Personal information

Activities

Employment (1)

Deakin University - Melbourne Burwood Campus: Melbourne, VIC, AU

Research Fellow (Faculty of Sci Eng & Built Env- Centre for Cyber Security Research and Innovation)
Employment
Source: Self-asserted source
Mohammad Reza Nosouhi

Works (28)

User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Devices

IEEE Transactions on Human-Machine Systems
2024 | Journal article
Contributors: Jongkil Jay Jeong; Syed Wajid Ali Shah; Ashish Nanda; Robin Doss; Mohammad Nosouhi; Jeb Webb
Source: check_circle
Crossref

Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments

2024-07-30 | Conference paper
Contributors: Mohammad Reza Nosouhi; Zubair Baig; Robin Doss; Divyans Mahansaria; Debi Prasad Pati; Praveen Gauravaram; Lei Pan; Keshav Sood
Source: check_circle
Crossref

Towards quantum‐secure software defined networks

IET Quantum Communication
2024-03 | Journal article
Contributors: Mohammad Reza Nosouhi; Keshav Sood; Vinay Chamola; Jongkil Jay Jeong; Anuroop Gaddam
Source: check_circle
Crossref

Bit Flipping Key Encapsulation for the Post-Quantum Era

IEEE Access
2023 | Journal article
Contributors: Mohammad Reza Nosouhi; Syed Wajid Ali Shah; Lei Pan; Robin Doss
Source: check_circle
Crossref

Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks

IEEE Transactions on Information Forensics and Security
2023 | Journal article
Contributors: Keshav Sood; Mohammad Reza Nosouhi; Dinh Duc Nha Nguyen; Frank Jiang; Morshed Chowdhury; Robin Doss
Source: check_circle
Crossref

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism

IEEE Transactions on Information Forensics and Security
2023 | Journal article
Contributors: Mohammad Reza Nosouhi; Syed W. Shah; Lei Pan; Yevhen Zolotavkin; Ashish Nanda; Praveen Gauravaram; Robin Doss
Source: check_circle
Crossref

Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks

IEEE Transactions on Network and Service Management
2023-09 | Journal article
Contributors: Keshav Sood; Dinh Duc Nha Nguyen; Mohammad Reza Nosouhi; Neeraj Kumar; Frank Jiang; Morshed Chowdhury; Robin Doss
Source: check_circle
Crossref

SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems

2023-07-10 | Conference paper
Contributors: Syed Wajid Ali Shah; Mohammad Reza Nosouhi; Lei Pan; Robin Doss
Source: check_circle
Crossref

Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios

IEEE Transactions on Dependable and Secure Computing
2023-01-01 | Journal article
Contributors: Keshav Sood; Mohammad Reza Nosouhi; Neeraj Kumar; Anuroop Gaddam; Bohao Feng; Shui Yu
Source: check_circle
Crossref

UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies

IEEE Transactions on Dependable and Secure Computing
2023-01-01 | Journal article
Contributors: Mohammad Reza Nosouhi; Shui Yu; Keshav Sood; Marthie Grobler; Raja Jurdak; Ali Dorri; Shigen Shen
Source: check_circle
Crossref

Towards Spoofing Resistant Next Generation IoT Networks

IEEE Transactions on Information Forensics and Security
2022 | Journal article
Contributors: Mohammad Reza Nosouhi; Keshav Sood; Marthie Grobler; Robin Doss
Source: check_circle
Crossref

RF Fingerprinting-Based IoT Node Authentication Using Mahalanobis Distance Correlation Theory

IEEE Networking Letters
2022-06 | Journal article
Contributors: Dinh Duc Nha Nguyen; Keshav Sood; Mohammad Reza Nosouhi; Yong Xiang; Longxiang Gao; Lianhua Chi
Source: check_circle
Crossref

Bushfire Risk Detection Using Internet of Things: An Application Scenario

IEEE Internet of Things Journal
2022-04-01 | Journal article
Contributors: Mohammad Reza Nosouhi; Keshav Sood; Neeraj Kumar; Tricia Wevill; Chandra Thapa
Source: check_circle
Crossref

