Wazir Zada Khan

Wazir Zada Khan
  • Doctor of Philosophy
  • Professor (Full) at University of Wah

About

137
Publications
150,120
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,809
Citations
Introduction
Wazir Zada Khan is currently with Department of Computer Science, University of Wah, Wah Cantt, Pakistan. He received his PhD from Electrical and Electronic Engineering Department, Universiti Teknologi PETRONAS, Malaysia and MS in Computer Science from Comsats Institute of Information Technology (CIIT), Pakistan. His research interests includes Wireless Sensor Networks, Network Security, Internet of Things and Autonomous Vehicles.
Current institution
University of Wah
Current position
  • Professor (Full)
Additional affiliations
August 2015 - present
Jazan University
Position
  • Lecturer
June 2012 - August 2015
Universiti Teknologi Petronas
Position
  • PhD Student

Publications

Publications (137)
Article
Full-text available
Mobile phone sensing is an emerging area of interest for researchers as smart phones are becoming the core communication device in people's everyday lives. Sensor enabled mobile phones or smart phones are hovering to be at the center of a next revolution in social networks, green applications, global environmental monitoring, personal and community...
Article
Full-text available
If stolen, personal information collected from consumers by smart consumer devices connected to the Internet of Things (IoT) can cause enormous harm. That's why the success and wide adoption of IoT devices will rely heavily on gaining the trust of consumers. In this article, we offer a definition of consumer trust as it relates to IoT technology, a...
Article
Full-text available
In recent years, the Edge computing paradigm has gained considerable popularity in academic and industrial circles. It serves as a key enabler for many future technologies like 5G, Internet of Things (IoT), augmented reality and vehicle-to-vehicle communications by connecting cloud computing facilities and services to the end users. The Edge comput...
Article
Full-text available
Consumer Electronics Internet of Things (CEIoT) products, implemented with improper security measures and inadequate privacy-preserving mechanisms, let the hackers or intruders to access and misuse consumer’s personal information. In this paper, we present a framework and perspective to study and address Internet of Things (IoT) consumer’s security...
Article
Full-text available
Melanoma is a lethal type of skin cancer that has become very common due to its high metastatic rate. Therefore, accurate and timely diagnosis plays a vital role in a patient’s effective treatment and recovery. Melanoma dermoscopic images provide a detailed analysis of pigmented lesions. Traditional manual segmentation by dermatologists has limitat...
Article
This research aimed to promote the electronic evaluation tools to tackle the pandemic implications (corona, COVID-19) and analyze the attitude and academic acceptance at the level of the female student's in the department of computer science-faculty of computer science and information technology at Jazan University, Saudi Arabia. The student's atti...
Article
The prevalence of brain tumor disorders is currently a global issue. In general, radiography, which includes a large number of images, is an efficient method for diagnosing these life-threatening disorders. The biggest issue in this area is that it takes a radiologist a long time and is physically strenuous to look at all the images. As a result, r...
Article
Full-text available
Autonomous Vehicles (AVs) and driverless cars which are equipped with communication capabilities, advanced sensing, and Intelligent Control Systems (ICS), aim to modernize the transportation system. It increases user satisfaction by enhancing personal safety, reducing infrastructure costs, decreasing environmental interruption, and saving time for...
Article
Full-text available
The COVID-19 pandemic has led to increased use of online resources in educational institutions, making e-learning a necessity. This study aimed to investigate how students from four colleges at Jazan University in Saudi Arabia perceived and accepted e-learning and e-evaluation. Methods: 236 students participated in a cross-sectional study conducted...
Article
Full-text available
Internet of Things (IoT) vision has astoundingly transcended environmental sensing with integrated computing systems and smart devices, providing seamless connectivity among humans, machines, and their environment to cooperate for convenience and economical benefits. Apart from all the tremendous benefits of IoT, this paradigm still suffers from ch...
Article
Full-text available
Online learning and technology acceptance has become a highly significant subject in the field of information technology. The challenges of eLearning acceptance and adoption in higher education are complex and multifaceted: it is important to carefully consider the environmental, social, and economic implications of eLearning implementation and to...
Article
The goal of gait recognition is to identify a person from a distance based on their walking style using a visual camera. However, the covariates such as a walk with carrying a bag and a change in clothes impact the recognition accuracy. This paper proposed a framework for human gait recognition based on deep learning and Bayesian optimization. The...
Article
Full-text available
