Murdoch University Research Repository

Welcome to the Murdoch University Research Repository

The Murdoch University Research Repository is an open access digital collection of research
created by Murdoch University staff, researchers and postgraduate students.

Learn more

Publications: Kaosar, Mohammed

Stats for Kaosar, Mohammed
Export as [feed] RSS
Group by: Item Type | Year
Jump to: 2022 | 2021 | 2020 | 2019 | 2018 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2007 | 2006 | 2005 | 2004
Number of items: 59.

2022

Islam, M., Reza, Md.T., Kaosar, M. and Parvez, M.Z. (2022) Effectiveness of federated learning and CNN ensemble architectures for identifying brain tumors using MRI images. Neural Processing Letters .

Bhuiyan, M.N., Masum Billah, Md., Saha, D., Rahman, M.M.ORCID: 0000-0002-6778-7931 and Kaosar, M. (2022) IoT based health monitoring system and its challenges and opportunities. In: Boulouard, Z., Ouaissa, M., Ouaissa, M. and El Himer, S., (eds.) AI and IoT for Sustainable Development in Emerging Countries. Springer, Cham, pp. 403-415.

Khan, M.A.R, Kaosar, M.G., Shorfuzzaman, M. and Jakimoski, K. (2022) A New Handover Management Model for Two-Tier 5G Mobile Networks. Computers, Materials & Continua, 71 (3). pp. 5491-5509.

Ouaissa, M., Boulouard, Z., Ouaissa, M., Khan, I.U. and Kaosar, M. (2022) Preface. In: Ouaissa, M., Boulouard, Z., Ouaissa, M. and Maleh, Y., (eds.) Artificial Intelligence of Things in Smart Environments. De Gruyter, V-VI.

2021

Makhdoom, L., Hayawi, K., Kaosar, M., Mathew, S. and Masud, M. (2021) Blockchain-based Secure CIDS Operation. In: 5th Cyber Security in Networking Conference (CSNet 2021), 12 - 14 October 2014, Abu Dhabi, UAE

Makhdoom, I., Hayawi, K., Kaosar, M., Mathew, S.S. and Masud, M.M. (2021) Blockchain-based Secure CIDS Operation. In: 5th Cyber Security in Networking Conference (CSNet) 2021, 12 - 14 October 2021, Abu Dhabi, United Arab Emirates

Hussain, S., Sajid Ullah, S., Shorfuzzaman, M., Uddin, M. and Kaosar, M. (2021) Cryptanalysis of an online/offline certificateless signature scheme for Internet of Health Things. Intelligent Automation & Soft Computing, 30 (3). pp. 983-993.

Makhdoom, I., Hayawi, K., Kaosar, M., Mathew, S.S. and Ho, P-H (2021) D2Gen: A decentralized device genome based integrity verification mechanism for collaborative intrusion detection systems. IEEE Access, 9 . pp. 137260-137280.

Shahraki, A., Abbasi, M., Taherkordi, A. and Kaosar, M. (2021) Internet traffic classification using an ensemble of deep convolutional neural networks. In: 4th FlexNets Workshop on Flexible Networks Artificial Intelligence Supported Network Flexibility and Agility (Part of SIGCOMM '21), 23 August 2021, Virtual pp. 38-43.

Kagita, M.K., Thilakarathne, N., Bojja, G.R. and Kaosar, M. (2021) A lossless compression technique for Huffman-based differential encoding in IoT for smart agriculture. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 29 (Supp. 02). pp. 317-332.

2020

Sharif, H., Haroon, K.M., Paracha, Z.J., Kaosar, M. and Javed, H. (2020) Identification of low frequency oscillation disturbance with the help of phasor measurement unit. Solid State Technology, 63 (1 Supp.).

Kaosar, M. and Yi, X. (2020) Privacy preserving participatory sensor network on named data networking infrastructure. International Journal of Wireless & Mobile Networks, 12 (1).

Sharif, H., Oo, A.M.T., Haroon, K.M. and Kaosar, M. (2020) Protection of interconnected transmission network using phasor measurement unit scheme. International Research Journal of Engineering and Technology, 7 (8). pp. 4303-4308.

Magomelo, M. and Kaosar, M. (2020) Security and privacy preserving in precision agriculture. In: 2nd African International Conference on Industrial Engineering and Operations Management, 7 - 10 December 2020, Harare, Zimbabwe

Chimeura, T. and Kaosar, M. (2020) User identity preservation and data protection in the Internet of Things. In: 2nd African International Conference on Industrial Engineering and Operations Management, 7 - 10 December 2020, Harare, Zimbabwe

Haroon, K.M., Sharif, H., Kaosar, M. and Javed, H. (2020) A review on different algorithms and methods used for neural spike detection. International Research Journal of Engineering and Technology (IRJET), 7 (8). pp. 4098-4104.

Sharif, H., Oo, A.M.T., Haroon, K.M. and Kaosar, M. (2020) A review on various Smart Grid Technologies used in Power System. International Research Journal of Engineering and Technology, 7 (8). pp. 4091-4097.

2019

Trang, C., Ahmed, R. and Kaosar, M.G. (2019) Liquid water film on the outer surface of a half-submerged rotating drum. Journal of Plastic Film & Sheeting, 35 (3). pp. 281-294.

2018

Binajjaj, A., Sheltami, T., Aliyu, F. and Kaosar, M. (2018) Design and implementation of a wearable gas sensor network for oil and gas industry workers. Journal of Computers, 13 (3). pp. 300-308.

Albugami, S., Arief, B. and Kaosar, M. (2018) Privacy statement regulating based on user preferences using document mining. International Journal of Security, Privacy and Trust Management (IJSPTM) .

2016

Alabdulatif, A. and Kaosar, M. (2016) Privacy preserving cloud computation using Domingo-Ferrer scheme. Journal of King Saud University - Computer and Information Sciences, 28 (1). pp. 27-36.

2015

Al-Bugami, S., Arif, B. and Kaosar, M. (2015) Shaping and regulating privacy statements to increase customer satisfaction. In: Customer Service in the Public Sector Conference, 17 - 19 November 2015, The Saudi Ministry of Civil Service, Saudi Arabia

Alhamid, A., Al-Khaldi, K. and Kaosar, M. (2015) Smart home base safe playground for kids. In: Playground Conference KSU, 13 July 2015, Ryadh, KSA

2014

Mamun, Q., Islam, R. and Kaosar, M. (2014) Anomaly detection in wireless sensor networks. Journal of Networks, 9 (11). pp. 2914-2924.

Kaosar, M.G. (2014) Backtracking based integer factorisation, primality testing and square root calculation. In: CCSIT 2014 : The Fourth International Conference on Computer Science and Information Technology, 21 - 22 February 2014, Sydney, Australia

Rabbi, K., Islam, R., Mamun, Q. and Kaosar, M.G. (2014) MTTG: An efficient technique for test data generation. In: The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014), 18 - 20 Dec. 2014, Dhaka, Bangladesh

Kaosar, M. and Mamun, Q. (2014) Privacy-Preserving Interest Group Formation in Online Social Networks (OSNs) Using Fully Homomorphic Encryption. Journal of Information Privacy and Security, 10 (1). pp. 44-52.

Paulet, R., Kaosar, M.G., Yi, X. and Bertino, E. (2014) Privacy-Preserving and Content-Protecting Location Based Queries. IEEE Transactions on Knowledge and Data Engineering, 26 (5). pp. 1200-1210.

Mamun, Q. and Kaosar, M. (2014) What is the first step in designing an application protocol for wireless sensor networks (WSNs)? In: IEEE Sensors Applications Symposium (SAS) 2014, 18 - 20 February 2014, Queenstown, New Zealand

Mandal, A.K., Kaosar, M., Islam, M.O. and Hossain, M.D. (2014) An approach for enhancing message security in audio steganography. In: 16th International Conference on Computer and Information Technology, 8 - 10 March 2014, Khulna, Bangladesh

Rabbi, K., Kaosar, M., Islam, M.R. and Mamun, Q. (2014) A secure real time data processing framework for Personally Controlled Electronic Health Record (PCEHR) System. In: Tian, J., Jing, J. and Srivatsa, M., (eds.) SecureComm 2014: International Conference on Security and Privacy in Communication Networks. Springer, Cham, pp. 141-156.

2013

Mamun, Q., Islam, R. and Kaosar, M. (2013) Ensuring data integrity by anomaly node detection during Data Gathering in WSNs. In: Zia, T., Zomaya, A., Varadharajan, V. and Mao, M., (eds.) Security and Privacy in Communication Networks. Springer, Cham, pp. 367-379.

Mamun, Q., Islam, R. and Kaosar, M. (2013) Establishing secured communications in cluster based wireless sensor networks. In: International Symposium on Wireless and pervasive Computing (ISWPC) 2013, 20 - 22 November 2013, Taipei, Taiwan

Begum, M., Mamun, Q. and Kaosar, M. (2013) A Privacy-Preserving Framework for Personally Controlled Electronic Health Record (PCEHR) System. In: 2nd Australian eHealth Informatics and Security Conference, 2 - 4 December 2013, Edith Cowan University, WA

Kaosar, M.G. and Yi, X. (2013) Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree. In: Nemati, H., (ed.) Privacy Solutions and Security Frameworks in Information Protection. IGI Global, pp. 82-102.

Yi, X., Kaosar, M.G., Paulet, R. and Bertino, E. (2013) Single-Database private information retrieval from fully homomorphic encryption. IEEE Transactions on Knowledge and Data Engineering, 25 (5). pp. 1125-1134.

Kaosar, M., Mamun, Q., Islam, R. and Yi, X. (2013) (k − n) Oblivious Transfer Using Fully Homomorphic Encryption System. In: Zia, T., Zomaya, A., Varadharajan, V. and Mao, M., (eds.) Security and Privacy in Communication Networks. Springer, Cham, pp. 380-392.

