A/2, Jahurul Islam Avenue
Jahurul Islam City, Aftabnagar
Dhaka-1212, Bangladesh
PhD in Cybersecurity, Federation University Australia
MSc in Internetworking, University of Technology Sydney (UTS), Australia
BSc in Computer Science and IT, Islamic University of Technology (IUT), Bangladesh
Dr. Mohammad Manzurul Islam received M.Sc. degree in Internetworking from the University of Technology Sydney, Australia in 2013 and Ph.D. degree in Cybersecurity from Federation University Australia in 2021. He is an Assistant professor at East West University Bangladesh. He served over 16+ years in many organisations, including universities (Monash University Australia, Federation University Australia, Canadian University Bangladesh, Stamford University Bangladesh) and IT industries (ZTE Corporation, Robi-Axiata Limited). His research interest includes machine learning, data analysis, IoT and cybersecurity.
Academic experience (12 years)
2022-current: East West University
2021–2022 Monash University, Teaching Associate
2019–2021 Federation University Australia, Sessional Academic
Teams, Adobe Connect), assessment grading, marking, student consultation.
Solving, Communications and Technology.
2014–2022 & 2005–2007 Stamford University Bangladesh, Assistant Professor
development, deliver lectures, prepare assessment specification, marking, supervise research students, manage Cisco NetAcad, academic administration, maintain industry collaboration.
Intelligence, Visual and Internet Programming.
2012 University of Technology Sydney, Tutor
Industry experience (5 years)
2010–2011 Abacus Services Limited, ICT Specialist
Abacus Services Limited is a group of companies. It has multiple businesses across Bangladesh. Key responsibilities include the overall ICT systems design and operation (analyse existing ICT systems and the user experience, identify user needs, limitations within the existing ICT systems, and develop software for insightful reports).
2009–2010 Robi-Axiata Ltd, Engineer, Intelligent Network Operation
Robi-Axiata is a multinational telecommunication operator company jointed owned by Robi (Bangladesh), Axiata (Malaysia), and NTT DoCoMo (Japan). Key responsibilities include designing and developing the artificial intelligence (AI) of the network to provide a state-of-the-art user experience and securing the system from cyberattacks.
2007–2009 ZTE Corporation, System Engineer
ZTE Corporation is a telecommunication vendor company having business all over the globe. Key responsibilities include configuration of Unix servers, IP network, firewalls and security policy.
Cybersecurity, Trust, ML/AI, IoT
|
|
Ali, M.S., Rashid, M.R.A., Hossain, T., Kabir, M.A., Kamrul, M., Aumy, S.H.B., Mridha, M.H., Sajeeb, I.H., Islam, M.M. and Jabid, T., 2024. A comprehensive dataset of rice field weed detection from Bangladesh. Data in Brief, 57, p.110981.
|
Islam, M.M., Rahman, S., Hoque, N., Al Mamun, M., Moheuddin, M.S., Ali, M.S., Rashid, M.R.A., Masum, S., Ferdaus, M.H., Niloy, N.T. and Rahman, M.A., 2024. REMP: A unique dataset of rare and endangered medicinal plants in Bangladesh for sustainable healing and biodiversity conservation. Data in Brief, 57, p.110895.
|
Islam, M.M., Karmakar, G., Kamruzzaman, J., Murshed, M. and Chowdhury, A., 2024. Trustworthiness of IoT Images Leveraging With Other Modal Sensor’s Data. IEEE Internet of Things Journal.
|
Mukto, M.M., Hasan, M., Al Mahmud, M.M., Haque, I., Ahmed, M.A., Jabid, T., Ali, M.S., Rashid, M.R.A., Islam, M.M. and Islam, M., 2024. Design of a real-time crime monitoring system using deep learning techniques. Intelligent Systems with Applications, 21, p.200311.
|
Islam, M., Islam, M.M., Ali, M.S., Niloy, N.T., Chowdhury, A. and Avik, S.C., 2023, December. Ensemble Method for Predicting Student Performance and Dropout Risk. In International Conference on Recent Advances in Artificial Intelligence & Smart Applications (pp. 269-278). Singapore: Springer Nature Singapore.
|
Rizvee, R.A., Orpa, T.H., Ahnaf, A., Kabir, M.A., Rashid, M.R.A., Islam, M.M., Islam, M., Jabid, T. and Ali, M.S., 2023. LeafNet: A proficient convolutional neural network for detecting seven prominent mango leaf diseases. Journal of Agriculture and Food Research, 14, p.100787.
|
A. Chowdhury, M.M. Islam, S. Kaisar, M.E. Khoda, R. Naha, M.A. Khoshkholghi, M. Aiash, "Leveraging Oversampling Techniques in Machine Learning Models for Multi-class Malware Detection in Smart Home Applications," 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Exeter, United Kingdom, 2023, pp. 2216-2221, doi: 10.1109/TrustCom60117.2023.00311.
|
S. Nath, M.M. Islam, A. Chowdhury, M.R.A. Rashid, M. Islam, T. Jabid, R. Naha, "Comprehensive Analysis of Feature Extraction Techniques and Runtime Performance Evaluation for Phishing Detection," 2023 6th International Conference on Applied Computational Intelligence in Information Systems (ACIIS), Bandar Seri Begawan, Brunei Darussalam, 2023, pp. 1-6, doi: 10.1109/ACIIS59385.2023.10367373.
|
N. Vasker, A. R. A. Sowrov, M. Hasan, M. S. Ali, M. R. A. Rashid and M. M. Islam, "Unmasking Ovary Tumors: Real-Time Detection with YOLOv5," 2023 4th International Conference on Big Data Analytics and Practices (IBDAP), Bangkok, Thailand, 2023, pp. 1-6, doi: 10.1109/IBDAP58581.2023.10271954.
|
P. Ghose, M. A. Uddin, M. M. Islam, M. Islam, U. K. Acharjee, "A Breast Cancer Detection Model using a Tuned SVM Classifier" in 25th International Conference on Computer and Information Technology (ICCIT). IEEE, 2022, pp. 102-107. |
M. M. Islam, G. Karmakar, J. Kamruzzaman, and M. Murshed, “A robust forgery detection method for copy–moveand splicing attacks in images,” Electronics, vol. 9, no. 9, p. 1500, 2020. [IF: 2.412].
|
M. M. Islam, J. Kamruzzaman, G. Karmakar, M. Murshed, and G. Kahandawa,“Passive detection of splicing and copy-move attacks in image forgery,” in International Conference on Neural Information Processing. Springer, 2018, pp. 555–567. [Core: A]. |
M. M. Islam, G. Karmakar, J. Kamruzzaman, M. Murshed, G. Kahandawa, and N. Parvin, “Detecting splicing and copy-move attacks in color images,” in Digital Image Computing: Techniques and Applications (DICTA). IEEE, 2018, pp. 1–7. [Core: B]. |
M. M. Islam, G. Karmakar, J. Kamruzzaman, and M. Murshed, “Measuring trustworthiness of IoT image sensor data using other sensors’ complementary multimodal data,” in TrustCom. IEEE, 2019, pp. 775–780. [Core: A]. |
M. M. Islam, F. T. Jaigirdar, and M. M. Islam, “Maximizing network interruption in wireless sensor network: an intruder’s perspective,” International Journal of Computer Networks & Communications, vol. 7, no. 2, p. 103, 2015. |
M.M. Islam, S. Morshed, and P. Goswami, "Cloud computing: A survey on its limitations and potential solutions,"International Journal of Computer Science Issues, vol. 10, no. 4, p. 159, 2013. |
M.F. Mridha, M.M. Islam, and S.M.O. Rahman, "A New Approach of Performance Analysis of Certain Graph Algorithms," International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 9, p. 3745, 2013. |
A.J. Jimi, M.M. Islam, M.F. Mridha, "A new approach of performance analysis of adaptive filter algorithm in noise elimination," International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 2, no. 9, p. 4571, 2013. |