Faculty Img
  • Phone:

  • Email:

    fullah@pmu.edu.sa

  • Office No:

    F025

  • Farhan Ullah

  • Job Title :

    Associate Research Professor

  • College :

    College of Computer Engineering and Science


  • Department :

    Computer Science


 Farhan Ullah received his Ph.D. in Computer Science from Sichuan University, China, and is currently an Associate Research Professor at the Cybersecurity Center of Prince Mohammad Bin Fahd University, Saudi Arabia. He has previously held positions as Associate Professor at Northwestern Polytechnical University, China, visiting research fellow at the University of Camerino, Italy, and lecturer at COMSATS University Islamabad, Pakistan. He has received various awards for his research and teaching excellence. He has also been invited as a keynote speaker and has delivered courses at international conferences and summer schools. He had the privilege of contributing as a guest editor and engaging in editorial work for renowned journals such as the IEEE Journal of Biomedical and Health Informatics, KSII Transactions, etc. He has supervised several undergraduate and graduate students and served as a foreign thesis examiner for Ph.D. thesis. His work has been published in reputable journals, including IEEE, Springer, Elsevier, and Wiley. His primary research areas include cybersecurity, malware analysis, data science, deep learning, and Explainable AI. 
 

Ph.D. (Computer Science) Sichuan University, Chengdu, China        

Master of Science (Computer Science) CECOS University, Peshawar, Pakistan 

Bachelor of Science (Computer Science) Peshawar University, Peshawar, Pakistan

1.      Farhan Ullah, Nazeeruddin Mohammad, Leonardo Mostarda, Diletta Cacciagrano, Shamsher Ullah, and Yue Zhao. "THE-TAFL: Transforming Healthcare Edge with Transformer-based Adaptive Federated Learning and Learning Rate Optimization." Internet of Things (2025): 101605. (https://www.sciencedirect.com/science/article/pii/S2542660525001180)

2.      Gan, Hongping, Hejie Zheng, J. Nescolarde Selva, Yunong Chen, Zhangfa Wu, and Farhan Ullah. "TCAD-Net: Integrating Transformer and Convolution for Weakly Supervised Anomaly Data Discovery." IEEE Transactions on Consumer Electronics (2025).

3.      Rehman, Asad Ur, Xiaochuan Shi, Farhan Ullah, Zepeng Wang, and Chao Ma. "Measuring student attention based on EEG brain signals using deep reinforcement learning." Expert Systems with Applications (2025): 126426. (https://www.sciencedirect.com/science/article/abs/pii/S095741742500048X?via%3Dihub)

4.      Naseer, Mehwish, Farhan Ullah, Samia Ijaz, Hamad Naeem, Amjad Alsirhani, Ghadah Naif Alwakid, and Abdullah Alomari. "Obfuscated Malware Detection and Classification in Network Traffic Leveraging Hybrid Large Language Models and Synthetic Data." Sensors (Basel, Switzerland) 25, no. 1 (2025): 202. (https://www.mdpi.com/1424-8220/25/1/202)

5.      Rehman, Asad Ur, Noor Ul Eman, Farhan Ullah, Diletta Cacciagrano, Leonardo Mostarda, and Nabeel Raza. "Advanced EEG Signal Processing and Deep Q-Learning for Accurate Student Attention Monitoring." IEEE Access (2024). (https://ieeexplore.ieee.org/abstract/document/10816329 )

6.      Farhan Ullah, Leonardo Mostarda, D. Cacciagrano, M. J. F. Alenazi, C. -M. Chen and S. Kumari, "Federated Edge Intelligence for Enhanced Security in Consumer Intermittent Healthcare Devices Using Adversarial Examples," in IEEE Transactions on Consumer Electronics,(URL: doi: 10.1109/TCE.2024.3511615) (https://ieeexplore.ieee.org/abstract/document/10778269)

7.      Hammad Naeem, Farhan Ullah, Ondrej Krejcar, Amjid Alsirhani and Yue Zhao, "Adversarial Malware Detection on Consumer Devices Using Optimized Image-Based Ensembles," in IEEE Consumer Electronics Magazine, doi: 10.1109/MCE.2024.3507282. (URL: doi: 10.1109/MCE.2024.3507282)

8.      Ahmed, Waqas, Waseem Iqbal, Ammar Hassan, Awais Ahmad, Farhan Ullah, and Gautam Srivastava. "Elevating e-health excellence with IOTA distributed ledger technology: Sustaining data integrity in next-gen fog-driven systems." Future Generation Computer Systems (2025): 107755. (https://www.sciencedirect.com/science/article/pii/S0167739X25000500)

9.      Shamsher Ullah, Jianqiang Li, Jie Chen, IKRAM ALI, Salabat Khan, Abdul Ahad, Farhan Ullah, and Victor Leung. "A Survey on Emerging Trends and Applications of 5G and 6G to Healthcare Environments." ACM Computing Surveys (2024).

(URL: https://doi.org/10.1145/3703154)

10.   Naeem, Hamad, Amjad Alsirhani, Faeiz M. Alserhani, Farhan Ullah, and Ondrej Krejcar. "Augmenting Internet of Medical Things Security: Deep Ensemble Integration and Methodological Fusion." CMES-Computer Modeling in Engineering and Sciences 141, no. 3 (2024): 2185-2223. (URL: https://doi.org/10.32604/cmes.2024.056308)

11.   Yousaf, Muhammad, Muhammad Farhan, Yousaf Saeed, Muhammad Jamshaid Iqbal, Farhan Ullah, and Gautam Srivastava. "Enhancing driver attention and road safety through EEG-informed deep reinforcement learning and soft computing." Applied Soft Computing 167 (2024): 112320. (URL: https://doi.org/10.1016/j.asoc.2024.112320)

12.   Chang, Furong, Hao Guo, Farhan Ullah, Haochen Wang, Yue Zhao, and Haitian Zhang. "Near-Data Source Graph Partitioning." Electronics 13, no. 22 (2024): 4455. URL: https://doi.org/10.3390/electronics13224455)

13.   Ullah, Shamsher, Jianqiang Li Jie Chen, Ikram Ali, Salabat Khan, Muhammad Tanveer Hussain, Farhan Ullah, and Victor CM Leung. "Homomorphic Encryption Applications for IoT and Light-Weighted Environments: A Review." IEEE Internet of Things Journal (2024). (URL:  doi: 10.1109/JIOT.2024.3472029)

14.   Farhan Ullah, Leonardo Mostarda, Diletta Cacciagrano, Chien-Ming Chen, Mohammed Amoon, and Saru Kumari. "Metaheuristic-Driven Secure Task Optimization for Consumer Edge Devices." IEEE Consumer Electronics Magazine (2024).

(URL: doi: 10.1109/MCE.2024.3467768)

 

15.   Khan, Sheharyar, Zheng Jiangbin, Farhan Ullah, Muhammad Pervez Akhter, Sohrab Khan, Fuad A. Awwad, and Emad AA Ismail. "Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system." PeerJ Computer Science 10 (2024): e2211. (URL: https://doi.org/10.7717/peerj-cs.2211)

16.   Jamil, Muhammad, Muhammad Farhan, Farhan Ullah, and Gautam Srivastava. "A Lightweight Zero Trust Framework for Secure 5G VANET Vehicular Communication." IEEE Wireless Communications (2024). (URL: doi: 10.1109/MWC.015.2300418)

17.   Zhao, Yue, Farhan Ullah, Chien-Ming Chen, Mohammed Amoon, and Saru Kumari. "Efficient malware detection using hybrid approach of transfer learning and generative adversarial examples with image representation." Expert Systems: e13693.

(URL: https://doi.org/10.1111/exsy.13693)

18.   Ullah, Shamsher, Jianqiang Li, Farhan Ullah, Jie Chen, Ikram Ali, Salabat Khan, Abdul Ahad, and Victor CM Leung. "The revolution and vision of explainable AI for android malware detection and protection." Internet of Things (2024): 101320.

 (URL: https://doi.org/10.1016/j.iot.2024.101320)

19.   Farhan Ullah, Diletta Cacciagrano, Chien-Ming Chen, and Saru Kumari. "Semantic-based Federated Defense for Distributed Malicious Attacks." IEEE Consumer Electronics Magazine (2024)., doi: 10.1109/MCE.2024.3431792.

(URL: https://ieeexplore.ieee.org/abstract/document/10606008)

20.   Turab, Ali, Wutiphol Sintunavarat, Farhan Ullah, Shujaat Ali Zaidi, Andrés Montoyo, and Josué-Antonio Nescolarde-Selva. "Computational modeling of animal behavior in T-mazes: Insights from machine learning." Ecological Informatics, Elsevier (2024): May 11:102639. (SCI, IF: 5.1, Q1) (URL: https://www.sciencedirect.com/science/article/pii/S157495412400181X)

21.   Sheharyar Khan, Zheng Jiangbin, Muhammad Irfan, Farhan Ullah, Sohrab Khan, "An expert system for hybrid edge to cloud computational offloading in heterogeneous MEC-MCC environments",  Journal of Network and Computer Applications, Elsevier 2024, 103867, (SCI, IF: 8.7, Q1) (URL: https://doi.org/10.1016/j.jnca.2024.103867)

22.   Naeem, Hamad, Farhan Ullah, and Gautam Srivastava. "Classification of intrusion cyber‐attacks in smart power grids using deep ensemble learning with metaheuristic‐based optimization." Expert Systems (2024), Wiley: e13556. (SCI, IF: 3.3, Q2) (URL: https://onlinelibrary.wiley.com/doi/full/10.1111/exsy.13556 )

23.   Farhan Ullah, Gautam Srivastava, Shamsher Ullah, and Leonardo Mostarda. "Privacy-Preserving Federated Learning Approach for Distributed Malware Attacks With Intermittent Clients and Image Representation." IEEE Transactions on Consumer Electronics (2023) (SCI, IF: 4.3, Q1) (URL: https://ieeexplore.ieee.org/abstract/document/10359131)

24.   Ge, Jing, Kangcheng Wu, Nasir Jamal, and Farhan Ullah. "Dynamic Resource Allocation Techniques for Wireless Network Data in Elastic Optical Network Applications." Mobile Networks and Applications (2023): 1-12. Springer. (SCI, IF: 3.8, Q2) (URL: https://link.springer.com/article/10.1007/s11036-023-02243-2

25.   Farhan Ullah, Gautam Srivastava, Shamsher Ullah, Kenji Yoshigoe, and Yue Zhao. "NIDS-VSB: Network Intrusion Detection System for VANET using Spark-Based Big Data Optimization and Transfer Learning." IEEE Transactions on Consumer Electronics (2023). (SCI, IF: 4.3, Q1) (URL: https://ieeexplore.ieee.org/document/10299718)

26.   Yang, Yang, Haitao Shang, Nasir Jamal, and Farhan Ullah. "Video resources recommendation for online tourism teaching in interactive network." Mobile Networks and Applications (2023): 1-12. Springer. (SCI, IF: 3.8, Q2)

( https://link.springer.com/article/10.1007/s11036-023-02193-9)

27.   Iqbal, Muhammad Jamshaid, Muhammad Farhan, Farhan Ullah, Gautam Srivastava, and Sohail Jabbar. "Intelligent multimedia content delivery in 5G/6G networks: A reinforcement learning approach." Transactions on Emerging Telecommunications Technologies (2023), Wiley. (SCI, IF: 3.31, Q2) (URL: https://onlinelibrary.wiley.com/doi/10.1002/ett.4842)

28.   Farhan Ullah., Ullah, S., Srivastava, G. et al. NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble. Wireless Networks (2023). https://doi.org/10.1007/s11276-023-03414-5, Springer. (SCI, IF: 3.0, Q2)  (URL: https://link.springer.com/article/10.1007/s11276-023-03414-5)

29.   Farhan Ullah, Gautam Srivastava, Heng Xiao, Shamsher Ullah, Jerry Chun-Wei Lin, and Yue Zhao. "A Scalable Federated Learning Approach for Collaborative Smart Healthcare Systems with Intermittent Clients using Medical Imaging." IEEE Journal of Biomedical and Health Informatics (2023). doi: 10.1109/JBHI.2023.3282955. (SCI, IF: 7.7, Q1)

(URL: https://ieeexplore.ieee.org/document/10144616)

30.   Hamad Naeem, Shi Dong, Olorunjube James Falana, and Farhan Ullah. "Development of a Deep Stacked Ensemble With Process Based Volatile Memory Forensics for Platform Independent Malware Detection and Classification." Expert Systems with Applications (2023):119952, Elsevier. (SCI, IF:8.665, Q1)

(URL: https://www.sciencedirect.com/science/article/pii/S0957417423004542)

