Mohammad Abdur Razzaque

Mohammad Abdur Razzaque
Teesside University · Department of Computing

PhD
Secure Machine Learning, Secure Sensing, Federated Machine Learning, and AIoT.

About

74
Publications
46,312
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,548
Citations
Citations since 2016
20 Research Items
2254 Citations
20162017201820192020202120220100200300
20162017201820192020202120220100200300
20162017201820192020202120220100200300
20162017201820192020202120220100200300
Additional affiliations
January 2018 - February 2022
Teesside University
Position
  • Professor (Associate)
October 2014 - December 2017
Trinity College Dublin
Position
  • Senior Researcher
September 2011 - September 2014
Universiti Teknologi Malaysia
Position
  • Senior Lecturer

Publications

Publications (74)
Article
Full-text available
Hand, Foot and Mouth Disease (HFMD) is a highly contagious paediatric disease showing up symptoms like fever, diarrhoea, oral ulcers and rashes on the hands and foot, and even in the mouth. This disease has become an epidemic with several outbreaks in many Asian-Pacific countries with the basic reproduction number R0 > 1. HFMD’s diagnosis is very c...
Article
Full-text available
Service search in IoT’s large-scale, heterogeneous and multi-domain services space is a challenging task. It can take the time that may not be acceptable for many IoT applications and requires resources that may not be available in many IoT devices. A categorisation of these services into their application domains can reduce the search space and of...
Article
Full-text available
Cancer is a complex disease that deregulates cellular functions at various molecular levels (e.g., DNA, RNA, and proteins). Integrated multi-omics analysis of data from these levels is necessary to understand the aberrant cellular functions accountable for cancer and its development. In recent years, Deep Learning (DL) approaches have become a usef...
Article
Full-text available
Hand, foot, and mouth disease (HFMD) is a highly contagious disease with several outbreaks in Asian-Pacific countries, including Thailand. With such epidemic characteristics and potential economic impact, HFMD is a significant public health issue in Thailand. Generally, contagious/infectious diseases’ transmission dynamics vary across geolocations...
Article
Full-text available
IoT is becoming more common and popular due to its wide range of applications in various domains. They collect data from the real environment and transfer it over the networks. There are many challenges while deploying IoT in a real-world, varying from tiny sensors to servers. Security is considered as the number one challenge in IoT deployments, a...
Article
The use of commercially available voice assistants (VA) that enable personal data collection on a large scale is on the rise. However, knowledge discovery on such data can lead to the violation of various privacy issues. This article presents the various stakeholders who are a part of this privacy regime, along with a detailed taxonomy of the vario...
Preprint
Full-text available
Background Hand Foot and Mouth Disease (HFMD) is a highly contagious disease and has become an epidemic in many Asian-Pacific countries, including Thailand. With such epidemic characteristics and potential economic impact, HFMD is a significant public health issue. Comprehensive modelling of HFMD’s epidemic dynamics can be useful in understanding a...
Article
Full-text available
The purpose of this research is to examine the factors affecting the willingness to disclose personal information based upon the privacy calculus framework and its relation to the continued usage of the Voice Assistant (VA) devices. The information disclosure is analyzed from a dual channel benefit/risk perspective through the calculus lens. Partic...
Article
Full-text available
The market for voice assistants (VAs) and other allied voice-based smart-home products is gradually emerging. The initial growth has been slower than expected; therefore, an in-depth simultaneous intention and diffusion analysis is needed for identifying the relevant factors along with finding out the target consumers. This work uses technology acc...
Preprint
Full-text available
With the emergence of 5G, Internet of Things (IoT) will become a centre of attraction for almost all industries due to its wide range of applications from various domains. The explosive growth of industrial control processes and the industrial IoT, imposes unprecedented vulnerability to cyber threats in critical infrastructure through the interconn...
Chapter
Educational immersive virtual reality is often tasked with minimising distractions for learners and maintaining or signalling their focus to the right areas. Managing location, density and relevancy of visual information in the virtual environment pertain to this. Essentially this problem could be defined as the need of management of cognitive load...
Article
Full-text available
A cyber-physical system (CPS) is a combination of physical system components with cyber capabilities that have a very tight interconnectivity. CPS is a widely used technology in many applications, including electric power systems, communications, and transportation, and healthcare systems. These are critical national infrastructures. Cybersecurity...
Article
Full-text available
The internet of things (IoT) envisages an ultralarge-scale network of things, which will offer services to a large number of applications in numerous domains and environments. A middleware can ease application development by providing the necessary functional components for service registration, discovery and composition. Recently, there have been...
Article
Body Area Networks (BANs) are becoming increasingly popular and have shown great potential in real-time monitoring of the human body. With the promise of being cost-effective and unobtrusive and facilitating continuous monitoring, BANs have attracted a wide range of monitoring applications, including medical and healthcare, sports, and rehabilitati...
Conference Paper
Full-text available
