How can I help?
How can I help?

Dr Mohammad Shan-A-Khuda

Lecturer

With a PhD in Data Science from Leeds Beckett University and an MSc in multidisciplinary informatics from the University of Leeds, Mohammad is an astute computing and data science academic with extensive experience in dynamic, cross-disciplinary research and teaching environments.

Orcid Logo 0000-0002-0588-623X
Dr Mohammad Shan-A-Khuda staff profile image

About

With a PhD in Data Science from Leeds Beckett University and an MSc in multidisciplinary informatics from the University of Leeds, Mohammad is an astute computing and data science academic with extensive experience in dynamic, cross-disciplinary research and teaching environments.

With a PhD in Data Science from Leeds Beckett University and an MSc in multidisciplinary informatics from the University of Leeds, Mohammad is an astute computing and data science academic with extensive experience in dynamic, cross-disciplinary research and teaching environments.

Mohammad guides, collaborates with and fully prepares students within various specialities and disciplines, supporting their journey towards professional positions within the IT industry and further study. He excels within interdisciplinary and multidisciplinary frameworks, leads and collaborates on projects, enhances methods of teaching practice to meet the needs of an ever-changing subject area, and fosters sustained student progression.

Mohammad has developed a wide range of practical skills in students using various tools and environments, introducing them to key critical and theoretical issues in computing and data science. He enhances the research journey, applications, and outcomes, collaborates across subjects to enable comprehensive, real-world findings and bolsters the institution's profile and funding potential.

Research interests

Mohammad's research interests include data analytics, visualisation, and modelling large datasets. His PhD thesis, Modelling fear of crime area variation of people in England, holistically examines the emotional and cognitive dimensions of people's fear of crime in England and considers a wide range of demographic and area-level measures, such as The English Indices of Deprivation using a novel methodology called Multilevel Modelling.

While working as a postdoctoral research fellow at Leeds Beckett University, Mohammad led the Characteristics of Victims of Cybercrime project. He presented the results of a comprehensive analysis of West Yorkshire Police (WYP) cybercrime data and evaluated the recognition of the knowledge generated and its impact on WYP.

Mohammad proposed and successfully supervised a series of MSc dissertation projects: Machine learning-based crime prediction, Visualisation of Road traffic accidents in the UK, and Machine Learning-based dementia prediction.


Publications (9)

Sort By:

Journal article
Enhancing Audio Classification Through MFCC Feature Extraction and Data Augmentation with CNN and RNN Models
Featured 31 July 2024 International Journal of Advanced Computer Science and Applications15(7):37-53 The Science and Information Organization
AuthorsRezaul KM, Jewel M, Islam MS, Siddiquee KNEA, Barua N, Rahman MA, Shan-A-Khuda M, Sulaiman RB, Shaikh MSI, Hamim MA, Tanmoy FM, Haque AU, Nipun MS, Dorudian N, Kareem A, Farid AK, Mubarak A, Jannat T, Asha UFT

Sound classification is a multifaceted task that necessitates the gathering and processing of vast quantities of data, as well as the construction of machine learning models that can accurately distinguish between various sounds. In our project, we implemented a novel methodology for classifying both musical instruments and environmental sounds, utilizing convolutional and recurrent neural networks. We used the Mel Frequency Cepstral Coefficient (MFCC) method to extract features from audio, which emulates the human auditory system and produces highly distinct features. Knowing how important data processing is, we implemented distinctive approaches, including a range of data augmentation and cleaning techniques, to achieve an optimized solution. The outcomes were noteworthy, as both the convolutional and recurrent neural network models achieved a commendable level of accuracy. As machine learning and deep learning continue to revolutionize image classification, it is high time to explore the development of adaptable models for audio classification. Despite the challenges associated with a small dataset, we successfully crafted our models using convolutional and recurrent neural networks. Overall, our strategy for sound classification bears significant implications for diverse domains, encompassing speech recognition, music production, and healthcare. We hold the belief that with further research and progress, our work can pave the way for breakthroughs in audio data classification and analysis.

Conference Contribution
Assessment of Methods of Cyber Training
Featured 25 May 2017 Tackling Cyber Crime and Improving Police Response Showcase Leeds Beckett University
AuthorsCockcroft TW, Shan-A-Khuda M
Journal article
Understanding Cybercrime Victimisation : Modelling The Local Area Variations in Routinely Collected Cybercrime Police Data Using Latent Class Analysis
Featured 2019 International Journal of Cyber Criminology13(2):493-510

