PROFILE DETAILS
mokammel@cuet.ac.bd
Md. Mokammel Haque received the B.Sc.Eng. degree in computer science & engineering from the Chittagong University of Engineering & Technology (CUET), Bangladesh, the M.Sc. degree in computer engineering from Kyung Hee University, South Korea, and the Ph.D. degree in computing from Macquarie University, Australia. He is currently working as a full-time Professor with the Department of Computer Science & Engineering, CUET. His research interests include cybersecurity, computer networks, cryptography, machine learning, and algorithms.
Postgraduate thesis/research work supervised by Dr. Md. Mokammel Haque
1. Thesis Title: " Elliptic Curve and Pseudoinverse Matrix Based Cryptosystem for Wireless Sensor Networks".
Degree Conferred Date: September 2019
Awardee's Name: Shomen Deb
Program: MSc Engg.
2. Thesis Title: "Malicious Attack Detection and Blocking using Semi-Supervised Machine Learning Technique in Optical Burst Switching Network".
Degree Conferred Date: September 2020
Awardee's Name: Md. Kamrul Hossain
Program: MSc Engg.
3. Thesis Title: " Classification of Driving Maneuvers Using Domain Knowledge of Time-Series Data with LSTM Network".
Degree Conferred Date: February 2022
Awardee's Name: Supriya Sarker
Program: MSc Engg.
4. Thesis Title: " Key Shifting and Artificial Neural Network Based Key Reconciliation Analysis in Quantum Cryptography".
Degree Conferred Date: September 2022
Awardee's Name: Chitra Biswas
Program: MSc Engg.
Light-weight Cryptography, AI-driven Cybersecurity, Lattice-based Cryptanalysis, Algorithm Design, Computer Networks, Machine Learning
PhD in Computer Science (Macquarie University, Australia)
MSc in Computer Engineering (Kyung Hee University, South Korea)
BSc in Computer Science & Engineering (CUET, Bangladesh)
Serial No | Title | Authors | Informations | Year |
---|---|---|---|---|
1 | A Modified Key Sifting Scheme With Artificial Neural Network Based Key Reconciliation Analysis in Quantum Cryptography | Chitra Biswas, Md. Mokammel Haque and Udayan Das Gupta | IEEE Access, vol. 10, 72743-72757 (Q1, ISI Indexed), IEEE | 2022 |
2 | Driving maneuver classification from time series data: a rule based machine learning approach | Md. Mokammel Haque, Supriya Sarker and M. Ali Akber Dewan | Applied Intelligence (SCI indexed), Springer, DOI:https://doi.org/10.1007/s10489-022-03328-3 | 2022 |
3 | Utilizing Off-Chain Storage Protocol for Solving the Trillemma Issue of Blockchain | Saha Reno and Md. Mokammel Haque | 3rd International Conference on Emerging Technologies In Data Mining And Information Security, IEMIS 2022, Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1348), pp. 169-179 | 2022 |
4 | TOS: A Relative Metric Approach for Model Selection in Machine Learning Solutions | Ricko Shaha, Dipon Talukder, Md. Asif Iqbal and Md. Mokammel Haque | IEEE International Conference on Robotics, Automation, Artificial-Intelligence and Internet-of-Things (RAAICON 2021), IEEE | 2021 |
5 | A Machine Learning Approach to Clinically Diagnose Human Pyrexia Cases | Dipon Talukder and Md Mokammmel Haque | Proceedings of the International Conference on Big Data, IoT, and Machine Learning. | 2021 |
6 | Development of an Efficient ETL Technique for Data Warehouses | Md Badiuzzaman Biplob and Md. Mokammel Haque | Proceedings of the International Conference on Big Data, IoT, and Machine Learning, 243-255. Part of the Lecture Notes on Data Engineering and Communications Technologies book series, vol 95. Springer, Singapore. | 2021 |
7 | OkkhorNama: BdSL Image Dataset For Real Time Object Detection Algorithms | Dipon Talukder, Fatima Jahara, Suvadra Barua and Md. Mokammel Haque | IEEE Region 10 Symposium (TENSYMP), pp. 1-6, IEEE, doi: 10.1109/TENSYMP52854.2021.9550907 | 2021 |
