Md Whaiduzzaman

ORCID: 0000-0003-2822-0657
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Caching and Content Delivery
  • Blockchain Technology Applications and Security
  • Artificial Intelligence in Healthcare
  • COVID-19 diagnosis using AI
  • Vehicular Ad Hoc Networks (VANETs)
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • IoT-based Smart Home Systems
  • Privacy-Preserving Technologies in Data
  • Water Quality Monitoring Technologies
  • Imbalanced Data Classification Techniques
  • Cryptography and Data Security
  • Network Security and Intrusion Detection
  • Cloud Data Security Solutions
  • IoT Networks and Protocols
  • Energy Efficient Wireless Sensor Networks
  • Distributed and Parallel Computing Systems
  • Sentiment Analysis and Opinion Mining
  • User Authentication and Security Systems
  • Age of Information Optimization
  • Software System Performance and Reliability
  • Privacy, Security, and Data Protection
  • Advanced Authentication Protocols Security

Torrens University Australia
2023-2025

Queensland University of Technology
2020-2024

Jahangirnagar University
2016-2024

Daffodil International University
2022

Bangabandhu Sheikh Mujibur Rahman Digital University
2022

University of Malaya
2013-2016

Information Technology University
2014

10.1016/j.jnca.2013.08.004 article EN Journal of Network and Computer Applications 2013-08-29

The Internet of Medical Things (IoMT) has become an attractive playground to cybercriminals because its market worth and rapid growth. These devices have limited computational capabilities, which ensure minimum power absorption. Moreover, the manufacturers use simplified architecture offer a competitive price in market. As result, IoMTs cannot employ advanced security algorithms defend against cyber-attacks. IoMT easy prey for due access valuable data rapidly expanding market, as well being...

10.3390/electronics12173541 article EN Electronics 2023-08-22

Security has always been a significant concern since the dawn of human civilization. That is why we build houses to keep ourselves and our belongings safe. And do not hesitate spend lot on front-door locks install CCTV cameras monitor security threats. This paper presents an innovative automatic Front Door (FDS) algorithm that uses Human Activity Recognition (HAR) detect four different threats at front door from real-time video feed with 73.18% accuracy. The activities are recognized using...

10.1109/access.2023.3248509 article EN cc-by-nc-nd IEEE Access 2023-01-01

Lung diseases are the third-leading cause of mortality in world. Due to compromised lung function, respiratory difficulties, and physiological complications, disease brought on by toxic substances, pollution, infections, or smoking results millions deaths every year. Chest X-ray images pose a challenge for classification due their visual similarity, leading confusion among radiologists. To imitate those issues, we created an automated system with large data hub that contains 17 datasets...

10.3390/s24092830 article EN cc-by Sensors 2024-04-29

To slow down the spread of COVID-19, governments worldwide are trying to identify infected people, and contain virus by enforcing isolation, quarantine. However, it is difficult trace people who came into contact with an person, which causes widespread community transmission, mass infection. address this problem, we develop e-government Privacy-Preserving Mobile, Fog computing framework entitled PPMF that can infected, suspected cases nationwide. We use personal mobile devices tracing app,...

10.1109/jbhi.2020.3026060 article EN cc-by IEEE Journal of Biomedical and Health Informatics 2020-09-23

Fog computing complements cloud by removing several limitations, such as delays and network bandwidth. It emerged to support Internet of Things (IoT) applications wherein its computations tasks are carried out at the network's edge. Heterogeneous IoT devices interact with different users throughout a network. However, data security is crucial concern for IoT, fog ecosystems. Since number anonymous increases new identity disclosures occur within IoTs, it becoming challenging grow mesh...

10.1109/access.2021.3100072 article EN cc-by IEEE Access 2021-01-01

Health information technology is one of today's fastest-growing and most powerful technologies. This used predominantly for predicting illness obtaining medications quickly because visiting a doctor performing pathological tests can be time-consuming expensive. has prompted many researchers to contribute by developing new disease prediction systems or improving existing ones. paper presents smartwatch-based system named 'MedAi' multiple diseases such as ischemic heart disease, hypertension,...

10.1109/access.2023.3236002 article EN cc-by IEEE Access 2023-01-01

Cyber-physical security is vital for protecting key computing infrastructure against cyber attacks. Individuals, corporations, and society can all suffer considerable digital asset losses due to attacks, including data loss, theft, financial reputation harm, company interruption, damage, ransomware espionage. A cyber-physical attack harms both physical assets. system more challenging than software-level because it requires inspection monitoring. This paper proposes an innovative effective...

10.3390/electronics12081892 article EN Electronics 2023-04-17

Internet of Medical Things (IoMT) is an ecosystem composed connected electronic items such as small sensors/actuators and other cyber-physical devices (CPDs) in medical services. When these are linked together, they can support patients through monitoring, analysis, reporting more autonomous intelligent ways. The IoMT devices; however, often do not have sufficient computing resources onboard for service security assurance while the services handle large quantities sensitive private...

10.3390/fi15080271 article EN cc-by Future Internet 2023-08-15

The Internet of Things (IoT) represents a swiftly expanding sector that is pivotal in driving the innovation today's smart services. However, inherent resource-constrained nature IoT nodes poses significant challenges embedding advanced algorithms for cybersecurity, leading to an escalation cyberattacks against these nodes. Contemporary research Intrusion Detection Systems (IDS) predominantly focuses on enhancing IDS performance through sophisticated algorithms, often overlooking their...

10.1109/access.2024.3396461 article EN cc-by-nc-nd IEEE Access 2024-01-01

Recognizing fraudulent activity in the banking system is essential due to significant risks involved. When transactions are vastly outnumbered by non-fraudulent ones, dealing with imbalanced datasets can be difficult. This study aims determine best model for detecting fraud comparing four commonly used machine learning algorithms: Support Vector Machine (SVM), XGBoost, Decision Tree, and Logistic Regression. Additionally, we utilized Synthetic Minority Over-sampling Technique (SMOTE) address...

10.3390/info15060298 article EN cc-by Information 2024-05-23

The rapid proliferation of Large Language Models (LLMs) across industries such as healthcare, finance, and legal services has revolutionized modern applications. However, their increasing adoption exposes critical vulnerabilities, particularly through adversarial prompt attacks that compromise LLM security. These prompt-based exploit weaknesses in LLMs to manipulate outputs, leading breaches confidentiality, corruption integrity, disruption availability. Despite significance, existing...

10.3390/fi17030113 article EN cc-by Future Internet 2025-03-03

Cloudlets are small self maintained clouds, with hotspot like deployment, to enhance the computational capabilities of mobile devices. The limited resources cloudlets can become heavily loaded during peak utilization. Consequently, per user available capacity decreases and at times devices find no execution time benefit for using cloudlet. Researchers have proposed augmenting cloudlet devices; however, approaches do not consider offered service load ratio while device resources. In this...

10.1109/tsc.2016.2564407 article EN IEEE Transactions on Services Computing 2016-05-06

Hepatitis C virus is a major cause for happening liver disease all over the world. However, many tools have been build that try to reduce influence of this virus. In work, machine learning based model has proposed can classify hepatitis infected patient's stages liver. We gathered instances fibrosis Egyptian patients from UCI repository. To balance multiple categories, synthetic minority oversampling methodology used increases patients. Later, we applied different feature selection methods...

10.1109/tensymp50017.2020.9230464 article EN 2017 IEEE Region 10 Symposium (TENSYMP) 2020-01-01
Coming Soon ...