientific traffic control of smart cities. In this situation, it is becoming a necessity to utilize the sensor data from massive cameras deployed at city cro...
Article
Internet of Medical Things (IoMT) supports traditional healthcare systems by providing enhanced scalability, efficiency, reliability, and accuracy of healthcare services. It enables the development of smart hardware as well as software platforms that operate on the basis of communication systems and the algorithms that process the data collected by...
Article
Various cyber attacks often occur in logistics network of the Industry4.0,which poses a threat to internet security.Intrusion detection can intelligently detect anomalous activities and secure the internet with the help of anomaly detection algorithms.Different from static data,intrusion detection data is a dynamic data form and has the following c...
Preprint
Full-text available
p>Quantum computing is an emerging field of research that can provide a “quantum leap” in terms of computing performance and thereby enable many new exciting healthcare applications such as rapid DNA sequencing, drug research and discovery, personalized medicine, molecular simulations, diagnosis assistance, efficient radiotherapy. In this paper, we...
Article
Full-text available
Purpose In the modern era, libraries confront significant service challenges. Some challenges are linked to information resource management which includes direct availability of information for immediate decision making. The Internet of Things (IoT) is a recent technological shift that library personnel should be aware of because it has the potenti...
Article
The Corona Virus Disease 2019 (COVID-19) has a great impact on public health and public psychology. People stay at home for a long time and rarely go out. With the improvement of the epidemic situation, people began to go to different places to check in. In order to maintain public mental health, it is necessary to propose a point-of-interest (POI)...
Article
Full-text available
Purpose -- Blockchain technology is a distributed and decentralized public digital ledger, which is employed to save dynamic transaction data and static records across several computers so that each record could not be modified retroactively without the collusion of the network and alteration of all subsequent blocks. Recently, it has become immens...
Article
Full-text available
Numerous studies have examined the role of social media as an open-learning (OL) tool in the field of education, but the empirical evidence necessary to validate such OL tools is scant, specifically in terms of student academic performance (AP). In today’s digital age, social media platforms are most popular among the student community, and they pr...
Article
Full-text available
A new class of link flooding attacks (LFA) can cut off internet connections of target links by employing legitimate flows to congest these without being detected. LFA is especially powerful in disrupting traffic in software-defined networks if the control channel is targeted. Most of the existing solutions work by conducting a deep packet-level ins...
Conference Paper
Full-text available
In recent years, edge computing transforms the network edge into an intelligent platform to provide better services for users by making storage, computing, control and network function closer to end-users, things, and sensors. However, due to the limitation of edge resources and the diversity of edge resource providers, there is no good mechanism t...
Article
Full-text available
Link Flooding Attacks (LFA) are a devastating type of stealthy denial of service attack that congests critical network links and can completely isolate the victim's network. In this work, we present a systematic survey of LFA patterns on all the layers of the Software Defined Network (SDN) ecosystem, along with a comparative analysis of mitigation...
Article
Full-text available
Millions of sensors continuously produce and transmit data to control real-world infrastructures using complex networks in the Internet of Things (IoT). However, IoT devices are limited in computational power, including storage, processing, and communication resources, to effectively perform compute-intensive tasks locally. Edge computing resolves...
Chapter
Full-text available
Efficient utilization of the IoT generated data helps in the decision-making process as well as the realization of the concept of smart cities into a reality. The smart cities utilize Intelligent Transportation System (ITS) to facilitate smart vehicles to operate independently without much human intervention. The ITS system utilizes the data produc...
Chapter
Classification is one of the most used machine learning technique especially in the prediction of daily life things. Its first step is grouping, dividing, categorizing, and separation of datasets based on future vectors. Classification procedure has many algorithms, some of them are Random Forest, Naïve Bayes, Decision Tree and Support Vector Machi...
Article
Full-text available
Modern internet technologies have revolutionized the traditional education by providing flexible and resourceful e-learning opportunities in all the fields of knowledge. Programming constitutes integral part of undergraduate curriculum in computer sciences, and adequate level of programming expertise is expected from the graduates. In this paper, w...
Article
Full-text available
Application development for the Internet of Things (IoT) poses immense challenges due to the lack of standard development frameworks, tools, and techniques to assist end-users in dealing with the complexity of IoT systems during application development. These challenges invoke the use of model-driven development (MDD) along with the representationa...
Article
Full-text available
With the advent of Internet of Things (IoT) age, the variety and volume of web services have been increasing at a fast speed. This often leads to users' selections for web services more complicated. Under the circumstance, a variety of methods such as collaborative filtering are adopted to deal with this challenging situation. While traditional col...
Chapter
Full-text available
Big data recommendation systems provide recommendations based on user history and optimize this process using feedback information. Recent developments in location-based social networks reveal that spatial properties of users greatly affect their opinion. Traditional location-aware recommendation systems do not consider user intentions to produce p...
Chapter
Full-text available
Managing the huge IoT infrastructure poses a vital challenge to the network community. Software Defined Networking (SDN), due to its characteristics of centralized network management has been considered as an optimal choice to manage IoT. Edge computing brings cloud recourses near the IoT to localize the cloud demands. Consequently, SDN, IoT, and e...
Chapter
Internet of Things (IoT) has been tremendously involved in the development of smart infrastructure. Software solutions in IoT have to consider lack of abstractions, heterogeneity, multiple stakeholders, scalability, and interoperability among the devices. The developers need to implement application logic on multiple hardware platforms to satisfy t...
Article
Due to the widespread popularity of cyber-social networks, research on community and social role discovery has drawn immense attention. Most of the available literature consider community and social role detection as areas of a disjoint problem domain. Moreover , existing research on concurrent community and social role detection utilizes a pre-def...
Article
Full-text available
Software Defined Networking (SDN) offers a novel paradigm for effective network management by decoupling the control plane from the data plane thereby allowing a high level of manageability and programmability. However, the notion of a centralized controller becomes a bottleneck by opening up a host of vulnerabilities to various types of attacks. O...
Article
Edge computing has emerged as a promising infrastructure for providing elastic resources in the proximity of mobile users. Owing to resource limitations in mobile devices, offloading several computational tasks from mobile devices to mobile edge servers is the main means of improving the quality of experience of mobile users. In fact, because of th...
Chapter
Full-text available
Huge amount of data is being produced by online social interaction among people. This data can be represented by graphs where nodes represent individuals and the connecting edges depicts their interaction. In this research we analyze a social network of individuals to understand social structure among them. Online interaction has become integral pa...
Chapter
In order to improve the quality of life and the efficiency of work, users need timely and accurate services provided by mobile devices. However, for the same service, different users have various personalized use styles, such as usage time, invoking frequency, etc. As a result, the accuracy of real-time service recommendations often depends on effe...
Conference Paper
Full-text available
Most of the IT infrastructure across the globe is virtualized and is backed by Software Defined Networks (SDN). Hence, any threat to SDN’s core components would potentially mean to harm today’s Internet and the very fabric of utility computing. After thorough analysis, this study identifies Crossfire link flooding technique as one of the lethal att...
Book
Full-text available
Nowadays data mining and social network analysis techniques are broadly being used for social network analysis to study social structure of the underlying community. Human social networks exploration has been an interesting topic for the researchers during past some years. This book is the discovery of such networks using cyber world data. This wor...
Article
Full-text available
Web applications become complicated, common and critical in every field of life due to which the quality and reliability of web applications is highly required. Web application's quality depends upon functionalities including both functional and nonfunctional requirements. Web application testing is interesting not only in functional testing but al...
Chapter
Full-text available
Nowadays data mining and social network analysis techniques are broadly being used to study social structure of the underlying community. Internet has crept into our lives because of more and more dependency on online resources. We can precisely identify how society behaves from their presence in the cyber space. People are leaving so much foot pri...

