Follow
Mohammad Reza Nosouhi
Mohammad Reza Nosouhi
Research Fellow at the School of Information Technology, Deakin University
Verified email at deakin.edu.au
Title
Cited by
Cited by
Year
Blockchain for secure location verification
MR Nosouhi, S Yu, W Zhou, M Grobler, H Keshtiar
Journal of Parallel and Distributed Computing 136, 40-51, 2020
462020
Privacy Preservation in Smart Cities
Y Qu, MR Nosouhi, L Cui, S Yu
Smart Cities Cybersecurity and Privacy, 75-88, 2018
392018
Improving data utility through game theory in personalized differential privacy
L Cui, Y Qu, MR Nosouhi, S Yu, JW Niu, G Xie
Journal of Computer Science and Technology 34, 272-286, 2019
372019
Pasport: A secure and private location proof generation and verification framework
MR Nosouhi, K Sood, S Yu, M Grobler, J Zhang
IEEE Transactions on Computational Social Systems 7 (2), 293-307, 2020
292020
Towards spoofing resistant next generation IoT networks
MR Nosouhi, K Sood, M Grobler, R Doss
IEEE Transactions on Information Forensics and Security 17, 1669-1683, 2022
252022
Intrusion detection scheme with dimensionality reduction in next generation networks
K Sood, MR Nosouhi, DDN Nguyen, F Jiang, M Chowdhury, R Doss
IEEE Transactions on Information Forensics and Security 18, 965-979, 2023
242023
UCoin: An efficient privacy preserving scheme for cryptocurrencies
MR Nosouhi, S Yu, K Sood, M Grobler, R Jurdak, A Dorri, S Shen
IEEE Transactions on Dependable and Secure Computing 20 (1), 242-255, 2021
192021
Bushfire risk detection using Internet of Things: An application scenario
MR Nosouhi, K Sood, N Kumar, T Wevill, C Thapa
IEEE Internet of Things Journal 9 (7), 5266-5274, 2021
172021
A hybrid location privacy protection scheme in big data environment
MR Nosouhi, VVH Pham, S Yu, Y Xiang, M Warren
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017
172017
Accurate detection of IoT sensor behaviors in legitimate, faulty and compromised scenarios
K Sood, MR Nosouhi, N Kumar, A Gaddam, B Feng, S Yu
IEEE Transactions on Dependable and Secure Computing 20 (1), 288-300, 2021
162021
SPARSE: privacy-aware and collusion resistant location proof generation and verification
MR Nosouhi, S Yu, M Grobler, Y Xiang, Z Zhu
2018 IEEE Global Communications Conference (GLOBECOM), 1-6, 2018
152018
Personalized privacy protection in big data
Y Qu, MR Nosouhi, L Cui, S Yu
Springer, 2021
122021
HSDC–net: Secure Anonymous Messaging in Online Social Networks
MR Nosouhi, S Yu, K Sood, M Grober
IEEE International Conference on Trust, Security and Privacy in Computing …, 2019
112019
RF fingerprinting-based IoT node authentication using mahalanobis distance correlation theory
DDN Nguyen, K Sood, MR Nosouhi, Y Xiang, L Gao, L Chi
IEEE Networking Letters 4 (2), 78-81, 2022
102022
Weak-key analysis for bike post-quantum key encapsulation mechanism
MR Nosouhi, SW Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, ...
IEEE Transactions on Information Forensics and Security 18, 2160-2174, 2023
72023
Existing privacy protection solutions
Y Qu, MR Nosouhi, L Cui, S Yu, Y Qu, MR Nosouhi, L Cui, S Yu
Personalized Privacy Protection in Big Data, 5-13, 2021
72021
Leading attacks in privacy protection domain
Y Qu, MR Nosouhi, L Cui, S Yu, Y Qu, MR Nosouhi, L Cui, S Yu
Personalized Privacy Protection in Big Data, 15-21, 2021
62021
Blockchain–based location proof generation and verification
MR Nosouhi, S Yu, M Grobler, Q Zhu, Y Xiang
IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops …, 2019
62019
Future research directions
Y Qu, MR Nosouhi, L Cui, S Yu, Y Qu, MR Nosouhi, L Cui, S Yu
Personalized Privacy Protection in Big Data, 131-136, 2021
52021
Personalized privacy protection solutions
Y Qu, MR Nosouhi, L Cui, S Yu, Y Qu, MR Nosouhi, L Cui, S Yu
Personalized Privacy Protection in Big Data, 23-130, 2021
52021
The system can't perform the operation now. Try again later.
Articles 1–20