About

Dr. Syed Taha Ali is working as Associate Professor in the School of Electrical Engineering and Computer Science . Dr. Syed Taha Ali has a PhD in Network Security . Dr. Syed Taha Ali has published 31 research articles & conference papers having a citation count of 456 , carried out 3 projects and filed 0 intellectual property.

Research Tags

Research Projects

1

Industry Projects

2

Amount Granted

168.9 M

Publications

31

Citations

456

Intellectual Property

0
Publication Types
Project Types
Publications by Year
Projects by Year

Education

PhD Network Security 2008- 2012
University of New South Wales , Australia
MS (Telecommunications) 2005- 2006
University of New South Wales , Australia
BE Communication 1998- 2002
Ghulam Ishaq Khan Institute of Science & Technology , Pakistan

Experience

Associate Professor 2023- Present
School of Electrical Engineering and Computer Science , NUST
Assistant Professor 2021- 2023
School of Electrical Engineering and Computer Science , NUST
Assistant Professor 2016- 2021
School of Electrical Engineering and Computer Science , NUST
Assistant Professor 2016- 2016
School of Electrical Engineering and Computer Science , NUST
Research Associate 2015- 2017
Newcastle University , Newcastle University, Newcastle upon Tyne, UK ,

Awards

Memberships

PEC
1
Research Projects
2
Industrial Projects
3
National Projects
0
International Projects
168.9M
Total Funding (PKR)
Evaluating the Higher Education in Pakistan: An Appraisal of Research Publication Landscape 2025
Project Status: Approved_inprocess Rs: 3.2 M Approval Date: 2025-04-09 Completion Date: N/A
Funding Agency: PIDE
Coding, Robotics and AI learning for primary grade students 2024
Project Status: Approved_inprocess Rs: 163.9 M Approval Date: 2024-09-01 Completion Date: 2026-08-21
Funding Agency: Ministry of Federal Education and Professional Training
Consultant Election Technologies 2022
Project Status: Approved_inprocess Rs: 1.8 M Approval Date: 2022-05-11 Completion Date: 2022-08-15
Funding Agency: UNDP
14
Research Articles
16
Conference Proceedings
0
Books
1
Book Chapters
1
Editorial Activities
Greening residential Wi-Fi networks under centralized control 2015
VI
Vijay Sivaraman (University of New South Wales)
JO
John Matthews (CSIRO)
CR
Craig Russell (CSIRO)
AR
Arun Vishwanath (IBM Research)
Journal: IEEE Transactions on Mobile Computing, Volume:14, Issue:3, Page:552-564
Impact Factor: 2.456 Citations: 13 Quartile: 1
SDG 9
Secure key loss recovery for network broadcast in single-hop wireless sensor networks 2010
VI
Vijay Sivaraman (University of New South Wales)
AS
Ashay Dhamdhere (University of New South Wales)
DI
Diethelm Ostry (CSIRO)
Journal: Ad Hoc Networks, Volume:8, Issue:6, Page:668-679
Impact Factor: 1.592 Citations: 15 Quartile: 1
SDG 9
SRoWM: Smart Review on Wormhole Mitigation 2017
DA
David Samuel Bhatti (University of Lahore)
SH
Shehla Saeed (University of Lahore)
MU
Muhammad Asad Ullah (University of Lahore)
NA
Naila Samar Naaz (University of Lahore)
SY
Syed Saqib Raza Rizvi (University of Lahore)
Journal: International Journal of Computer Science and Network Security, Volume: 17, Issue: 12, Pages 178-187
Impact Factor: - Citations: 0 Quartile: N/A
Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices 2014
VI
Vijay Sivaraman (University of New South Wales)
DI
Diethelm Ostry (CSIRO)
Journal: IEEE Transactions on Mobile Computing, Volume:13, Issue:12, Page:2763-2776
Impact Factor: 2.543 Citations: 94 Quartile: 1
SDG 9
Securing first-hop data provenance for bodyworn devices using wireless link fingerprints 2014
VI
Vijay Sivaraman (University of New South Wales)
DI
Diethelm Ostry (CSIRO)
GE
Gene Tsudik (UCI)
SA
Sanjay Jha (University of New South Wales)
Journal: IEEE Transactions on Information Forensics and Security, Volume:9, Issue:12, Page:2193-2204
Impact Factor: 2.408 Citations: 34 Quartile: 1
SDG 9
Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring 2014
VI
Vijay Sivaraman (University of New South Wales)
DI
Diethelm Ostry (University of New South Wales)
Journal: Future Generation Computer Systems, Volume:35, Page:80-90
Impact Factor: 2.786 Citations: 33 Quartile: 1
SDG 9
A Survey of Securing Networks Using Software Defined Networking 2015
VI
Vijay Sivaraman (Newcastle University)
SA
Sanjay Jha (Newcastle University)
AD
Adam Radford (Newcastle University)
Journal: IEEE Transactions on Reliability, Volume:64, Issue:3, Page:1086-1097
Impact Factor: 2.287 Citations: 146 Quartile: 1
SDG 9
ZombieCoin 2.0: managing next-generation botnets using Bitcoin 2018
PA
Patrick McCorry (Newcastle University)
PE
Peter Hyun-Jeen Lee (Paysafe Group)
FE
Feng Hao (Newcastle University)
Journal: International Journal of Information Security, Vol:17, Pages411–422
Impact Factor: 1.658 Citations: 47 Quartile: 2
A First Look at Private Communications in Video Games using Visual Features 2021
AB
Abdul Wajid
NA
Nasir Kamal
MU
Muhammad Sharjeel
RA
Raaez Muhammad Sheikh
HU
Huzaifa Bin Wasim
MU
Muhammad Hashir Ali
Journal: Proceedings on Privacy Enhancing Technologies, Volume 2021 (3), Pages 433–452
Impact Factor: N/A Citations: 0 Quartile: N/A
Merging engine implementation for intra-frame sharing in multi-tenant virtual passive optical networks 2023
AK
Akhlaque Ahmad (TED University)
AS
Ashfaq Ahmed (Khalifa University)
AR
Arafat Al-Dweik (Khalifa University)
Journal: Journal of Optical Communications and Networking, Volume:15, Issue:4, Page:209-218
Impact Factor: 4.508 Citations: 3 Quartile: 1
SDG 9
Forensic Verification of Health Data from Wearable Devices using Anonymous Witnesses 2020
MU
Muhammad Siddiqui (Australian Institute of Higher Education)
VI
Vijay Sivaraman (University of new South Wales)
Journal: IEEE Internet of Things Journal, Volume 7, Issue 11, Pages 10745-10762
Impact Factor: 9.471 Citations: 9 Quartile: 1
Cerberus: A Blockchain-Based Accreditation and Degree Verification System 2023
AA
Aamna Tariq
HI
Hina Binte Haq
Journal: IEEE Transactions on Computational Social Systems, Volume: 10, Issue: 4, Page(s): 1503-1514, INSPEC Accession Number: 23515488
Impact Factor: 4.747 Citations: 24 Quartile: 2
SDG 4
False data injection attacks on networked control systems 2023
AH
Ahmed Pasha (Air University)
RI
Rijha Safdar
Journal: Journal of Control and Decision, Pages 1-10
Impact Factor: 1.500 Citations: 5 Quartile: 3
SDG 9
Secure Opportunistic Contextual Logging for Wearable Healthcare Sensing Devices 2021
MU
Muhammad Siddiqui (University of New South Wales)
VI
Vijay Sivaraman (University of New South Wales)
Journal: IEEE Transactions on Dependable and Secure Computing, Volume 18, Issue 2, Pages 753-764
Impact Factor: 6.791 Citations: 6 Quartile: 1
A Game of Forms: a Decade of Rigged Elections in Pakistan
HA
Hassan Mahmood (Information Technology University (ITU))
RO
Ronan McDermott (Independent Election Commission)
Conference: 4th Annual Virtual Electoral Integrity Conference
Citations: N/A
A key loss recovery scheme for secure broadcasts in wireless sensor networks
VI
Vijay Sivaraman (University of New South Wales)
AS
Ashay Dhamdhere (University of New South Wales)
DI
Diethelm Ostry (ICT Centre, CSIRO)
Conference: 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications
Citations: N/A
A per-hop security scheme for highly dynamic wireless sensor networks
VI
Vijay Sivaraman (University of New South Wales)
AS
Ashay Dhamdhere (University of New South Wales)
Conference: 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems
Citations: N/A
Secret key generation rate vs. reconciliation cost using wireless channel characteristics in body area networks
VI
Vijay Sivaraman (University of New South Wales)
DI
Diethelm Ostry (ICT Centre, CSIRO)
Conference: 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Citations: N/A
Zero reconciliation secret key generation for body-worn health monitoring devices
VI
Vijay Sivaraman (University of New South Wales)
DI
Diethelm Ostry (ICT Centre, CSIRO)
Conference: 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Citations: N/A
Improving Secret Key Generation Performance for On-Body Devices
LI
Linjia Yao (University of New South Wales)
VI
Vijay Sivaraman (University of New South Wales)
DI
Diethelm Ostry (University of New South Wales)
Conference: 6th International ICST Conference on Body Area Networks
Citations: N/A
Authentication of lossy data in body-sensor networks for healthcare monitoring
VI
Vijay Sivaraman (University of New South Wales)
DI
Diethelm Ostry (CSIRO ICT Centre)
Conference: 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
Citations: N/A
Decorrelating secret bit extraction via channel hopping in body area networks
LI
Linjia Yao (University of New South Wales)
VI
Vijay Sivaraman (University of New South Wales)
DI
Diethelm Ostry (The University of New South Wales)
Conference: 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC)
Citations: N/A
Bitcoin: Perils of an unregulated global P2P currency
DY
Dylan Clarke (Newcastle University)
PA
Patrick McCorry (Newcastle University)
Conference: Cambridge International Workshop on Security Protocols
Citations: N/A
ZombieCoin: Powering next-generation botnets with bitcoin
PA
Patrick McCorry (Newcastle University)
PE
Peter Hyun-Jeen Lee (Newcastle University)
FE
Feng Hao (Newcastle University)
Conference: International Conference on Financial Cryptography and Data Security, FC 2015
Citations: N/A
End-to-end verifiable voting for developing countries - what’s hard in Lausanne is harder still in Lahore
HI
Hina Binte Haq
RO
Ronan McDermott (Małopolskie Centrum Dźwięku i Słowa)
Conference: EVoteID
Citations: N/A
Pakistan's Internet Voting Experiment
HI
Hina Binte Haq (-)
RO
Ronan McDermott (United Nations)
Conference: Fourth International Joint Conference on Electronic Voting E-Vote-ID 2019
Citations: N/A
Secure lightweight context-driven data logging for bodyworn sensing devices
MU
Muhammad Siddiqi (University of New South Wales)
VI
Vijay Sivaraman (University of New South Wales)
Conference: 2017 5th International Symposium on Digital Forensic and Security (ISDFS)
Citations: 19
End to End Security is Not Enough
DY
Dylan Clarke (Newcastle University)
Conference: Cambridge International Workshop on Security Protocols
Citations: 1
Why Preventing a Cryptocurrency Exchange Heist Isn?t Good Enough
PA
Patrick McCorry (University College London)
MA
Malte Moser (Princeton University)
Conference: Cambridge International Workshop on Security Protocols
Citations: 7
Navigating the Cryptocurrency Landscape: An Islamic Perspective
HI
Hina Binte Haq (-)
Conference: 6th International Conference on Islam and Liberty
Citations: N/A
An Overview of End-to-End Verifiable Voting Systems 2020
JU
Judy Murray (Newcastle University)
Book: Book on Real-World Electronic Voting: Design, Analysis and Deployment (1st Edition, Chapter 8,)
Citations: N/A
SDG 9
2019
Reviewed Papers for Journals
Impact Factor: 9.515
No IP records found for this faculty member
No training records found for this faculty member
0
Total Supervisions
0
PhD Supervisions
0
MS Supervisions
Loading...

Loading PhD supervisions...

Loading...

Loading MS supervisions...