Numerous factors such as sociodemographic characteristics contribute to cybercrime victimisation. Previous research suggests that neighbourhood plays a role in cybercrime perpetration. However, despite the theoretical importance and particular interest to law enforcement agencies and policymakers, local area variations in cybercrime victimisation have rarely been examined. Drawing on data from recorded cybercrime incidents within one of the largest police forces in England from a three-year period with a victim dataset of 5,270 individuals enhanced by the Census data, this research untangles the relationships between demographics of cybercrime victims and their resident area characteristics. The research considers four types of cybercrime victimisation: ‘Harassment/Unwanted Contact’, ‘Fraud/Theft/Handling’, ‘Sexual/Indecent Images’ and ‘other types of cybercrime’ (classifications used by the participating police force). Latent Class Analysis (LCA) was applied to rigorously analyse the relationship among the four different types of cybercrime victimisation with victim demographics and resident area-level characteristics. This research finds that each type of cybercrime yielded statistically distinct victim profiles. Vulnerabilities to cybercrime varied among male and female of different age groups, and importantly, the types of residential areas of the victims. Specifically, it is evident that females were much more likely to become cybercrime victims than males for two types of cybercrime: ‘Harassment/Unwanted Contact’, and ‘Sexual/Indecent Images’. Vulnerabilities associated with these two types of cybercrime decreased with the increase of age. Cybercrime victims of ‘Sexual/Indecent Images’ were likely to be 5-14 year-olds living in areas with a higher number of Level 2, Level 4 qualifications and full-time students. Both males and females were vulnerable to ‘Fraud/Theft/Handling’ cybercrime and their resident areas had a higher number of full-time students, Level 4 qualifications and Asians. Finally, victims of ‘other types of cybercrime’ were most likely to be male and their resident areas had a high number of Asians and full-time students. Our work demonstrates that it is possible to apply statistical analysis to routinely collected police data to gain insight into the cybercrime victimisation that occurs across crime types in relation to demographics and area-level variations. These results provide valuable insights into policing cybercrime in England and beyond.

Working Paper
Police Cybercrime Training: Perceptions, Pedagogy and Policy (Working Paper)
Featured 2018 Policing Oxford Oxford University Press (OUP)

Cybercrime presents numerous issues for police organizations. A key challenge is to understand how best to impart relevant skills and knowledge about cybercrime throughout the organization to enable police officers to react appropriately to such incidents. This article is drawn from research undertaken as part of the CARI Project, a major study into the effectiveness of cybercrime investigation within a large UK police force funded by the Police Knowledge Fund. As part of the needs assessment for the above project, concerns were raised about the effectiveness of existing training arrangements in facilitating the development of cyber skills within police officers. The present research, based on survey data, explored the effectiveness of different training styles as perceived by those who had undertaken cyber training. The research found that officers perceived some modes of training as more effective than others and highlighted some of the organizational contexts that impact negatively on the delivery of effective cyber training. The findings are presented within a context, informed by existing literature, that acknowledges wider debates surrounding the pedagogy of police learning and the organizational challenges of developing cyber skills within police officers. The authors believe that the findings will have relevance to police training policy both in the UK and in the wider international context.

Conference Contribution
Security Scenario Generator (SecGen): A Framework for Generating Randomly Vulnerable Rich-scenario VMs for Learning Computer Security and Hosting CTF Events
Featured 14 August 2017 2017 USENIX Workshop on Advances in Security Education (ASE'17) USENIX Vancouver, BC, Canada USENIX Association
AuthorsSchreuders ZC, Shaw T, Shan-A-Khuda M, Ravichandran G, Keighley J, Ordean M

Computer security students benefit from hands-on experience applying security tools and techniques to attack and defend vulnerable systems. Virtual machines (VMs) provide an effective way of sharing targets for hacking. However, developing these hacking challenges is time consuming, and once created, essentially static. That is, once the challenge has been "solved" there is no remaining challenge for the student, and if the challenge is created for a competition or assessment, the challenge cannot be reused without risking plagiarism, and collusion. Security Scenario Generator (SecGen) can build complex VMs based on randomised scenarios, with a number of diverse use-cases, including: building networks of VMs with randomised services and in-thewild vulnerabilities and with themed content, which can form the basis of penetration testing activities; VMs for educational lab use; and VMs with randomised CTF challenges. SecGen has a modular architecture which can dynamically generate challenges by nesting modules, and a hints generation system, which is designed to provide scaffolding for novice security students to make progress on complex challenges. SecGen has been used for teaching at universities, and hosting a recent UK-wide CTF event.

Journal article
Needs Assessment of Cybercrime and Digital Evidence in a UK Police Force
Featured 2020 International Journal of Cyber Criminology14(1):316-340 International Journal of Cyber Criminology
AuthorsSchreuders ZC, Cockcroft T, Butterfield E, Elliott J, Soobhany AR, Shan-A-Khuda M

Cybercrime has recently surpassed, in terms of volume, all other forms of crime in the United Kingdom, and has been acknowledged as a national priority. The purpose of this research is to analyse the police cyber-investigation lifecycle: from the experience of the public when reporting cybercrime to call takers, through to the attending officers, officer(s) in charge, and the many units and roles involved in supporting cybercrime investigations. A large scale needs assessment was conducted within one of the largest police forces in England and Wales, involving focus groups and interviews with police staff and strategic leads across key units and roles. The results of the needs assessment document the state of policing cybercrime in a UK police force, along with the improvements and needs that exist across the force and in specific units and roles. In total, 125 needs were identified and further coded based on a thematic analysis. Common themes identified include: knowledge/training, communication, recording, software, roles, governance, procedures, resources, consistency, staffing, national input, face-to-face, interactions with the public, new capabilities, and triage. The most common needs were related to training and knowledge, communications, quality of recording, software, governance, procedures, resourcing, and national input. Due to the nature of the findings, it is likely that some of these identified areas may parallel other police organisations’ experiences at national and international levels.

Conference Contribution
Cybercrime Policing: Needs Analysis and Building a Research Culture
Featured 2017 College of Policing PKF Event Coventry, UK
AuthorsSchreuders ZC, Cockcroft TW, Butterfield EM, Elliott JR, Shan-A-Khuda M
Working Paper
Needs Assessment of Cybercrime and Digital Evidence in a UK Police Force
Featured 01 January 2020 International Journal of Cyber Criminology
AuthorsSchreuders ZC, Cockcroft TW, Butterfield EM, Elliott JR, Soobhany AR, Shan-A-Khuda M

Cybercrime has recently surpassed, in terms of volume, all other forms of crime in the United Kingdom, and has been acknowledged as a national priority. The purpose of this research is to analyse the police cybcr-invcstigation lifccyclc: from the experience of the public when reporting cybercrime to call takers, through to the attending officers, ofEcer(s) in charge, and the many units and roles involved in supporting cybercrime investigations. A large-scale needs assessment was conducted within one of the largest police forces in-England and Wales, involving focus groups and interviews with police staff and strategic leads across key units and roles. The results of the needs assessment document the state of policing cybercrime in a UK police force, along with the improvements and needs that exist across the force and in specific units and roles. In total, 125 needs were identified and further coded based on a thematic analysis. Due to the nature of the findings, it is likely that some of these identified areas may parallel other police organisations' experiences at national and international levels.

Journal article
Police Cybercrime Training: Perceptions, Pedagogy and Policy
Featured 26 October 2018 Policing: A Journal of Policy and Practice15(1):15-33 Oxford Journals
AuthorsCockcroft TW, Shan-A-Khuda M, Schreuders C, Trevorrow P

Cybercrime has become one of the most pressing developments for police organisations to engage with over recent years. One of the key challenges here is to understand how best to effectively impart relevant skills and knowledge about cybercrime throughout the organisation to enable police officers to react appropriately to such illicit behaviours. This paper is drawn from mixed-methods research undertaken as part of a major study into the effectiveness of cybercrime investigation within a large UK police force funded by College of Policing/Hefce. The research found that officers perceived some modes of training as considerably more effective than others and, similarly, highlighted some of the organisational contexts that impact negatively on the delivery of effective cyber training to police officers. The authors believe that the findings will have relevance to police training policies both in the UK and in the wider international context.

Current teaching

  • Statistics in practice
  • Intelligent Systems and Machine Learning
  • Mathematics for Data Science
  • Objected Oriented Programming
  • Computer Programming
  • Fundamentals of Databases
  • Computing Systems
  • Data Structures and Algorithms
  • Advanced Engineering Mathematics
  • Simulation and Modelling

{"nodes": [{"id": "20874","name": "Dr Mohammad Shan-A-Khuda","jobtitle": "Lecturer","profileimage": "/-/media/images/staff/dr-mohammad-shan-a-khuda.jpg","profilelink": "/staff/dr-mohammad-shan-a-khuda/","department": "School of Built Environment, Engineering and Computing","numberofpublications": "9","numberofcollaborations": "9"},{"id": "13359","name": "Dr Cliffe Schreuders","jobtitle": "Reader","profileimage": "/-/media/images/staff/lbu-approved/beec/cliffe-schreuders.jpg","profilelink": "/staff/dr-cliffe-schreuders/","department": "School of Built Environment, Engineering and Computing","numberofpublications": "46","numberofcollaborations": "7"},{"id": "23040","name": "Tom Shaw","jobtitle": "Lecturer","profileimage": "/-/media/images/staff/lbu-approved/beec/thomas-shaw.jpg","profilelink": "/staff/tom-shaw/","department": "School of Built Environment, Engineering and Computing","numberofpublications": "3","numberofcollaborations": "1"},{"id": "2314","name": "Dr Pip Trevorrow","jobtitle": "Course Director","profileimage": "/-/media/images/staff/dr-pip-trevorrow.jpg","profilelink": "/staff/dr-pip-trevorrow/","department": "School of Built Environment, Engineering and Computing","numberofpublications": "38","numberofcollaborations": "2"}],"links": [{"source": "20874","target": "13359"},{"source": "20874","target": "23040"},{"source": "20874","target": "2314"}]}
Dr Mohammad Shan-A-Khuda
20874