Questions

Questions (10)
Question
Hi scholars, I have a somewhat naive question; want to know the possibilities after a reject (send elsewhere) decision from a journal.
Question
Quantum computing provides the benefits of speeding up traditional computing systems. I am interested in broad challenges that should be addressed for the implementation of healthcare services.
Question
Information-centric networking brings novel benefits of managing traditional networks by addressing content by names and exploiting in-network caching. Although it brings benefits of efficient content management, I am interested in knowing the challenges it may cause in managing traditional networks.
Question
I have recently read a blog post where it was mentioned that communication takes 5 times the power of computing in an embedded microcontroller. Can someone help in finding an article supporting this fact? The link of the blog is given in the following.
Question
Accuracy measure is used for evaluation of recommender systems, I want to know how can we compute Average Precision when accuracy@N is given.
Question
Modern requirements go often beyond connectivity. For example, operators may want to ensure that packets traverse a given middlebox (e.g., a firewall) for security reasons, or a chain of middleboxes (e.g., encoder and decoder) for performance reasons; and/or they might like to enforce that paths comply with Service Level Agreements (e.g., in terms of delay).

Network

Cited By

Projects

Project (1)
Archived project
In this research, we are interested in dealing with the end-to-end IoT services orchestration using SDN characteristics in the legacy cloud and edge computing.