This paper discusses the challenges in developing an IoT platform for registering, discovering and composing heterogeneous services from multiple provider types, viz., Wireless Sensor Networks (WSNs), Web Service Providers (WSPs), and Autonomous Service Providers (ASPs), without human intervention. The platform executes a service composition in a d...
Article
Full-text available
In these days, information sharing as a crucial part appears in our vision, bringing about a bulk of discussions about methods and techniques of privacy preserving for data mining which are regarded as strong guarantee to avoid information disclosure and protect individuals’ privacy. k-anonymity has been proposed for privacy preserving for data min...
Conference Paper
Full-text available
Wireless sensor networks are primarily characterized by inadequate energy supply. Therefore, development of an energy efficient protocol can play an important role in impacting the network lifetime. Typically, communication is the most energy expensive act that nodes perform and limited energy of nodes is the main obstacle. An efficient cluster arr...
Article
Full-text available
Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated...
Article
All-optical networks are the aspiration of bandwidth-greedy applications providers and users such as telecom operators and scientific research centres. Because of the limitations of current network infrastructures, some optical switching paradigms have been proposed. Among these paradigms, optical burst switching (OBS) is seen as the most appropria...
Conference Paper
Full-text available
Bike sharing systems (BSSs) are increasingly popular in cities world-wide as a sustainable, eco-friendly and flexible transportation mode. The flexibility in BSSs comes with challenges relating to unpredictable and dynamic demand and asymmetric usage, which frequently lead a BSS to an imbalanced system and make bike distribution a difficult task. I...
Article
Full-text available
In past few years, cloud computing is one of the popular paradigm to host and deliver services over Internet. It is having popularity by offering multiple computing services as cloud storage, cloud hosting and cloud servers etc., for various types of businesses as well as in academics. Though there are several benefits of cloud computing, it suffer...
Article
Full-text available
The development of cloud computing has revolutionized in how the computing and storage are utilized remotely. It has grown from being hopeful business concept to one of the fast growing segments of the IT manufacturing. It has become attractive to businesses and organizations. Although of all the benefits of the cloud, enterprise customers are stil...
Article
Full-text available
The life critical and real time medical application of Wireless Body Sensor Networks (WBSNs) requires the assurance of the demanded Quality of Service (QoS) both in terms delay and reliability. This paper proposes Critical Data Routing (CDR) that categorizes the sensory data packets as critical and noncritical data packets. Along with the heterogen...
Article
Full-text available
Wireless sensor network (WSN) is considered as the enabling technology to bridge the gap between the physical and digital world. Some of the applications environments of WSN require a mobile sink to operate in the sensor field where delayed and/or partial data delivery might lead to inappropriate conclusions and thus require high quality of service...
Article
Full-text available
The Internet of Things (IoT) envisages a future in which digital and physical things or objects (e.g., smartphones, TVs, cars) can be connected by means of suitable information and communication technologies, to enable a range of applications and services. The IoT's characteristics, including an ultra-largescale network of things, device and networ...
Article
Full-text available
Wireless body sensor networks (WBSNs) for healthcare and medical applications are real-time and life-critical infrastructures, which require a strict guarantee of quality of service (QoS), in terms of latency, error rate and reliability. Considering the criticality of healthcare and medical applications, WBSNs need to fulfill users/applications and...
Conference Paper
Vehicular Ad-hoc Network (VANET) can improve road safety through collision avoidance. False or bogus information is a real threat in VANET’s safety applications. Vehicles or drivers may react to false information and cause serious problems. In VANETs drivers’ behavioral tendencies can be reflected in the mobility patterns of the vehicles. Monitorin...
Conference Paper
Full-text available
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. False or bogus information is a real threat in VANET's safety applications, security and privacy. Vehicles or drivers may react to false information and cause serious problems. In VANETs D...
Article
Full-text available
With the promise of cost effective, unobtrusive, and unsupervised continuous monitoring, wireless body sensor networks (WBSNs) have attracted a wide range of monitoring applications such as medical and healthcare, sport activity, and rehabilitation systems. Most WBSN's medical and healthcare applications are real-time and life-critical, which requi...
Article
Full-text available
publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.  Abstract―In Wireless Sensor Networks (WSNs), exploiting the sink mobility has been considered as a good s...
Article
Full-text available
Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between...
Article
Full-text available
Sensing of the application environment is the main purpose of a wireless sensor network. Most existing energy management strategies and compression techniques assume that the sensing operation consumes significantly less energy than radio transmission and reception. This assumption does not hold in a number of practical applications. Sensing energy...
Article
Full-text available
For the past 20 years, many authors have focused their investigations on wireless sensor networks. Various issues related to wireless sensor networks such as energy minimization (optimization), compression schemes, self-organizing network algorithms, routing protocols, quality of service management, security, energy harvesting, etc., have been exte...
