default search action
Ahmad Y. Javaid
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Abdulsahib Albehadili, Ahmad Y. Javaid:
Performance Evaluation of Carrier-Frequency Offset as a Radiometric Fingerprint in Time-Varying Channels. Sensors 24(17): 5670 (2024) - [c42]Mehzabien Iqbal, Ahmad Y. Javaid, Junghwan Kim:
Antenna Beamforming Patterns of Multimedia Transmissions for NextG Phy-Security. BMSB 2024: 1-6 - [c41]Claire Han, Quamar Niyaz, Ahmad Y. Javaid:
Browser Security Comparison Using Cookie Analysis. EIT 2024: 256-261 - [c40]Mateo Garcia, Quamar Niyaz, Xiaoli Yang, Ahmad Y. Javaid, Sidike Paheding:
An Interactive Visualization Tool for Computer Organization and Design Course. EIT 2024: 457-462 - [i12]Tauheed Khan Mohd, Ahmad Y. Javaid:
Integrated Control of Robotic Arm through EMG and Speech: Decision-Driven Multimodal Data Fusion. CoRR abs/2404.15283 (2024) - 2023
- [c39]Mehzabien Iqbal, Ahmad Y. Javaid:
IEEE CNS 23 Poster: Cooperative Omnidirectional Beamformation for THz Band Phy-Security. CNS 2023: 1-2 - [c38]Sai Suma Sudha, Gabriel Castro Aguayo, Abel A. Reyes Angulo, Jyothirmai Kothakapu, Quamar Niyaz, Xiaoli Yang, Ahmad Y. Javaid:
Changes in High-School Student Attitude and Perception Towards Cybersecurity Through the Use of an Interactive Animated Visualization Framework. EDUCON 2023: 1-10 - [c37]Sai Sushmitha Sudha, Jyothi P. Bandreddi, Laxmi Mounika Podila, Ramesh Govindula, Austin Richardson, Quamar Niyaz, Xiaoli Yang, Ahmad Y. Javaid:
Impact of Smartphone-Based Interactive Learning Modules on Cybersecurity Learning at the High-School Level. EDUCON 2023: 1-10 - 2022
- [j23]Aakif Mairaj, Ahmad Y. Javaid:
Game theoretic solution for an Unmanned Aerial Vehicle network host under DDoS attack. Comput. Networks 211: 108962 (2022) - [j22]Mohammad Faridul Haque Siddiqui, Parashar Dhakal, Xiaoli Yang, Ahmad Y. Javaid:
A Survey on Databases for Multimodal Emotion Recognition and an Introduction to the VIRI (Visible and InfraRed Image) Database. Multimodal Technol. Interact. 6(6): 47 (2022) - [c36]Xinrun Zhang, Akshay Mathur, Lei Zhao, Safia Rahmat, Quamar Niyaz, Ahmad Y. Javaid, Xiaoli Yang:
An Early Detection of Android Malware Using System Calls based Machine Learning Model. ARES 2022: 92:1-92:9 - [c35]Medha Pujari, Bhanu Cherukuri, Ahmad Y. Javaid, Weiqing Sun:
An Approach to Improve the Robustness of Machine Learning based Intrusion Detection System Models Against the Carlini-Wagner Attack. CSR 2022: 62-67 - [c34]Tauheed Khan Mohd, Subhrajit Majumdar, Akshay Mathur, Ahmad Y. Javaid:
Cybersecurity Based Simulation of Connected Automated Vehicles for Instructional Use. EIT 2022: 32-36 - [c33]Abel A. Reyes Angulo, Xiaoli Yang, Quamar Niyaz, Paheding Sidike, Ahmad Y. Javaid:
A Secure Software Engineering Design Framework for Educational Purpose. EIT 2022: 375-381 - [i11]Tauheed Khan Mohd, Jackson Carvalho, Ahmad Y. Javaid:
Multi-modal data fusion of Voice and EMG data for Robotic Control. CoRR abs/2201.02237 (2022) - [i10]Tauheed Khan Mohd, Nicole Nguyen, Ahmad Y. Javaid:
Multi-Modal Data Fusion in Enhancing Human-Machine Interaction for Robotic Applications: A Survey. CoRR abs/2202.07732 (2022) - 2021
- [j21]Akshay Mathur, Laxmi Mounika Podila, Keyur Kulkarni, Quamar Niyaz, Ahmad Y. Javaid:
NATICUSdroid: A malware detection framework for Android using native and custom permissions. J. Inf. Secur. Appl. 58: 102696 (2021) - [j20]Aasim Kamal, Parashar Dhakal, Ahmad Y. Javaid, Vijay K. Devabhaktuni, Devinder Kaur, Jack D. Zaientz, Robert P. Marinier:
Recent advances and challenges in uncertainty visualization: a survey. J. Vis. 24(5): 861-890 (2021) - [c32]Akshay Mathur, Ethan Ewoldt, Quamar Niyaz, Ahmad Y. Javaid, Xiaoli Yang:
Permission-Educator: App for Educating Users About Android Permissions. ICHI 2021: 361-371 - [i9]Praveen Damacharla, Achuth Rao M. V, Jordan Ringenberg, Ahmad Y. Javaid:
TLU-Net: A Deep Learning Approach for Automatic Steel Surface Defect Detection. CoRR abs/2101.06915 (2021) - 2020
- [j19]Mohammad Faridul Haque Siddiqui, Ahmad Y. Javaid:
A Multimodal Facial Emotion Recognition Framework through the Fusion of Speech with Visible and Infrared Images. Multimodal Technol. Interact. 4(3): 46 (2020) - [j18]Abdulsahib Albehadili, Khair Al Shamaileh, Ahmad Y. Javaid, Vijay K. Devabhakuni:
Link-Signature-Based Discriminatory Channel Estimation (LS-DCE) for Physical Layer Security in Stationary and Mobile OFDM Transceivers. IEEE Trans. Veh. Technol. 69(8): 8119-8131 (2020) - [c31]Subhrajit Majumder, Kiyan Khaloozadeh, Charlene M. Czerniak, Jared Oluoch, Tod Shockey, Ahmad Y. Javaid, Gale Mentzer, Ryan Ducket, Thehazhnan Ponnaiyan:
A Study of Common Concerns Inhibiting Teacher Enactment of Computational Thinking into Project-based Mathematics and Career Technical Education. CSEDU (1) 2020: 341-349 - [c30]Aasim Kamal, Ahmad Y. Javaid, Vijay K. Devabhaktuni, Devinder Kaur, Jack D. Zaientz, Robert P. Marinier:
A Novel Approach to Air Corridor Estimation and Visualization for Autonomous Multi-UAV Flights. EIT 2020: 370-377 - [c29]Laxmi Mounika Podila, Jyothi P. Bandreddi, Javier I. Campos, Quamar Niyaz, Xiaoli Yang, Anastasia Trekles, Charlene M. Czerniak, Ahmad Y. Javaid:
Practice-Oriented Smartphone Security Exercises for Developing Cybersecurity Mindset in High School Students. TALE 2020: 303-310 - [c28]Subhrajit Majumder, Deepthi Chandrika Mandava, Junghwan Kim, Ahmad Y. Javaid:
Multimedia Transmission for V2X Communication over Legacy LTE-A Network Infrastructure - A Performance Evaluation. UEMCON 2020: 28-34 - [c27]Abdulsahib Albehadili, Osama Hussein, Mohammed Sarkhi, Vijay K. Devabhaktuni, Junghwan Kim, Ahmad Y. Javaid:
Machine Learning-based PHY-authentication for Mobile OFDM Transceivers. VTC Fall 2020: 1-6 - [i8]Praveen Damacharla, Dhwani Mehta, Ahmad Y. Javaid, Vijay K. Devabhaktuni:
Study on State-of-the-art Cloud Services Integration Capabilities with Autonomous Ground Vehicles. CoRR abs/2008.04853 (2020) - [i7]Praveen Damacharla, Ahmad Y. Javaid, Jennie J. Gallimore, Vijay K. Devabhaktuni:
Common Metrics to Benchmark Human-Machine Teams (HMT): A Review. CoRR abs/2008.04855 (2020) - [i6]Praveen Damacharla, Parashar Dhakal, Sebastian Stumbo, Ahmad Y. Javaid, Subhashini Ganapathy, David A. Malek, Douglas C. Hodge, Vijay Kumar Devabhaktuni:
Effects of Voice-Based Synthetic Assistant on Performance of Emergency Care Provider in Training. CoRR abs/2008.05064 (2020) - [i5]Parashar Dhakal, Praveen Damacharla, Ahmad Y. Javaid, Hari K. Vege, Vijay K. Devabhaktuni:
IVACS: Intelligent Voice Assistant for Coronavirus Disease (COVID-19) Self-Assessment. CoRR abs/2009.02673 (2020)
2010 – 2019
- 2019
- [j17]Blen M. Keneni, Devinder Kaur, Ali Al Bataineh, Vijaya Kumar Devabhaktuni, Ahmad Y. Javaid, Jack D. Zaientz, Robert P. Marinier:
Evolving Rule-Based Explainable Artificial Intelligence for Unmanned Aerial Vehicles. IEEE Access 7: 17001-17016 (2019) - [j16]Zhipeng Huang, Ahmad Y. Javaid, Vijay Kumar Devabhaktuni, Yingjie Li, Xiaoli Yang:
Development of Cognitive Training Program With EEG Headset. IEEE Access 7: 126191-126200 (2019) - [j15]Praveen Damacharla, Parashar Dhakal, Sebastian Stumbo, Ahmad Y. Javaid, Subhashini Ganapathy, David A. Malek, Douglas C. Hodge, Vijay Kumar Devabhaktuni:
Effects of Voice-Based Synthetic Assistant on Performance of Emergency Care Provider in Training. Int. J. Artif. Intell. Educ. 29(1): 122-143 (2019) - [j14]Ankit Renduchintala, Farha Jahan, Raghav Khanna, Ahmad Y. Javaid:
A comprehensive micro unmanned aerial vehicle (UAV/Drone) forensic framework. Digit. Investig. 30: 52-72 (2019) - [j13]Parashar Dhakal, Praveen Damacharla, Ahmad Y. Javaid, Vijay Kumar Devabhaktuni:
A Near Real-Time Automatic Speaker Recognition Architecture for Voice-Based User Interface. Mach. Learn. Knowl. Extr. 1(1): 504-520 (2019) - [j12]Dhwani Mehta, Mohammad Faridul Haque Siddiqui, Ahmad Y. Javaid:
Recognition of Emotion Intensities Using Machine Learning Algorithms: A Comparative Study. Sensors 19(8): 1897 (2019) - [j11]Aakif Mairaj, Asif Iqbal Baba, Ahmad Y. Javaid:
Application specific drone simulators: Recent advances and challenges. Simul. Model. Pract. Theory 94: 100-117 (2019) - [c26]Subhrajit Majumder, Akshay Mathur, Ahmad Y. Javaid:
A Study on Recent Applications of Blockchain Technology in Vehicular Adhoc Network (VANET). NCS 2019: 293-308 - [c25]Safia Rahmat, Quamar Niyaz, Akshay Mathur, Weiqing Sun, Ahmad Y. Javaid:
Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems. UEMCON 2019: 322-328 - [c24]Mohammed Sarkhi, Abdulsahib Albehadili, Osama Hussein, Ahmad Y. Javaid, Vijay Kumar Devabhaktuni:
Performance Investigation of Polar Codes over Nakagami-M Fading and Real Wireless Channel Measurements. WASA 2019: 285-296 - [c23]Abdulsahib Albehadili, Atif Ali, Farha Jahan, Ahmad Y. Javaid, Jared Oluoch, Vijay Kumar Devabhaktuni:
Machine Learning-based Primary User Emulation Attack Detection In Cognitive Radio Networks using Pattern Described Link-Signature (PDLS). WTS 2019: 1-7 - [i4]Aakif Mairaj, Asif Iqbal Baba, Ahmad Y. Javaid:
Application Specific Drone Simulators: Recent Advances and Challenges. CoRR abs/1902.00616 (2019) - 2018
- [j10]Abdulsahib Albehadili, Khair Al Shamaileh, Ahmad Y. Javaid, Jared Oluoch, Vijay K. Devabhaktuni:
An Upper Bound on PHY-Layer Key Generation for Secure Communications Over a Nakagami-M Fading Channel With Asymmetric Additive Noise. IEEE Access 6: 28137-28149 (2018) - [j9]Praveen Damacharla, Ahmad Y. Javaid, Jennie J. Gallimore, Vijay K. Devabhaktuni:
Common Metrics to Benchmark Human-Machine Teams (HMT): A Review. IEEE Access 6: 38637-38655 (2018) - [j8]Shahrukh Ashraf, Priyanka Aggarwal, Praveen Damacharla, Hong Wang, Ahmad Y. Javaid, Vijay Kumar Devabhaktuni:
A low-cost solution for unmanned aerial vehicle navigation in a global positioning system-denied environment. Int. J. Distributed Sens. Networks 14(6) (2018) - [j7]Dhwani Mehta, Mohammad Faridul Haque Siddiqui, Ahmad Y. Javaid:
Facial Emotion Recognition: A Survey and Real-World User Experiences in Mixed Reality. Sensors 18(2): 416 (2018) - [c22]Bhargav Pingle, Aakif Mairaj, Ahmad Y. Javaid:
Real-World Man-in-the-Middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use. EIT 2018: 192-197 - [c21]Shriya Vyamajala, Tauheed Khan Mohd, Ahmad Y. Javaid:
A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning. EIT 2018: 198-202 - [c20]Yaswanth Kolli, Tauheed Khan Mohd, Ahmad Y. Javaid:
Remote Desktop Backdoor Implementation with Reverse TCP Payload Using Open Source Tools for Instructional Use. EIT 2018: 249-254 - [c19]Arun Prasath Sivanesan, Akshay Mathur, Ahmad Y. Javaid:
A Google Chromium Browser Extension for Detecting XSS Attack in HTML5 Based Websites. EIT 2018: 302-304 - [c18]Benjamin T. Cechner, Akshay Mathur, Ahmad Y. Javaid:
Software Cracking: An Exploration of the Physical Realities of Software. EIT 2018: 328-333 - [c17]Tejaswi Kakarla, Aakif Mairaj, Ahmad Y. Javaid:
A Real-World Password Cracking Demonstration Using Open Source Tools for Instructional Use. EIT 2018: 387-391 - [c16]Ankita R. Chordiya, Subhrajit Majumder, Ahmad Y. Javaid:
Man-in-the-Middle (MITM) Attack Based Hijacking of HTTP Traffic Using Open Source Tools. EIT 2018: 438-443 - [c15]Wei Liu, Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid:
A Web-Based Lightweight Testbed for Supporting Network Security Hands-on Labs. EIT 2018: 498-503 - [c14]Parashar Dhakal, Praveen Damacharla, Ahmad Y. Javaid, Vijay Kumar Devabhaktuni:
Detection and Identification of Background Sounds to Improvise Voice Interface in Critical Environments. ISSPIT 2018: 78-83 - [c13]Tauheed Khan Mohd, Subhrajit Majumdar, Akshay Mathur, Ahmad Y. Javaid:
Simulation and Analysis of DDoS Attack on Connected Autonomous Vehicular Network using OMNET++. UEMCON 2018: 502-508 - [c12]Praveen Damacharla, Dhwani Mehta, Ahmad Y. Javaid, Vijay K. Devabhaktuni:
Study on State-of-the-art Cloud Services Integration Capabilities with Autonomous Ground Vehicles. VTC Fall 2018: 1-5 - [c11]Akshay Chawan, Weiqing Sun, Ahmad Y. Javaid, Umesh Gurav:
Security Enhancement of Over-the-Air Update for Connected Vehicles. WASA 2018: 853-864 - [i3]Keyur Kulkarni, Ahmad Y. Javaid:
Open Source Android Vulnerability Detection Tools: A Survey. CoRR abs/1807.11840 (2018) - [i2]Ashutosh Bandekar, Ahmad Y. Javaid:
Cyber-attack Mitigation and Impact Analysis for Low-power IoT Devices. CoRR abs/1807.11850 (2018) - 2017
- [j6]Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid:
A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). EAI Endorsed Trans. Security Safety 4(12): e2 (2017) - [j5]Ahmad Y. Javaid, Farha Jahan, Weiqing Sun:
Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation. Simul. 93(5): 427-441 (2017) - [c10]Safia Rahmat, Quamar Niyaz, Ahmad Y. Javaid, Weiqing Sun:
Normal and anomalous traffic flow pattern analysis for organizational networks. CCECE 2017: 1-4 - [c9]Rishabh Chauhan, Hong Wang, Ahmad Y. Javaid, Mansoor Alam:
Modified RSSI Fingerprinting Algorithm with Reliability Factor for Wi-Fi based Indoor Navigation System. SENSORNETS 2017: 118-125 - [c8]Tauheed Khan Mohd, Jackson Carvalho, Ahmad Y. Javaid:
Multi-modal data fusion of Voice and EMG data for robotic control. UEMCON 2017: 329-333 - 2016
- [j4]Ahmad Y. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam:
A Deep Learning Approach for Network Intrusion Detection System. EAI Endorsed Trans. Security Safety 3(9): e2 (2016) - [c7]Ahmad Maroof Karimi, Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid, Vijay K. Devabhaktuni:
Distributed network traffic feature extraction for a real-time IDS. EIT 2016: 522-526 - [c6]Ashutosh Bandekar, Akshay Kotian, Ahmad Y. Javaid:
Comparative Analysis of Simulation and Real-World Energy Consumption for Battery-Life Estimation of Low-Power IoT (Internet of Things) Deployment in Varying Environmental Conditions Using Zolertia Z1 Motes. S-CUBE 2016: 137-148 - [i1]Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid:
A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). CoRR abs/1611.07400 (2016) - 2015
- [j3]Farha Jahan, Ahmad Y. Javaid, Weiqing Sun, Mansoor Alam:
GNSSim: An Open Source GNSS/GPS Framework for Unmanned Aerial Vehicular Network Simulation. EAI Endorsed Trans. Mob. Commun. Appl. 2(6): e2 (2015) - [j2]Ahmad Y. Javaid, Weiqing Sun, Mansoor Alam:
Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation. EAI Endorsed Trans. Scalable Inf. Syst. 2(4): e4 (2015) - [j1]Kaveh Ahmadi, Ahmad Y. Javaid, Ezzatollah Salari:
An efficient compression scheme based on adaptive thresholding in wavelet domain using particle swarm optimization. Signal Process. Image Commun. 32: 33-39 (2015) - [c5]Ahmad Y. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam:
A Deep Learning Approach for Network Intrusion Detection System. BICT 2015: 21-26 - 2014
- [c4]Junghwan Kim, Quamar Niyaz, Ahmad Y. Javaid:
Performance evaluation of VoIP broadcasting over LTE for varying speeds and distances of mobile nodes. BMSB 2014: 1-5 - [c3]Ahmad Y. Javaid, Weiqing Sun, Mansoor Alam:
UAVNet Simulation in UAVSim: A Performance Evaluation and Enhancement. TRIDENTCOM 2014: 107-115 - 2013
- [c2]Ahmad Y. Javaid, Weiqing Sun, Mansoor Alam:
UAVSim: A simulation testbed for unmanned aerial vehicle network cyber security analysis. GLOBECOM Workshops 2013: 1432-1436 - 2010
- [c1]Mohammed Abdul Qadeer, Shahid Habib, Ahmad Y. Javaid, Mohammed A. Hafeez:
A novel approach for resource allocation in broadband access networks. ICWET 2010: 268-272
Coauthor Index
aka: Vijay K. Devabhaktuni
aka: Vijay K. Devabhakuni
aka: Vijaya Kumar Devabhaktuni
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint