Privacy-preserving and content-protecting location based queries R Paulet, MG Kaosar, X Yi, E Bertino IEEE transactions on knowledge and data engineering 26 (5), 1200-1210, 2013 | 211 | 2013 |
Single-database private information retrieval from fully homomorphic encryption X Yi, MG Kaosar, R Paulet, E Bertino IEEE Transactions on Knowledge and Data Engineering 25 (5), 1125-1134, 2012 | 126 | 2012 |
Fully homomorphic encryption based two-party association rule mining MG Kaosar, R Paulet, X Yi Data & Knowledge Engineering 76, 1-15, 2012 | 52 | 2012 |
The role of collective effects on settling velocity enhancement for inertial particles in turbulence PD Huck, C Bateson, R Volk, A Cartellier, M Bourgoin, A Aliseda Journal of Fluid Mechanics 846, 1059-1075, 2018 | 47 | 2018 |
Simulation-based comparative study of on demand routing protocols for MANET MG Kaosar, HM Asif, TR Sheltami, ASH Mahmoud International Conference on Wireless Networking and Mobile Computing 1, 201-206, 2005 | 46 | 2005 |
Effectiveness of federated learning and CNN ensemble architectures for identifying brain tumors using MRI images M Islam, MT Reza, M Kaosar, MZ Parvez Neural Processing Letters 55 (4), 3779-3809, 2023 | 44 | 2023 |
Social media bot detection with deep learning methods: a systematic review K Hayawi, S Saha, MM Masud, SS Mathew, M Kaosar Neural Computing and Applications 35 (12), 8903-8918, 2023 | 25 | 2023 |
An approach for enhancing message security in audio steganography AK Mandal, M Kaosar, MO Islam, MD Hossain 16th Int'l Conf. Computer and Information Technology, 383-388, 2014 | 20 | 2014 |
Distributed Association rule mining with minimum communication overhead MG Kaosar, Z Xu, X Yi Proceedings of the Eighth Australasian Data Mining Conference-Volume 101, 17-23, 2009 | 18 | 2009 |
A framework for intelligent IoT firmware compliance testing MK Kagita, GR Bojja, M Kaosar Internet of Things and Cyber-Physical Systems 1, 1-7, 2021 | 17 | 2021 |
Anomaly detection in wireless sensor networks Q Mamun, MDR Islam, M Kaosar Journal of Networks 9 (11), 2914-2924, 2014 | 17 | 2014 |
Performance improvement of dynamic source routing protocol considering the mobility effect of nodes in cache management MG Kaosar, ASH Mahmoud, TR Sheltami The Third IEEE and IFIP International Conference on Wireless and Optical …, 2006 | 13 | 2006 |
Secure two-party association rule mining MG Kaosar, R Paulet, X Yi Proceedings of the Ninth Australasian Information Security Conference-Volume …, 2011 | 12 | 2011 |
Stock price prediction: comparison of different moving average techniques using deep learning model MM Billah, A Sultana, F Bhuiyan, MG Kaosar Neural Computing and Applications 36 (11), 5861-5871, 2024 | 11 | 2024 |
Cryptanalysis of an online/offline certificateless signature scheme for Internet of Health Things S Hussain, SS Ullah, M Shorfuzzaman, M Uddin, M Kaosar Intelligent Automation & Soft Computing 30 (3), 983-993, 2021 | 11 | 2021 |
A privacy-preserving framework for personally controlled electronic health record (PCEHR) system M Begum, Q Mamun, M Kaosar SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2013 | 11 | 2013 |
A lossless compression technique for Huffman-based differential encoding in IoT for smart agriculture MK Kagita, N Thilakarathne, GR Bojja, M Kaosar International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems …, 2021 | 10 | 2021 |
D2Gen: A Decentralized Device Genome based Integrity Verification Mechanism for Collaborative Intrusion Detection Systems PHO I. Makhdoom, K. Hayawi, Mohammed Kaosar, S. Mathew AEEE Access 9, 137260-137280, 2021 | 10* | 2021 |
Internet traffic classification using an ensemble of deep convolutional neural networks A Shahraki, M Abbasi, A Taherkordi, M Kaosar Proceedings of the 4th FlexNets Workshop on Flexible Networks Artificial …, 2021 | 9 | 2021 |
Design and Implementation of a Wearable Gas Sensor Network for Oil and Gas Industry Workers. A Binajjaj, TR Sheltami, F Aliyu, M Kaosar J. Comput. 13 (3), 300-308, 2018 | 9 | 2018 |