Tamer Nadeem, Ph.D.

Professor VCU College of Engineering

  • Richmond VA

Wireless networks, edge/cloud systems, generative AI, cybersecurity, trustworthy AI, AI-enabled health, cyber-physical systems, and cobots.

Contact

VCU College of Engineering

View more experts managed by VCU College of Engineering

Spotlight

3 min

Research team aims to enhance security of medical devices

Tamer Nadeem, Ph.D., the principal investigator of the VCU-based MedKnights project, explained that the project’s focus is on the Internet of Medical Things (IoMT). Nadeem and co-PI Irfan Ahmed, Ph.D., both associate professors in the VCU College of Engineering Department of Computer Science, recently received $600,000 from the NSF’s Office of Advanced Cyberinfrastructure to put together a framework to improve IoMT security. IoMT devices are used in a range of diagnostic, monitoring and therapeutic applications. IoMT includes patient monitors, ventilators, MRI machines — even “smart beds.” Ahmed cited the internet-connected insulin pump is a good example of an IoMT device. Internet connectivity allows for both monitoring and adjusting the dosage remotely — functions that require a high degree of security for patient privacy as well as safety. All IoMT devices are potentially vulnerable to ransomware, denial of service and other malicious hacker attacks. Nadeem points out that IoMT devices have a higher security requirement than traditional IoT devices such as smart doorbells and smart thermostats in homes. “The most important thing in the medical domain is privacy,” Nadeem said. “For IoT devices in your home, you wouldn’t care that much about privacy, but for medical devices, it is an essential thing. You wouldn’t want anyone to know what your health conditions are, or what problems you might have had.” The work of the MedKnights group is important, as the IoMT domain is expanding; there is growth in terms of types of devices, number of patients using them and number of IoMT vendors. Nadeem added that the COVID pandemic and accompanying quarantine and stay-home orders increased the focus of medical-technology providers on the possibilities of IoMT. “Talking to some of the medical-device providers, I’ve learned that they are considering a line of products where they can remotely monitor patients on those devices, and they also can configure those devices remotely,” Nadeem said. Security is a large concern for the new generation of devices, because the current IoMT devices have been hit hard by hackers, he said. Security is an issue that extends from the individual patient to the institution. “Statistics show there are a lot of ransom attacks being done on the health sectors during the pandemic,” Nadeem said. “That motivated us.” The MedKnights team’s preparation for taking on the dragon of malicious IoMT attacks includes building a “test bed,” an isolated hardware/software assembly that Nadeem says will mimic the internet-enabled hospital setting. “In the hospital environment, there’s set of rooms. Each room has a lot of medical devices; they could be wired, or they could be wireless devices,” he said. “But there is no way that we can do what we want to do in a hospital.” The test bed will incorporate IoMT datasets based on typical device behavior, traffic and known malicious attacks. Nadeem explained that MedKnights will explore vulnerabilities of various IoMT hardware and software by subjecting the elements of the IoMT test bed to a range of attacks. “We will try to see in real time how efficient our technologies to monitor or detect these attacks, then try to intervene if we notice any change in the activities on the network,” he said. “Now, if the attacks manage to get into the device, we would like to also to start to see whether we can monitor these devices and observe abnormality or any misbehavior.” Nadeem said the next step is to isolate the source of fishy activity in the test bed network and begin to reverse-engineer the malware. He explained the group will work on understanding the question by looking for the “hole” that created the vulnerability. Ahmed said the MedKnights will bring undergraduates into the project through DURI, the Dean’s Undergraduate Research Initiative at the VCU College of Engineering. High school students will have an opportunity to join the team through a similar program known as the Dean’s Early Research Initiative, or DERI. DURI and DERI are just two ways of getting younger scientists and engineers involved in actual research. “For the last couple of years, I’ve been contacted by local high schools to host a couple of their students during the summer,” Nadeem added. “The students were really excited about it. We came up with some nice ideas about how to extend that work to their classrooms. As we continue this project, we will reach out to the schools, because we would love having a couple of their students involved.”

Tamer Nadeem, Ph.D.Irfan Ahmed, Ph.D.

