Research Publications
Reverse Engineering#
Possible Implementation Flaws in Mobile Applications: A Security Audit of a Bank’s Mobile Application. https://tinyurl.com/yc3fxh3k
Unauthorised User Account Access on iRokotv platform. http://dx.doi.org/10.13140/RG.2.2.25486.79681/2
Reverse Engineering GhanaPostGPS Mobile Application to Create an Application Programming Interface for Local Developers. http://dx.doi.org/10.13140/RG.2.2.24355.27684/2
A Security Analysis of WhatsApp iOS Mobile Application. http://dx.doi.org/10.13140/RG.2.2.30510.33605
Academic Research#
Justice Owusu Agyemang, Jerry John Kponyo, Elliot Amponsah, Godfred Manu Addo Boakye, Kwame Opuni-Boachie Obour Agyekum, “Local-Splitter: A Measurement Study of Seven Tactics for Reducing Cloud LLM Token Usage on Coding-Agent Workloads”, arXiv preprint arXiv:2604.12301, 2026. https://arxiv.org/abs/2604.12301
Justice Owusu Agyemang, Jerry John Kponyo, Elliot Amponsah, Godfred Manu Addo Boakye, Kwame Opuni-Boachie Obour Agyekum, “Resilient Write: A Six-Layer Durable Write Surface for LLM Coding Agents”, arXiv preprint arXiv:2604.10842, 2026. https://arxiv.org/abs/2604.10842
Rose-Mary Owusuaa Mensah Gyening, Juliet Arthur, Prince Dawson Tetteh, Felix Adu Mensah Amofah, Kelvin Ackah, Enoch Acheampong, Betty Agyei Kponyo, Justice Owusu Agyemang, Emmanuel Ahene, Vida Kasore, Jerry John Kponyo, GESMA: A Dataset of Ghanaian Environmental Soundscapes for Machine Learning Applications, Data in Brief, 2026, 112732, ISSN 2352-3409, https://doi.org/10.1016/j.dib.2026.112732. (https://www.sciencedirect.com/science/article/pii/S2352340926002854)
Enoch Acheampong; Vida Kasore; Betty Agyei Kponyo; Ros Yaw Owusu-Ansah; Jeffrey Kwame; Owusu Ansah; Elizabeth Owusu Ansah; Justice Owusu Agyemang; Rose-Mary Owusuaa; Mensah Gyening et al. Sci Rep (2025). https://doi.org/10.1038/s41598-025-31466-4
Asakipaam, Simon A., Jerry J. Kponyo, Kwame O. Gyasi, Justice O. Agyemang, Kingsford S. O. Kwakye, and Kwame O. O. Agyekum. 2025. “ Adaptive Resource Management Framework for Profit Optimisation in 5G Network Slicing,” IET Networks: e70018. https://doi.org/10.1049/ntw2.70018.
Agyemang, J.O., Atakpla, D.D., Selorm, A.G., Boadu, T., Kodua-Basoa, M., Darko, C.B. (2025). Improving Face Recognition from a Single Image. In: N. Ngatched, T.M., Woungang, I., Tapamo, JR., Viriri, S. (eds) Pan-African Artificial Intelligence and Smart Systems. PAAISS 2024. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 631. Springer, Cham. https://doi.org/10.1007/978-3-031-94442-0_10
Agyemang, J.O., Aboagye, M.G., Selorm, A.G., Obed, S., Clinton, A., Elikplim, H.C. (2025). Campus WiFi Demand Prediction: A Case Study on KNUST Campus. In: N. Ngatched, T.M., Woungang, I., Tapamo, JR., Viriri, S. (eds) Pan-African Artificial Intelligence and Smart Systems. PAAISS 2024. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 632. Springer, Cham. https://doi.org/10.1007/978-3-031-94439-0_16
Owusu, E. T., Agyekum, K. A. P., Benneh, M., Ayorna, P., Agyemang, J. O., Colley, G. N. M., & Gazde, J. D. (2025). A transformer-based deep q learning approach for dynamic load balancing in software-defined networks. arXiv preprint arXiv:2501.12829.
Agyemang, J.O., Ampomah, S.J., Selorm, A.G., Vinkpedomeh, R.S., Berko, P. (2025). IoT Device Fingerprinting for Anomaly Detection. In: Woungang, I., Dhurandher, S.K. (eds) The 7th International Conference on Wireless, Intelligent and Distributed Environment for Communication. WIDECOM 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 237. Springer, Cham. https://doi.org/10.1007/978-3-031-80817-3_6
Kwarteng, K., Gyasi, K. O., Agyemang, J. O., Agyekum, K., Kwakye, K., Sani, E. M., … & Bonsu, K. A. (2025). Cat Swarm Optimization with Lévy Flight for Link Load Balancing in SDN. Journal of Telecommunications and Information Technology https://doi.org/10.26636/jtit.2025.1.1773
Robert Antwi, James Dzisi Gadze, Eric Tutu Tchao, Axel Sikora, Kwame Opuni-Boachie Obour Agyekum, Henry Nunoo-Mensah, Andrew Selasi Agbemenu, Justice Owusu Agyemang, Dominik Welte, Abdul-Rahman Ahmed & Eliel Keelson, “Optimising peer-to-peer topology for blockchain-based industrial internet of things networks using particle swarm optimisation”. Cluster Comput 28, 204 (2025). https://doi.org/10.1007/s10586-024-04917-2
Akua Achiaa, James Dzisi Gadze, Kingsford Sarkodie Obeng Kwakye, Kwame Agyeman-Prempeh Agyekum and Justice Owusu Agyemang, “Measurement and evaluation of electromagnetic radiation exposure from antennas in cellular networks in Ghana”. Published Online: September 13, 2024. pp. 267-280, https://doi.org/10.1504/IJWMC.2024.141457
Kwame Opuni-Boachie Obour Agyekum, Alex Yaw Boakye, Benedict Appati, Jochebed Akoto Opoku, Justice Owusu Agyemang, Gordon Owusu Boateng, James Dzisi Gadze, “Resource Allocation in D2D-Enabled 5G Networks Using Multiagent Reinforcement Learning”, Journal of Computer Networks and Communications, 2024, 2780845, 14 pages, 2024. https://doi.org/10.1155/2024/2780845
Dennis Agyemanh Nana Gookyi, Fortunatus Aabangbio Wulnye, Ewura Abena Essanoah Arthur, Roger Kwao Ahiadormey, Justice Owusu Agyemang, Kwame Opuni-Boachie Obour Agyekum, Raymond Gyaang, “TinyML for smart agriculture: Comparative analysis of TinyML platforms and practical deployment for maize leaf disease identification”, Smart Agricultural Technology, Volume 8, 2024, 100490, ISSN 2772-3755, https://doi.org/10.1016/j.atech.2024.100490. (https://www.sciencedirect.com/science/article/pii/S2772375524000959)
F. A. Wulnye, E. A. Essanoah Arthur, D. A. Nana Gookyi, D. Kwaku Pobi Asiedu, M. Wilson and J. O. Agyemang, “TinyML Implementation on Microcontrollers: The Case of Maize Leaf Disease Identification,” 2024 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 2024, pp. 180-185, doi: 10.1109/ICTAS59620.2024.10507115.
