© 2026 KNUST Research Atlas. All rights reserved.

Back to Search
Profile photo of Emmanuel Ahene

Emmanuel Ahene

Computer Science

View Official KNUST Profile

About

Emmanuel Ahene is a Senior Lecturer at the Department of Computer Science, a Licensed Cybersecurity Professional and the Co-Founder of Cyberpass Consult, specializing in cyber security and machine learning. He obtained his doctoral and master's degrees in Computer Science and Technology in 2019 and 2016, respectively.His research extends to developing innovative technologies that harness the power of cyber security and machine learning to address critical challenges such as Cyber-attack Detection, equal access to Healthcare and Education. Dr Ahene leads as the PI for the Secure AI project, with the ultimate goal of developing privacy-preserving frameworks for AI agents with impact in defense, healthcare, agriculture, and beyond. His ongoing efforts have led to more than 20 research articles published in high-impact journals. He is also the PI for the SignTalk project. The outcome of the SignTalk project will be a secure deep learning model that will enhance doctor-to-patient conversation in Ghana for speech and hearing-impaired folks. In addition, he serves as the PI for the Deep Learning for food sustainability project, the CO-PI for the MESTI mHealth Project for inclusive and secure health systems and also serves as the Project lead Consultant for GIZ on the "Training under Careers in Modern lT Fields project". In 2023, he received the Vice Chancellors award for creativity and innovation in KNUST, Ghana.As an advocate for building human capacity, Dr Ahene has provided hands-on training programs for IT professionals in public and private institutions. His efforts have impacted more than 500 IT professionals nationwide.Within the academic community, he serves as the Guest Editor for two special issues: Special Issue on Security and Reliability in Future Intelligent Mobile Communication, Computer Communications, Elsevier and Special Issue on Frontiers in Cyber Security, Journal of Systems Architecture, Elsevier. He served as the program committee chair for the international conference on "Frontiers in Cyber Security" in December, 2022He is a reviewer for several high-impact journals, including IEEE Internet of Things, IEEE Systems Journal, IEEE Transactions on Computers, IEEE Access, Computers and Electrical Engineering (Elsevier), KSII Transactions on Internet & Information Systems and has received awards as an outstanding reviewer from reputable journals, such as KSII Transactions on Internet & Information Systems (2020) and Computers and Electrical Engineering, Elsevier (2017).He is a member of IEEE, GSA, and the KNUST Young Researcher’s Forum, demonstrating his commitment to continuous learning and collaboration within the academic community. He has given talks at international and local conferences on cyber security and AI in several Asian and African countries.Find more:Professional Talks LinkedIn featured Research publications

Research Summary

(inferred from publications by AI)

Research activities at this scholar span multiple domains, blending technological innovation with real-world applications across diverse fields. The work delves into vehicular ad hoc networks (VANETs), leveraging blockchain-based solutions for security in vehicle-to-infrastructure communication; advancing hydrological forecasting through machine learning tailored to Ghana’s ecological zones; and exploring cryptographic techniques for secure systems, such as deniable authentication and advanced signal processing methods. These areas are characterized by their focus on enhancing safety, efficiency, and security in critical technologies like power transfer systems and data storage solutions. The scholar also contributes to software-defined networks by addressing challenges in privacy and resource management, while maintaining a global perspective with studies that span social sciences and engineering disciplines.

Research Themes

All Papers

A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs(2019)
Rainfall Prediction Using Machine Learning Algorithms for the Various Ecological Zones of Ghana(2021)
Efficient Signcryption With Proxy Re-Encryption and its Application in Smart Grid(2019)
Certificateless deniably authenticated encryption and its application to e-voting system(2018)
A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid(2018)
Heterogeneous signcryption with proxy re-encryption and its application in EHR systems(2022)
Efficient deniable authentication and its application in location-based services(2022)
A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security(2015)
CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment(2019)
Using the Power-Of-Two Vector Padding to Enhance Efficiency and Speed in CKKS Homomorphic Encryption(2024)
P2P-CKKS: enhancing homomorphic encryption efficiency via dynamic power-of-two vector padding(2025)
A Multi-objective Optimization Approach to Workflow Scheduling in Clouds Considering Fault Recovery(2016)
Fault-Tolerant Resource Provisioning with Deadline-Driven Optimization in Hybrid Clouds(2016)
Evaluation of Conversational Agents: Understanding Culture, Context and Environment in Emotion Detection(2022)
Corrections to “Evaluation of Conversational Agents: Understanding Culture, Context and Environment in Emotion Detection”(2022)
Enhanced network load balancing technique for efficient performance in software defined network(2023)
Automatic lithology identification in meteorite impact craters using machine learning algorithms(2024)
Cold Boot Attack on Encrypted Containers for Forensic Investigations(2022)
Frontiers in Cyber Security(2022)
Secure Energy Encryption for Wireless Power Transfer(2017)
Application of residue number system (RNS) to image processing using orthogonal transformation(2015)
Implicit optimal variational collaborative filtering(2022)
Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source(2022)
Efficient Authentication Protocol and Its Application in Resonant Inductive Coupling Wireless Power Transfer Systems(2021)
An Enhanced Subsampling Technique for Signal Reconstruction in Compressive Sensing Using Linear Interpolation and Random Measurement Matrix(2023)
An Enhanced Subsampling Technique in Compressive Sensing using Linear Interpolation and Random Measurement Matrix(2024)
Dynamic Programming-based Adversarial Windows Payload Generator(2023)
Deit-Mi: Advancing Malware Detection and Classification with Data-Efficient Image Transformers(2023)
Guest editorial: Special issue on frontiers in cyber security(2023)
Hybrid Firefly–Particle Swarm Optimization for Parameter Tuning of XGBoost: Network Intrusion Detection(2025)
MEN: leveraging explainable multimodal encoding network for precision prediction of CYP450 inhibitors(2025)

Collaboration Network

4fd08beb-3461-43a3-a061-e47054335ba6
Research Collaboration Map
Collaboration Frequency
Less
More

About This Profile

This profile is generated from publicly available publication metadata and is intended for research discovery purposes. Themes, summaries, and trajectories are inferred computationally and may not capture the full scope of the lecturer's work. For authoritative information, please refer to the official KNUST profile.