Social

Biography

Dr. Tamer Nadeem is an accomplished Professor in the Department of Computer Science at Virginia Commonwealth University, the Associate Director of the VCU Cybersecurity Center, and leader of the Mobile Systems and Intelligent Communication (MuSIC) Lab. Dr. Nadeem's research spans domains such as network security, robust & secure medical IoT, mobile & edge computing, and next-generation wireless systems. Most recently, he has become interested in developing dynamic and distributed AI frameworks with applications in smart healthcare, smart cities, and human-centered computing. His research is supported by agencies including the National Science Foundation (NSF), National Institute of Health (NIH), National Institute of Standards and Technology (NIST), Federal Highway Administration (FHWA), US Department of Transportation (USDOT), Commonwealth Cyber Initiative (CCI), Siemens Corporate Research, AT&T Labs, Microsoft, Nokia-Bell Labs, and Google.

Dr. Nadeem holds 6 US patents and has authored over 100 publications in peer-reviewed scholarly journals, book chapters, and conference proceedings. He serves on the technical and organizing committees of various ACM and IEEE conferences and is currently on the editorial boards of the IET Communications journal and MDPI Sensors. His leadership and contributions to the field have earned him recognition as the 2024-25 Provost's Office Faculty Fellow, where he will contribute to strategic academic initiatives at Virginia Commonwealth University.

Dr. Nadeem received his Ph.D. in Computer Science from the University of Maryland, College Park, in 2006.

Industry Expertise

Research
Wireless
Computer Networking

Areas of Expertise

Cybersecurity and Privacy
Wireless Networks
Edge/Cloud Computing
Generative AI
Trustworthy AI
AI-Enabled Health
Cyber Physical Systems
Collaborative Robotics

Education

University of Maryland, College Park

Ph.D.

Computer Science

2006

Research Focus

Generative AI for Robust Communication and Efficient Networking

Generative AI is revolutionizing communication by enabling intelligent, automated content creation across text and multimedia, improving efficiency, accuracy, and personalization. It supports diverse applications, from customer service to real-time translation, while advancing technologies like transformers and reinforcement learning to enhance global knowledge sharing. We introduce LoRaFlow, a generative modeling approach using diffusion transformers and rectified flow to reconstruct LoRa signals from noisy inputs, improving demodulation. Integrated with existing LoRa infrastructure, LoRaFlow enhances signal recovery under low SNR conditions with minimal hardware changes, extending the range and reliability of IoT communications.

View More

AI-Based Tactics for Advanced Network Deception

Modern computer networks, characterized by their high connectivity and heterogeneity, integrate a wide range of devices and protocols such as IoT, sensors, and robotic systems. While this complexity enables advanced services and adaptability, it also introduces significant security vulnerabilities, particularly in critical environments like the Internet of Battlefield Things (IoBT). To address these challenges, this project explores advanced cyber deception techniques aimed at mitigating reconnaissance-stage cyber threats. Two key contributions include MirageNet, a GAN-based framework for generating synthetic network traffic to enhance security and privacy, and MiragePkt, which synthetically generates network packets by learning from raw data. Additionally, a novel Graph Neural Network (GNN)-based approach for optimizing honeypot placement demonstrates superior performance over traditional methods, achieving 92.34% accuracy and a 139x speedup in inference. Together, these innovations highlight the potential of AI-driven solutions in fortifying modern network defenses.

View More

HomePal: Developing a Smart Speaker-Based System for In-Home Loneliness Assessment for Older Adults

Experiences of loneliness are prevalent among older adults. Loneliness is a painful and pernicious state occurring when there is a perceived discrepancy between one’s optimal levels of social interactions and actual social relationships. Lonely older adults are more likely to experience functional decline, including activities of daily living, mobility, and stair climbing. Loneliness has been associated with negative health outcomes, such as increased morbidity and mortality, dementia risk, and cognitive impairment. With longer life expectancy rates, the number of older adults at risk for loneliness will increase substantially, presenting challenges to the healthcare system. However, studies reported that loneliness is a reversible condition, which could be achieved through appropriate interventions, such as improving physical health and social relationships. Detection measures are imperative to identify both lonely and at-risk individuals early enough to intervene before adverse health outcomes occur. The assessment of loneliness is challenging due to the social stigma of being labeled as lonely, resulting in underestimation. Although multidimensional scales exist that do not explicitly use the word “lonely,” healthcare providers do not routinely assess loneliness using validated instruments, making it challenging to be aware of the extent of loneliness among their older adult patients.

