Mohammed Golam Kaosar
Mohammed Golam Kaosar
Senior Lecturer, Murdoch University
Verified email at
Cited by
Cited by
Privacy-preserving and content-protecting location based queries
R Paulet, MG Kaosar, X Yi, E Bertino
IEEE transactions on knowledge and data engineering 26 (5), 1200-1210, 2013
Single-database private information retrieval from fully homomorphic encryption
X Yi, MG Kaosar, R Paulet, E Bertino
IEEE Transactions on Knowledge and Data Engineering 25 (5), 1125-1134, 2012
Fully homomorphic encryption based two-party association rule mining
MG Kaosar, R Paulet, X Yi
Data & Knowledge Engineering 76, 1-15, 2012
The role of collective effects on settling velocity enhancement for inertial particles in turbulence
PD Huck, C Bateson, R Volk, A Cartellier, M Bourgoin, A Aliseda
Journal of Fluid Mechanics 846, 1059-1075, 2018
Simulation-based comparative study of on demand routing protocols for MANET
MG Kaosar, HM Asif, TR Sheltami, ASH Mahmoud
International Conference on Wireless Networking and Mobile Computing 1, 201-206, 2005
Effectiveness of federated learning and CNN ensemble architectures for identifying brain tumors using MRI images
M Islam, MT Reza, M Kaosar, MZ Parvez
Neural Processing Letters 55 (4), 3779-3809, 2023
Social media bot detection with deep learning methods: a systematic review
K Hayawi, S Saha, MM Masud, SS Mathew, M Kaosar
Neural Computing and Applications 35 (12), 8903-8918, 2023
An approach for enhancing message security in audio steganography
AK Mandal, M Kaosar, MO Islam, MD Hossain
16th Int'l Conf. Computer and Information Technology, 383-388, 2014
Distributed Association rule mining with minimum communication overhead
MG Kaosar, Z Xu, X Yi
Proceedings of the Eighth Australasian Data Mining Conference-Volume 101, 17-23, 2009
Anomaly detection in wireless sensor networks
Q Mamun, MDR Islam, M Kaosar
Journal of Networks 9 (11), 2914-2924, 2014
A framework for intelligent IoT firmware compliance testing
MK Kagita, GR Bojja, M Kaosar
Internet of Things and Cyber-Physical Systems 1, 1-7, 2021
Performance improvement of dynamic source routing protocol considering the mobility effect of nodes in cache management
MG Kaosar, ASH Mahmoud, TR Sheltami
The Third IEEE and IFIP International Conference on Wireless and Optical …, 2006
Secure two-party association rule mining
MG Kaosar, R Paulet, X Yi
Proceedings of the Ninth Australasian Information Security Conference-Volume …, 2011
Cryptanalysis of an online/offline certificateless signature scheme for Internet of Health Things
S Hussain, SS Ullah, M Shorfuzzaman, M Uddin, M Kaosar
Intelligent Automation & Soft Computing 30 (3), 983-993, 2021
A privacy-preserving framework for personally controlled electronic health record (PCEHR) system
M Begum, Q Mamun, M Kaosar
SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2013
Privacy preserving cloud computation using Domingo-Ferrer scheme
A Alabdulatif, M Kaosar
Journal of King Saud University-Computer and Information Sciences 28 (1), 27-36, 2016
Performance Comparison of IP
HM Asif, MG Kaosar
ATM and MPLS Based Network Cores Using OPNET,‖ in 1st IEEE International …, 2006
Stock price prediction: comparison of different moving average techniques using deep learning model
MM Billah, A Sultana, F Bhuiyan, MG Kaosar
Neural Computing and Applications 36 (11), 5861-5871, 2024
A lossless compression technique for Huffman-based differential encoding in IoT for smart agriculture
MK Kagita, N Thilakarathne, GR Bojja, M Kaosar
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems …, 2021
D2Gen: A Decentralized Device Genome based Integrity Verification Mechanism for Collaborative Intrusion Detection Systems
PHO I. Makhdoom, K. Hayawi, Mohammed Kaosar, S. Mathew
AEEE Access 9, 137260-137280, 2021
The system can't perform the operation now. Try again later.
Articles 1–20