QAU

CS

Academics

Research

Faculty

Admission

 

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: G:\Official\Personal Web Page\Dr_Usman_Web_Page_files\line.gif

Muhammad Usman

Assistant Professor – HEC Approved PhD Supervisor

Ph.D., Griffith University, Australia
MS (CS), PMAS Arid Agriculture University, Pakistan

Phone: +92-51-9064-2161

Email: musman at qau dot edu dot pk

 

Muhammad Usman received MS (Computer Science) from the PMAS-AAUR, Pakistan with first class and obtained Ph.D. from School of Information and Communication Technology, Griffith University, Australia. He has held several academic and industrial positions in different parts of the world. He has published over twenty five research papers in international journals and conferences including prestigious journals such as IEEE Transactions on Consumer Electronics. He has also published a book focused on Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks. He has been recipient of several research and travel grants. He is a member of Network Security Research Group at the Institute for Integrated and Intelligent Systems at Griffith University, Australia. He is also a member of Computer Science Teachers Association, endorsed by ACM, USA. His recent research paper has received the best paper award in IEEE ComTech 2017.


(Book)


(Book Chapter)





 


Research Interests

  • Security and Privacy – intrusion and anomaly detection systems, data leakage prevention, key management schemes, trust management 
  • Internet of Things - smart homes and smart cities, pervasive computing, wireless sensor networks
  • Data Analytics – healthcare and social data analytics using statistical and social network analytical techniques
  • Computer Networks – distributed systems, grid computing, mobile agent-based distributed systems, routing protocols, peer-to-peer computing
  • Cloud Computing -  architectural, efficiency, security and privacy issues
  • Web Services – security & privacy issues in web 2.0, performance issues in web services, trust in learning management systems
  • Formal Modeling and Analysis – statistical modeling, structural and behavior modeling and analysis of distributed protocols and systems

Research & Development Grants

  • Principal Investigator with Dr. Onaiza Maqbool (Co-PI): Design and Analysis of Web Services Ranking Methods for Internet of
    Things (PKR 0.477 million) - funded by Higher Education Commission of Pakistan
  • Co-Principal Investigator with Dr. Muddassar Azam Sindhu (PI) and Dr. Onaiza Maqbool (Co-PI): Data Leak Prevention (PKR 0.15 million), funded by an industry partner
  • Co-Principal Investigator with Dr. Muddassar Azam Sindhu (PI) and Dr. Onaiza Maqbool (Co-PI): Code Vulnerability Scanner for Java
    Language (PKR 0.15 million), funded by an industry partner
  • Co-Principal Investigator with Dr. Muddassar Azam Sindhu (PI) and Dr. Onaiza Maqbool (Co-PI): Code Vulnerability Scanner for C
    Language (PKR 0.15 million), funded by an industry partner

Honors and Awards

  • Research paper titled as "Dynamic Trust Evaluation of Learning objects" won the best paper award in the IEEE ComTech 2017 conference
  • Griffith University International Postgraduate Research Scholarship (GUIPRS) for PhD - 2012-2015 - received highly competitive GUIPRS (tuition fee) scholarship
  • Griffith University Postgraduate Research Scholarship (GUPRS) for PhD - 2012-2015 – received highly competitive GUPRS (living stipend) scholarship
  • Conference Travel Grant – WoWMoM 2014 - awarded with a conference travel grant amounting to 906AUD by School of ICT, Griffith University, Australia
  • Conference Travel Grant – 38th LCN - awarded with a conference travel grant amounting to 450AUD by School of ICT, Griffith University, Australia
  • 1st Position in Computer Networks Group of MS (CS) - 2006-2009
  • Vice Chancellor Merit Scholarship in 2nd Semester of MS (CS)
  • Academic Standing - scored three consecutive 4/4 GPAs in last three semesters of MS (CS)

International & National Collaborators

Some of the ongoing collaborated projects are listed below:

 

1.      Principal Investigator with Dr. Onaiza Maqbool (Co-PI): Design and Analysis of Web Services Ranking Methods for Internet of Things (PKR 0.477 million) - funded by Higher Education Commission of Pakistan.

2.      Co-Principal Investigator with Dr. Muddassar Azam Sindhu (PI) and Dr. Onaiza Maqbool (Co-PI): Data Leak Prevention (PKR 0.15 million), funded by a public sector organization.

3.      Co-Principal Investigator with Dr. Muddassar Azam Sindhu (PI) and Dr. Onaiza Maqbool (Co-PI): Code Vulnerability Scanner for Java Language (PKR 0.15 million), funded by a public sector organization.

4.      Co-Principal Investigator with Dr. Muddassar Azam Sindhu (PI) and Dr. Onaiza Maqbool (Co`-PI): Code Vulnerability Scanner for C Language (PKR 0.15 million), funded by a public sector organization.

5.      Principal Investigator with Professor Vallipuram Muthukkumarasamy (Griffith University, Australia): Access Control Methods in Internet of Things Enabled Cardiac Devices (PKR 0.906682 million), under review by Higher Education Commission of Pakistan.

6.      Collaborating with Alireza Jolfaei, Federation University, Australia on a joint research work focusing on Trust Management Issues in Intelligent Transport Systems.

7.      Collaborating with Alireza Jolfaei, Federation University, Australia on editing a special issue special issue of IEEE Transactions on Industry Applications on Security, Privacy, Trust, and Access Control in Industrial Applications

8.      Associate Professor Iqbal Gondal, Federation University, Australia on editing a special issue special issue of IEEE Transactions on Industry Applications on Security, Privacy, Trust, and Access Control in Industrial Applications

9.      Professor Krishna Kant, Temple University, USA on editing a special issue special issue of IEEE Transactions on Industry Applications on Security, Privacy, Trust, and Access Control in Industrial Applications

10.   Collaboration with Dr. Shahab, Pakistan Institute of Medical Sciences, on a project focusing on Access Control Methods in Internet of Things Enabled Cardiac Devices.

11.   Collaboration with Professor Vallipuram Muthukkumarasamy, Griffith University, Australia, on a project focusing on Access Control Methods in Internet of Things Enabled Cardiac Devices.

12.   Collaboration with Dr. Xin-Wen Wu, Griffith University, Australia, on a joint research work focusing on ranking of sensing as a service. 

13.   Collaboration with Dr. Muhammad Arif Nadeem Saqib and his team, from Pakistan Health Research Council, on several joint research works focusing on statistical and network analyses of health data.

14.   Collaboration with Dr. Muhammad Rizwan Alam, Department of Biochemistry, Quaid-i-Azam University, Pakistan on biomedical health retrievals and analytics.  


Editorial Services, Editorial and TPC Member, & Invited Reviewer

 

Role

Journal/ Conference

Editor

·         Lead Guest Editor of Special Issue of IEEE Transactions on Industry Applications on Security, Privacy, Trust, and Access Control in Industrial Applications, scheduled to be published in May/ June 2020 (under review)

·         Guest Editors Team:

1         Dr. Muhammad Usman, Quaid-i-Azam University, Pakistan

2         Dr. Alireza Jolfaei, Federation University, Australia

3         Associate Professor Iqbal Gondal, Federation University, Australia

4         Professor Krishna Kant, Temple University, USA

 

Member Editorial Board

·         Editorial board member of Smart Science Journal by Taylor & Francis

 

Technical Program Chair and Publication Chair

 

·         ICET, Islamabad, Pakistan – 2018

Member TPC

·         Special Session in ICIT, Melbourne, Australia – 2019

·         First IEEE International Workshop on Internet of Services and Applications (IoS 2018), Xi'an, China - Member Program Committee

·         Member Technical Program Committee for ICCAIS-18

·         IBCAST Reviewer - 2018

·         Intellect 2017

·         IBMSGS 2015

·         UWCSN 2014

·         ICCAIE 2010

·         UbiCoNet 2010

·          

Reviewer

·         IEEE Transactions on parallel and distributed systems

·         IEEE Transactions on Cybernetics 

·         Journal of Systems and Software, Elsevier Journal

·         Journal of Networks and Computer Applications, Elsevier Journal

·         International Journal of Image and Data Fusion

·         IEEE Access

·         International Journal of Image and Data Fusion 

·         ISBEIA 2014

·         ISIEA 2013, ISCI 2013, BEIAC 2013

·         BEIAC 2012, IAPEC 2012, APACE 2012, PECON 2012, SCOReD 2012, ISBEIA 2012, ISCAIE 2012, ISCI 2012, ISIEA 2012, ISWTA 2012,

·         ICOS 2011, RFM 2011, SCOReD 2011, ISCI 2011, ISIEA 2011, ISWTA 2011

·         FEMnet 2010, ICCAIE 2010, Wi-UAV 2010, UbiCoNet 2010            

 


Memberships

  • Member Network Security Research Group, Griffith University, Australia
  • Computer Science Teacher Association (CSTA) endorsed by ACM Publishers, USA
  • Juniper Networks, USA

1.       Internetworking Specialist (Enterprise Routing Track)

2.       Internetworking Specialist (JUNOS Security Track)

3.       Internetworking Associate (Enterprise Switching Track)

4.       Internetworking Associate (Enterprise Routing Track)


Experience (last five positions)

  • Assistant Professor – Quaid-I-Azam University, Pakistan – February 2016 to date
  • Lecturer (Level A) – Griffith University, Australia – August 2015 – January 2016
  • PhD Scholar & Instructor – Griffith University, Australia – February 2012 – July 2015
  • Lecturer – King Khalid University, Saudi Arabia - March 2011- To - January 2012
  • Lecturer and Project Manager (Research Centre) – University of Central Punjab, Pakistan - Oct 2010 - To - Feb 2011  

Teaching

  • PhD (CS)
    1. CS-824: Peer-to-Peer Systems
    2. CS-832: Information Security  
    3. CS-833: Information Privacy and Access Control – F’17

  • MPhil (CS)
    1. CS-751: Distributed Systems - F’16
    2. CS-824: Peer-to-Peer Systems
    3. CS-833: Information Privacy and Access Control - F’17

  • MS (IST)
    1. IST-672: Web Services - S’16, S’17, S’18
    2. IST-780: Project/Thesis – F’16, S’17, F’17, S’18
    3. IST-832: Information Security 
    4. IST-833: Information Privacy and Access Control

  • M.Sc. (CS)
    1. CS-303: Rapid Application Development – S’18
    2. CS-499: Project – S’16, F’16, S’17, F’17, S’18

  • BS (CS)
    1. CS-223: Operating System – S’16
    2. CS-445: Information Systems – S’18
    3. CS-454: Introduction To Web Services - F’16, F’17
    4. CS-462: Introduction To Cyber Security - S’17
    5. CS-489:Project - F’16, S’17, F’17, S’18

Research Students

  •  
    1. Secondary Analysis of World Health Organization Dataset Using Network and Statistical Analyses Methods - Zarghona Anis (S’18 – F’18)
    2. Key Exchange Protocols in Internet of Things Applications – Zartaj Ali (S’18 – F’18)
    3. Visualization of retrieved data through non-linear data structures – Jawad Ahmed (S’18 – F’18)
    4. Ranking of Sensing-as-a-Service in Internet of Things - Aroosa Hameed (F’17 – S’18)
    5. Design and Analysis of Optical Interconnection System for Cloud Computing Data Centers - Samina Lone (F’17 – S’18)
    6. Design and Analysis of a Data Leakage System – Seema Raishad (F’17 – S’18)
    7. Probabilistic Judgments in Analytic Hierarchy Process for Web Services Ranking – Noor Alam (F’16 – S’18)
    8. Game Theory-based Learning Object Selection – Asad Zia (F’16 – S’18)
    9. Risk Factors-based Network Analysis of Non-Communicable Diseases – Zahra Batool (F’16 – S’17)
    10. Utility Theory-based Trust Evaluation of Learning Objects – Kanwal Mahmud (F’16 – S’17)

 

Project Students

  • MSc
  •  
    1. Telehealth - Mubeen Sarwar (F’17 – S’18)
    2. Calendar Analyzer– Bisma Tariq (S’17 – F’17)
    3. Taste Skewer – Nadia Liaqat (S’17 – F’17)
    4. Employee Tracker – Waheed Ahmed (S’17)
    5. Friends Band - Mahvish Ghazi (S’17)
    6. Student Learning Experience - Iqra Shabeer (S’17)
    7. Visualization of Real World Applications using Distributed Synchronization and Scheduling Algorithms - Saba Bashir (F’16)
    8. Family Tree - Zeeshan Shahid (F’16)
    9. Transport Management System: Quaid-I-Azam University - Muhammad Umar (S’16)
  • BS (CS)
    1. Smart Contracts – Raja Ammad Iftikhar (F’17, S’18)
    2. Development of Intra-Lab Data Leakage Prevention System – Danish Alam (F’17, S’18)
    3. Cricket Club Hub - Abdul Rahman (F’16, S’17)
    4. Academic Staff Association Hub - I - Hassan Farooqi (F’16, S’17)
    5. Academic Staff Association Hub - II - Azmatullah (F’16, S’17)
    6. Quaid-I-Azam University Community Guild - I - Luqman Anjum (F’16, S’17)
    7. Quaid-I-Azam University Community Guild - II - Shahroz Jamil (F’16, S’17)

Publications

  • Book
    1. Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks, M. Usman, V. Muthukkumarasamy, X.-W. Wu, and Surraya Khanum, Springer, 2018. ISBN 978-981-10-7466-0, ISBN (eBook) 978-981-10-7467-7.
  • Journal
    1. A. Irshad, H. Naqvi, S. Ashraf Chaudhary, M. Usman, M. Shafiq, O. Mir, and A. Kanwal, "Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee’s Scheme" Information Technology and Control, Vol. 47, No. 3, 2018.
    2. Trust Establishment and Estimation in Cloud Services: A Systematic Literature Review, K. Mehmood and M. Usman, Journal of Network and Systems Management, Sep. 2018. (accepted).
    3. Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks, Muhammad Shafiq, Maqbool Ahmad, Azeem Irshad, Moneeb Gohar, Muhammad Usman, Muhammad Khalil Afzal, Jin-Ghoo Choi, and Heejung Yu, Sensors, vol. 18, no. 7, 2018.
    4. An efficient and secure design of multi-server authenticated key agreement protocol, Azeem Irshad, Syed Husnain Abbas Naqvi, Shehzad Ashraf Chaudhary, Shoukat Raheem, Saru Kumari, Ambrina Kanwal, and Muhammad Usman, Journal of Supercomputing, vol. x. no. x. 2018.
    5. Disease-Disease Association Using Network Modeling: Challenges and Opportunities, Zahra Batool, Muhammad Usman, Khalid Saleem, M. Abdullah-Al-Wadud, Fazal-e-Amin, Abdulhameed Al-Eliwi, Journal of Medical Imaging and Health Informatics, Vol. 8, pp. 1-10, 2018.
    6. An improved lightweight multi-server authentication scheme, Azeem Irshad, Shehzad Ashraf Chaudhary, Saru Kumari, Muhammad Usman, Khalid Mahmood, and Muhammad Shahzad Faisal, International Journal of Communication Systems, 4 July, 2017.
    7. Mobile Agent-based Cross Layer Anomaly Detection in Smart Home Sensor Networks, M. Usman, V. Muthukkumarasamy, and X.-W. Wu, IEEE Transactions on Consumer Electronics, May 2015.
    8. Specifications and Validation of Agent-based Anomaly Detection and Verification System for Resource Constrained Networks, M. Usman, V. Muthukkumarasamy, and X.-W. Wu, Journal of Networks, July 2015.
    9. A Resource-Efficient System for Mobile Agent-based Anomaly Detection and Verification in Wireless Sensor Networks, M. Usman, V. Muthukkumarasamy, and X.-W. Wu, Journal of Networks, Vol. 9, No. 12, pp. 3427-3444, Dec. 2014.
    10. Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks S. Khanum, M. Usman, and A. Alwabel, International Journal of Computer Science Issues (IJCSI), vol. 9, iss. 1, January 2012.
    11. Performance Evaluation of Group Mobility in Mobile Ad hoc Networks, E. Irshad, W. Noshairwan, M. Shafiq, S. Khurram, A. Irshad, and M. Usman, International Journal of Future Generation Communication and Networking, pp. 13-22, vol. 4, iss. 1, 2011.
    12. Security Enhancement in MANET Authentication by checking the CRL Status of Servers, A. Irshad, W. Noshairwan, M. Shafiq, S. Khurram, E. Irshad, and M. Usman, International Journal of Advanced Science & Technology (IJAST), Korea, 2008.
  • Conference/ Book Chapter
    1. Asad Zia and Muhammad Usman, "Elective Learning Objects Group Recommendation Using Non-Cooperative Game Theory", 16th IEEE International Conference on Frontiers of Information Technology (FIT), 17-19 December, 2018.
    2. Samina Lone and Muhammad Usman, "E-HOSA: Extended-Hybrid Optical Switch Architecture for Cloud Computing Data Centers", 16th IEEE International Conference on Frontiers of Information Technology (FIT), 17-19 December, 2018.
    3. Sum-of-the-Parts Valuation-based Scheduling of Parallel Applications over Global Grid, Aroosa Hameed and Muhammad Usman, Frontiers of Information Technology (FIT), Islamabad, Pakistan, 18-20 December, 2017. (accepted)
    4. Dynamic Trust Evaluation of Learning Objects, Kanwal Mehmood and M. Usman, International Conference on Communications Technologies (ComTech - 2017), pp. 195-200, Rawalpindi, Pakistan, April 2017. (Best Paper Award)
    5. Anomaly Detection in Wireless Sensor Network: Challenges and Future Trends, M. Usman, V. Muthukkumarasamy, X-W. Wu, S. Khanum, Book chapter, Security for Multihop Wireless Networks, Auerbach publications, Taylor & Francis Group, pp. 273-304, USA, 2014.
    6. Agent-enabled Anomaly Detection in Resource Constrained Wireless Sensor Networks, M. Usman, in proceedings of the IEEE International Symposium on a World of Wireless, Mob­­ile and Multimedia Networks (WoWMoM), pp. 1-2, Sydney, Australia, June 2014.
    7. Formal Verification of Mobile Agent Based Anomaly Detection in Wireless Sensor Networks, M. Usman, V. Muthukkumarasamy, X-W. Wu, in proceedings of the IEEE 38th conference on Local Computer Networks (LCN Workshops), pp. 1001-1009, Sydney, Australia, October, 2013.
    8. Efficient Clique Based Clustering and Routing Mechanism in Wireless Sensor Networks, K. Biswas, V. Muthukkumarasamy, E. Sithirasenan, and M. Usman, in proceedings of the 9th IEEE International Wireless Communications and Mobile Computing Conference, (IWCMC), pp. 171-176, Sardinia, Italy, July, 2013.
    9. Securing Mobile Agent Based Wireless Sensor Network Applications on Middleware, M Usman, V Muthukkumarasamy, X.-W. Wu, and S. Khanum, IEEE 12th International Symposium on Communication and Information Technology (ISCIT), Gold Coast, Australia, October 2012.
    10. Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly Detection, M Usman, V Muthukkumarasamy, X.-W. Wu, and S. Khanum, in proceedings of the IEEE 9th conference on Ubiquitous intelligence and Computing (UIC), pp. 322-329, Japan, September 2012.
    11. An Optimal Mutual Authentication Scheme in GSM Networks, A. Haleem and M. Usman, in proceedings of the IEEE International Conference on Information and Communication Technologies (ICICT), pp. 1-5, Karachi, Pakistan, July, 2011.
    12. Hash-chain based peer-peer key management and establishment of Security Associations in MANETS, A. Irshad, S. M. Gilani, S. Khurram, M. Shafiq, A. W. Khan, M. Usman, in proceedings of the IEEE International Conference on Information and Emerging Technologies (ICIET), pp. 1-6, Karachi, Pakistan, 2010. 
    13. Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN, M. Usman, S. Khanum, W. Noshairwan, E. Irshad, and A. Irshad High Performance Computing and Applications (HPCA), LNCS, Springer-Verlag, pp. 384-389, 2010.
    14. Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture, S. Khanum, M. Usman, K Hussain, R Zafar, and M Sher, High Performance Computing and Applications (HPCA), LNCS, Springer-Verlag, pp. 212–217, 2010.
    15. Certificate Chain based Authentication in MANETS using 4th generation Technologies, A. Irshad, W. Noshairwan, M. Shafiq, A. W. Khan, M. Usman, and E. Irshad, in proceedings of the IEEE 2nd International Conference on Computer Science and Information Technology (ICCSIT), pp. 518-523, Beijing, China, August 2009.
    16. Authentication of Nodes among Different Symmetric Key Groups in MANETs using 4G Technologies, A. Irshad, W. Noshairwan, M. Rashid, S. M. Gilani, E. Irshad, and M. Usman, in proceedings of the IEEE International Conference on Computer Engineering and Technology (ICCET), pp. 261-265, Singapore, Jan 2009.
    17. A Secure interaction among nodes from different MANET Groups using 4G technologies, A. Irshad, M. Shafiq, A. Rahman, S. Khurram, M. Usman, and E. Irshad, Oct 2009, In proceedings of the IEEE International Conference on Emerging Technologies (ICET), pp. 476-481, Rawalpindi, Pakistan, 2009.
    18. Seamless vertical handoff using Authentication Certificate in GPRS-WLAN tightly coupled integrated networks, M. Usman, W. Noshairwan, M. Gilani, A. Irshad, and E. Irshad, in proceedings of the 4th IEEE International Conference on Emerging Technologies, pp. 199-204, Pakistan, 2008.
    19. Group Mobility in Mobile Ad hoc Networks, E. Irshad, W. Noshairwan, M. Usman, A. Irshad, M. Gilani WWW/Internet, IADIS, pp. 1-5, Germany, 13-15 Oct, 2008.

 

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: G:\Official\Personal Web Page\Dr_Usman_Web_Page_files\line.gif

[QAU] [CS] [Academics] [Research] [Faculty] [Admission]

Copyright© cs.qau.edu.pk 2018