Publications
Conference Publications
- Zhang, T., Ye, Z., Mahdad, A.T., Akanda, M. M. R. R., Shi, C., Wang, Y., Saxena, N. and Chen, Y., 2023, November. FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (pp. 446-459).
- Md
Akanda M.R.R., Khandaker M.M., Saha T., Haque J., Majumder A., Rakshit A.
(2020) Voice-Controlled Smart Assistant
and Real-Time Vehicle Detection for Blind People. In: Sengodan T.,
Murugappan M., Misra S. (eds) Advances in Electrical and Computer Technologies.
Lecture Notes in Electrical Engineering, vol 672. Springer, Singapore. http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-981-15-5558-9_27
Poster Publications
- Zhang, T., Ye, Z., Mahdad, A.T., Akanda, M. M. R. R., Shi, C., Saxena, N., Wang, Y. and Chen, Y., 2023, October. Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via AR/VR Motion Sensors. In Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (pp. 308-309).
Book Chapters
- Islam, K., Islam, Z., Amin, A., Akanda, M. R. R., Hossen, S., Naznin, F., & Moni, M. A. (2023). IoT and Deep Learning-Based Smart Healthcare with an Integrated Security System to Detect Various Skin Lesions. In Artificial Intelligence for Disease Diagnosis and Prognosis in Smart Healthcare (pp. 219-242). CRC Press.
Journal Publications
-
Pan, P., Mandal, R. K., & Rahman Redoy Akanda, M. M. (2022). Fault classification with convolutional neural networks for microgrid systems. International Transactions on Electrical Energy Systems, 2022.
- Akanda,
M.,
& Hossain, M. (2021) Smart−devices
in Human Behavior Manipulation: Process diagram with exploratory assessment
.
International Journal of Engineering, Science and Information Technology
(IJESTY), 1(3), pp.54-58.
https://doi.org/10.52088/ijesty.v1i3.88
- Akter, S., Hossain, M., & Akanda, M. (2021). A Noble Security Analysis of Various Distributed Systems.
International Journal of Engineering, Science and Information Technology
(IJESTY), 1(2), 62-71. https://doi.org/10.52088/ijesty.v1i2.101