2012

Kaosar, M.G., Paulet, R. and Yi, X. (2012) Fully homomorphic encryption based two-party association rule mining. Data & Knowledge Engineering, 76-78 . pp. 1-15.

2011

Kaosar, M.G., Paulet, R. and Yi, X. (2011) Optimized two party privacy preserving association rule mining using fully homomorphic encryption. In: Xiang, Y., Cuzzocrea, A., Hobbs, M. and Zhou, W., (eds.) ICA3PP 2011: Algorithms and Architectures for Parallel Processing. Springer, Berlin, Heidelberg, pp. 360-370.

Kaosar, M.G. and Yi, X. (2011) Privacy Preserving Data Gathering in Wireless Sensor Network. In: Kar, D.C. and Syed, R., (eds.) Network Security, Administration and Management. IGI Global, pp. 237-251.

Kaosar, M.G. and Yi, X. (2011) Secure Two-Party association rule mining based on One-Pass FP-Tree. International Journal of Information Security and Privacy, 5 (2). pp. 13-32.

Kaosar, M.G., Paulet, R. and Yi, X. (2011) Secure two-party association rule mining. In: 9th Australasian Information Security Conference (AISC '11), 17 - 20 January 2011, Perth, Australia

Paulett, R., Kaosar, M.G. and Yi, X. (2011) k-Anonymous private query based on blind signature and oblivious transfer. In: 2nd International Cyber Resilience Conference, 1 - 2 August 2011, The Duxton Hotel, Perth

2010

Kaosar, M.G. and Yi, X. (2010) Semi-Trusted mixer based privacy preserving distributed data mining for resource constrained devices. International Journal of Computer Science and Information Security,, 8 (1). pp. 44-51.

2009

Kaosar, M.G., Xu, Z. and Yi, X. (2009) Distributed association rule mining with minimum communication payload. In: The 8th Australasian Data Mining Conference (AusDM 2009), 1 - 4 December 2009, Melbourne, Australia

Kaosar, M.G. and Yi, X. (2009) Privacy preserving association rule mining in ubiquitous computing environment. Ubiquitous Computing and Communication Journal, 6 (3). pp. 925-933.

Kaosar, M.G. and Sheltami, T.R. (2009) Voice transmission over ad hoc network adapting optimum approaches to maximize the performance. Computer Communications, 32 (4). pp. 634-639.

2007

Kaosar, M.G., Sheltami, T.R. and Mahmoud, A.S.H. (2007) Delay and Power Efficient Voice Transmission over MANET. In: IEEE International Conference on Communications 2007, 24 - 28 June 2007, Glasgow, UK

2006

Kaosar, M.G. and Sheltami, T.R. (2006) Effect of voice transmission over MANET using energy aware cluster based routing protocol. In: TSSA and WSSA 2006, 8 - 9 December 2006, Bandung, Indonesia

Sheltami, T.R. and Kaosar, M.G. (2006) Improved caching mechanism for Ad-hoc Network Routing Protocol. PCTE Journal of Computer Sciences, 2 (2).

Kaosar, M.G. (2006) Shortest and simplest solutions for N-Queen problem. PCTE Journal of Computer Science, 2 (2).

Kaosar, M.G., Hasif, A.M., Sheltami, T.R. and Mahmoud, A.S.H. (2006) Simulation study of delay analysis for voice transmission over MANET. In: 1st IEEE International Conference on Information and Industrial Systems (ICIIS) 2006, 8 - 11 August 2006, Peradeniya, Sri Lanka

2005

Kaosar, M.G. and Asif, H.M. (2005) Comparative Study of Two MANET Routing Protocols DSR and TORA Using OPNET. In: 2nd CIIT Workshop on Research in Computing, 18 November 2005, Lahore, Pakistan.

Kaosar, M.G. (2005) Finding multiple solutions from a single solution of N-Queen Problem. In: International Conferences on Challenges and Opportunities in IT Industry (ICCII 2005), 12 November 2005, Ludhiana, Punjab, India

Kaosar, M.G. (2005) Finding multiple solutions from a single solution of N-queen problem. PCTE Journal of Computer Sciences, 1 (2).

Kaosar, M.G. (2005) Primality Test – An Enhanced Method. In: International Conferences on Challenges and Opportunities in IT Industry (ICCII 2005), 12 November 2005, Ludhiana, Punjab, India

Kaosar, M.G. (2005) Solving the N-Queen Problem Using Direct Placement Method. In: International Conference On Intelligent Systems (ICIS 2005), 1 - 3 December 2005, Kuala Lumpur, Malaysia

Hassan, M.M., Islam, S.M.S. and Kaosar, M.G. (2005) ”Virtual Ear”: A centre based visual clustering approach. In: International Conference On Intelligent Systems (ICIS 2005), 1 - 3 December 2005, Kuala Lumpur, Malaysia

2004

Kaosar, M.G., Shorfuzzaman, M. and Ahmed, S. (2004) A novel approach to solving N-queens problem. In: 8th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2004), 18 - 21 July 2004, Orlando, FL

This list was generated on Sun Mar 26 21:29:39 2023 UTC.