Awumee, G.S., Agyemang, J.O., Boakye, S.S., Bempong, D. (2024). SmishShield: A Machine Learning-Based Smishing Detection System. In: Woungang, I., Dhurandher, S.K. (eds) The 6th International Conference on Wireless, Intelligent and Distributed Environment for Communication. WIDECOM 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 185. Springer, Cham. https://doi.org/10.1007/978-3-031-47126-1_14
Ernest Kwadwo Adomako, Abdul-Rahman Ahmed, Sani Mubarak Ellis, Justice Owusu Agyemang, & Griffith Selorm Klogo. (2023). Assessing the Feasibility of RF Fingerprinting for Security in Unmanned Aerial Vehicles. International Journal of Communication Networks and Information Security (IJCNIS), 15(2), 101–113. https://doi.org/10.17762/ijcnis.v15i2.6181
Antwi, R.; Gadze, J.D.; Tchao, E.T.; Sikora, A.; Nunoo-Mensah, H.; Agbemenu, A.S.; Obour Agyekum, K.O.-B.; Agyemang, J.O.; Welte, D.; Keelson, E. A Survey on Network Optimization Techniques for Blockchain Systems. Algorithms 2022, 15, 193. https://doi.org/10.3390/a15060193.
Agyemang, J.O., Yu, D., Kponyo, J.J. (2022). Autonomic IoT: Towards Smart System Components with Cognitive IoT. In: Ngatched, T.M.N., Woungang, I. (eds) Pan-African Artificial Intelligence and Smart Systems. PAAISS 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 405. Springer, Cham. https://doi.org/10.1007/978-3-030-93314-2_16.
A Lightweight Messaging Protocol for Internet of Things Devices. https://www.mdpi.com/2227-7080/10/1/21
A Critical Survey on Overhead Control Traffic Reduction Strategies in Software-Defined Wireless Sensor Networking. https://www.ijcna.org/Manuscripts/IJCNA-2021-O-01.pdf
An Investigation into the Application of Deep Learning in the Detection and Mitigation of DDOS Attack on SDN Controllers. http://dx.doi.org/10.3390/technologies9010014
Design of A Minimal Overhead Control Traffic Topology Discovery and Data Forwarding Protocol for Software-Defined Wireless Sensor Networks. https://www.ijcnis.org/index.php/ijcnis/article/view/4803/429
Detecting End-Point (EP) Man-In-The-Middle (MITM) Attack based on ARP Analysis: A Machine Learning Approach. https://www.ijcnis.org/index.php/ijcnis/article/view/4735/416
Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices. http://dx.doi.org/10.1016/j.iot.2020.100319
Dynamic Bandwidth Utilization in Software - Defined Campus Based Networks: A Case Study of the Kwame Nkrumah University of Science and Technology. http://dx.doi.org/10.17148/IJARCCE.2020.9617
Lightweight Rogue Access Point Detection Algorithm for WiFi-Enabled Internet of Things(IoT) Devices. http://dx.doi.org/10.1016/j.iot.2020.100200
An Algorithm to Determine the Extent of an Epidemic Spread: A NetLogo Modeling Approach. http://dx.doi.org/10.11648/j.eas.20190404.11
An Intelligent Irrigation System for Rural Agriculture. http://dx.doi.org/10.11648/j.ijaas.20190503.13
An Orchestration Framework for IoT Devices Based on Public Key Infrastructure (PKI). http://dx.doi.org/10.5013/IJSSST.a.20.S1.04
A Lightweight Rogue Access Point Detection Algorithm for Embedded Internet of Things (IoT) Devices. http://dx.doi.org/10.12691/iscf-7-1-2
Lightweight Man-In-The-Middle (MITM) Detection and Defense Algorithm for WiFi-Enabled Internet of Things (IoT) Gateways. http://www.sciepub.com/ISCF/abstract/10082
The State of Wireless Routers as Gateways for Internet of Things (IoT) Devices. http://www.sciepub.com/ISCF/abstract/9936
Light Fidelity(LiFi) as an Alternative Data Transmission Medium in VANET. http://dx.doi.org/10.1109/EMS.2017.44