In the last few years, artificial intelligence has shown a lot of promise in the medical domain for the diagnosis and classification of human infections. Several computerized techniques based on artificial intelligence (AI) have been introduced in the literature for gastrointestinal (GIT) diseases such as ulcer, bleeding, polyp, and a few others. M...
Article
Full-text available
The COVID-19 pandemic has led to increased use of online resources in educational institutions, making e-learning a necessity. This study aimed to investigate how students from four colleges at Jazan University in Saudi Arabia perceived and accepted e-learning and e-evaluation. Methods: 236 students participated in a cross-sectional study conducted...
Preprint
Full-text available
p>Classical blockchain cryptographic primitives are susceptible to quantum computing technology due to its unprecedented growth because it has the potential to make current blockchain encryption techniques obsolete against quantum attacks. Shor algorithm can perform transactional hijacking and forge digital signatures to impersonate blockchain user...
Preprint
Full-text available
p>Classical blockchain cryptographic primitives are susceptible to quantum computing technology due to its unprecedented growth because it has the potential to make current blockchain encryption techniques obsolete against quantum attacks. Shor algorithm can perform transactional hijacking and forge digital signatures to impersonate blockchain user...
Preprint
Full-text available
p>Internet of Everything (IoE) connects billions of people, devices, objects and things to the Internet for autonomous services provisioning. IoE benefits from the value created by the compound impacts of connecting people, processes, things, and data. The interoperability among heterogeneous components facilitates seamless communication exchange f...
Preprint
Full-text available
p>Internet of Everything (IoE) connects billions of people, devices, objects and things to the Internet for autonomous services provisioning. IoE benefits from the value created by the compound impacts of connecting people, processes, things, and data. The interoperability among heterogeneous components facilitates seamless communication exchange f...
Article
A common practice among programmers is to reuse existing code, accomplished by performing natural language queries through search engines. The main aim of code retrieval is to search for the most relevant snippet from a corpus of code snippets but unfortunately, code retrieval frameworks for low resource languages are insufficient. Retrieving the m...
Article
Full-text available
The Holy Quran and Hadith are the two main sources of legislation and guidelines for Muslims to shape their lives. The daily activities, sayings, and deeds of the Holy Prophet Muhammad (PBUH) are called Hadiths. Hadiths are the optimal practical descriptions of the Holy Quran. Technological advancements of information and communication technologies...
Article
Full-text available
In this paper, we propose an agent-based approach for the evaluation of Multiple Unmanned Autonomous Vehicle (MUAV) wildfire monitoring systems for remote and hard-to-reach areas. Emerging environmental factors are causing a higher number of wildfires and keeping these fires in check is becoming a global challenge. MUAV deployment for the monitorin...
Preprint
Full-text available
Internet of Things (IoT) vision has astoundingly transcended the environmental sensing with integrated computing systems and smart devices, providing seamless connectivity among humans, machines and their environment to cooperate for convenience and economical benefits. Apart from all the tremendous benefits of IoT, this paradigm still suffers from...
Preprint
Full-text available
Internet of Things (IoT) vision has astoundingly transcended the environmental sensing with integrated computing systems and smart devices, providing seamless connectivity among humans, machines and their environment to cooperate for convenience and economical benefits. Apart from all the tremendous benefits of IoT, this paradigm still suffers from...
Article
Full-text available
Traditional methods for behavior detection of distracted drivers are not capable of capturing driver behavior features related to complex temporal features. With the goal to improve transportation safety and to reduce fatal accidents on roads, this research article presents a Hybrid Scheme for the Detection of Distracted Driving called HSDDD. This...
Preprint
Full-text available
In this work, we have highlighted the recent developments on Fake news detection.
Preprint
Full-text available
In this work, we have highlighted the recent developments on Fake news detection.
Article
Full-text available
Cardiac diseases constitute a major root of global mortality and they are likely to persist. Electrocardiogram (ECG) is widely opted in clinics to detect countless heart illnesses. Numerous artifacts interfere with the ECG signal, and their elimination is vital to allow medical specialists to acquire valuable statistics from the ECG. The utmost art...
Article
Coronavirus (COVID-19) is an ecumenical pandemic that has affected the whole world drastically by raising a global calamitous situation. Due to this pernicious disease, millions of people have lost their lives. The scientists are still far from knowing how to tackle the coronavirus due to its multiple mutations found around the globe. Standard test...
