Hamad Naeem

2.0k total citations · 1 hit paper
45 papers, 1.3k citations indexed

About

Hamad Naeem is a scholar working on Computer Networks and Communications, Signal Processing and Artificial Intelligence. According to data from OpenAlex, Hamad Naeem has authored 45 papers receiving a total of 1.3k indexed citations (citations by other indexed papers that have themselves been cited), including 19 papers in Computer Networks and Communications, 17 papers in Signal Processing and 15 papers in Artificial Intelligence. Recurrent topics in Hamad Naeem's work include Advanced Malware Detection Techniques (17 papers), Network Security and Intrusion Detection (14 papers) and Underwater Vehicles and Communication Systems (7 papers). Hamad Naeem is often cited by papers focused on Advanced Malware Detection Techniques (17 papers), Network Security and Intrusion Detection (14 papers) and Underwater Vehicles and Communication Systems (7 papers). Hamad Naeem collaborates with scholars based in China, Saudi Arabia and Pakistan. Hamad Naeem's co-authors include Farhan Ullah, Danish Vasan, Muhammad Rashid Naeem, Mamoun Alazab, Sobia Wassan, Zheng Qin, Babak Safaei, Sohail Jabbar, Shehzad Khalid and Bing Guo and has published in prestigious journals such as Expert Systems with Applications, IEEE Access and Sensors.

In The Last Decade

Hamad Naeem

40 papers receiving 1.3k citations

Hit Papers

IMCFN: Image-based malware classification using fine-tune... 2020 2026 2022 2024 2020 100 200 300

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Hamad Naeem China 21 760 737 531 378 155 45 1.3k
Changzhen Hu China 16 464 0.6× 721 1.0× 601 1.1× 411 1.1× 86 0.6× 109 1.2k
Dawei Feng China 12 271 0.4× 275 0.4× 434 0.8× 243 0.6× 162 1.0× 64 1.1k
Helmi Md Rais Malaysia 11 191 0.3× 237 0.3× 620 1.2× 277 0.7× 199 1.3× 32 1.2k
Yanjun Wu China 18 212 0.3× 257 0.3× 588 1.1× 390 1.0× 429 2.8× 100 1.3k
Marta Cimitile Italy 18 206 0.3× 282 0.4× 329 0.6× 425 1.1× 66 0.4× 105 1.0k
Xuetao Wei China 18 349 0.5× 626 0.8× 317 0.6× 300 0.8× 88 0.6× 104 1.4k
Vincent Omollo Nyangaresi Kenya 28 172 0.2× 916 1.2× 597 1.1× 757 2.0× 233 1.5× 103 1.9k
Jay Kumar China 16 184 0.2× 253 0.3× 582 1.1× 324 0.9× 144 0.9× 38 1.1k
Shijie Zhou China 21 224 0.3× 523 0.7× 709 1.3× 295 0.8× 96 0.6× 123 1.4k
Lahouari Ghouti Saudi Arabia 18 136 0.2× 231 0.3× 376 0.7× 367 1.0× 405 2.6× 69 1.2k

Countries citing papers authored by Hamad Naeem

Since Specialization
Citations

This map shows the geographic impact of Hamad Naeem's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Hamad Naeem with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Hamad Naeem more than expected).

Fields of papers citing papers by Hamad Naeem

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Hamad Naeem. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Hamad Naeem. The network helps show where Hamad Naeem may publish in the future.

Co-authorship network of co-authors of Hamad Naeem

This figure shows the co-authorship network connecting the top 25 collaborators of Hamad Naeem. A scholar is included among the top collaborators of Hamad Naeem based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Hamad Naeem. Hamad Naeem is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Naeem, Hamad, et al.. (2025). Optimizing vehicle security: A multiclassification framework using deep transfer learning and metaheuristic-based genetic algorithm optimization. International Journal of Critical Infrastructure Protection. 49. 100745–100745. 1 indexed citations
3.
Vasan, Danish, Mohammad Hammoudeh, Adel F. Ahmed, & Hamad Naeem. (2025). Cyber-attacks: Securing ship navigation systems using multi-layer cross-validation defense. Computers & Security. 160. 104706–104706.
4.
Naeem, Hamad, et al.. (2024). Augmenting Internet of Medical Things Security: Deep Ensemble Integration and Methodological Fusion. Computer Modeling in Engineering & Sciences. 141(3). 2185–2223. 3 indexed citations
5.
Ullah, Inam, Farhad Ali, Amin Sharafian, et al.. (2024). Optimizing underwater connectivity through multi-attribute decision-making for underwater IoT deployments using remote sensing technologies. Frontiers in Marine Science. 11. 5 indexed citations
6.
Naeem, Hamad, Farhan Ullah, & Gautam Srivastava. (2024). Classification of intrusion cyber‐attacks in smart power grids using deep ensemble learning with metaheuristic‐based optimization. Expert Systems. 42(1). 20 indexed citations
7.
Naeem, Hamad, et al.. (2024). Adversarial Malware Detection on Consumer Devices Using Optimized Image-Based Ensembles. IEEE Consumer Electronics Magazine. 15(2). 75–86. 1 indexed citations
8.
Naeem, Hamad, et al.. (2023). Development of a deep stacked ensemble with process based volatile memory forensics for platform independent malware detection and classification. Expert Systems with Applications. 223. 119952–119952. 41 indexed citations
9.
Bhutta, Muhammad Shoaib, et al.. (2023). Evaluation of Machine Learning Models for Smart Grid Parameters: Performance Analysis of ARIMA and Bi-LSTM. Sustainability. 15(11). 8555–8555. 27 indexed citations
10.
Ullah, Farhan, Jihoon Moon, Hamad Naeem, & Sohail Jabbar. (2022). Explainable artificial intelligence approach in combating real-time surveillance of COVID19 pandemic from CT scan and X-ray images using ensemble model. The Journal of Supercomputing. 78(17). 19246–19271. 22 indexed citations
11.
Ullah, Farhan, Amjad Alsirhani, Mohammed Mujib Alshahrani, et al.. (2022). Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation. Sensors. 22(18). 6766–6766. 41 indexed citations
12.
Li, Deguang, et al.. (2022). Exploring Spatiotemporal Dynamics of PM2.5 Emission Based on Nighttime Light in China from 2012 to 2018. Sustainability. 14(21). 14011–14011.
13.
Naeem, Hamad, et al.. (2022). Explainable Artificial Intelligence-Based IoT Device Malware Detection Mechanism Using Image Visualization and Fine-Tuned CNN-Based Transfer Learning Model. Computational Intelligence and Neuroscience. 2022. 1–17. 20 indexed citations
14.
Ashraf, Shahzad, Mingsheng Gao, Zhengming Chen, et al.. (2020). Underwater Pragmatic Routing Approach Through Packet Reverberation Mechanism. IEEE Access. 8. 163091–163114. 27 indexed citations
15.
Ashraf, Shahzad, et al.. (2020). USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time. Wireless Communications and Mobile Computing. 2020. 1–12. 25 indexed citations
16.
Naeem, Muhammad Rashid, Lin Tao, Hamad Naeem, & Hailu Liu. (2019). A machine learning approach for classification of equivalent mutants. Journal of Software Evolution and Process. 32(5). 11 indexed citations
17.
Naeem, Hamad. (2019). Detection of Malicious Activities in Internet of Things Environment Based on Binary Visualization and Machine Intelligence. Wireless Personal Communications. 108(4). 2609–2629. 29 indexed citations
18.
Ullah, Farhan, Hamad Naeem, Sohail Jabbar, et al.. (2019). Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach. IEEE Access. 7. 124379–124389. 158 indexed citations
19.
Aamir, Muhammad, et al.. (2018). A Framework for Automatic Building Detection from Low-Contrast Satellite Images. Symmetry. 11(1). 3–3. 32 indexed citations
20.
Aamir, Muhammad, Yi‐Fei Pu, Zia-ur Rahman, et al.. (2018). A Hybrid Proposed Framework for Object Detection and Classification. Journal of Information Processing Systems. 14(5). 1176–1194. 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026