Dr Jakir Hossain
Senior Lecturer

Biography
Dr. MD Jakir Hossain completed his Ph.D. in 2021 from the University of Electronic Science and Technology of China, specializing in secure authentication protocol design. In 2022, he further pursued a Postgraduate Certificate in Education (PGCiE) from Staffordshire University. Dr. Hossain has made significant contributions in the fields of cybersecurity, wireless body area networks, cloud computing, and intrusion detection using artificial intelligence. His expertise extends to IoT, quantum computing, and cyber threat detection, as demonstrated by his numerous research projects, independent studies, and group collaborations. Dr. Hossain has authored several high-impact manuscripts as both first author and corresponding author in IEEE Transactions, Elsevier, and Springer journals over the last four years, achieving a combined impact factor of 71.04. He is also an active reviewer for prestigious journals and conferences, including IEEE Internet of Things (IoT) Journal, IEEE Transactions on Vehicular Technology, Various IEEE technical conferences. He had been working as a lecturer, senior lecturer, and assistant professor in the Department of Computer Science and Engineering, Metropolitan University, Sylhet from 2012 to 2018. In the year 2021, he joined Oxford Brookes University and Chengdu University of Technology Collaborative Programme, China as an Associate Professor ( Cybersecurity Lead). In the year 2025, he joined University of Chester as a Senior Lecturer. He received different scholarships including the Chinese Government Scholarship for Ph.D. studies. He served as Co-CI (Co-Chief Investigator) for multiple research groups in China. He is active IEEE member, affiliated with various IEEE technical societies, and proctor, IEEE Xtreme. Dr. Hossain’s research focuses on: Secure Authentication Protocols for diverse applications (IoT, telecare medicine information systems, cloud storage, wireless sensor networks, smart city, smart grid, etc.), Quantum Cryptography, and Cyber Threat Detection using AI.
Research and Knowledge Exchange
1. Designing Secure Authentication Protocols for Diverse Application Scenarios 2. Cryptography and Network Security 3. Intrusion Detection and Response using AI