Follow
Md. Mokammel Haque
Md. Mokammel Haque
Professor of Computer Science & Engineering, Chittagong University of Engineering & Technology
Verified email at cuet.ac.bd
Title
Cited by
Cited by
Year
Sensor applications and physiological features in drivers’ drowsiness detection: A review
A Chowdhury, R Shankaran, M Kavakli, MM Haque
IEEE sensors Journal 18 (8), 3055-3067, 2018
1652018
An efficient algorithm for confidentiality, integrity and authentication using hybrid cryptography and steganography
C Biswas, UD Gupta, MM Haque
2019 International Conference on Electrical, Computer and Communication …, 2019
572019
Securing U-healthcare sensor networks using public key based scheme
MM Haque, ASK Pathan, CS Hong
2008 10th International Conference on Advanced Communication Technology 2 …, 2008
502008
An asymmetric key-based security architecture for wireless sensor networks
MM Haque, ASK Pathan, CS Hong, EN Huh
KSII Transactions on Internet and Information Systems (TIIS) 2 (5), 265-277, 2008
312008
Solving Multiple Depot Vehicle Routing Problem (MDVRP) using Genetic Algorithm
N Mahmud, MM Haque
2019 International Conference on Electrical, Computer and Communication …, 2019
142019
An efficient PKC-based security architecture for wireless sensor networks
MM Haque, ASK Pathan, BG Choi, CS Hong
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
132007
An improved fitness function for automated cryptanalysis using genetic algorithm
MSA Forhad, MS Hossain, MO Rahman, MM Rahaman, MM Haque, ...
Indonesian Journal of Electrical Engineering and Computer Science 13 (2 …, 2019
112019
Analysing progressive-BKZ lattice reduction algorithm
MM Haque, MO Rahman, J Pieprzyk
Department of Computer Science and Engineering, CUET, 2013
102013
Driving Maneuver Classification Using Domain Specific Knowledge and Transfer Learning
S Sarker, MM Haque, MAA Dewan
IEEE Access 9, 86590-86606, 2021
82021
A semi-supervised machine learning approach using K-means algorithm to prevent burst header packet flooding attack in optical burst switching network
MK Hossain, MM Haque
Baghdad Science Journal 16 (3 (Suppl.)), 0804-0804, 2019
82019
Authentication of Diffie-Hellman protocol against man-in-the-middle attack using cryptographically secure CRC
N Naher, Asaduzzaman, MM Haque
Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018 …, 2018
82018
A Modified Key Sifting Scheme With Artificial Neural Network Based Key Reconciliation Analysis in Quantum Cryptography
C Biswas, MM Haque, UD Gupta
IEEE Access 10, 72743-72757, 2022
72022
Solving blockchain trilemma using off‐chain storage protocol
S Reno, MM Haque
IET Information Security 17 (4), 681-702, 2023
62023
An approach towards domain knowledge-based classification of driving maneuvers with LSTM network
S Sarker, MM Haque
Proceedings of International Joint Conference on Advances in Computational …, 2021
62021
A hierarchical key derivative symmetric key algorithm using digital logic
C Biswas, UD Gupta, MM Haque
2017 International Conference on Electrical, Computer and Communication …, 2017
62017
An efficient security architecture for Wireless Sensor Networks using pseudo-inverse matrix
A Chowdhury, FA Tanzila, S Chowdhury, MM Haque
2015 18th International Conference on Computer and Information Technology …, 2015
62015
Driving maneuver classification from time series data: a rule based machine learning approach
MM Haque, S Sarker, MAA Dewan
Applied Intelligence 52 (14), 16900-16915, 2022
52022
Utilizing Off-Chain Storage Protocol for Solving the Trilemma Issue of Blockchain
S Reno, MM Haque
Emerging Technologies in Data Mining and Information Security: Proceedings …, 2022
52022
OkkhorNama: BdSL Image Dataset For Real Time Object Detection Algorithms
D Talukder, F Jahara, S Barua, MM Haque
2021 IEEE Region 10 Symposium (TENSYMP), 1-6, 2021
52021
Database Security as a Gateway to Privacy Preserving Data Mining
C Bhowmik, MAI Momin, FJ Shanta, MM Haque
2021 2nd International Conference on Robotics, Electrical and Signal …, 2021
42021
The system can't perform the operation now. Try again later.
Articles 1–20