View More

Show All +

Patents

Transparent Digital Rights Management for Extendible Content Viewers

https://patents.google.com/patent/US7171558B1/

2007-01-30

A digital rights management system for controlling the distribution of digital content to player applications. The system comprises a verification system, a trusted content handler, and a user interface control. The verification system is provided to validate the integrity of the player applications; and the trusted content handler is used to decrypt content and to transmit the decrypted content to the player applications, and to enforce usage rights associated with the content. The user interface control module is provided to ensure that users of the player applications are not exposed to actions that violate the usage rights. The preferred embodiment of the present invention provides a system that enables existing content viewers, such as Web browsers, document viewers, and Java Virtual Machines running content-viewing applications, with digital rights management capabilities, in a manner that is transparent to the viewer. Extending content viewers with such capabilities enables and facilitates the free exchange of digital content over open networks, such as the Internet, while protecting the rights of content owners, authors, and distributors. This protection is achieved by controlling access to the content and constraining it according to the rights and privileges granted to the user during the content acquisition phase.

View more

A New Scheme for Operating a Wireless Station Having Directional Antennas

US7630343B2

2009-12-08

Disclosed is a wireless station having a receiver and a network allocation vector associated with each of a plurality of directional antennas. The receivers concurrently listen for frames from remote stations. When any receiver detects a frame from a remote station, the receiver activates its associated NAV. The station has one or more transmitters that can transmit using the antennas. While transmitting a signal using an antenna, the receivers associated with any non-transmitting antennas continue to listen for signals from remote stations. The station cancels any signals from the transmitting antenna received by the non-transmitting antennas. To perform the cancellation, the station performs a self-calibration procedure. The station can self-calibrate by either silencing neighboring stations or by inserting null tones into a transmitted calibration signal.

View more

Estimation of Travel Times using Bluetooth

US8519868B2

2013-08-27

Methods for estimating travel time using at least two remote systems to record the timestamps associated with obtaining identifying information of a wireless Bluetooth enabled, or other WPAN technology, electronic device in a vehicle. A remote system in one embodiment is a Bluetooth enhanced traffic controller. Characteristics of Bluetooth technology, such as a unique address for each Bluetooth capable device are used to detect a vehicle with a Bluetooth device by at least a first and a second remote system. Vehicle identifying data including at least a time stamp is transmitted by the remote systems to a central system. The central system determines a travel time, or an estimated travel delay. Travel time related data is provided by the central system to a display, such as a variable or dynamic message sign.

View more

Show All +

Research Grants

CC*IIE Networking Infrastructure: CHARMED – Campus High-Availability Scientific Research Environment and DMZ

National Science Foundation

2015-01-01

The project builds a full featured "scienceDMZ" that leverages the Old Dominion University's investment in operational high availability resources in the existing data centers routing and switching fabric, incorporates an enhanced and scalable High Performance Computing (HPC) model, and facilitates data intensive research while precluding the need for science projects to create their own stand alone environments. This high performance and high availability computing and networking environment accelerates scientific discovery by increasing the rate at which data can be transferred between collaborators, and by facilitating the creation of communities focused on the data. This project represents a significant shift in promoting and facilitating greater scientific research through collaboration by accommodating the needs of data driven discovery in Physics, Oceanography, Computer Science and Engineering, along with researchers from across campus. Three scientific domains are selected as first users to show the impact of the developed enhanced scientific research environment. The developed environment will have a broad impact on scientific discovery by being a common reliable infrastructure for scientists to host collaboration environments in support of their works. It is envisioned that this infrastructure could be more broadly utilized to accommodate further "Big Data" science in social sciences, biomedical research and public health. This project provides opportunities for enriching the undergraduate and graduate curricula and for exposing students to cutting-edge research in different science domains. Moreover, all of the designs, documentation, and developed tools are made available for other institutions.

View more

EAGER: Bluetooth Open-Source Stack (BOSS) - A Flexible and Extensible Bluetooth Research Platform

National Science Foundation

2014-12-01

Bluetooth technology continues to evolve and expand, taking advantage of the desirable attributes and features it possesses in comparison to other wireless technologies. With the latest update to the Bluetooth specification (version 4.1), Bluetooth devices are expected to become major players in the much-hyped Internet of Things market. A large body of the research community, utilizing this technology, will require modifications to the lower layers of the Bluetooth protocol. Given the lack of an open-source implementation of Bluetooth stack, the community efforts will be limited in validating and verifying their research under realistic scenarios. This ambitious project aims to design, develop, and disseminate a flexible and extensible open-source Bluetooth platform (BOSS) that will enable new research opportunities for the wireless and mobile computing community. The platform will enable development and evaluation of schemes, services, and applications across all layers of the Bluetooth stack, through the creation of a community-maintained, open-access repository. These goals will be accomplished by: 1) developing a complete Bluetooth open-source platform, by implementing lower layers of the protocol stack as firmware on an existing open-source Bluetooth hardware platform, and extending existing open source upper layers of the stack; and 2) creating and maintaining an open-access repository, where the community will play a key role in generating novel open-source modules.

This project will empower the network community with a tool-set facilitating the development and evaluation of new Bluetooth protocols, applications and services. These new protocols and services could be used to contribute to future Bluetooth standards. BOSS project will have an impact on multiple areas in wireless networks and mobile computing research, such as protocol design, security, wireless network coexistence, and multi-interface smart devices, among others. The project will expose students to cutting-edge research in wireless networks, mobile computing, and computer architecture. In addition, the project?s outcome will be utilized in lectures targeting high school students to educate them about Bluetooth technology and its application as an example of wireless technology as well as Internet of Things. Results from this work will be disseminated through presentations at conferences, journal publications, and reports. An open-access repository, which includes all the designed an

View more

Bridging the Disciplinary Gaps in Cybersecurity Curricula through General Education, High Impact Practices, and Training for Incoming Freshmen

US National Science Foundation

2017-08-01

Experts agree that cybersecurity is a multifaceted problem that should be addressed through an interdisciplinary framework; however, most of cybersecurity curricula are offered within specific disciplines. Developing interdisciplinary programs can be challenging with issues such as: student isolation, a disconnect between faculty from the disciplinary programs, a lack of coordination in course delivery, gaps in providing student support, and a lack of a basic interdisciplinary foundation among faculty and students alike. To address these challenges, the "Bridging the Disciplinary Gaps in Cybersecurity Curricula through General Education, High Impact Practices, and Training for Incoming Freshman" project will fully integrate student-focused high impact practices into an interdisciplinary cybersecurity major and minor at Old Dominion University. In addition, an interdisciplinary cybersecurity training module for incoming freshmen will be developed and delivered, and another interdisciplinary general education cybersecurity course will be made available through open education resources (OER). Developing an interdisciplinary general education cybersecurity course will provide students the foundation they need to learn about the topic through a multi-faceted lens.

Integrating high impact practices into interdisciplinary curricula is a novel approach that will bolster the quality of cybersecurity academic programs. These will include learning communities, service learning, internships, undergraduate research projects, and e-Portfolios. The learning communities will include freshmen learning communities, sophomore learning communities, and living learning communities. Each learning community will have a peer mentor assigned. A process will be developed so cybersecurity majors can develop an electronic portfolio in their first-year general studies cybersecurity course, providing a framework for usage over the course of their studies. The development of an open education resource (OER) general studies cybersecurity course will provide a framework that other higher education institutions can use to develop similar courses. Integrating high impact practices into the curricula will provide a framework that can be replicated in other institutions. Graduates of these curricula will be able to fill those occupational cybersecurity positions that require an interdisciplinary background in multiple fields, as well as strong communications and critical thinking skills. In

View more

Show All +

Courses

CMSC-691-002 - DP TOP: AI for Networking & Edge Systems - Fall 2024

This course aims to provide an in-depth exploration of the latest research and developments in the rapidly-evolving fields of networking and edge systems, focusing particularly on the transformative impact of AI and machine learning technologies. Equipped with both theoretical and practical components, this course is aiming to provide you with an extensive understanding of the state-of-the-art AI/ML methodologies applied to networking and edge systems. Throughout interactive and engaging lectures, we will delve into cutting-edge topics such as ML/AI fundamentals for networking, edge computing, network performance optimization, ML for IoT, security, and privacy issues in AI-enabled networking.

View more

CMSC 440: Data Communication and Networking - Spring 2025

This course explores computer networking, focusing on the applications and protocols that run on the Internet. We will take a top-down approach to the layered network architecture, studying applications first and then proceeding down the network “stack” towards the physical link. We will look at the operation of applications such as the web, FTP, e-mail, and DNS. At the transport layer, we will study both connectionless UDP and connection-oriented TCP. Since TCP is the protocol that the majority of Internet traffic uses, we will study its operation in-depth, including flow control and congestion control. We will also look at how data is routed through the Internet, regardless of transport protocol. We will also introduce current “hot” topics, such as network security and wireless/mobile network.

View more