31.   Din, Nizamud, Abdul Waheed, Shamsher Ullah, Noor Ul Amin, Gautam Srivastava, Farhan Ullah, and Jerry Chun-Wei Lin. "A typology of secure multicast communication over 5 G/6 G networks." International Journal of Information Security (2023): 1-19. Springer. (SCI, IF: 2.427, Q1) (URL: https://link.springer.com/article/10.1007/s10207-023-00678-y)

32.   Farhan Ullah, Shamsher Ullah, Gautam Srivastava, and Jerry Chun-Wei Lin. "IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic." Digital Communications and Networks (2023), Elsevier. (SCI, IF: 7.9, Q1) (URL: https://www.sciencedirect.com/science/article/pii/S2352864823000640

33.   Farhan Ullah, Xiaochun Cheng, Leonardo Mostarda, and Sohail Jabbar. "Android-IoT Malware Classification and Detection Approach Using Deep URL Features Analysis." Journal of Database Management (JDM) 34, no. 2 (2023): 1-26. IGI Global, (SCI, CCF C, IF: 2.656, Q2), (URL: https://www.igi-global.com/article/android-iot-malware-classification-and-detection-approach-using-deep-url-features-analysis/318414)

34.   Shamsher Ullah, Jiangbin Zheng, Nizamud Din, Muhammad Tanveer Hussain, Farhan Ullah, and Mahwish Yousaf. "Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey." Computer Science Review 47 (2023): 100530. Elsevier, (SCI, IF: 8.757, Q1) (URL: https://www.sciencedirect.com/science/article/pii/S1574013722000648 )

35.   Farhan Ullah, Shamsher Ullah, Gautam Srivastava, and Jerry Chun-Wei Lin. "Droid-MCFG: Android malware detection system using manifest and control flow traces with multi-head temporal convolutional network." Physical Communication 57 (2023): 101975. Elsevier, (SCI, IF: 2.379, Q2) (URL: https://www.sciencedirect.com/science/article/pii/S187449072200252X )

36.   Farhan Ullah, Srivastava, G. and Ullah, S., 2022. A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization. Journal of Cloud Computing, 11(1), pp.1-21, Springer, (SCI, IF: 3.418, Q1) (URL:  https://journalofcloudcomputing.springeropen.com/articles/10.1186/s13677-022-00349-8)

37.   Shamsher Ullah, Zheng Jiangbin, Muhammad Tanveer Hussain, Nizamud Din, Farhan Ullah, and Muhammad Umar Farooq. "A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments." Journal of Information Security and Applications 70(2022): 103346. Elsevier, (CCF: C, SCI, IF: 4.96, Q1)

        (URL: https://www.sciencedirect.com/science/article/abs/pii/S2214212622001910)

38.   Bukhari, Maryam, Sadaf Yasmin, Adnan Habib, Xiaochun Cheng, Farhan Ullah, Jaeseok Yoo, and Daewon Lee. "A Novel Framework for Melanoma Lesion Segmentation Using Multiparallel Depthwise Separable and Dilated Convolutions with Swish Activations." Journal of Healthcare Engineering 2023 (2023). (SCI, IF: 3.822, Q2) (URL: https://www.hindawi.com/journals/jhe/2023/1847115/)

39.   Farhan Ullah, Amjad Alsirhani, Mohammed Mujib Alshahrani, Abdullah Alomari, Hamad Naeem, and Syed Aziz Shah. "Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation." Sensors 22, no. 18 (2022): 6766. (SCI, IF: 3.847, Q1) (URL: https://www.mdpi.com/1424-8220/22/18/6766)

40.   Naeem, Hamad, Bandar M. Alshammari, and Farhan Ullah. "Explainable Artificial Intelligence-Based IoT Device Malware Detection Mechanism Using Image Visualization and Fine-Tuned CNN-Based Transfer Learning Model." Computational Intelligence and Neuroscience 2022 (2022). (SCI, IF: 3.120) (URL: https://www.hindawi.com/journals/cin/2022/7671967/ )

41.   Farhan Ullah, Shamsher Ullah, Muhammad Rashid Naeem, Leonardo Mostarda, Seungmin Rho, and Xiaochun Cheng. "Cyber-threat detection system using a hybrid approach of transfer learning and multi-model image representation." Sensors 22, no. 15 (2022): 5883. (SCI, IF: 3.847, Q1) (URL: https://www.mdpi.com/1424-8220/22/15/5883)

42.   Naeem, Hamad, Xiaochun Cheng, Farhan Ullah, Sohail Jabbar, and Dong Shi. "A Deep Convolutional Neural Network Stacked Ensemble for Malware Threat Classification in Internet of Things." Journal of Circuits, Systems and Computers (2022). (SCI, IF: 1.333, Q3), (URL: https://www.worldscientific.com/doi/10.1142/S0218126622503029)

43.   Ali, Rahman, Asmat Ali, Farkhund Iqbal, Mohammed Hussain, and Farhan Ullah. "Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review." Security and Communication Networks (2022). (SCI, IF: 1.968, Q2) (URL: https://www.hindawi.com/journals/scn/2022/2959222/)

44.   Farhan Ullah, Jihoon Moon, Hamad Naeem, and Sohail Jabbar. "Explainable artificial intelligence approach in combating real-time surveillance of COVID19 pandemic from CT scan and X-ray images using ensemble model." The Journal of Supercomputing (2022): 1-26, Springer, (CCF C, SCI, IF: 2.474, Q2) (URL: https://link.springer.com/article/10.1007/s11227-022-04631-z )

45.   Farhan Ullah, Muhammad Rashid Naeem, Hamad Naeem, Xiaochun Cheng, and Mamoun Alazab. "CroLSSim: Cross‐language software similarity detector using hybrid approach of LSA‐based AST‐MDrep features and CNN‐LSTM model." International Journal of Intelligent Systems (2022), Wiley. (SCI, IF: 8.709, Q1)  (URL: https://onlinelibrary.wiley.com/doi/abs/10.1002/int.22813)

46.   Farhan Ullah, Naeem, M. R., Bajahzar, A. S., & Al-Turjman, F. (2021). IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification. ACM Transactions on Internet Technology (TOIT), 22(2), 1-17. (CCF B, SCI, IF: 3.135, Q1) (URL: https://dl.acm.org/doi/10.1145/3418206)

47.   Farhan Ullah, Sohail Jabbar, and Leonardo Mostarda. "An intelligent decision support system for software plagiarism detection in academia." International          Journal  of           Intelligent  Systems, Wiley, (IF: 10.312, SCI, Q1) (URL: https://onlinelibrary.wiley.com/doi/10.1002/int.22399)   

48.   Farhan Ullah, Muhammad Rashid Naeem, Leonardo Mostarda, and Syed Aziz Shah. "Clone detection in 5G-enabled social IoT system using graph semantics and deep learning model." International Journal of Machine Learning and Cybernetics, Springer:1-13  (IF: 3.75, SCI, Q1) (URL: https://link.springer.com/article/10.1007/s13042-020-01246-9)  

49.   Farhan Ullah, Fadi Al-Turjman, and Anand Nayyar. "IoT-based green city architecture using secured and sustainable android services." Environmental Technology & Innovation, Elsevier (2020): 101091.  (IF: 7.1, SCI, Q1) (URL: https://www.sciencedirect.com/science/article/abs/pii/S2352186420313912)

50.   Farhan Ullah, Sohail Jabbar, and Fadi Al-Turjman. "Programmers' de-anonymization using a hybrid approach of abstract syntax tree and deep learning." Technological Forecasting and Social Change, Elsevier 159 (2020): 120186. IF: 12, SCI, Q1) (URL: https://www.sciencedirect.com/science/article/pii/S004016252031012X#!)

51.   Farhan Ullah, Junfeng Wang, Sohail Jabbar, Fadi Al-Turjman, Mamoun Alazab, “Source Code Authorship Attribution Using Hybrid Approach of Program Dependence Graph and Deep Learning Model”, IEEE Access Vol 7 (2019: 141987-141999)

(IF: 4.098, SCI, Q1) (URL: https://ieeexplore.ieee.org/document/8848478)

52.   Farhan Ullah, Hamad Naeem, Sohail Jabbar, Shehzad Khalid, Muhammad Ahsan Latif, Fadi Al-turjman, and Leonardo Mostarda. "Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach." IEEE Access Vol 7 (2019): 124379-124389. (IF: 4.098, SCI, Q1) (URL: https://ieeexplore.ieee.org/document/8848478)

53.   Farhan Ullah, Junfeng Wang, Muhammad Farhan, Sohail Jabbar, Zhiming Wu, and Shehzad Khalid. "Plagiarism detection in students’ programming assignments based on semantics: multimedia e-learning based smart assessment methodology." Multimedia Tools and Applications, Springer (2018): 1-18 (CCF C,  IF: 3.6, SCI, Q1) (URL : https://link.springer.com/article/10.1007/s11042-018-5827-6)

54.   Farhan Ullah, Junfeng Wang, Muhammad Farhan, Masood Habib, and Shehzad Khalid. "Software plagiarism detection in multiprogramming languages using machine learning approach." Concurrency and Computation: Practice and Experience, Wiley (2018): e5000. (CCF C, IF: 1.167, SCI, Q3) (URL: https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.5000)

55.   Farhan Ullah, Muhammad Asif Habib, Muhammad Farhan, Shehzad Khalid, Mehr Yahya Durrani, and Sohail Jabbar. "Semantic interoperability for big-data in heterogeneous IoT infrastructure for healthcare." Sustainable cities and society, Elsevier 34 (2017): 90-96 (IF: 11.7, SCI, Q1) (URL: https://www.sciencedirect.com/science/article/abs/pii/S221067071730255X)

56.   Farhan Ullah, Junfeng Wang, Muhammad Farhan, Sohail Jabbar, Muhammad Kashif Naseer, and Muhammad Asif. "LSA Based Smart Assessment Methodology for SDN Infrastructure in IoT Environment." International Journal of Parallel Programming, Springer, (2018): 1-16. (SCI,  IF: 1.258, Q3)

(URL: https://link.springer.com/article/10.1007/s10766-018-0570-1)

57.   Farhan Ullah, Hamad N, Muhammad R N, Fadi A, Shehzad K, Sohail J. Detection of Clone Scammers in Android Markets using IoT-based Edge Computing, Transactions on Emerging Telecommunications Technologies, Wiley. (SCI, IF: 3.31, Q2)

               (URL: https://onlinelibrary.wiley.com/doi/abs/10.1002/ett.3791)

58.   Farhan Ullah, Abdullah B, Hamza A, Muhammad F, Hamad N, Sabahat H. B, Kaleem R M. An E-Assessment Methodology Based on Artificial Intelligence Techniques to Determine Students’ Language Quality and Assignments’ Plagiarism, Intelligent Automation & Soft Computing, Taylor & Francis, 2019. (SCI, IF: 0.790, Q3) (URL: http://autosoftjournal.net/paperShow.php?paper=100000138&q=)

59.   Jamal, Nasir, Chen Xianqiao, Fadi Al-Turjman, and Farhan Ullah. "A Deep Learning–based Approach for Emotions Classification in Big Corpus of Imbalanced Tweets."ACM Transactions on Asian and Low-Resource Language Information Processing 20, no. 3 (2021): 1-16. (SCI, IF: 2.0, Q2) (URL: https://dl.acm.org/journal/tallip)

60.   Khan, Mansoor, Chuan He, Tianqi Liu, and Farhan Ullah. "A New Hybrid Approach of Clustering Based Probabilistic Decision Tree to Forecast Wind Power on Large Scales." Journal of Electrical Engineering & Technology 16, no. 2 (2021): 697-710. (SCI,IF: 1.069, Q2) (URL: https://link.springer.com/article/10.1007/s42835-020-00616-1)

61.   Li, Jing, Jiang Wang, and Farhan Ullah. "An End-to-End Task-Simplified and Anchor-Guided Deep Learning Framework for Image-Based Head Pose Estimation." IEEE Access 8 (2020): 42458-42468. (SCI, IF: 4.098, Q1)

(URL: https://ieeexplore.ieee.org/document/9019692)

62.   Wang Jiang, Farhan Ullah, Ying Cai, and Jing Li. "Non-Stationary Representation for Continuity Aware Head Pose Estimation Via Deep Neural Decision Trees." IEEE Access, Vol 7(2019:181947-181958) (SCI, IF: 4.098, Q1)

(URL: https://ieeexplore.ieee.org/document/8932455)

63.   Hamad N, Farhan Ullah, Sohail J, Danish V, Muhammad R N. Malware Detection in Industrial Internet of Things based on Image Visualization and Deep Learning, Ad Hoc Network, Elsevier. (SCI, IF: 3.490, Q1)

(URl: https://www.sciencedirect.com/science/article/abs/pii/S1570870519306948 )

64.   Naeem, Muhammad Rashid, Tao Lin, Hamad Naeem, Farhan Ullah, and Saqib Saeed. "Scalable mutation testing using predictive analysis of deep learning model." IEEE Access, Vol 7(2019: 158264 - 158283)

(SCI, IF: 4.098, Q1) (URL: https://ieeexplore.ieee.org/document/8886413)

65.   Hamad N, Bing G, Danish V, Rashid M. N, Farhan Ullah, Hamza A et al. Identification of malicious code variants based on image visualization, Journal of Computers and Electrical Engineering, Elsevier, 2019, pp. 225-237. (IF: 2.189, SCI)

(URL: https://www.sciencedirect.com/science/article/pii/S004579061733776X)

66.   Hamad N, Bing G, Farhan Ullah, Rashid M. N. A Cross-Platform Malware Variant Classification based on Image Representation, KSII Transactions on Internet and Information Systems, Korean Internet Society, 2019, pp.3756-3777. (SCI, IF: 0.711, Q3) (URL: http://itiis.org/digital-library/manuscript/2446)

67.   Khan, Mansoor, Tianqi Liu, and Farhan Ullah. "A New Hybrid Approach to Forecast Wind Power for Large Scale Wind Turbine Data Using Deep Learning with TensorFlow Framework and Principal Component Analysis." Energies 12, no. 12 (2019): 2229. (SCI, IF: 3.2  Q1) (URL: https://www.mdpi.com/1996-1073/12/12/2229)

68.   Rahman, Ziaur, Muhammad Aamir, Yi-Fei Pu, Farhan Ullah, and Qiang Dai. "A Smart System for Low-Light Image Enhancement with Color Constancy and Detail Manipulation in Complex Light Environments." Symmetry 10, no. 12 (2018): 718.

(SCI, IF: 2.7Q2) (URL: https://www.mdpi.com/2073-8994/10/12/718)

69.   Jabbar, Sohail, Farhan Ullah, Shehzad Khalid, Murad Khan, and Kijun Han. "Semantic interoperability in heterogeneous IoT infrastructure for healthcare." Wireless Communications and Mobile Computing 2017 (2017). (SCI, IF: 1.396, Q2)

(URL: https://www.hindawi.com/journals/wcmc/2017/9731806/)

70.   Razzaq Malik, Kaleem, Masood Habib, Shehzad Khalid, Farhan Ullah, Muhammad Umar, Taimur Sajjad, and Awais Ahmad. "Data compatibility to enhance sustainable capabilities for autonomous analytics in IoT." Sustainability 9, no. 6 (2017): 877.

(SCI, IF: 2.592, Q1) (URL: https://www.mdpi.com/2071-1050/9/6/877)

71.   Razzaq Malik, Kaleem, Tauqir Ahmad, Muhammad Farhan, Farhan Ullah, Kashif Amjad, and Shehzad Khalid. "Multiagent semantical annotation enhancement model for iot-based energy-aware data." International Journal of Distributed Sensor Networks 12, no. 6 (2016): 9103265. (Q2, IF: 1.614, SCI) (URL: https://journals.sagepub.com/doi/full/10.1155/2016/9103265)

Cybersecurity Center, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia.

Google Scholar: https://scholar.google.com/citations?user=Cp9jHJYAAAAJ&hl=en

9/2024—till date      Associate Research Professor, Cybersecurity Center, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia.
 
07/2020-9/2024          Associate Professor, School of Software, Northwestern Polytechnical University (NPU), Xian, China
 
02/2015-08/2017        Lecturer in Computer Science Department, COMSATS University Islamabad, Sahiwal Campus, Pakistan
 
01/2013-09/2014        Network Engineer, FIFA, FATA Secretariat, Warsak Road, Peshawar, Pakistan
 
01/2011-04/2013        Lecturer, CECOS University, Peshawar, Pakistan

Introduction to Software Project Management

Joint Human Machine Learning

Network and Distributed Computing

Data Structures

Algorithms

Data Science and Visualization

Computer Networks

Malware Analysis, Intrusion Detection, Program Analysis, Data Science, Cybersecurity

Member of Association of Computer Machinery (ACM)