Existing Privacy Protection Solutions

2021 | Book chapter
Contributors: Youyang Qu; Mohammad Reza Nosouhi; Lei Cui; Shui Yu
Source: check_circle
Crossref

Future Research Directions

2021 | Book chapter
Contributors: Youyang Qu; Mohammad Reza Nosouhi; Lei Cui; Shui Yu
Source: check_circle
Crossref

Introduction

2021 | Book chapter
Contributors: Youyang Qu; Mohammad Reza Nosouhi; Lei Cui; Shui Yu
Source: check_circle
Crossref

Leading Attacks in Privacy Protection Domain

2021 | Book chapter
Contributors: Youyang Qu; Mohammad Reza Nosouhi; Lei Cui; Shui Yu
Source: check_circle
Crossref

Personalized Privacy Protection in Big Data

2021 | Book
Contributors: Youyang Qu; Mohammad Reza Nosouhi; Lei Cui; Shui Yu
Source: check_circle
Crossref

Personalized Privacy Protection Solutions

2021 | Book chapter
Contributors: Youyang Qu; Mohammad Reza Nosouhi; Lei Cui; Shui Yu
Source: check_circle
Crossref

Summary and Outlook

2021 | Book chapter
Contributors: Youyang Qu; Mohammad Reza Nosouhi; Lei Cui; Shui Yu
Source: check_circle
Crossref

Blockchain for secure location verification

Journal of Parallel and Distributed Computing
2020 | Journal article
EID:

2-s2.0-85074527923

Contributors: Nosouhi, M.R.; Yu, S.; Zhou, W.; Grobler, M.; Keshtiar, H.
Source: Self-asserted source
Mohammad Reza Nosouhi via Scopus - Elsevier

PASPORT: A Secure and Private Location Proof Generation and Verification Framework

IEEE Transactions on Computational Social Systems
2020-04 | Journal article
Contributors: Mohammad Reza Nosouhi; Keshav Sood; Shui Yu; Marthie Grobler; Jingwen Zhang
Source: check_circle
Crossref

HSDC-Net: Secure anonymous messaging in online social networks

Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019
2019 | Conference paper
EID:

2-s2.0-85075173212

Contributors: Nosouhi, M.R.; Yu, S.; Sood, K.; Grobler, M.
Source: Self-asserted source
Mohammad Reza Nosouhi via Scopus - Elsevier

Improving Data Utility Through Game Theory in Personalized Differential Privacy

Journal of Computer Science and Technology
2019 | Journal article
EID:

2-s2.0-85063607300

Contributors: Cui, L.; Qu, Y.; Nosouhi, M.R.; Yu, S.; Niu, J.-W.; Xie, G.
Source: Self-asserted source
Mohammad Reza Nosouhi via Scopus - Elsevier

Policy-based Bigdata Security and QoS Framework for SDN/IoT: An Analytic Approach

INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019
2019 | Conference paper
EID:

2-s2.0-85073233293

Contributors: Pokhrel, S.R.; Sood, K.; Yu, S.; Nosouhi, M.R.
Source: Self-asserted source
Mohammad Reza Nosouhi via Scopus - Elsevier

SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification

2018 IEEE Global Communications Conference (GLOBECOM)
2018 | Other
Contributors: Mohammad Reza Nosouhi; Shui Yu; Marthie Grobler; Yong Xiang; Zuqing Zhu
Source: Self-asserted source
Mohammad Reza Nosouhi via Crossref Metadata Search
grade
Preferred source (of 2)‎

A hybrid location privacy protection scheme in big data environment

2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings
2017 | Conference paper
EID:

2-s2.0-85046469362

Contributors: Nosouhi, M.R.; Pham, V.V.H.; Yu, S.; Xiang, Y.; Warren, M.
Source: Self-asserted source
Mohammad Reza Nosouhi via Scopus - Elsevier

Distance-based location privacy protection in social networks

2017 27th International Telecommunication Networks and Applications Conference, ITNAC 2017
2017 | Conference paper
EID:

2-s2.0-85046660096

Contributors: Nosouhi, M.R.; Qu, Y.; Yu, S.; Xiang, Y.; Manuel, D.
Source: Self-asserted source
Mohammad Reza Nosouhi via Scopus - Elsevier