default search action
Mohammad Reza Nosouhi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Ashish Nanda, Jongkil Jay Jeong, Syed Wajid Ali Shah, Mohammad Reza Nosouhi, Robin Doss:
Examining usable security features and user perceptions of Physical Authentication Devices. Comput. Secur. 139: 103664 (2024) - [j14]Mohammad Reza Nosouhi, Keshav Sood, Vinay Chamola, Jongkil Jay Jeong, Anuroop Gaddam:
Towards quantum-secure software defined networks. IET Quantum Commun. 5(1): 66-71 (2024) - [j13]Jongkil Jay Jeong, Syed Wajid Ali Shah, Ashish Nanda, Robin Doss, Mohammad Reza Nosouhi, Jeb Webb:
User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Devices. IEEE Trans. Hum. Mach. Syst. 54(5): 554-564 (2024) - [c7]Mohammad Reza Nosouhi, Zubair A. Baig, Robin Doss, Divyans Mahansaria, Debi Prasad Pati, Praveen Gauravaram, Lei Pan, Keshav Sood:
Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments. ARES 2024: 145:1-145:11 - 2023
- [j12]Mohammad Reza Nosouhi, Syed Wajid Ali Shah, Lei Pan, Robin Doss:
Bit Flipping Key Encapsulation for the Post-Quantum Era. IEEE Access 11: 56181-56195 (2023) - [j11]Mohammad Reza Nosouhi, Shui Yu, Keshav Sood, Marthie Grobler, Raja Jurdak, Ali Dorri, Shigen Shen:
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies. IEEE Trans. Dependable Secur. Comput. 20(1): 242-255 (2023) - [j10]Keshav Sood, Mohammad Reza Nosouhi, Neeraj Kumar, Anuroop Gaddam, Bohao Feng, Shui Yu:
Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios. IEEE Trans. Dependable Secur. Comput. 20(1): 288-300 (2023) - [j9]Keshav Sood, Mohammad Reza Nosouhi, Dinh Duc Nha Nguyen, Frank Jiang, Morshed Chowdhury, Robin Doss:
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks. IEEE Trans. Inf. Forensics Secur. 18: 965-979 (2023) - [j8]Mohammad Reza Nosouhi, Syed W. Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss:
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism. IEEE Trans. Inf. Forensics Secur. 18: 2160-2174 (2023) - [j7]Keshav Sood, Dinh Duc Nha Nguyen, Mohammad Reza Nosouhi, Neeraj Kumar, Frank Jiang, Morshed Chowdhury, Robin Doss:
Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks. IEEE Trans. Netw. Serv. Manag. 20(3): 3831-3847 (2023) - [c6]Syed Wajid Ali Shah, Mohammad Reza Nosouhi, Lei Pan, Robin Doss:
SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems. APKC@AsiaCCS 2023: 2-9 - 2022
- [j6]Dinh Duc Nha Nguyen, Keshav Sood, Mohammad Reza Nosouhi, Yong Xiang, Longxiang Gao, Lianhua Chi:
RF Fingerprinting-Based IoT Node Authentication Using Mahalanobis Distance Correlation Theory. IEEE Netw. Lett. 4(2): 78-81 (2022) - [j5]Mohammad Reza Nosouhi, Keshav Sood, Neeraj Kumar, Tricia Wevill, Chandra Thapa:
Bushfire Risk Detection Using Internet of Things: An Application Scenario. IEEE Internet Things J. 9(7): 5266-5274 (2022) - [j4]Mohammad Reza Nosouhi, Keshav Sood, Marthie Grobler, Robin Doss:
Towards Spoofing Resistant Next Generation IoT Networks. IEEE Trans. Inf. Forensics Secur. 17: 1669-1683 (2022) - [i1]Mohammad Reza Nosouhi, Syed W. Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss:
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism. CoRR abs/2204.13885 (2022) - 2021
- [b2]Youyang Qu, Mohammad Reza Nosouhi, Lei Cui, Shui Yu:
Personalized Privacy Protection in Big Data. Springer 2021, ISBN 978-981-16-3749-0, pp. 1-139 - 2020
- [b1]Mohammad Reza Nosouhi:
Location Privacy Protection in Social Networks. University of Technology Sydney, Australia, 2020 - [j3]Mohammad Reza Nosouhi, Shui Yu, Wanlei Zhou, Marthie Grobler, Habiba Keshtiar:
Blockchain for secure location verification. J. Parallel Distributed Comput. 136: 40-51 (2020) - [j2]Mohammad Reza Nosouhi, Keshav Sood, Shui Yu, Marthie Grobler, Jingwen Zhang:
PASPORT: A Secure and Private Location Proof Generation and Verification Framework. IEEE Trans. Comput. Soc. Syst. 7(2): 293-307 (2020)
2010 – 2019
- 2019
- [j1]Lei Cui, Youyang Qu, Mohammad Reza Nosouhi, Shui Yu, Jianwei Niu, Gang Xie:
Improving Data Utility Through Game Theory in Personalized Differential Privacy. J. Comput. Sci. Technol. 34(2): 272-286 (2019) - [c5]Shiva Raj Pokhrel, Keshav Sood, Shui Yu, Mohammad Reza Nosouhi:
Policy-based Bigdata Security and QoS Framework for SDN/IoT: An Analytic Approach. INFOCOM Workshops 2019: 73-78 - [c4]Mohammad Reza Nosouhi, Shui Yu, Keshav Sood, Marthie Grobler:
HSDC-Net: Secure Anonymous Messaging in Online Social Networks. TrustCom/BigDataSE 2019: 350-357 - 2018
- [c3]Mohammad Reza Nosouhi, Shui Yu, Marthie Grobler, Yong Xiang, Zuqing Zhu:
SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification. GLOBECOM 2018: 1-6 - 2017
- [c2]Mohammad Reza Nosouhi, Vu Viet Hoang Pham, Shui Yu, Yong Xiang, Matthew J. Warren:
A Hybrid Location Privacy Protection Scheme in Big Data Environment. GLOBECOM 2017: 1-6 - [c1]Mohammad Reza Nosouhi, Youyang Qu, Shui Yu, Yong Xiang, Damien Manuel:
Distance-based location privacy protection in social networks. ITNAC 2017: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint