Electrical Engineering and Computer Science

/engineering/electrical-engineering-computer-science/

main menu

/engineering/electrical-engineering-computer-science/

Resources

Contact Us

Main Campus
2008 Nitschke Hall
Mail Stop 308
2801 W. Bancroft St.
Toledo, OH 43606-3390
Phone: (419) 530-8140
Fax: (419) 530-8146

Dr. Ahmad Y. Javaid

javaid

Assistant Professor

Contact Information

EECS Department
The University of Toledo
Toledo,OH 43606 
Tel: (419) 530-8260 
Office: NI 2051 
E-mail: ahmad.javaid@utoledo.edu 

Recent Courses

  • EECS 4980 – Fundamentals of Cyber-Security

Research Interests

  • Cyber Security and Cyber-Physical Systems
  • Wireless Sensor, Mobile and Computer Networks
  • Data Mining/Analytics
  • Drone (UAV) and Android forensics and cybersecurity
  • Human-machine teaming/cooperation
  • Simulation, modeling, analysis, and mitigation of cyber-attacks
  • Deep-learning and pattern analysis based cyber attack detection for traditional, software-defined and mobile networks
  • Multi-modal data fusion applications – attack detection, emotion recognition, and robotic arm control

Current Students

  • PhD : Aakif Mairaj, Akshay Mathur,Mohammad Faridul Haque Siddiqui, Praveen Damacharla, Subhrajit Majumdar, Tauheed Khan Mohd
  • MS: Aasim Kamal, Md Tanzin Farhat, Bhargava Pingle, Yashwanth Kolli, Ankita Chordiya 

Biography

Ahmad Javaid received his B.Tech. (Hons.) Degree in Computer Engineering from Aligarh Muslim University, India in 2008. He received his Ph.D. degree from The University of Toledo in 2015 along with the prestigious University Fellowship Award. Previously, he worked for two years as Scientist Fellow in Ministry of Science & Technology, Government of India. He joined the EECS Department as an Assistant Professor in Fall 2015 and is the founding director of the Paul A. Hotmer Cybersecurity and Teaming Research (CSTAR) lab. His research expertise is in the area of cyber security of drone networks, smartphones, wireless sensor networks, and other systems. He is also conducting extensive research on human-machine teams and applications of AI and machine learning to attack detection and mitigation. During his time at UT, he has participated in several collaborative research proposals that have led to a cumulative sum of $4.3M in funding of which roughly $800K has been allocated specifically to him. These projects have been funded by various agencies including the NSF (National Science Foundation), AFRL (Air Force Research Lab), and the State of Ohio. He also played a critical role in the cultivation of a private gift to support the CSTAR lab for cyber security research. He has published more than 50 peer-reviewed journal, conference and poster papers. He has also served as a reviewer for several high impact journals and as a member of the technical program committee for several conferences.

Journal Publications

  • Ahmad Y. Javaid, Farha Jahan, Weiqing Sun and Mansoor Alam, "GPS Spoofing and GPS Jamming attack impact analysis on Unmanned Aerial Vehicle (UAV) Navigation", In SIMULATION: Transactions of The International Society for Modeling and Simulation (Submitted)
  • Farha Jahan, Ahmad Y. Javaid, Weiqing Sun and Mansoor Alam, "GNSSim: An open source GNSS/GPS framework for Unmanned Aerial Vehicular Network Simulation", In EAI Endorsed Transactions on Mobile Communication and Applications. Vol. 2, Issue 6, pp 1-13, 2015
  • Ahmad Y. Javaid, Weiqing Sun, and Mansoor Alam. "Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation." In EAI Endorsed Transactions on Scalable Information Systems, Vol. 2 Issue 4, pp 1-11, 2015
  • Kaveh Ahmadi, Ahmad Y. Javaid and Ezzatollah Salari. "An Efficient Compression Scheme based on Adaptive Thresholding in Wavelet Domain Using Particle Swarm Optimization." In Signal Processing: Image Communication, Vol. 32, pp 33-39, 2015
  • Ahmad Javaid, Weiqing Sun, and Mansoor Alam. "UAVNet Simulation in UAVSim: A Performance Evaluation and Enhancement." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 137, pp. 107-115, Springer International Publishing, 2014

conference PUBLICATIONS

  • Yaswanth Kolli, Tauheed Khan Mohd, and Ahmad Y. Javaid, "Remote Desktop Backdoor Implementation with Reverse TCP Payload using Open Source Tools for Instructional Use," In 9th Annual Information Technology, Electronics & Mobile Communications Conference, Vancouver, BC, Canada, Nov 1-3, 2018. (Accepted 9/17)
  • Md Tanzin Farhat, Ahmad Y Javaid, Vijay Devabhaktuni, and Zhiqiang Wu, "A Signal Verification Approach to Cognitive Radio Network Security," In 2018 IEEE National Aerospace & Electronics Conference (NAECON), Fairborn, Ohio, USA, July 23-26, 2018. (Accepted 5/30)
  • Blen Keneni, Devinder Kaur, Vijay Devabhaktuni, Ahmad Javaid, Jack Zaientz, and Robert Marinier, "Evolving Rule-Based Explainable Artificial Intelligence (XAI) for Decision Support System of Unmanned Air Vehicles (UAV)," in 3rd Annual Nature Inspired Exploration Summit Biocene 2018, Cleveland, Ohio, August 14-17, 2018. (Accepted 4/29)
  • Akshay Chawan, Weiqing Sun, Ahmad Javaid, and Umesh Gurav, "Security Enhancement of Over-the-Air Update for Connected Vehicles," In 2018 International Conference on Wireless Algorithms, Systems, and Applications (WASA 2018), Tianjin, China, June 20-22, 2018. (doi: 10.1007/978-3-319-94268-1_78) (Online)
  • Quamar Niyaz, Wei Liu, Weiqing Sun, and Ahmad Y. Javaid, "A Web-based Lightweight Testbed for Supporting Network Security Hands-on Labs," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, Michigan, USA, May 3-5, 2018. (Accepted 4/9)
  • Arun Prasath Sivanesan, Akshay Mathur, and Ahmad Y. Javaid, "A Google Chromium Browser Extension for Detecting XSS attack in HTML5 based Websites," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, Michigan, USA, May 3-5, 2018. (Accepted 4/9)
  • Benjamin Cechner, Akshay Mathur, and Ahmad Y. Javaid, "Software Cracking: An Exploration of the Physical Realities of Software," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, Michigan, USA, May 3-5, 2018. (Accepted 4/9)
  • Ankita Chordiya, Subhrajit Majumder, and Ahmad Y. Javaid, "Man-in-the-Middle (MITM) Attack Based Hijacking of HTTP Traffic Using Open Source Tools," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, Michigan, USA, May 3-5, 2018. (Accepted 4/9)
  • Bhargav Pingle, Aakif Mairaj, and Ahmad Y. Javaid, "Real-world Man-in-the-middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, Michigan, USA, May 3-5, 2018. (Accepted 4/9)
  • Shriya Vyamajala, Tauheed Mohd Khan, and Ahmad Y. Javaid, "A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, Michigan, USA, May 3-5, 2018. (Accepted 4/9)
  • Praveen Damacharla, Ruthwik R Junuthula, Ahmad Y. Javaid, and Vijay K. Devabhaktuni, “Autonomous ground vehicle error prediction modeling to facilitate human-machine cooperation”, In: Chen J. (eds) Advances in Human Factors in Robots and Unmanned Systems. AHFE 2018. Advances in Intelligent Systems and Computing, vol 784, pp 36-45. Springer, Cham, 2018. (doi: 10.1007/978-3-319-94346-6_4) (Online)
  • Praveen Damacharla, Ahmad Y. Javaid, and Vijay K. Devabhaktuni, “Human Error Prediction Using Eye Tracking to Improvise Team Cohesion in Human-Machine Teams”, In: Boring R. (eds) Advances in Human Error, Reliability, Resilience, and Performance. AHFE 2018. Advances in Intelligent Systems and Computing, vol 778, pp 47-57. Springer, Cham8, 2018. (doi: 10.1007/978-3-319-94391-6_5) (Online)
  • Ankit L. P. S. Renduchintala, Abdulsahib Albehadili,and Ahmad Y. Javaid, "Drone Forensics: A Preliminary Flight Log Analysis of Micro Drones", In 2017 International Symposium on Cyber Warfare, Cyber Defense, and Security, in collaboration with 2017 Conference on Computational Science and Computational Intelligence (CSCI-ISCW 2017), December 14-16, 2017, Las Vegas, USA (Accepted 11/03/17)
  • Mohammad Faridul Haque Siddiqui, Jackson DeCarvalho, and Ahmad Y. Javaid, "Genetic Algorithm Based Approach for Data Fusion at Grammar Level", In 2017 International Symposium on Computational Science, in collaboration with 2017 International Conference on Computational Science and Computational Intelligence (CSCI-ISCS 2017), December 14-16, 2017, Las Vegas, USA (Accepted 10/15/17)
  • Tauheed Khan Mohd, Jackson Carvalho, and Ahmad Y. Javaid, "Multi-modal data fusion of Voice and EMG data for Robotic Control," In 8th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, Columbia University, New York City, NY, USA, 19 - 21 October 2017. doi: 10.1109/UEMCON.2017.8249063 (Online)
  • Ashutosh Bandekar and Ahmad Y. Javaid, "Cyber-attack Mitigation and Impact Analysis for Low-power IoT Devices," In 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER), Honolulu, HI, USA, 2017, pp. 1631-1636. doi: 10.1109/CYBER.2017.8446380 (Online)
  • Bhavana Daddala, Hong Wang and Ahmad Y. Javaid, "Design and Implementation of a customized encryption algorithm for Authentication and Secure Communication between devices", at 2017 IEEE National Aerospace and Electronics Conference (NAECON), Dayton, OH, June 27-30, 2017 doi: 10.1109/NAECON.2017.8268781 (Online)
  • Mohammad Rahat Helal, Weiqing Sun, and Ahmad Y. Javaid, "Efficient Isolation Enabled Role-Based Access Control for Database Systems," In the 2017 International Conference on Security and Management (SAM 2017), Las Vegas, USA, July 17-20, 2017. (Online)
  • Safia Rahmat, Quamar Niyaz, Ahmad Y Javaid, and Weiqing Sun, "Normal and Anomalous Traffic Flow Pattern Analysis for Organizational Networks," In 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), Windsor, ON, April 30-May 3, 2017. doi: 10.1109/CCECE.2017.7946652 (Online)
  • Rishabh Chauhan, Hong Wang, and Ahmad Javaid, “Modified RSSI Fingerprinting Algorithm with Reliability Factor for Wi-Fi based Indoor Navigation System”, In 6th International Conference on Sensor Networks, February 19-21, 2017, Porto, Portugal.
  • Keyur Kulkarni and Ahmad Javaid, “Open Source Android Vulnerability Detection Tools: A Survey,” In 2017 IEEE International Symposium on Technologies for Homeland Security, Waltham, MA, USA, April 25-26, 2017. (Online)
  • Ashutosh Bandekar, Akshay Kotian, and Ahmad Javaid, "Comparative Analysis of Simulation and Real-world Energy Consumption for Battery-life Estimation of low-power IoT deployment in Varying Indoor Lighting Conditions using Zolertia Z1 motes", 7th EAI International Conference on Sensor Systems and Software, Nice, France, 2016. (DOI: 10.1007/978-3-319-61563-9_12) (Online) (Online)
  • Harsha Chenji, Gordon Stewart, Zhiqiang Wu, Ahmad Javaid, Vijay Devabhaktuni, Kul Bhasin and Bin Wang, "An Architecture Concept for Cognitive Space Communication Networks", 34th AIAA International Communications Satellite Systems Conference, International Communications Satellite Systems Conferences (ICSSC), (AIAA 2016-5728) doi: 10.2514/6.2016-5728 (Online)
  • Zhiping Zhang, Zhiqiang Wu, Harsha Chenji, James Stewart, Ahmad Javaid, Vijay Devabhaktuni, Kul Bhasin and Bin Wang, "Intelligent Channel Sensing based Secure Cross Layer Cognitive Networking for Resilient Space Communication", at 2016 IEEE National Aerospace and Electronics Conference (NAECON) and Ohio Innovation Summit (OIS), Dayton, OH, 2016, pp. 407-411. doi: 10.1109/NAECON.2016.7856839 (Online)
  • Ahmad Karimi, Quamar Niyaz, Weiqing Sun, Ahmad Javaid, and Vijay Devabhaktuni, "Distributed Network Traffic Feature Extraction for a Real-time IDS", In 2016 IEEE International Conference on Electro Information Technology (EIT), Grand Forks, ND, 2016, pp. 0522-0526 doi: 10.1109/EIT.2016.7535295 (Online)
  • Hailu Xu, Weiqing Sun, and Ahmad Javaid, "Efficient Spam Detection across Online Social Networks." In IEEE International Conference on Big Data Analysis (ICBDA), pp 1-6, IEEE 2016 doi: 10.1109/ICBDA.2016.7509829 (Online)
  • Quamar Niyaz, Weiqing Sun, Ahmad Javaid, and Mansoor Alam, "A Deep Learning Approach for Network Intrusion Detection System." In Proceedings of 9th EAI International Conference on Bio-inspired Information and Communications Technologies (BICT), pp. 21-26, ACM 2015 (Online)
  • Junghwan Kim, Quamar Niyaz, and Ahmad Y. Javaid. "Performance evaluation of VoIP broadcasting over LTE for varying speeds and distances of mobile nodes." In Broadband Multimedia Systems and Broadcasting (BMSB), 2014 IEEE International Symposium on, pp. 1-5. IEEE, 2014. (Online)Ahmad Y. Javaid, Weiqing Sun, and Mansoor Alam. "UAVSim: A simulation testbed for unmanned aerial vehicle network cyber security analysis." In Globecom Workshops (GC Wkshps), 2013 IEEE, pp. 1432-1436. (Online)
  • Ahmad Y. Javaid, Weiqing Sun, Vijay K. Devabhaktuni, and Mansoor Alam. "Cyber security threat analysis and modeling of an unmanned aerial vehicle system." In Homeland Security (HST), 2012 IEEE Conference on Technologies for, pp. 585-590. IEEE, 2012. (Online)

Poster Publications

  • Praveen Damacharla, Ahmad Y. Javaid, and Vijay K. Devabhaktuni, "Human Machine Team (HMT) Architecture Design for Live Virtual Constructive (LVC) Environment Towards Training Medical First Responders", at Air Force Research Laboratory's Safe & Secure Systems and Software Symposium (S5), 12-14 July 2016, Dayton, Ohio

book chapters

  • Safia Rahmat, Quamar Niyaz, Ahmad Y Javaid,and Weiqing Sun, "Application of Deep Learning as a Pattern Recognition Technique in Information Security," In Advances in Pattern Recognition Research, Eds: Thomas Lu, Senior Researcher & Tien-Hsin Chao, Principal Researcher, NASA/JPL/Caltech, NOVA Science Publishers. Accepted and In Print.
  • Subhrajit Majumder and Ahmad Y. Javaid, "Chapter: "Cyber-Physical System Security Controls: A review", In Cyber-Physical System: Architecture, Security and Application, Eds: Deze eng and Song Guo. Springer Innovations in Communications and Computing Book Series. Accepted and In Print.
  • Abdulsahib Albehadili and Ahmad Javaid, “Chapter Five: IoT Security”, In Internet of Things and Big Data Analysis: Recent Trends and Challenges, Eds.: Ali Al-Sabbagh and Ruaa Alsabah, pp. 112-148, United Scholars Publications, ISBN-13: 978-0692809921, December 2016

Grants

  • 2016-2018 - Air Force Research Lab (AFRL) Grant: "EpEx: Episodic Memory Reconstruction for UAS Behavior Explanation", $300K sub-contract. Total project award is $1.2M including university/industry partners. PIs: Dr. Vijay Devabhaktuni, Dr. Ahmad Javaid, and Dr. Devinder Kaur
  • 2016-2018 - Ohio Federal Research Network (OFRN) Award: "Improving Healthcare Training & Decision Making through the Live, Virtual, and Constructive (LVC) Enterprise", ranked #3 among OFRN Round 1 proposals across Ohio. $135K contract. Total project award is $655K including university/industry partners. PIs: Dr. Ahmad Javaid, and Dr. Vijay Devabhaktuni
Last Updated: 9/22/18