Dr. Muhammad Asad Khan
Biography
Designation :
Assistant Professor
Email Address :
masadkhattak@gmail.com
Contact Number:
+923459990636
Additional Charge:
MS Coordinator
Dr. Muhammad Asad Khan is an Assistant Professor in the Department of Telecommunication at Hazara University, specializing in mobile networks, Internet of Things (IoT), data governance, and cybersecurity. He earned his Ph.D. in Information and Communication Engineering from the University of Electronic Science and Technology of China, and holds two Master’s degrees in Mobile and High-Speed Telecommunication Networks from Oxford Brookes University, UK, and Communication & Networks from Bahria University, Pakistan.
Dr. Khan’s teaching expertise includes Mobile & Wireless Communication, Network Security, IoT, Data Communication, and Transmission & Switching. He integrates data science, graph analysis, and AI tools into his teaching to enhance students' problem-solving skills and practical knowledge.
His research focuses on graph and social network analysis, energy informatics, and communication networks, with contributions to efficient graph summarization, short-term load forecasting, and 5G edge caching. He has published extensively in reputable journals and conferences, and has secured multiple competitive research grants in areas such as smart grids and IoT security.
Dr. Khan is committed to mentoring students, fostering intellectual curiosity, and continuously updating curricula to keep pace with technological advancements.
Contact: asadkhan@hu.edu.pk
Academic Background
| S.No | Degree Title | Institute | Degree Completion Year |
|---|---|---|---|
| 1 | PhD | University of Electronic Science and Technology of China | 2016 |
| 2 | MS | Oxford Brookes | 2006 |
| 3 | MCS | Bahria University | 2004 |
| 4 | BCS | University of Peshawar | 2002 |
Publications
| S.No | Publication Title | Authors | Action |
|---|---|---|---|
| 1 | Ssag: Summarization and sparsification of attributed graphs | S. Ali, M. Ahmad, M. A. Beg, I. U. Khan, S. Faizullah, and M. A. Khan, | Click to View |
| 2 | Modeling power consumption of web apps using static design features | M. S. Ayub, N. Mustafa, S. Ali, I. U. Khan, M. A. Khan, and S. Faizullah, | Click to View |
| 3 | A component-based localization algorithm for sparse 3-d wireless sensor networks | M. Islam, M. S. Ayub, and M. A. Khan | Click to View |
| 4 | Short-term load forecasting using ami data | H. Mansoor, S. Ali, I. Khan, N. Arshad, M. A. Khan, and S. Faizullah, | Click to View |
| 5 | Revolutionizing historical document digitization: Lstm-enhanced ocr for arabic handwritten manuscripts | F. Safiullah, M. S. Ayub, S. Hussain, M. A. Khan, A. Abdullah, and N. Emad, | Click to View |
| 6 | Enhanced facial emotion detection models utilizing geometry-based features for superior human-computer interaction | A. Shafiq, A. M. Sohaib, S. Rohan, and M. A. Khan, | Click to View |
| 7 | An investigation of the imputation techniques for missing values in ordinal data enhancing clustering and classification analysis validity | S. Alam, M. S. Ayub, S. Arora, and M. A. Khan, | Click to View |
| 8 | Towards developing an automated chatbot for predicting legal case outcomes: A deep learning approach | S. Alam, R. Pande, M. S. Ayub, and M. A. Khan | Click to View |
| 9 | A comparative analysis of global optimization algorithms for surface electromyographic signal onset detection | S. Alam, X. Zhao, I. K. Niazi, M. S. Ayub, and M. A. Khan | Click to View |
| 10 | Efficient approximate kernel based spike sequence classification | S. Ali, B. Sahoo, M. A. Khan, A. Zelikovsky, I. U. Khan, and M. Patterson, | Click to View |
| 11 | Camp: A context- aware cricket players performance metric | M. S. Ayub, N. Ullah, S. Ali, I. U. Khan, S. Faizullah, and M. A. Khan | Click to View |
| 12 | A survey of ocr in arabic language: Applications, techniques, and challenges | S. Faizullah, M. S. Ayub, S. Hussain, and M. A. Khan | Click to View |
| 13 | Adopting sustainable agriculture practices in developing nations using cbrs | A. Yadav, M. Manekiya, T. Ahmad, and M. A. Khan | Click to View |
| 14 | Efficient data analytics on augmented similarity triplets | S. Ali, M. Ahmad, U. U. Hassan, M. A. Khan, S. Alam, and I. U. Khan | Click to View |
| 15 | Impact of missing data imputation on the fairness and accuracy of graph node classifier | H. Mansoor, S. Ali, S. Alam, M. A. Khan, U. U. Hassan, and I. U. Khan | Click to View |
| 16 | A comparison of ensemble learning for intrusion detection in telemetry data | N. Naz, M. A. Khan, M. A. Khan, M. Almas, S. U. J. Khan, S. A. Shah, Q. H. Arshad, and J. Ahmad | Click to View |
| 17 | Effective and scalable clustering of sars-cov-2 sequence | S. Ali, T. E. Ali, M. A. Khan, I. U. Khan, and M. D. Patterson | Click to View |
| 18 | Predicting attributes of nodes using network structure | S. Ali, M. H. Shakeel, I. U. Khan, S. Faizullah, and M. A. Khan | Click to View |
| 19 | Social groups based content caching in wireless networks | N. Mustafa, I. U. Khan, M. A. Khan, and Z. A. Uzmi | Click to View |
| 20 | Detecting ddos attack on sdn due to vulnerabilities in openflow | S. Ali, M. K. Alvi, S. Faizullah, M. A. Khan, A. Alshanqiti, and I. U. Khan | Click to View |
| 21 | Fair allocation based soft load shedding | S. Ali, H. Mansoor, I. U. Khan, N. Arshad, S. Faizullah, and M. A. Khan | Click to View |
| 22 | Permissioned blockchain-based security for sdn in iot cloud networks | S. Faizullah, M. A. Khan, A. Alzahrani, and I. U. Khan | Click to View |
| 23 | Effect of analysis window and feature selection on classification of hand movements using emg signal, | A. Ullah, S. Ali, I. U. Khan, M. A. Khan, and S. Faizullah, | Click to View |
| 24 | Cooperative backhaul sharing and caching for home cells | M. A. Khan, S. Leng, G. Min, X. Huang, and G. Qiao | Click to View |
| 25 | Backhaul aggregation for smart homes in heterogeneous wireless networks | M. A. Khan, S. Leng, X. Huang, J. Yin, and B. Fan | Click to View |
| 26 | Architecture of heterogeneous wireless access networks: A short survey,” | M. A. Khan, S. Leng, W. Xiang, and K. Yang | Click to View |
| 27 | Access granularity control of multichannel random access in next-generation wireless lans | J. Yin, Y. Mao, S. Leng, Y. Jiang, and M. A. Khan | Click to View |
| 28 | Backup backhaul for femtocells | M. A. Khan, S. Leng, A. K. Jadoon, and J. Yin | Click to View |