Sajid Anwar, Ph.D.


Research Interest

My personal research is on:

  • Software architecture evaluation
  • Mapping requirements to architecture
  • Mining software repositories
  • Search based software engineering

My collaborative research mainly centers round developing and applying novel data mining and machine learning techniques to:

  • Customer churn prediction modeling
  • Developing prudent based expert systems
  • Compromised users’ credentials detection
  • Solving real world problems

Research Supervision

Supervisor MS & PhD thesis and corresponding work resulted in international publications. List of successfully supervised work is as follows:

MS:

  • Shah Nazir, in the area of “Software Component Selection”
  • Changez khan Bangash, in the area of “Site Selection for food distribution “
  • Adnan Amin, in the area of “Customer Churn Prediction Using Rough Set Approach”
  • Saleh Shah, in the area of “Compromised Users’ Credentials Detection” (In Progress)
  • Ahsan Ashfaq, in the area of “Mining Software Concerns”
  • Muhammad Tahir, in the area of “Software Defect Prediction” (In Progress)
  • Humaira Amazai, in the area of “ Test Case Prioritization” (In Progress)

Ph.D:

  • Adnan Amin: Customer Churn Prediction (In Progress)
  • Changez Khan Bangash PhD Course Work In Progress.

Presentations

Journal Papers

  1. Countering Malicious URLs in Internet-of-Thing (IoT) using a knowledge-based approach and simulated expert
    Sajid Anwar,Feras Al-Obeidat, Abdallah Tubaishat, Sadia Din, Awais Ahmad, Fakhri Alam Khan, Gwanggil Jeon, Jonathan Loo
    IEEE Internet of Things Journal.
  2. Big Data Visualization in Cardiology—A Systematic Review and Future Directions,
    Shah Nazir, Muhammad Nawaz, Sajid Anwar, Awais Adnan, Shahla Asadi, Sara Shahzad, Shaukat Ali
    IEEE ACCESS, Vol 7, 2019,pp 115945 – 115958.
  3. Static malware detection and attribution in android byte-code through an end-to-end deep system
    Muhammad Amin, Tamleek Ali Tanveer, Mohammad Tehseen, Murad Khan, Fakhri Alam Khan, Sajid Anwar
    Future Genaration Computer Systems, Vol 102, January 2020, pp 112-126.
  4. Android Malware detection through Generative Adversarial Networks
    Muhammad Amin, babar Shah,Aizaz Sharif, Tamleek Ali, Ki-Il Kim, Sajid Anwar
    Transactions on Emerging Telecommunication Technologies, 2019.
  5. Compromised user credentials detection in digital enterprise using behavioural analytics
    Saleh Shah, Babar Shah, Adnan Amin, Feras Al-Obeidat, Francis Chow, Fernando Moreira, Sajid Anwar
    Future Generation Computer Systems, Vol 93, April 2019, pp 407-417.
  6. An Automated Permission Selection Framework for Android Platform
    Toqeer Ali, Yasar Khan, Tamleek Ali, Safiullah Faizullah, Turki Alghamdi, Sajid Anwar ,
    Journal of Grid Computing, pp 1-15, Springer.
  7. Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods
    Adnan Amin, Babar Shah, Asad Masood Khattak, Fernando Joaquim Lopes Moreira, Gohar Ali, Alvaro Rocha Sajid Anwar ,
    International Journal of Information Management (In press).
  8. An Automated Permission Selection Framework for Android Platform
    Toqeer Ali, Yasar Khan, Tamleek Ali, Safiullah Faizullah, Turki Alghamdi, Sajid Anwar ,
    Journal of Grid Computing, pp 1-15, Springer.
  9. Customer churn prediction in telecommunication industry using data certainty
    Adnan Amin, Feras Al-Obeidat, Babar Shah, Awais Adnan, Jonathan Loo, Sajid Anwar ,
    The Journal of Business Research (In Press),ELSEVIVR.
  10. Just-in-time customer churn prediction in the telecommunication sector
    Adnan Amin, Feras Al-Obeidat, Babar Shah, May Al Tae, Changez Khan, Hamood Ur Rehman Durrani, Sajid Anwar
    The Journal of Supercomputing, 2017, pp 1–25.
  11. A prudent based approach for compromised user credentials detection
    Adnan Amin, Babar Shah, Sajid Anwar, Feras Al Obeidat, Asad Masood Khattak and Awais Adnan
    Cluster Computing 2017.
  12. Customer Churn Prediction in Telecommunication Sector using Rough Set Approach
    Adnan Amin, Sajid Anwar, Awais Adnan, Muhammad Nawaz and Aamir Hussain
    Neurocomputing, Vol 237, No. C, 2017,pp 242-254.
  13. Comparing oversampling techniques to handle the class imbalance problem: A customer churn prediction case study
    Adnan Amin, Sajid Anwar, Awais Adnan, Muhammad Nawaz and Aamir Hussain
    IEEE ACCESS, Vol, 4, 2016, pp 7940 – 7957.
  14. Site Selection for Food Distribution Using Rough Set Approach and Topsis Method
    Changez Khan, Sajid Anwar, Adnan Amin
    Journal of Intelligent and Fuzzy Systems, Vol 29, No.6 , 2015, pp 2413-2419.
  15. A Novel Rules Based Approach for Estimating Software Birthmark
    Shah Nazir, Sara Shahzad, Sher Afzal and Sajid Anwar
    The Scientific World Journal, Volume 2015 (2015).
  16. Software Component Selection Based on Quality Criteria Using the Analytic Network Process
    Shah Nazir, Sara Shahzad, Sher Afzal and Sajid Anwar
    Abstract Applied Analysis, Volume 2014.
  17. Architecture Based Software Quality Maintenance Ripple Effect Analysis
    Sajid Anwar, Muhammad Ramzan, Abdul Rauf, Arfan Jaffar, and Arshad Ali Shahid
    International Journal of Innovative Computing, Information and Control (IJICIC), Vol.8, No.1(A), Jan 2012, pp 489-500.
  18. A Novel Approach for Architecture Based Software Maintenance Prediction
    Sajid Anwar, Muhammad Ramzan, Abdul Rauf, Arfan Jaffar, and Arshad Ali Shahid
    International Journal of Innovative Computing, Information and Control (IJICIC), Vol.7, No.6, June 2011, pp 3193-3208.
  19. Project scheduling conflict identification and resolution using genetic algorithms (GA)
    Muhammad Ramzan, Arfan Jaffar, Amjad Iqbal, Sajid Anwar, Abdul Rauf, Arshad Shahid
    Telecommunication Systems (Springer).
  20. A genetic algorithms based approach for conflicts resolution in requirement
    Muhammad Ramzan, Arfan Jaffar, Amjad Iqbal, Sajid Anwar, Abdul Rauf, Arshad Shahid
    International Journal of physical Sciences Vol 6(4), pp 828-836.
  21. A Scalable and Privacy Preserving Remote Attestation Mechanism
    Tamleek Ali, Masoom Alam, Mohammad Nauman, Toqeer Ali, Muhammad Ali and Sajid Anwar
    Information Journal: An International Interdisciplinary Journal, Vol 14(4), pp 1193-1204.
  22. A FODA Oriented Approach to Architecture based Ripple Effect Analysis
    Sajid Anwar, Shehzad Haleem, Toqeer Ali Syed, and Awais Adnan
    Information Journal: An International Interdisciplinary Journal, Vol 14(6), June 2011, pp 2139-2150.
  23. Towards Trusted Information Sharing in Enterprise Information Systems
    Masoom Alam, Tamleek Ali, Sajid Anwar and Quratulain Alam
    Information Journal: An International Interdisciplinary Journal, Vol 14(10), June 2011, pp 3515-3526.
  24. Mauth: A fine-grained and user-centric permission delegation framework for web services
    Masoom Alam, Muhammad Ali, Quratulain Alam, Tamleek Ali, Sajid Anwar, Awais Adnan and Mudasser Ali
    International Journal of the Physical Sciences Vol. 6(6), pp. 2060-2071, 18 April, 2011 ISSN 1992 – 1950 ©2011 Academic Journals.
  25. Behavioral Attestation for Web Services using access policies
    Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Muhammad Ali, Sajid Anwar and Quratulain Alam
    Multimedia Tools and Applications.
  26. Model driven security for trusted systems
    Masoom Alam, Shahbaz Khan, Quatulain Alam, Tamleek Ali Tanveer, Sajid Anwar, Amir Hayat, Arfan Jaffar, Muhammad Ali and Awais Adnan
    International Journal of Innovative Computing, Information and Control (IJICIC), Vol.8 No.2, Feb 2012, pp 1349-4198.
  27. Dynamic remote attestation through behavior measurement and verification
    Masoom Alam, Xinwen Zhan, Muhammad Numan, Tamleek Ali Tanveer, Sana Ullah, Shahbaz Khan, Quratulain Alam, Sajid Anwar, Arfan Jaffar, , Amir Hayat,Muhammad Ali and Awais Adnan
    International Journal of Innovative Computing, Information and Control (IJICIC), Vol.8 No.3(A), March 2012, pp 1821-1836.

Conference Papers

  1. Features Weight Estimation Using a Genetic Algorithm for Customer Churn Prediction in the Telecom Sector
    Adnan Amin, Babar Shah, Ali Abbas, Sajid Anwar, Omar Alfandi, Fernando Moreira
    WorldCIST'19 2019: New Knowledge in Information Systems and Technologies pp 483-491.
  2. Just-in-time Customer Churn Prediction: With and Without Data Transformation
    Adnan Amin, Babar Shah, Asad Masood Khattak, Thar Baker, Hamood ur Rahman Durani and Sajid Anwar
    IEEE CEC 2018, Rio de Janeiro, Brazil (Accepted).
  3. Compromised user credentials detection using temporal features: A prudent based approach
    Adnan Amin, Sajid Anwar, Babar Shah and Asad masood Khattak
    9th International Conference on Computer and Automation Engineering (ICCAE 2017), Australia.
  4. A comparison of two oversampling techniques (SMOTE vs MTDF) for handling class imbalance problem: A case study of customer churn prediction
    Adnan Amin, Fasial Rahim, Imtiaz Ali, Changez Khan and Sajid Anwar
    3rd World Conference on Information Systems and Technologies (WORLDCIST 2015), Portugal.
  5. Classification of Cyber Attacks based on Rough Set Theory
    Adnan amin. Sajid anwar. Awais adnan. Muhammad Amir khan. Zafar iqbal
    1st international conference on anti-cybercrime (ICACC 2015), Saudi Arabia.
  6. A prudent based approach for customer churn prediction
    Adnan Amin, Faisal Rahim, Muhammad Ramzan and Sajid Anwar
    11th International Conference Beyond Databases Architectures and Structures (BDAS 2015), Poland.
  7. Customer Churn Prediction in Telecommunication Industry: With and without Counter-Examples
    Adnan Amin, Changez Khan, Imtiaz Ali, and Sajid Anwar
    13th Mexican International Conference on Artificial Intelligence (MICAI 2014), Mexico.
  8. Customer churn prediction in telecom industry using Rough Set Theory approach
    Adnan Amin, Saeed Shahzad, Imtiaz Ali and Sajid Anwar
    6th International Conference on Computational Collective Intelligence Technologies and Applications (ICCCI 2014), Seoul Korea.
  9. Semantic Based Ontology Driven Feature Interaction Detection & Modeling
    Sadia Batool, Sajid Anwar, Muhammad Ramzan and Irfan Jaffer
    The 4th International Conference on Information Science and Applications (ICISA 2013), Thailand.
  10. User Interaction Based Framework for Protecting User Privacy in Online Social Networks
    Shoukat Ali, Sajid Anwar and Salman Faiz Solehria
    International Conference on Informatics and Semiotics in Organisations (ICISO 2013) Sweden.
  11. A Novel Fuzzy logic Based Software Component Selection Modeling
    Shah Nazir, Muhammad Aamir Khan and Sajid Anwar
    International Conference on Information Science and Applications (ICISA 2012), Suwon, Korea.
  12. Software maintenance prediction: A Software architecture perspective
    Sajid Anwar, Abdul Rauf, Muhammad Ramzan, Arshad Ali Shahid
    International Conference on Information Science and Applications (ICISA 2010), Seoul, Korea, April 21st – 23rd, 2010.
  13. Software qualitymaintenance ripple effect analysis: A Software architecture perspective
    Sajid Anwar, Abdul Rauf, Muhammad Ramzan, Arshad Ali Shahid
    International Conference on Information Science and Applications (ICISA 2010), Seoul, Korea, April21st – 23rd, 2010.
  14. Maximizing GUI Test Coverage Through PSO
    Abdul Rauf, Naveed Kazim, Sajid Anwar, Shafiq-Ur Rehman, Arshad Ali Shahid
    19th International Conference on Software Engineering and Data Engineering (SEDE-2010), San Francisco, California, USA, June 16 – 18, 2010.
  15. Automated GUI Test Coverage Analysis using GA
    Abdul Rauf, Sajid Anwar, Arfan Jaffar, Arshad Ali Shahid
    7th International Conference on Information Technology New Generations ITNG 2010 April 12-14, 2010, Las Vegas, Nevada, USA.
  16. Project Scheduling Conflict Identification and Resolution using Genetic Algorithms
    Muhammad Ramzan , Abdul Rauf, Sajid Anwar, Amjad Iqbal, Arshad Ali Shahid
    International Conference on Information Science and Applications (ICISA 2010), Seoul, Korea, April 21st – 23rd, 2010.
  17. Ontology Driven Semantic Annotation Based GUI Testing
    Abdul Rauf, Sajid Anwar, Muhammad Ramzan, Arshad Ali Shahid
    IEEE International Conference on Emerging Technologies 2010 (ICET 2010) Islamabad, Pakistan, October 18-19, 2010.
  18. Value Assignment Process (VAP): Establishing Value of Software through a New Definition of Value
    Muhammad Ramzan, Sajid Anwar, Arfan Jaffar, Abdul Rauf, Arshad Ali Shahid
    Fourth International Conference on Innovative Computing, Information and Control, (ICICIC 2009), December 7 – 9, 2009, Kaohsiung Taiwan.
  19. Need to redefine “VALUE” and case for a new Software Valuation Technique: An Analytical Study
    Mohammad Ramzan, Sajid Anwar, Abdul Rauf, Arshad Ali Shahid
    International Conference on Telecom Technology and Applications (ICTTA 2009), Manila Philippine.
  20. Value Based Fuzzy Requirement Prioritization and Its Evaluation Framework
    M. Ramzan, M. Arfan Jaffar, M. Amjad Iqbal, Sajid Anwar, Arshad A. Shahid
    Fourth International Conference on Innovative Computing, Information and Control, Kaohsiung, Taiwan, 2009.