Dr Rahman Ziaur
Faculty of Science,
School of Computer Science
Biography
As a Research Fellow within the Trusted Networks Lab at QUT, Rahman Ziaur has been working on two work packages for a major Cybersecurity project funded by the CSCRC. The project is SOCRATES: Software Security with a Focus on Critical Technologies.Being passionate in order theory and algebraic structure, he has been moving parts on ring learning with error, dua lattice, short integer solution, shortest vector problem, etc. His current research outcomes include designing a novel data authentication technique for the next-generation quantum computing. He also has developed theorems, proofs, employed graph data science, done large-scale experiments on package networks, and discovered open-source software risk propagation techniques with a proposal of a novel solution so enterprises can avoid potentially harmful dependencies.
Before this, Rahman developed several hands-on security applications, including a Blockchain-based secure billing system for BIPV (Tools: Hyperledger Fabric, Java), a Machine-learning-driven patient readmission system (HelthDM) (Tools: Random Forest Model, Django, AWS EC2) for the NSW government, V-CISO demo tool (Tools: Python, Django) for the CSCRC project, supervised developing the online judge system (Tools: Java, Laravel, SQL) that are currently live/in use.
He received PhD in Cybersecurity from RMIT University, Melbourne, where his PhD thesis was classified as outstanding (top 5%), and he was the recipient of a STEM Higher Degree by Research (HDR) Award. Dr Rahman has an expertise in solving security and privacy challenges of the large-scale internet of things. His PhD research revealed a blockchain-based, AI-enabled, certificate-less data protection mechanism against advanced persistent threats targeting IoT ecosystem.
Rahman served academia overseas, several academia-industry cooperated projects in Australia and published high-quality publications in the top journals (i.e., IEEE ComMag, JIoT, TII) and conferences (AsiaCCS), including the articles nominated and received best paper awards. He has been affiliated with ACM, ACS, AISA, IEB and IEEE as a member/professional member. His research interests include Privacy-preserved IoT security, post-quantum cryptography, blockchain technology, edge machine learning, software security, etc. He accepts HDR Masters and Ph.D. students with backgrounds matching his interests.
Ref: Resume of Rahman Ziaur | DBLP | Arxiv | GitHub
Expertise related to UN Sustainable Development Goals
In 2015, UN member states agreed to 17 global Sustainable Development Goals (SDGs) to end poverty, protect the planet and ensure prosperity for all. This person’s work contributes towards the following SDG(s):
Personal details
Positions
- Research Fellow in Cyber Security
Faculty of Science,
School of Computer Science
Keywords
Blockchain Technology, Internet of Things Security, Edge Machine Learning, Software Security, Post-quantum Cryptography, Cybersecurity
Research field
Distributed Computing, Computer Software, Artificial Intelligence and Image Processing
Field of Research code, Australian and New Zealand Standard Research Classification (ANZSRC), 2008
Qualifications
- Doctor of Philosophy (RMIT University Melbourne)
Professional memberships and associations
Professional Member, Australian Information Security Association (AISA), Australia
- Registration number: M289361ID
- Current status: Active
Professional Member, Association for Computing Machinery, USA
- Registration number: 7441133
- Current status: Active
Full Member, Institute of Electrical and Electronics Engineers (IEEE), USA
- Registration number 94742759
- Current status: Active
Full Member, Australian Computer Society (ACS), Australia
- Registration number 4265362
- Current status: Active
- Area of Continous Profession Hours (CPD): Cyber Security Analyst ( Completed Session & Risk Management with 100% score)
Full Member, Institution of Engineers (IEB), Bangladesh
- Registration number 41139
- Date of expiry: NA
- Current status: Active
Teaching
Academic courses conducted:
[1] Advanced Networks (IFN649 @QUT)
- This unit is designed for graduate students in the Masters of IT. Students will learn the theory, architecture, hardware/software, and programming of networks, including network services and Internet-of-Things (IoT).
[2] Programming Foundations in Python (FIT9133 @Monash Uni)
- Basic python programming. Jupiter Notebook., Python for network security
[3] Programming with C++ Theory & Practical (ICT -2103 & 2104 @MBSTU)
- Structural programming, Object-oriented programming, Collection , File I/O, project Development.
[4] Advanced Java & Practical (ICT-2205 & 2206 @MBSTU)
- Java Standard Edition (JDK 1.12), Java Enterprise Edition (J2EE), Java FX UI, Project Development.
[5] Secure Electronic Commerce & Sessional (CS-1950 @RMIT)
- Symmetric Encryption, Assymetric Encryption, RSA, RSADSA, ECDSA, Elgamal, Secure Payment Gateway, Blind Signature, etc.
[6] Cyber Security (SWE-3203 @DIU)
[7] Software Quality Assurance and Testing (ICT-5105-5106 @MBSTU)
- J-Unit Testing, Testing Annotation, Project Development
For more, list of courses I conducted so far are also available on Linkedin.
Cybersecurity Learning Help:
- How to generate a chart using python matplotlib and pandas? 📄
- What is IoT? Can you make me understand with an example? 📄
- What is digital currency? Do Fiat, Commodity, Coupon and Crypto confuse you like me? 📄
- What is Blockchain? Need a simple answer? 📄
- Have heard about Hyperledger permissioned Blockchain? Here is its consensus look like. 📄
- Do you want to understand RSA algorithm with a simple example? 📄
- Do you know how RSA works with Digital Signature Algorithm (DSA)? 📄
- What if we consider an El Gamal encryption scheme over an Elliptic curve ? Here is the simple example. 📄
- Multi-signature/Signature Aggregation : Let 's calculate some well-known multisig schemes. Yes, Multi-signature (9 examples): Kiesler-Harn & GQ Identity-based (IBE), Okamato, Schnorr, and Boneh–Lynn–Shacham (BLS) signature aggrgation techniques with curve singularity & cardinality are here. 📄
- Let's have a look on Cybersecurity tutorials now? It contains couple of topics that we eventually talk and use. For example, Contents such as Digital cash model, SSL/TLS Handshaking, Elliptic Curve Digital Signature Algorithm (ECDSA), Addition, Doubling formula, Elliptic Curve over Galois field, E-commerce security etc. Digital Envelope, Dual Signature (NIST recetnly recommends to use it for transitional post-quantum security) are here. (total 10 tutes) 📄
- Do you know Learning With Error (LWE)? Yes it is the core concept of lattice-based signatures that are even secure in the post-quantum era. Let us learn Short Vector Problem (SVP), Short Integer Solution (SIS) and how these work for the Lattic-based signature technique. 📄
These single-click pdf documents are based on email conversations with the teaching coordination team in different time.
Experience
- April 2023 - Incumbent : Research Fellow in Cybersecurity - Queensland University of Technology, Brisbane, Australia
- August 2022 - March 2023: Research Assistant and Postdoctoral Research Fellow in Cybersecurity - Charles Sturt University, NSW Australia
- December 2020 - February 2021: Casual Research Assistant , Deakin University
- November 2018 - July 2022: Casual Tutor, Lecturer, Research Assistant - RMIT University, Melbourne
- April 2013 - August 2018: Lecturer, Assistant Professor and Associate Professor - Mawlana Bhashani Science and Technology University, Bangladesh
Please see resume for details: Resume of Rahman Ziaur
Publications
Research outputs by year
- Rahman, Z., Yi, X. & Khalil, I. (2023). Blockchain-Based AI-Enabled Industry 4.0 CPS Protection Against Advanced Persistent Threat. IEEE Internet of Things Journal, 10(8), 6769–6778. https://eprints.qut.edu.au/242755
- Mehedi, S., Anwar, A., Rahman, Z., Ahmed, K. & Islam, R. (2023). Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach. IEEE Transactions on Industrial Informatics, 19(1), 1006–1017. https://eprints.qut.edu.au/242758
- Rahman, Z., Yi, X., Khalil, I., Anwar, A. & Pal, S. (2023). Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System. ASSS '23: Proceedings of the Third International Symposium on Advanced Security on Software and Systems. https://eprints.qut.edu.au/242756
- Rahman, Z., Yi, X., Tanzir Mehedi, S., Islam, R. & Kelarev, A. (2022). Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions. Electronics (Switzerland), 11(9). https://eprints.qut.edu.au/242753
- Rahman, Z., Yi, X., Billah, M., Sumi, M. & Anwar, A. (2022). Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home. Electronics (Switzerland), 11(7). https://eprints.qut.edu.au/242790
- Rahman, Z., Khalil, I., Yi, X. & Atiquzzaman, M. (2021). Blockchain-Based Security Framework for a Critical Industry 4.0 Cyber-Physical System. IEEE Communications Magazine, 59(5), 128–134. https://eprints.qut.edu.au/242749
- Mehedi, S., Anwar, A., Rahman, Z. & Ahmed, K. (2021). Deep transfer learning based intrusion detection system for electric vehicular networks. Sensors, 21(14). https://eprints.qut.edu.au/242752
- Rahman, Z., Yi, X., Khalil, I. & Kelarev, A. (2021). Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability. Quality, Reliability, Security and Robustness in Heterogeneous Systems: 17th EAI International Conference, QShine 2021, Proceedings, 57–74. https://eprints.qut.edu.au/242750
- Rahman, Z., Yi, X., Khalil, I. & Sumi, M. (2021). Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security. Quality, Reliability, Security and Robustness in Heterogeneous Systems: 17th EAI International Conference, QShine 2021, Proceedings, 177–193. https://eprints.qut.edu.au/242751
- Rahman, A., Islam, M., Rahman, Z., Reza, M., Anwar, A., Parvez Mahmud, M., Nasir, M. & Noor, R. (2020). DistB-Condo: Distributed Blockchain-based IoT-SDN Model for Smart Condominium. IEEE Access, 8, 209594–209609. https://eprints.qut.edu.au/242743
QUT ePrints
For more publications by Rahman, explore their research in QUT ePrints (our digital repository).
Awards
- Type
- Academic Honours, Prestigious Awards or Prizes
- Reference year
- 2022
- Details
- Received the Higher Degree by Research (#HDR) Prize by RMIT University. RMIT STEM College of RMIT University has awarded me the HDR Computing Technologies Award for my research performance and community contribution. Professor Karin Verspoor FAIDH , Executive Dean, RMIT School of Computing Technologies, handed over the prize and certificate on July 6 at the Village Roadshow Theatrette of State Library Victoria, Melbourne.
- Type
- Academic Honours, Prestigious Awards or Prizes
- Reference year
- 2022
- Details
- Secured the Runner-up position in the three-minute thesis (3MT) competition at RMIT University. The Three Minute Thesis competition celebrates the exciting research conducted by Doctor of Philosophy students. Developed by The University of Queensland, 3MT cultivates students’ academic, presentation, and research communication skills.The competition supports their capacity to effectively explain their research in three minutes, in a language appropriate to a non-specialist audience.
- Type
- Other
- Reference year
- 2022
- Details
- Health and Safety Representative (HSR) of RMIT University for the period 19 July 2022- 18 June 2023. I was appointed as a Health and Safety Representative (HSR) for the HDR Students Designated Work Group (DWG) in the School of Computing Technologies, RMIT University. The HSW Charter for this RMIT STEM College Committee, which outlines the duties of HSW representatives.
- Type
- Reviewer for an Academic Journal
- Reference year
- 2022
- Details
- IEEE Communications Magazine provides timely information on all aspects of (electrical/electronic) communications. The magazine covers services (telecommunications, multimedia, Internet and digital), network (including its softwarization, as well as underlying infrastructure) and device technology, support systems, transversal topics like artificial intelligence applied to telecommunications, market trends, strategy and regulatory issues. Articles are tutorial in nature and written in a style comprehensible to readers outside the specialty of the article. These articles are complemented with non-indexed columns.
- Type
- Reviewer for an Academic Journal
- Reference year
- 2021
- Details
- Journal Name: IET Information Security, IET Communications.IET Information Security will be published in collaboration by the Institution of Engineering and Technology, Wiley and Hindawi. IET Communications is a Gold Open Access journal that publishes original research on the use of communication technologies to harness the signals for better performing communication systems using various wired and/or wireless media.
Supervision
Looking for a postgraduate research supervisor?
I am currently accepting research students for Honours, Masters and PhD study.
You can browse existing student topics offered by QUT or propose your own topic.