Follow
Mohammad Reza Nosouhi
Mohammad Reza Nosouhi
Research Fellow at the School of Information Technology, Deakin University
Verified email at deakin.edu.au
Title
Cited by
Cited by
Year
Blockchain for secure location verification
MR Nosouhi, S Yu, W Zhou, M Grobler, H Keshtiar
Journal of Parallel and Distributed Computing 136, 40-51, 2020
402020
Improving data utility through game theory in personalized differential privacy
L Cui, Y Qu, MR Nosouhi, S Yu, JW Niu, G Xie
Journal of Computer Science and Technology 34, 272-286, 2019
362019
Privacy Preservation in Smart Cities
Y Qu, MR Nosouhi, L Cui, S Yu
Smart Cities Cybersecurity and Privacy, 75-88, 2018
362018
PASPORT: A secure and private location proof generation and verification framework
MR Nosouhi, K Sood, S Yu, M Grobler, J Zhang
IEEE Transactions on Computational Social Systems 7 (2), 293-307, 2020
232020
UCoin: An efficient privacy preserving scheme for cryptocurrencies
MR Nosouhi, S Yu, K Sood, M Grobler, R Jurdak, A Dorri, S Shen
IEEE Transactions on Dependable and Secure Computing, 2021
182021
Towards spoofing resistant next generation IoT networks
MR Nosouhi, K Sood, M Grobler, R Doss
IEEE Transactions on Information Forensics and Security 17, 1669-1683, 2022
162022
Personalized privacy protection solutions
Y Qu, MR Nosouhi, L Cui, S Yu, Y Qu, MR Nosouhi, L Cui, S Yu
Personalized Privacy Protection in Big Data, 23-130, 2021
152021
SPARSE: privacy-aware and collusion resistant location proof generation and verification
MR Nosouhi, S Yu, M Grobler, Y Xiang, Z Zhu
2018 IEEE Global Communications Conference (GLOBECOM), 1-6, 2018
142018
A hybrid location privacy protection scheme in big data environment
MR Nosouhi, VVH Pham, S Yu, Y Xiang, M Warren
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017
142017
Bushfire risk detection using Internet of Things: An application scenario
MR Nosouhi, K Sood, N Kumar, T Wevill, C Thapa
IEEE Internet of Things Journal 9 (7), 5266-5274, 2021
132021
Intrusion detection scheme with dimensionality reduction in next generation networks
K Sood, MR Nosouhi, DDN Nguyen, F Jiang, M Chowdhury, R Doss
IEEE Transactions on Information Forensics and Security 18, 965-979, 2023
122023
Accurate detection of IoT sensor behaviors in legitimate, faulty and compromised scenarios
K Sood, MR Nosouhi, N Kumar, A Gaddam, B Feng, S Yu
IEEE Transactions on Dependable and Secure Computing, 2021
102021
HSDC–net: Secure Anonymous Messaging in Online Social Networks
MR Nosouhi, S Yu, K Sood, M Grober
IEEE International Conference on Trust, Security and Privacy in Computing …, 2019
102019
RF fingerprinting-based IoT node authentication using mahalanobis distance correlation theory
DDN Nguyen, K Sood, MR Nosouhi, Y Xiang, L Gao, L Chi
IEEE Networking Letters 4 (2), 78-81, 2022
72022
Existing privacy protection solutions
Y Qu, MR Nosouhi, L Cui, S Yu, Y Qu, MR Nosouhi, L Cui, S Yu
Personalized Privacy Protection in Big Data, 5-13, 2021
72021
Future research directions
T Qiu, N Chen, S Zhang
Robustness Optimization for IoT Topology, 201-214, 2022
62022
Leading attacks in privacy protection domain
Y Qu, MR Nosouhi, L Cui, S Yu, Y Qu, MR Nosouhi, L Cui, S Yu
Personalized Privacy Protection in Big Data, 15-21, 2021
62021
Blockchain–based location proof generation and verification
MR Nosouhi, S Yu, M Grobler, Q Zhu, Y Xiang
IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops …, 2019
52019
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism
MR Nosouhi, SW Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, ...
IEEE Transactions on Information Forensics and Security 18, 2160-2174, 2023
42023
Policy-based bigdata security and QoS framework for SDN/IoT: An analytic approach
SR Pokhrel, K Sood, S Yu, MR Nosouhi
IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops …, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20