Niaz Chowdhury

ORCID: 0000-0003-2227-4187
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Vehicular Ad Hoc Networks (VANETs)
  • COVID-19 Digital Contact Tracing
  • Cloud Data Security Solutions
  • Opportunistic and Delay-Tolerant Networks
  • Privacy-Preserving Technologies in Data
  • Privacy, Security, and Data Protection
  • Caching and Content Delivery
  • Mobile Ad Hoc Networks
  • Electric Vehicles and Infrastructure
  • Context-Aware Activity Recognition Systems
  • Advanced Malware Detection Techniques
  • Impact of Light on Environment and Health
  • Mobile Health and mHealth Applications
  • Banking stability, regulation, efficiency
  • Cooperative Communication and Network Coding
  • Online Learning and Analytics
  • Risk and Portfolio Optimization
  • Wireless Networks and Protocols
  • Spam and Phishing Detection
  • History and Developments in Astronomy
  • Green IT and Sustainability
  • Internet of Things and AI
  • Optimization and Mathematical Programming

The Open University
2016-2021

Griffith University
2020

La Trobe University
2020

Shahjalal University of Science and Technology
2020

Australian Catholic University
2020

Imperial College London
2020

University of Glasgow
2014

Trinity College Dublin
2008

Distributed Ledger Technology (DLT) has emerged as one of the most disruptive technologies in last decade. It promises to change way people do their business, track products, and manage personal data. Though concept DLT was first implemented 2009 Bitcoin, it gained significant attention only past few years. During this time, different enthusiasts commercial companies have proposed developed several platforms. These platforms are usually categorized public vs private, general purpose...

10.1109/access.2019.2953729 article EN cc-by IEEE Access 2019-01-01

Goal: As the Coronavirus Pandemic of 2019/2020 unfolds, a COVID-19 'Immunity Passport' has been mooted as way to enable individuals return back work. While quality antibody testing, availability vaccines, and likelihood even attaining immunity continue be researched, we address issues involved in providing tamper-proof privacy-preserving certification for test results vaccinations. Methods: We developed prototype mobile phone app requisite decentralized server architecture that facilitates...

10.1109/ojemb.2020.2999214 article EN cc-by IEEE Open Journal of Engineering in Medicine and Biology 2020-01-01

Contact tracing has become a vital tool for public health officials to effectively combat the spread of new diseases, such as novel coronavirus disease COVID-19. is not epidemiologist rather, it used manual or semi-manual approaches that are incredibly time-consuming, costly and inefficient. It mostly relies on human memory while scalability significant challenge in tackling pandemics. The unprecedented socio-economic impacts led researchers practitioners around world search technology-based...

10.1109/access.2020.3036718 article EN cc-by IEEE Access 2020-01-01

Choosing the right technologies to build an urban-scale IoT system can be challenging. There is often a focus on low-level architectural details such as scalability of message handling. In our experience building information requires high-level holistic approach that mixes traditional data collection from vendor-specific cloud backends, together with collected directly embedded hardware and mobile devices. Supporting this heterogeneous environment prove challenging lead complex systems are...

10.1145/2962735.2962747 article EN 2016-05-24

Abstract The Internet of Things (IoT) has recently emerged as an innovative technology capable empowering various areas such healthcare, agriculture, smart cities, homes and supply chain with real-time state-of-the-art sensing capabilities. Due to the underlying potential this technology, it already saw exponential growth in a wide variety use-cases multiple application domains. As researchers around globe continue investigate its aptitudes, collective agreement is that get best out harness...

10.1017/s0269888920000284 article EN The Knowledge Engineering Review 2020-01-01

Over-centralisation of data leads to tampering and sharing user information without the consent owners. This problem has been studied extensively in recent times providing separate solutions involving distributed storage, Blockchain technology Solid Pods. Individually these are not sufficient build realistic applications a decentralised environment; however, combination them can effectively provide more powerful useful use-cases. In this paper, we propose methods combining Pods ledgers...

10.1145/3366424.3385759 article EN Companion Proceedings of the The Web Conference 2018 2020-04-20

The central promise of the Internet Things (IoT) is to accelerate interaction with surroundings. Appliances such as smartwatches, smart bulbs, thermostats, fitness trackers, next-generation vehicles, and so on have gained ability communicate accept instructions from outside help various embedded devices. While doing so, they almost always operate little no human interaction. These devices, alongside a lot benefits, also bring forth several security challenges. From manufacturers' point view,...

10.1109/iccit48885.2019.9038563 article EN 2019-12-01

Abstract The popularity of smart cars is increasing around the world as they offer a wide range services and conveniences. These are equipped with variety sensors generating large amount data, many which critical. Besides, there multiple parties involved in lifespan car, such manufacturers, car owners, government agencies, third-party service providers who also generate data about vehicle. In addition to managing sharing among these entities secure privacy-friendly way great challenge...

10.1017/s0269888920000028 article EN The Knowledge Engineering Review 2020-01-01

An Accident Warning System (AWS) is a safety application that provides collision avoidance notifications for next generation vehicles whilst Vehicular Ad-hoc Networks (VANETs) provide the communication functionality to exchange these notifications. Despite much previous research, there little agreement on requirements accident warning systems. In order build practical system, it important ascertain system requirements, information be exchanged, and protocols needed between vehicles. This...

10.1109/wons.2014.6814726 article EN 2014-04-01

Contact tracing has become a vital tool for public health officials to effectively combat the spread of new diseases, such asthe novel coronavirus disease COVID-19. is not epidemiologist rather, it used manual or semi-manualapproaches that are incredibly time-consuming, costly and inefficient. It mostly relies on human memory while scalabilityis significant challenge in tackling pandemics. The unprecedented socio-economic impacts led researchersand practitioners around world search...

10.20944/preprints202006.0240.v2 preprint EN 2020-07-14

Peer-to-Peer (P2P) energy trading platforms are being actively designed, tested, and operated by engineers, power distribution companies, prosumers. The assurance of the accountability conduct different stakeholders through a robust trust management mechanism is imperative in such platforms. usage blockchain, as an underlying technology, can ensure numerous properties, immutability, transparency, traceable execution transactions, addition to ensuring establishment among entities system. Few...

10.1109/jiot.2021.3063710 article EN IEEE Internet of Things Journal 2021-03-08

Wearable devices continuously produce physiological data that can provide individuals critical information about their daily routine or fitness level in combination with smartphones without requiring manual calculations maintaining log-books. Real-time participant-generated enable large scale observational studies of health conditions, better insights into medical conditions and streamline clinical trial processes research. However, privacy is a major concern for there be lack trust among...

10.1109/cloudcom.2019.00070 article EN 2019-12-01

The energy drivers use to charge their Electric Vehicles (EVs) comes from various sources. Of those, some are renewable green sources such as solar photovoltaic systems (SolarPV) and home storage battery whilst called brown gas turbine, coal oil. To analyse the behaviour of EV how they household energy, separating mix is a necessity. This paper argues that Internet Things (IoT) can be helpful in achieving goal demonstrates pilot study showing process charging.

10.1145/2968219.2968346 article EN 2016-09-12

Regulatory compliance is an essential exercise in the modern societies confirming safety and prevention of harm to consumers. Despite many efforts from international national quality control authorities, transparency accountability regulatory remain a challenging technical-legal problem sitting atop heavy reliance on trust. This paper presents theoretical model aiming at improving for systems data audit introduces higher degree management control. It explores technical aspects two emerging...

10.1145/3341162.3349320 article EN 2019-09-09

The goal of this work is to design a new adaptive routing technique for ad hoc wireless networks. This paper proposed the basic deign algorithm that works based on principle Ant Colony Optimization (ACO). probabilistic changes its routes with change network topology over period time by learning environment. It identifies appropriate paths feedback previously travelled packets and maintains table accordingly. A self-made simulator implemented C++ used evaluate performance basis diverse issues...

10.1109/iccitechn.2008.4803126 article EN 2008-12-01
Coming Soon ...