8 | A Comparative Analysis of Semi-Supervised Learning in Detecting Burst Header Packet Flooding Attack in Optical Burst Switching Network | Md. Kamrul Hossain , Md. Mokammel Haque and M. Ali Akber Dewan | Computers, 10(8),95 (ESCI, Scopus Indexed), MDPI | 2021 |
9 | Driving Maneuver Classification Using Domain Specific Knowledge and Transfer Learning | Supriya Sarker , Md. Mokammel Haque and M. Ali Akber Dewan | IEEE Access, vol. 09, 86590 - 86606 (SCIE, Scopus Indexed), IEEE | 2021 |
10 | Database Security as a Gateway to Privacy Preserving Data Mining | Chinmoy Bhowmik, Mahibul Abdullah Ibne Momin, Fariha Jahan Shanta and Md. Mokammel Haque | 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), 125-130, IEEE | 2021 |
11 | An Approach Towards Domain Knowledge-Based Classification of Driving Maneuvers with LSTM Network | Supriya Sarker and Md. Mokammel Haque | Proceedings of International Joint Conference on Advances in Computational Intelligence, 469-484, Part of the Algorithms for Intelligent Systems book series (AIS), Springer | 2021 |
12 | Semi-supervised learning approach using modified self-training algorithm to counter burst header packet flooding attack in optical burst switching network | Md. Kamrul Hossain and Md. Mokammel Haque | International Journal of Electrical and Computer Engineering (IJECE), 10(4), 4340-4351 (Scopus Indexed), IAES | 2020 |
13 | A Data Change Rule Based Empirical Framework for Labeling Unlabeled Time Series Driving Data | Supriya Sarker and Md. Mokammel Haque | 2nd International Conference on Advanced Information and Communication Technology (ICAICT), 476-479, IEEE | 2020 |
14 | A Semi-supervised Approach to Detect Malicious Nodes in OBS Network Dataset Using Gaussian Mixture Model | Md. Kamrul Hossain and Md. Mokammel Haque | Inventive Communication and Computational Technologies, 707-719, Part of the Lecture Notes in Networks and Systems book series (LNNS, vol.89), Springer | 2020 |
15 | Analyzing Progressive-BKZ Lattice Reduction Algorithm | Md. Mokammel Haque and Mohammad Obaidur Rahman | International Journal of Computer Network and Information Security (IJCNIS), 11(1), 40-46, (Scopus Indexed), MECS Press | 2019 |
16 | A semi-supervised machine learning approach using K-means algorithm to prevent burst header packet flooding attack in optical burst switching network | Md. Kamrul Hossain and Md. Mokammel Haque | Baghdad Science Journal,16(3), 804–815 (Scopus Indexed), University of Baghdad | 2019 |
17 | Elliptic curve and pseudo-inverse matrix based cryptosystem for wireless sensor networks | Shomen Deb and Md. Mokammel Haque | International Journal of Electrical and Computer Engineering (IJECE), 9(5) 4479-4492 (Scopus Indexed), IAES | 2019 |
18 | An improved fitness function for automated cryptanalysis using genetic algorithm | Md. Shafiul Alam Forhad, Md. Sabir Hossain, Mohammad Obaidur Rahman, Md. Mostafizur Rahaman, Md. Mokammel Haque and Md. Kamrul Hossain | Indonesian Journal of Electrical Engineering and Computer Science,13(2), 643–648 (Scopus Indexed), IAES | 2019 |
19 | Solving Multiple Depot Vehicle Routing Problem (MDVRP) using Genetic Algorithm | Nafiz Mahmud and Md. Mokammel Haque | 2nd International Conference on Electrical, Computer and Communication Engineering (ECCE), 8679429, IEEE | 2019 |
20 | An Efficient Algorithm for Confidentiality, Integrity and Authentication Using Hybrid Cryptography and Steganography | Chitra Biswas, Udayan Das Gupta and Md. Mokammel Haque | 2nd International Conference on Electrical, Computer and Communication Engineering (ECCE), 8679136, IEEE | 2019 |
21 | Preprocessing optimisation: Revisiting recursive-BKZ lattice reduction algorithm | Md. Mokammel Haque and Josef Pieprzyk | IET Information Security, 12(6), 551-557 (SCIE, Scopus Indexed), IET | 2018 |
22 | Sensor Applications and Physiological Features in Drivers Drowsiness Detection: A Review | Anuva Chowdhury, Rajan Shankaran, Manolya Kavakli and Md. Mokammel Haque | IEEE Sensors Journal, 18(8), 3055 - 3067 (SCI, Scopus Indexed), IEEE | 2018 |
23 | Authentication of Diffie-Hellman Protocol Against Man-in-the-Middle Attack Using Cryptographically Secure CRC | Nazmun Naher, Asaduzzaman and Md. Mokammel Haque | Proceedings of International Ethical Hacking Conference, 139-150, Part of the Advances in Intelligent Systems and Computing book series (AISC, vol.811), Springer | 2018 |
24 | An Improved Asymmetric Key Based Security Architecture for WSN | Md. Abdul Quaum, Shajir Uddin Haider and Md. Mokammel Haque | International Conference on Computer, Communication, Chemical, Material and Electronic Engineering (IC4ME2), 8465602, IEEE | 2018 |
25 | Analysing recursive preprocessing of BKZ lattice reduction algorithm | Md. Mokammel Haque and Josef Pieprzyk | IET Information Security, 11(2), 114-120, (SCIE, Scopus Indexed), IET | 2017 |
26 | Reducing network overhead of IoTDTLS protocol employing ChaCha20 and Poly1305 | Maliha Momtaz Islam, Sourav Paul and Md. Mokammel Haque | 20th International Conference of Computer and Information Technology (ICCIT), 8281857, IEEE | 2017 |
27 | An improved steganographic technique based on diamond encoding method | Md. Mokammel Haque, Jobayer Sheikh and Md. Jihan Al Rashid | International Conference on Electrical, Computer and Communication Engineering (ECCE), 583-588, IEEE | 2017 |
28 | A Hierarchical Key Derivative Symmetric Key Algorithm using Digital Logic | Chitra Biswas, Udayan Das Gupta and Md. Mokammel Haque | International Conference on Electrical, Computer and Communication Engineering (ECCE), 604-609, IEEE | 2017 |
29 | An efficient security architecture for Wireless Sensor Networks using pseudo-inverse matrix | Anuva Chowdhury, Farzana Alam Tanzila, Shanta Chowdhury and Md. Mokammel Haque | 18th International Conference on Computer and Information Technology (ICCIT), 7488103, IEEE | 2015 |
30 | A secret key-based security architecture for wireless sensor networks | Anuva Chowdhury, Farzana Alam Tanzila, Shanta Chowdhury and Md. Mokammel Haque | International Conference on Computer and Information Engineering (ICCIE), 7399322, IEEE | 2015 |
31 | Evaluating the performance of the practical lattice reduction algorithms | Md Mokammel Haque and Josef Pieprzyk | 8th International Conference on Electrical and Computer Engineering (ICECE), 7026884, IEEE | 2014 |
32 | Predicting tours and probabilistic simulation for BKZ lattice reduction algorithm | Md Mokammel Haque, Josef Pieprzyk and Asaduzzaman | 9th International Forum on Strategic Technology (IFOST), 6991058, IEEE | 2014 |
33 | An asymmetric key-based security architecture for wireless sensor networks | Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong Seon Hong and Eui-Nam Huh | KSII Transactions on Internet and Information Systems, 2(5), 265-279 (SCIE, Scopus Indexed), KSII | 2008 |
34 | Securing U-healthcare sensor networks using public key based scheme | Md. Mokammel Haque, Al-Sakib Khan Pathan and Choong Seon Hong | 10th International Conference on Advanced Communication Technology (ICACT), IEEE | 2008 |
35 | An efficient PKC-based security architecture for wireless sensor networks | Md. Mokammel Haque, Al-Sakib Khan Pathan, Byung Goo Choi and Choong Seon Hong | MILCOM - IEEE Military Communications Conference, 4455317, IEEE | 2007 |
36 | Security management in wireless sensor networks with a public key based scheme | Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel Haque and Choong Seon Hong | Asia-Pacific Network Operations and Management Symposium (APNOMS ), 503-506, Part of the Lecture Notes in Computer Science book series (LNCS, vol. 4773), Springer | 2007 |