Publications Archive

A complete collection of my research and professional work in cybersecurity and AI-driven defense.

Publications

A complete archive of my scholarly work.

AI, ML, and LLM Integration in 5G/6G Networks: A Comprehensive Survey of Architectures, Challenges, and Future Directions

Y. Usman, H. Oladipupo, A. D. During, A. Robert, R. Chataut

In IEEE Access, pp. 169–353, 2025

Green Cybersecurity: Leveraging AI, ML, and LLMs to Optimize Energy, Threat Detection, and Sustainability Frameworks

Y. Usman, C. J. Ihejirika, S. N. Offor, R. Akl, R. Chataut

In IEEE Access, vol. 13, pp. 159345–159379, 2025

IEEE AIIoT 2025

Deep Reinforcement Learning for Adaptive Beamforming in 6G Massive MIMO Systems Using DeepMIMO

Y. Usman, C. Muriuki-Mureithi, D. Vitashkevich, R. Akl, R. Chataut

In Proceedings of The 2025 IEEE World AI IoT Congress (AIIoT). Best Presentation Award.

IEEE AIIoT 2025

PhishProof: AI-Driven Phishing Detection with Optimized Feature Selection for Scalable Security

Y. Usman, B. Girardi, R. Akl, P. K. Gyawali, R. Chataut

In Proceedings of The 2025 IEEE World AI IoT Congress (AIIoT). Best Presentation Award.

IEEE AIIoT 2025

AI-Enhanced Deep Neural Network Architecture for Accurate Channel Estimation in 6G Networks

Y. Usman, D. Vitashkevich, C. Muriuki-Mureithi, R. Akl, R. Chataut

In Proceedings ofThe 2025 IEEE World AI IoT Congress (AIIoT)

IEEE CSNet 2024

Spam No More: A Cross-Model Analysis of Machine Learning Techniques and Large Language Model Efficacies

R. Chataut, A. Upadhyay, Y. Usman, P. K. Gyawali

In Proceedings of The 2024 8th Cyber Security in Networking Conference (IEEE CSNet 2024)

IEEE Access 2024

Security and Privacy in E-Health Systems: A Review of AI and Machine Learning Techniques

M. Nankya, A. Mugisa, Y. Usman, A. Upadhyay, R. Chataut

In IEEE Access, Aug 2024

IEEE UEMCON 2024

The Dark Side of AI: Large Language Models as Tools for Cyber Attacks on Vehicle Systems

Y. Usman, S. Gyawali, P. K. Gyawali, R. Chataut

In Proceedings of The 15th Annual Ubiquitous Computing, Electronics & Mobile Communications Conference (IEEE UEMCON 2024). Best Presentation Award.

IEEE UEMCON 2024

Enhancing Phishing Detection with AI: A Novel Dataset and Comprehensive Analysis using Machine Learning and Large Language Models

R. Chataut, Y. Usman, A. R. C. Mohammad, S. Gyawali, P. K. Gyawali

In Proceedings of The 15th Annual Ubiquitous Computing, Electronics & Mobile Communications Conference (IEEE UEMCON 2024). Best Presentation Award.

ASEE NE Conference 2024

Unveiling Cyber Threats: A Comprehensive Analysis of Connecticut Data Breaches

R. Chataut, F. Scholl, Y. Usman

In Proceedings of the ASEE NE Conference, 2024

Can AI Keep You Safe? A Study of Large Language Models for Phishing Detection

R. Chataut, P. K. Gyawali, Y. Usman

In Proceedings of the 12th Annual Computing and Communication Workshop Conference (IEEE CCWC 2024), Jan 2024

Is generative ai the next tactical cyber weapon for threat actors? unforeseen implications of ai generated cyber attacks 2024

Y. Usman, Aadesh Upadhyay, Prashnna Gyawali, Robin Chataut