Article
Fake news is a major threat to democracy (e.g., influencing public opinion), and its impact cannot be understated particularly in our current socially and digitally connected society. Researchers from different disciplines (e.g., computer science, political science, information science, and linguistics) have also studied the dissemination, detectio...
Article
Full-text available
The characterization of aircraft in remote sensing satellite imagery has many armed and civil applications. For civil purposes, such as in tragedy and emergency aircraft searching, airport scrutiny and aircraft identification from satellite images are very important. This study presents an automated methodology based on handcrafted and deep convolu...
Article
Full-text available
Relational databases are still important in modern times due to their many advantages, such as ease of interaction, simplicity and data integrity. In this regard, structured query language (SQL) and technical knowledge about database schemas are the basic building blocks for retrieving information from relational databases. Generally, non-expert us...
Article
Full-text available
Social networks have become an important venue to express the feelings of their users on a large scale. People are intuitive to use social networks to express their feelings, discuss ideas, and invite folks to take suggestions. Every social media user has a circle of friends. The suggestions of these friends are considered important contributions....
Article
Blockchain is considered a distributed ledger that can transact securely and trustfully without involving any third party. It has caused a lot of interest in various sectors, like government, finance, banking, etc. Blockchain technology is suitable for areas where multiple data storage and transaction types generally require the third party to auth...
Article
Public Acceptance is a prerequisite forgaining the intended benefits of Connected and Au-tonomous Vehicles (CAVs). This paper proposes anidea of digital labels for CAVs so as to increaseconsumers trust and awareness regarding the se-curity level of their vehicle. We come up with anarchitecture named Cybersecurity Box (CSBox) inwhich digital labels...
Article
Full-text available
Enterprise Resource Planning (ERP) software is extensively used for the management of business processes. ERP offers a system of integrated applications with a shared central database. Storing all business-critical information in a central place raises various issues such as data integrity assurance and a single point of failure, which makes the da...
Article
Peer-to-peer (P2P) computing involves exchanging resources and files by computers connected through a network rather than a central server. In P2P, over mobile ad hoc networks (MANETs), the fundamental necessity is the linkage of the overlay participating peers (OPPs) for the efficient operation of the DHT-based P2P overlay protocol over MANETs. Th...
Article
Full-text available
The progression of Internet of Things (IoT) has resulted in generation of huge amount of data. Effective handling and analysis of such big volumes of data proposes a crucial challenge. Existing cloud-based frameworks of Big Data visualization are rising costs for servers, equipment, and energy consumption. There is a need for a green solution targe...
Article
Full-text available
Due to the inability of the Global Positioning System (GPS) signals to penetrate through surfaces like roofs, walls, and other objects in indoor environments, numerous alternative methods for user positioning have been presented. Amongst those, the Wi-Fi fingerprinting method has gained considerable interest in Indoor Positioning Systems (IPS) as t...
Preprint
Full-text available
Coronavirus (COVID-19) is an ecumenical pandemic that has affected the whole world drastically by raising a global calamitous situation. Due to this pernicious disease, millions of people have lost their lives. The scientists are still far from knowing how to tackle the coronavirus due to its multiple mutations found around the globe. Standard test...
Article
Full-text available
This research aimed to promote the electronic evaluation tools to tackle the pandemic implications (corona, COVID-19) and analyze the attitude and their academic acceptance at the level of the female student's in the department of computer science-faculty of computer science and information technology at Jazan University, Saudi Arabia. The students...
Article
In the next few years, smart farming will reach each and every nook of the world. The prospects of using unmanned aerial vehicles (UAV) for smart farming are immense. However, the cost and the ease in controlling UAVs for smart farming might play an important role for motivating farmers to use UAVs in farming. Mostly, UAVs are controlled by remote...
Article
Full-text available
Due to recent advances in wireless gadgets and mobile computing, the location-based services have attracted the attention of computing and telecommunication industries to launch location-based fast and accurate localization systems for tracking, monitoring and navigation. Traditional lateration-based techniques have limitations, such as localizatio...
Article
Full-text available
With the advent and advancements in the wireless technologies, Wi-Fi fingerprinting-based Indoor Positioning System (IPS) has become one of the most promising solutions for localization in indoor environments. Unlike the outdoor environment, the lack of line-of-sight propagation in an indoor environment keeps the interest of the researchers to deve...
Article
Full-text available
The rapid deployment of Electric Vehicles (EVs) and the integration of renewable energy sources have ameliorated the existing power systems and contributed to the development of greener smart communities. However, load balancing problems, security threats, privacy leakage issues, etc., remain unresolved. Many blockchain-based approaches have been u...
Article
There are numerous channels available such as social media, blogs, websites, etc., through which people can easily access the news. It is due to the availability of these platforms that the dissemination of fake news has become easier. Anyone using these platforms can create and share fake news content based on personal or professional motives. To...
Article
Social Internet of Things (SIoT) is an extension of the Internet of Things (IoT) that converges with social networking concepts to create social networks of interconnected smart objects. This convergence allows the enrichment of the two paradigms, resulting into new ecosystems. While IoT follows two interaction paradigms, human to human (H2H) and t...
Article
Full-text available
Stroke is enlisted as one of the leading causes of death and serious disability affecting millions of human lives across the world with high possibilities of becoming an epidemic in the next few decades. Timely detection and prompt decision making pertinent to this disease, plays a major role which can reduce chances of brain death, paralysis and o...
Article
Full-text available
The land registry system is one of the very important department in any governance system that stores the records of land ownership. There are various issues and loopholes in the existing system that give rise to corruption and disputes. This requires a significant chunk of valuable government resources from judiciary and law enforcement agencies i...
Article
Full-text available
Security threat is a crucial issue in cognitive radio network (CRN). These threats come from physical layer, data link layer, network layer, transport layer, and application layer. Hence, security system to all layers in CRN has a responsibility to protect the communication between among Secondary User (SU) or to maintain valid detection to the pre...
Preprint
The rise of blockchain technology within a few years has attracted researchers across the world. The prime reason for worldwide attention is undoubtedly due to its feature of immutability along with the decentralized approach of data protection. As this technology is progressing, lots of developments in terms of identifying new applications, blockc...
Article
Full-text available
Multi-microgrid (MMG) system is a new method that concurrently incorporates different types of distributed energy resources, energy storage systems and demand responses to provide reliable and independent electricity for the community. However, MMG system faces the problems of management, real-time economic operations and controls. Therefore, this...
Preprint
Full-text available
In the next few years, smart farming will reach each and every nook of the world. The prospects of using unmanned aerial vehicles (UAV) for smart farming are immense. However, the cost and the ease in controlling UAVs for smart farming might play an important role for motivating farmers to use UAVs in farming. Mostly, UAVs are controlled by remote...
Article
Full-text available
Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also a...
Article
In the competing era of online industries, understanding customer feedback and satisfaction is one of the important concern for any business organization. The well‐known social media platforms like Twitter are a place where customers share their feedbacks. Analyzing customer feedback is beneficial, as it provides an advantage way of unveiling custo...
Article
Full-text available
Human drivers have different driving styles, experiences, and emotions due to unique driving characteristics, exhibiting their own driving behaviors and habits. Various research efforts have approached the problem of detecting abnormal human driver behavior with the aid of capturing and analyzing the face of driver and vehicle dynamics via image an...
Article
The inefficient disposal of industrial waste causes water and soil pollution; thus, to protect the health of different ecosystems, industrial wastewater management is essential. Wastewater treatment's aim is to clean and protect water and to extract pollutants and remove toxicants before the remaining water is discharged into the environment. Curre...
Article
In the last few decades, there is a massive increase in population and hence increase in societal development. Concerning environmental change as a result of development in society and the economy, the marine environment plays a significant role in global climatic change. Hence recent Information and Communication Technologists are attracted toward...
Article
Full-text available
The recent state of the art innovations in technology enables the development of low-cost sensor nodes with processing and communication capabilities. The unique characteristics of these low-cost sensor nodes such as limited resources in terms of processing, memory, battery, and lack of tamper resistance hardware make them susceptible to clone node...
Article
Full-text available
Android OS is the most popular mobile OS for the past few years. Vulnerabilities arise with respect to the increasing functionality of Android OS, impolitic app development practices of developers, end-user incautious and interestingly remediation for the vulnerabilities has been introduced frequently as well. To mitigate security risk factor Googl...
Article
In recent years, unprecedented work has been done in the area of smart cities. The purpose of developing smart cities is to enhance quality of life factors for people dwelling within them. To achieve that purpose, technologies such as IoT and cloud computing have been utilized. Blockchain technology is also among the promising technologies that can...
Chapter
Fake news, particularly with the speed and reach of unverified/false information dissemination, is a troubling trend with potential political and societal consequences, as evidenced in the 2016 United States presidential election, the ongoing COVID-19 pandemic, and the ongoing protests. To mitigate such threats, a broad range of approaches have bee...
Article
Full-text available
The adoption of emerging technological trends and applications of the Internet of Things (IoT) in the industrial systems is leading towards the development of Industrial IoT (IIoT). IIoT serves as a new vision of IoT in the industrial sector by automating smart objects for sensing, collecting, processing and communicating the real-time events in in...
Article
Full-text available
Industrial Internet of Things (IIoT) has enabled the oil and gas industry to reap potential benefits such as improved efficiency, lower operating costs, and higher productivity. However, due to the elevated connectivity, the oil and gas industry is now at higher risk by becoming a significant target for cyberattacks. The three sectors of oil and ga...
Article
Smart City is an application of the Internet of Things (IoT) with the aim of managing cities without human intervention. Each IoT device that is producing data may sense a sensitive one that should not be disclosed unintentionally. Due to the existence of a large number of devices in the near future, the possibility of information leakage, privacy...
Article
Full-text available
String matching has been an extensively studied research domain in the past two decades due to its various applications in the fields of text, image, signal, and speech processing. As a result, choosing an appropriate string matching algorithm for current applications and addressing challenges is difficult. Understanding different string matching a...
Chapter
Full-text available
The significant part of smart grid is to make smart grid cost-efficient by predicting electricity price and load. To improve the prediction performance we proposed an Efficient Convolutional Neural Network (ECNN) and Efficient K-nearest Neighbour (EKNN) in which the parameters are tuned. It may be difficult to deal with huge amount of load data tha...
Chapter
Full-text available
One of the key issues in the Smart Grid (SG) is accurate electric load forecasting. Energy generation and consumption have highly varying. Accurate forecasting of electric load can decrease the fluctuating behavior between energy generation and consumption. By knowing the upcoming electricity load consumption, we can control the extra energy genera...
Article
Full-text available
Due to the limited availability of battery power of the acoustic node, an efficient utilization is desired. Additionally, the aquatic environment is harsh; therefore, the battery cannot be replaced, which leaves the network prone to sudden failures. Thus, an efficient node battery dissipation is required to prolong the network lifespan and optimize...
Preprint
Full-text available
The Internet of Things (IoTs) is an evolving new face of technology that provides state of the art services using ubiquitously connected smart objects. These smart objects are capable of sensing, processing, collaborating, communicating the events and provide services. The IoT is a collection of heterogeneous technologies like Sensor, RFID, Communi...
Article
The industrial world of oil and gas involves critical processes and machinery for the exploration, extraction, refining, transporting and marketing petroleum products. Oil and gas companies need to control, monitor, maintain and secure the processes and industrial assets in an efficient manner. To resolve the critical challenges of pipeline conditi...
Conference Paper
Full-text available
Malicious user is internal attacker that disturb communication. In case of cognitive radio, malicious user attacks primary signal detection and influences the fidelity of sensing outcome. This paper studies malicious user attack and its impacts to sensing outcome in cognitive radio network (CRN). We consider a number of malicious user that emulate...
Article
Signal detection in cognitive radio network (CRN) is influenced by several factors. One of them is malicious user that emulate primary user (PU) signal. Emulation of PU signal causes detection error. This paper investigates the impact of malicious user attack to PU signal detection. A number of malicious users are randomly deployed around secondary...

Questions

Question (1)
Question
How can we apply Differential Privacy to real time data for privacy preserving?

Network

Cited By