default search action
Ijaz Ahmad 0001
Person information
- affiliation: VTT Technical Research Center of Finland, Espoo, Finland
- affiliation (2019): TU Vienna, Austria
- affiliation (2018): Aalto University, Finland
- affiliation (PhD 2018): University of Oulu, Department of wireless communications, Finland
Other persons with the same name
- Ijaz Ahmad — disambiguation page
- Ijaz Ahmad 0002 — Chosun University, Department of Computer Engineering, South Korea
- Ijaz Ahmad 0003 — University of Engineering and Technology, Centre of Excellence in Water Resources Engineering, Lahore, Pakistan (and 1 more)
- Ijaz Ahmad 0004 — COMSATS University Islamabad, Islamabad, Pakistan
- Ijaz Ahmad 0005 — University of Oulu, Finland
- Ijaz Ahmed — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j23]Jani Suomalainen, Ijaz Ahmad, Annette Shajan, Tapio Savunen:
Cybersecurity for tactical 6G networks: Threats, architecture, and intelligence. Future Gener. Comput. Syst. 162: 107500 (2025) - [j22]Senthil Kumar Jagatheesaperumal, Ijaz Ahmad, Marko Höyhtyä, Suleman Khan, Andrei V. Gurtov:
Deep learning frameworks for cognitive radio networks: Review and open research challenges. J. Netw. Comput. Appl. 233: 104051 (2025) - 2024
- [j21]Ijaz Ahmad, Felipe Rodriguez, Tanesh Kumar, Jani Suomalainen, Senthil Kumar Jagatheesaperumal, Stefan Walter, Muhammad Zeeshan Asghar, Gaolei Li, Nikolaos Papakonstantinou, Mika Ylianttila, Jyrki Huusko, Thilo Sauter, Erkki Harjula:
Communications Security in Industry X: A Survey. IEEE Open J. Commun. Soc. 5: 982-1025 (2024) - [c25]Ann Varghese, Antti Heikkinen, Petri Mähönen, Tiia Ojanperä, Ijaz Ahmad:
Predictive QoS for Cellular-Connected UAV Communications. ICC 2024: 3901-3906 - [c24]Ijaz Ahmad, Hafiz Faheem Shahid, Ijaz Ahmad, Johirul Islam, Kazi Nymul Haque, Erkki Harjula:
Adaptive Lightweight Security for Performance Efficiency in Critical Healthcare Monitoring. ISMICT 2024: 78-83 - [c23]Ijaz Ahmad, Ijaz Ahmad, Erkki Harjula:
Adaptive Security in 6G for Sustainable Healthcare. NCDHWS (1) 2024: 38-47 - [i10]Ijaz Ahmad, Ijaz Ahmad, Erkki Harjula:
Adaptive Security in 6G for Sustainable Healthcare. CoRR abs/2403.01100 (2024) - [i9]Ijaz Ahmad, Hafiz Faheem Shahid, Ijaz Ahmad, Johirul Islam, Kazi Nymul Haque, Erkki Harjula:
Adaptive Lightweight Security for Performance Efficiency in Critical Healthcare Monitoring. CoRR abs/2406.03786 (2024) - [i8]Senthil Kumar Jagatheesaperumal, Ijaz Ahmad, Marko Höyhtyä, Suleman Khan, Andrei V. Gurtov:
Deep Learning Frameworks for Cognitive Radio Networks: Review and Open Research Challenges. CoRR abs/2410.23949 (2024) - [i7]Johirul Islam, Ijaz Ahmad, Shakthi Gimhana, Juho Markkula, Erkki Harjula:
Energy Profiling and Analysis of 5G Private Networks: Evaluating Energy Consumption Patterns. CoRR abs/2412.01634 (2024) - 2023
- [c22]Ijaz Ahmad, Aarne Mämmelä, Md. Munjure Mowla, Adam Flizikowski, Muhammad Ali Babar Abbasi, Dmitry Zelenchuk, Mahnaz Sinaie:
Sustainability in 6G Networks: Vision and Directions. CSCN 2023: 202-208 - [c21]Rupender Singh, Ijaz Ahmad, Jyrki Huusko:
On Secrecy Performance of Mixed THz-FSO Relaying System. CSCN 2023: 271-277 - [c20]Ijaz Ahmad, Jere Malinen, Filippos Christou, Pawani Porambage, Andreas Kirstädter, Jani Suomalainen:
Security in Intent-Based Networking: Challenges and Solutions. CSCN 2023: 296-301 - [c19]Rupender Singh, Ijaz Ahmad, Jyrki Huusko:
The Role of Physical Layer Security in Satellite-Based Networks. EuCNC/6G Summit 2023: 36-41 - [c18]Andrea Gentili, Seppo Horsmanheimo, Lotta Tuomimäki, Petri Hyvärinen, Heli Kokkoniemi-Tarkkanen, Ijaz Ahmad:
Improving 5G Performance in Critical Environments through MPTCP. VTC Fall 2023: 1-5 - 2022
- [j20]Ijaz Ahmad, Zeeshan Asghar, Tanesh Kumar, Gaolei Li, Ahsan Manzoor, Konstantin Mikhaylov, Syed Attique Shah, Marko Höyhtyä, Jarmo Reponen, Jyrki Huusko, Erkki Harjula:
Emerging Technologies for Next Generation Remote Health Care and Assisted Living. IEEE Access 10: 56094-56132 (2022) - [j19]Shahbaz Siddiqui, Sufian Hameed, Syed Attique Shah, Ijaz Ahmad, Adel Aneiba, Dirk Draheim, Schahram Dustdar:
Toward Software-Defined Networking-Based IoT Frameworks: A Systematic Literature Review, Taxonomy, Open Challenges and Prospects. IEEE Access 10: 70850-70901 (2022) - [j18]Ijaz Ahmad, Jani Suomalainen, Pawani Porambage, Andrei V. Gurtov, Jyrki Huusko, Marko Höyhtyä:
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions. IEEE Access 10: 96038-96052 (2022) - [j17]Ella Peltonen, Ijaz Ahmad, Atakan Aral, Michele Capobianco, Aaron Yi Ding, Felipe J. Gil-Castiñeira, Ekaterina Gilman, Erkki Harjula, Marko Jurmu, Teemu Karvonen, Markus Kelanti, Teemu Leppänen, Lauri Lovén, Tommi Mikkonen, Nitinder Mohan, Petteri Nurmi, Susanna Pirttikangas, Pawel Sroka, Sasu Tarkoma, Tingting Yang:
The Many Faces of Edge Intelligence. IEEE Access 10: 104769-104782 (2022) - [j16]Diana Pamela Moya Osorio, Ijaz Ahmad, José David Vega Sánchez, Andrei V. Gurtov, Johan Scholliers, Matti Kutila, Pawani Porambage:
Towards 6G-Enabled Internet of Vehicles: Security and Privacy. IEEE Open J. Commun. Soc. 3: 82-105 (2022) - [j15]Tianpeng Ye, Gaolei Li, Ijaz Ahmad, Chaofeng Zhang, Xiang Lin, Jianhua Li:
FLAG: Few-Shot Latent Dirichlet Generative Learning for Semantic-Aware Traffic Detection. IEEE Trans. Netw. Serv. Manag. 19(1): 73-88 (2022) - [c17]Ijaz Ahmad, Sergio Lembo, Felipe Rodriguez, Stephan Mehnert, Mikko Vehkaperä:
Security of Micro MEC in 6G: A Brief Overview. CCNC 2022: 332-337 - 2021
- [j14]Jude Okwuibe, Juuso Haavisto, Ivana Kovacevic, Erkki Harjula, Ijaz Ahmad, Johirul Islam, Mika Ylianttila:
SDN-Enabled Resource Orchestration for Industrial IoT in Collaborative Edge-Cloud Networks. IEEE Access 9: 115839-115854 (2021) - [j13]Ijaz Ahmad, Jarno Pinola, Ilkka Harjula, Jani Suomalainen, Erkki Harjula, Jyrki Huusko, Tanesh Kumar:
An Overview of the Security Landscape of Virtual Mobile Networks. IEEE Access 9: 169014-169030 (2021) - 2020
- [j12]Tanesh Kumar, Erkki Harjula, Muneeb Ejaz, Ahsan Manzoor, Pawani Porambage, Ijaz Ahmad, Madhusanka Liyanage, An Braeken, Mika Ylianttila:
BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks. IEEE Access 8: 154166-154185 (2020) - [j11]Jani Suomalainen, Arto Juhola, Shahriar Shahabuddin, Aarne Mämmelä, Ijaz Ahmad:
Machine Learning Threatens 5G Security. IEEE Access 8: 190822-190842 (2020) - [j10]Ijaz Ahmad, Shahriar Shahabuddin, Hassan Malik, Erkki Harjula, Teemu Leppänen, Lauri Lovén, Antti Anttonen, Ali Hassan Sodhro, Muhammad Mahtab Alam, Markku J. Juntti, Antti Ylä-Jääski, Thilo Sauter, Andrei V. Gurtov, Mika Ylianttila, Jukka Riekki:
Machine Learning Meets Communication Networks: Current Trends and Future Challenges. IEEE Access 8: 223418-223460 (2020) - [j9]Jude Okwuibe, Juuso Haavisto, Erkki Harjula, Ijaz Ahmad, Mika Ylianttila:
SDN Enhanced Resource Orchestration of Containerized Edge Applications for Industrial IoT. IEEE Access 8: 229117-229131 (2020) - [c16]Ahnaf Ahmad, Erkki Harjula, Mika Ylianttila, Ijaz Ahmad:
Evaluation of Machine Learning Techniques for Security in SDN. GLOBECOM (Workshops) 2020: 1-6 - [i6]Mika Ylianttila, Raimo Kantola, Andrei V. Gurtov, Lorenzo Mucchi, Ian J. Oppermann, Zheng Yan, Tri Hong Nguyen, Fei Liu, Tharaka Mawanane Hewa, Madhusanka Liyanage, Ijaz Ahmad, Juha Partala, Robert Abbas, Artur Hecker, Sara Jayousi, Alessio Martinelli, Stefano Caputo, Jonathan Bechtold, Ivan Morales, Razvan-Andrei Stoica, Giuseppe Abreu, Shahriar Shahabuddin, Erdal Panayirci, Harald Haas, Tanesh Kumar, Basak Ozan Ozparlak, Juha Röning:
6G White paper: Research challenges for Trust, Security and Privacy. CoRR abs/2004.11665 (2020) - [i5]Samad Ali, Walid Saad, Nandana Rajatheva, Kapseok Chang, Daniel Steinbach, Benjamin Sliwa, Christian Wietfeld, Kai Mei, Hamid Shiri, Hans-Jürgen Zepernick, Thi My Chinh Chu, Ijaz Ahmad, Jyrki Huusko, Jaakko Suutala, Shubhangi Bhadauria, Vimal Bhatia, Rangeet Mitra, SaiDhiraj Amuru, Robert Abbas, Baohua Shao, Michele Capobianco, Guanghui Yu, Maëlick Claes, Teemu Karvonen, Mingzhe Chen, Maksym Girnyk, Hassan Malik:
6G White Paper on Machine Learning in Wireless Communication Networks. CoRR abs/2004.13875 (2020) - [i4]Ijaz Ahmad, Shahriar Shahabuddin, Tanesh Kumar, Erkki Harjula, Marcus Meisel, Markku J. Juntti, Thilo Sauter, Mika Ylianttila:
Challenges of AI in Wireless Networks for IoT. CoRR abs/2007.04705 (2020) - [i3]Ijaz Ahmad:
Improving Software Defined Cognitive and Secure Networking. CoRR abs/2007.05296 (2020) - [i2]Ijaz Ahmad, Ilkka Harjula, Jarno Pinola:
Overview of Security of Virtual Mobile Networks. CoRR abs/2007.08871 (2020)
2010 – 2019
- 2019
- [j8]Erkki Harjula, Pekka Karhula, Johirul Islam, Teemu Leppänen, Ahsan Manzoor, Madhusanka Liyanage, Jagmohan Chauhan, Tanesh Kumar, Ijaz Ahmad, Mika Ylianttila:
Decentralized Iot Edge Nanoservice Architecture for Future Gadget-Free Computing. IEEE Access 7: 119856-119872 (2019) - [j7]Ijaz Ahmad, Shahriar Shahabuddin, Tanesh Kumar, Jude Okwuibe, Andrei V. Gurtov, Mika Ylianttila:
Security for 5G and Beyond. IEEE Commun. Surv. Tutorials 21(4): 3682-3722 (2019) - [c15]Tanesh Kumar, An Braeken, Vidhya Ramani, Ijaz Ahmad, Erkki Harjula, Mika Ylianttila:
SEC-BlockEdge: Security Threats in Blockchain-Edge based Industrial IoT Networks. RNDM 2019: 1-7 - [c14]Muhammad Arif, Olli Liinamaa, Ijaz Ahmad, Ari Pouttu, Mika Ylianttila:
On the Demonstration and Evaluation of Service-Based Slices in 5G Test Network using NFV. WCNC Workshops 2019: 1-6 - [i1]Jude Okwuibe, Juuso Haavisto, Erkki Harjula, Ijaz Ahmad, Mika Ylianttila:
Orchestrating Service Migration for Low Power MEC-Enabled IoT Devices. CoRR abs/1905.12959 (2019) - 2018
- [j6]Tanesh Kumar, Pawani Porambage, Ijaz Ahmad, Madhusanka Liyanage, Erkki Harjula, Mika Ylianttila:
Securing Gadget-Free Digital Services. Computer 51(11): 66-77 (2018) - [j5]Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage, Jude Okwuibe, Mika Ylianttila, Andrei V. Gurtov:
Overview of 5G Security Challenges and Solutions. IEEE Commun. Stand. Mag. 2(1): 36-43 (2018) - [j4]Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage, Mika Ylianttila, Timo Koskela, Timo Bräysy, Antti Anttonen, Vesa Pentikäinen, Juha-Pekka Soininen, Jyrki Huusko:
Towards gadget-free internet services: A roadmap of the Naked world. Telematics Informatics 35(1): 82-92 (2018) - [c13]Tanesh Kumar, Vidhya Ramani, Ijaz Ahmad, An Braeken, Erkki Harjula, Mika Ylianttila:
Blockchain Utilization in Healthcare: Key Requirements and Challenges. HealthCom 2018: 1-7 - 2017
- [j3]Madhusanka Liyanage, Ijaz Ahmed, Jude Okwuibe, Mika Ylianttila, Hammad Kabir, Jesus Llorente Santos, Raimo Kantola, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca:
Enhancing Security of Software Defined Mobile Networks. IEEE Access 5: 9422-9438 (2017) - [c12]Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage, Jude Okwuibe, Mika Ylianttila, Andrei V. Gurtov:
5G security: Analysis of threats and solutions. CSCN 2017: 193-199 - [c11]Ijaz Ahmad, Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Analysis of deployment challenges of Host Identity Protocol. EuCNC 2017: 1-6 - [c10]Tanesh Kumar, Madhusanka Liyanage, An Braeken, Ijaz Ahmad, Mika Ylianttila:
From gadget to gadget-free hyperconnected world: Conceptual analysis of user privacy challenges. EuCNC 2017: 1-6 - [c9]Madhusanka Liyanage, Jude Okwuibe, Ijaz Ahmed, Mika Ylianttila, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca:
Software Defined Monitoring (SDM) for 5G mobile backhaul networks. LANMAN 2017: 1-6 - 2016
- [j2]Suneth Namal, Ijaz Ahmad, Muhammad Saad Saud, Markku Jokinen, Andrei V. Gurtov:
Implementation of OpenFlow based cognitive radio network architecture: SDN&R. Wirel. Networks 22(2): 663-677 (2016) - [c8]Ijaz Ahmad, Madhusanka Liyanage, Suneth Namal, Mika Ylianttila, Andrei V. Gurtov, Marcus Eckert, Thomas Bauschert, Zoltán Faigl, László Bokor, Ece Saygun, Hasan Anil Akyildiz, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Berna Özbek, Aydin Ulas:
New concepts for traffic, resource and mobility management in software-defined mobile networks. WONS 2016: 41-48 - 2015
- [j1]Ijaz Ahmad, Suneth Namal, Mika Ylianttila, Andrei V. Gurtov:
Security in Software Defined Networks: A Survey. IEEE Commun. Surv. Tutorials 17(4): 2317-2346 (2015) - [c7]José Costa-Requena, Jesus Llorente Santos, Vicent Ferrer Guasch, Kimmo Ahokas, Gopika Premsankar, Sakari Luukkainen, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Ijaz Ahmad, Madhusanka Liyanage, Mika Ylianttila, Edgardo Montes de Oca:
SDN and NFV integration in generalized mobile network architecture. EuCNC 2015: 154-158 - [c6]Madhusanka Liyanage, Ijaz Ahmad, Mika Ylianttila, Andrei V. Gurtov, Ahmed Bux Abro, Edgardo Montes de Oca:
Leveraging LTE security with SDN and NFV. ICIIS 2015: 220-225 - [c5]Madhusanka Liyanage, Ijaz Ahmed, Mika Ylianttila, Jesus Llorente Santos, Raimo Kantola, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca, Asier Valtierra, Carlos Jimenez:
Security for Future Software Defined Mobile Networks. NGMAST 2015: 256-264 - [c4]Ijaz Ahmad, Suneth Namal, Mika Ylianttila, Andrei V. Gurtov:
Towards software defined cognitive networking. NTMS 2015: 1-5 - 2014
- [c3]Suneth Namal, Ijaz Ahmad, Markku Jokinen, Andrei V. Gurtov, Mika Ylianttila:
SDN Core for Mobility between Cognitive Radio and 802.11 Networks. NGMAST 2014: 272-281 - 2013
- [c2]Suneth Namal, Ijaz Ahmad, Andrei V. Gurtov, Mika Ylianttila:
SDN Based Inter-Technology Load Balancing Leveraged by Flow Admission Control. SDN4FNS 2013: 1-5 - [c1]Suneth Namal, Ijaz Ahmad, Andrei V. Gurtov, Mika Ylianttila:
Enabling Secure Mobility with OpenFlow. SDN4FNS 2013: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-02 15:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint