Blockchain for secure location verification MR Nosouhi, S Yu, W Zhou, M Grobler, H Keshtiar Journal of Parallel and Distributed Computing 136, 40-51, 2020 | 52 | 2020 |
Towards spoofing resistant next generation IoT networks MR Nosouhi, K Sood, M Grobler, R Doss IEEE Transactions on Information Forensics and Security 17, 1669-1683, 2022 | 42 | 2022 |
Privacy Preservation in Smart Cities Y Qu, MR Nosouhi, L Cui, S Yu Smart Cities Cybersecurity and Privacy, 75-88, 2018 | 42 | 2018 |
Improving data utility through game theory in personalized differential privacy L Cui, Y Qu, MR Nosouhi, S Yu, JW Niu, G Xie Journal of Computer Science and Technology 34, 272-286, 2019 | 40 | 2019 |
Intrusion detection scheme with dimensionality reduction in next generation networks K Sood, MR Nosouhi, DDN Nguyen, F Jiang, M Chowdhury, R Doss IEEE Transactions on Information Forensics and Security 18, 965-979, 2023 | 36 | 2023 |
Pasport: A secure and private location proof generation and verification framework MR Nosouhi, K Sood, S Yu, M Grobler, J Zhang IEEE Transactions on Computational Social Systems 7 (2), 293-307, 2020 | 31 | 2020 |
UCoin: An efficient privacy preserving scheme for cryptocurrencies MR Nosouhi, S Yu, K Sood, M Grobler, R Jurdak, A Dorri, S Shen IEEE Transactions on Dependable and Secure Computing 20 (1), 242-255, 2021 | 25 | 2021 |
Accurate detection of IoT sensor behaviors in legitimate, faulty and compromised scenarios K Sood, MR Nosouhi, N Kumar, A Gaddam, B Feng, S Yu IEEE Transactions on Dependable and Secure Computing 20 (1), 288-300, 2021 | 23 | 2021 |
Bushfire risk detection using Internet of Things: An application scenario MR Nosouhi, K Sood, N Kumar, T Wevill, C Thapa IEEE Internet of Things Journal 9 (7), 5266-5274, 2021 | 18 | 2021 |
SPARSE: privacy-aware and collusion resistant location proof generation and verification MR Nosouhi, S Yu, M Grobler, Y Xiang, Z Zhu 2018 IEEE Global Communications Conference (GLOBECOM), 1-6, 2018 | 18 | 2018 |
A hybrid location privacy protection scheme in big data environment MR Nosouhi, VVH Pham, S Yu, Y Xiang, M Warren GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017 | 17 | 2017 |
Weak-key analysis for BIKE post-quantum key encapsulation mechanism MR Nosouhi, SW Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, ... IEEE Transactions on Information Forensics and Security 18, 2160-2174, 2023 | 15 | 2023 |
RF fingerprinting-based IoT node authentication using Mahalanobis distance correlation theory DDN Nguyen, K Sood, MR Nosouhi, Y Xiang, L Gao, L Chi IEEE Networking Letters 4 (2), 78-81, 2022 | 13 | 2022 |
Personalized privacy protection in big data Y Qu, MR Nosouhi, L Cui, S Yu Springer, 2021 | 12 | 2021 |
HSDC–net: Secure Anonymous Messaging in Online Social Networks MR Nosouhi, S Yu, K Sood, M Grober IEEE International Conference on Trust, Security and Privacy in Computing …, 2019 | 12 | 2019 |
Blockchain–based location proof generation and verification MR Nosouhi, S Yu, M Grobler, Q Zhu, Y Xiang IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops …, 2019 | 8 | 2019 |
Bit Flipping Key Encapsulation for the Post-Quantum Era MR Nosouhi, SWA Shah, L Pan, R Doss IEEE Access 11, 56181-56195, 2023 | 7 | 2023 |
Existing privacy protection solutions Y Qu, MR Nosouhi, L Cui, S Yu, Y Qu, MR Nosouhi, L Cui, S Yu Personalized Privacy Protection in Big Data, 5-13, 2021 | 7 | 2021 |
Leading attacks in privacy protection domain Y Qu, MR Nosouhi, L Cui, S Yu, Y Qu, MR Nosouhi, L Cui, S Yu Personalized Privacy Protection in Big Data, 15-21, 2021 | 7 | 2021 |
Future research directions Y Qu, MR Nosouhi, L Cui, S Yu, Y Qu, MR Nosouhi, L Cui, S Yu Personalized Privacy Protection in Big Data, 131-136, 2021 | 6 | 2021 |