Want to hire this expert for a project? Request a quote for free.
Profile Details
Create Project
USD 55 /hr
Hire Yusuf U.
United States
USD 55 /hr
AI-Driven Cybersecurity Researcher | Adversarial ML · LLM Security · Penetration Testing | IEEE Author · 220+ Citations
Profile Summary
Subject Matter Expertise
Services
Writing
Clinical Trial Documentation,
Non-Medical Regulatory Writing,
Technical Writing,
Copywriting,
Creative Writing,
General Proofreading & Editing
Research
User Research,
Meta-Research,
Feasibility Study,
Technology Scouting,
Fact Checking,
Gap Analysis,
Scientific and Technical Research,
Systematic Literature Review,
Secondary Data Collection
Consulting
Scientific and Technical Consulting
Data & AI
Predictive Modeling,
Statistical Analysis,
Image Processing,
Image Analysis,
Algorithm Design-Non ML,
Algorithm Design-ML,
Data Visualization,
Big Data Analytics,
Text Mining & Analytics,
Data Mining,
Data Cleaning,
Data Processing,
Data Insights
Product Development
Reverse Engineering
Work Experience
Cybersecurity R&D Engineer (AI Focus)
iSenseHUB
June 2025 - Present
Cybersecurity and AI Solutions
Cyproteck
May 2025 - Present
Research Assistant
Quinnipiac University
August 2023 - Present ![]()
Cybersecurity Research Assistant
Quinnipiac University
August 2023 - May 2025
CYBERSECURITY ANALYST
National Assembly
September 2020 - August 2023
Education
Master in Cybersecurity
Quinnipiac University
August 2023 - May 2025
BS in Computer Science
ESGT University
August 2017 - September 2020
Certifications
-
Ethical Hacking & Penetration Testing
Quinnipiac University
https://www.credly.com/badges/87e01430-0273-43c3-a94e-9ef56e4e222d/public_urlDecember 2024 - Present
-
Applied Healthcare Cyber Risk Management
Quinnipiac University
https://www.credly.com/badges/afa8cdc5-8064-47a7-9dd9-04f6fc3a95ac/public_urlDecember 2024 - Present
-
AWS Certified Security Specialty
AWS
https://www.credly.com/badges/a31e030e-d704-4fc1-940f-000312914d09/public_urlSeptember 2024 - Present
-
CompTIA SecurityX
CompTIA
https://www.credly.com/earner/earned/badge/d04cf1cb-0cdc-44d6-bc16-68e7d8ffd946June 2024 - Present
-
CompTIA PenTest
CompTIA
https://www.credly.com/earner/earned/badge/69ecd11f-7ab0-4f36-9d39-8bc6ca9b9679June 2024 - Present
Publications
JOURNAL ARTICLE
Usman, Y., Oladipupo, H., During, A.D., Akl, R., Chataut, R.(2025). AI, ML, and LLM Integration in 5G/6G Networks: A Comprehensive Survey of Architectures, Challenges, and Future Directions . IEEE Access. 13. Microsoft.AspNetCore.Mvc.Localization.LocalizedHtmlString 168914-168950.
Yusuf Usman, Habeeb Oladipupo, Adegboyega D. During, Akl Robert, Robin Chataut (2025). AI, ML, and LLM Integration in 5G/6G Networks: A Comprehensive Survey of Architectures, Challenges, and Future Directions . IEEE Access.
Yusuf Usman, Chidimma Judith Ihejirika, Stephen Nonye Offor, Robert Akl, Robin Chataut (2025). Green Cybersecurity: Leveraging AI, ML, and LLMs to Optimize Energy, Threat Detection, and Sustainability Frameworks . IEEE Access.
Usman, Y., Ihejirika, C.J., Offor, S.N., Akl, R., Chataut, R.(2025). Green Cybersecurity: Leveraging AI, ML, and LLMs to Optimize Energy, Threat Detection, and Sustainability Frameworks . IEEE Access. 13. Microsoft.AspNetCore.Mvc.Localization.LocalizedHtmlString 159345-159379.
Yusuf Usman, Mary Nankya, Allan Mugisa, Aadesh Upadhyay, Robin Chataut (2024). Security and Privacy in E-Health Systems: A Review of AI and Machine Learning Techniques . IEEE Access.
Nankya, M., Mugisa, A., Usman, Y., Upadhyay, A., Chataut, R.(2024). Security and Privacy in E-Health Systems: A Review of AI and Machine Learning Techniques . IEEE Access.