Conference Paper
Full-text available
With about 1 billion users, Facebook nowadays is the most popular and famous social networking site (SNS) around the globe. It is one of the Internet's biggest success stories. Facebook gets hundreds of new users every day because of the incredible spread of the network. One specific aspect of this social network site that widely discussed in the n...
Article
Full-text available
Wireless sensor networks (WSNs) are highly resource constrained in terms of power supply, memory capacity, communication bandwidth, and processor performance. Compression of sampling, sensor data, and communications can significantly improve the efficiency of utilization of three of these resources, namely, power supply, memory and bandwidth. Recen...
Article
Full-text available
Wireless sensor networks (WSNs) are highly resource constrained in terms of power supply, memory capacity, communication bandwidth, and processor performance. Compression of sampling, sensor data, and communications can significantly improve the efficiency of utilization of three of these resources, namely, power supply, memory and bandwidth. Recen...
Conference Paper
Full-text available
Securing the Vehicular Adhoc Networks (VANETs) along with appropriate protection of the privacy of drivers or vehicle owners is a very challenging task. Drivers' behavioral tendencies can be reflected in the mobility patterns of the vehicles (rational behavior). Misbehaving vehicles are always threat to safety, VANETs security and privacy. Dete...
Conference Paper
Use of Wireless Sensor Networks (WSNs) in environmental gas emission monitoring system can provide inexpensive, portable, and easily accessible system. In most cases naive use of WSNs in gas emission monitoring will fail to provide long-term and cost-effective system due to very high power requirement of most gas sensors. In this work, we support t...
Conference Paper
Full-text available
Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited reso...
Conference Paper
Generally wireless sensor networks rely of many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack caus...
Conference Paper
Prediction based data gathering or estimation is a very frequent phenomenon in wireless sensor networks (WSNs). Learning and model update is in the heart of prediction based data gathering. A majority of the existing prediction based data gathering approaches consider centralized and some others use localized and distributed learning and model upda...
Conference Paper
For the last two decades, nature inspired metaheuristic algorithms have shown their ubiquitous nature in almost every aspect, where computational intelligence is used. This paper intends to focus on the comparative study of two popular and robust bio mimic strategies used in computer engineering, namely Particle Swarm Optimization (PSO) and Cuckoo...
Chapter
Wireless Body Area Sensor Networks (WBANs) are becoming more and more popular and have shown great potential in real-time monitoring of the human body. With the promise of cost effective, unobtrusive, and unsupervised continuous monitoring, WBANs have attracted a wide range of monitoring applications such as healthcare, sport activity and rehabilit...
Article
Full-text available
Wireless sensor networks are increasingly common in medical, environmental monitoring, precision agriculture, smart home monitoring, and other applications. Most wireless sensor networks operate in air or liquid media: in this paper we are concerned with the design and implementation of sensor networks embedded into solid materials, thus placing se...
Chapter
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia application...
Chapter
Wireless Body Area Sensor Networks (WBANs) are becoming more and more popular and have shown great potential in real-time monitoring of the human body. With the promise of cost effective, unobtrusive, and unsupervised continuous monitoring, WBANs have attracted a wide range of monitoring applications such as healthcare, sport activity and rehabilit...
Conference Paper
Wireless Sensor Network (WSN) is highly budgeted by energy since sensor nodes are mostly battery-powered and deployed in hard-to-reach area for prolonged duration. Moreover radio communication is very expensive for WSN. At the same time, a substantial portion WSN applications require periodic data collection. In this paper we investigate this issue...
Conference Paper
Full-text available
Self-organisation has emerged as a very promising approach to the design, deployment, operation, control and evolution of complex wireless networks. The dominant strictly layered design style may how- ever not be able to accommodate many useful optimisations, and we conjecture that cross-layer design may offer a more promising approach. In support...
Conference Paper
Full-text available
Mobile ad hoc networks (MANETs) generally adopt a peer-to-peer architecture in which the nodes themselves provide routing and services to the network. Disconnectivity with peer nodes, induced by mobility, power drains and damage makes route maintenance difficult and degrade the network's ability tooffer services reliably to its peer nodes. In this...
Chapter
Autonomic communication aims to build more reflective systems with properties like self-healing, self-organisation, self-optimisation and so forth — the so-called “self-*” properties. To attain this within the existing strictly-layered approaches to network software may be possible to certain extent, but will not leverage all the possible optimisat...
Conference Paper
Full-text available
Layered architectures are not sufficiently flexible to cope with the dynamics of wireless-dominated next generation communications. Cross-layer approaches may provide a better solution: allowing interactions between two or more non-adjacent layers in the protocol stack. Cross-layer architectures based on purely local information will not be able to...