CONFERENCE PAPER
Usman, Y., Vitashkevich, D., Muriuki-Mureithi, C.A., Akl, R., Chataut, R.(2025). AI-Enhanced Deep Neural Network Architecture for Accurate Channel Estimation in 6G Networks . 2025 IEEE 6th Annual World AI Iot Congress Aiiot 2025. Microsoft.AspNetCore.Mvc.Localization.LocalizedHtmlString 732-736.
Usman, Y., Muriuki-Mureithi, C.A., Vitashkevich, D., Akl, R., Chataut, R.(2025). Deep Reinforcement Learning for Adaptive Beamforming in 6G Massive MIMO Systems Using DeepMIMO . 2025 IEEE 6th Annual World AI Iot Congress Aiiot 2025. Microsoft.AspNetCore.Mvc.Localization.LocalizedHtmlString 699-706.
Usman, Y., Girardi, B., Akl, R., Gyawali, P.K., Chataut, R.(2025). PhishProof: AI-Driven Phishing Detection with Optimized Feature Selection for Scalable Security . 2025 IEEE 6th Annual World AI Iot Congress Aiiot 2025. Microsoft.AspNetCore.Mvc.Localization.LocalizedHtmlString 839-845.
Yusuf Usman, Robin Chataut, Chowdhury Mohammad Abid Rahman, Sohan Gyawali, Prashnna K Gyawali(2024). Enhancing Phishing Detection with AI: A Novel Dataset and Comprehensive Analysis Using Machine Learning and Large Language Models . 2024 IEEE 15th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). Microsoft.AspNetCore.Mvc.Localization.LocalizedHtmlString 0226-0232.
Yusuf Usman, Prashnna K Gyawali, Sohan Gyawali, Robin Chataut(2024). The Dark Side of AI: Large Language Models as Tools for Cyber Attacks on Vehicle Systems . 2024 IEEE 15th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). Microsoft.AspNetCore.Mvc.Localization.LocalizedHtmlString 169-175.
Yusuf Usman, Robin Chataut, Prashnna Kumar Gyawali(2024). Can AI Keep You Safe? A Study of Large Language Models for Phishing Detection . 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC). Microsoft.AspNetCore.Mvc.Localization.LocalizedHtmlString 0548-0554.
Chataut, R., Usman, Y., Rahman, C.M.A., Gyawali, S., Gyawali, P.K.(2024). Enhancing Phishing Detection with AI: A Novel Dataset and Comprehensive Analysis Using Machine Learning and Large Language Models . 2024 IEEE 15th Annual Ubiquitous Computing Electronics and Mobile Communication Conference Uemcon 2024. Microsoft.AspNetCore.Mvc.Localization.LocalizedHtmlString 226-232.
Chataut, R., Upadhyay, A., Usman, Y., Nankya, M., Gyawali, P.K.(2024). Spam No More: A Cross-Model Analysis of Machine Learning Techniques and Large Language Model Efficacies . Proceedings of the 8th Cyber Security in Networking Conference AI for Cybersecurity Csnet 2024. Microsoft.AspNetCore.Mvc.Localization.LocalizedHtmlString 116-122.
Usman, Y., Gyawali, P.K., Gyawali, S., Chataut, R.(2024). The Dark Side of AI: Large Language Models as Tools for Cyber Attacks on Vehicle Systems . 2024 IEEE 15th Annual Ubiquitous Computing Electronics and Mobile Communication Conference Uemcon 2024. Microsoft.AspNetCore.Mvc.Localization.LocalizedHtmlString 169-175.
Chataut, R., Gyawali, P.K., Usman, Y.(2024). Can AI Keep You Safe? A Study of Large Language Models for Phishing Detection . 2024 IEEE 14th Annual Computing and Communication Workshop and Conference Ccwc 2024. Microsoft.AspNetCore.Mvc.Localization.LocalizedHtmlString 548-554.
OTHER
Usman, Y., Upadhyay, A., Gyawali, P.K., Chataut, R.(2024). Is Generative AI the Next Tactical Cyber Weapon For Threat Actors? Unforeseen Implications of AI Generated Cyber Attacks . Arxiv.
YUSUF USMAN, Aadesh Upadhyay, Prashnna Gyawali, Robin Chataut(2024). Is Generative AI the Next Tactical Cyber Weapon For Threat Actors? Unforeseen Implications of AI Generated Cyber Attacks .