+61 (2) 9061 5900 L14, 233 Castlereagh Street, Sydney NSW 2000 94-96 Foster Street, Dandenong, VIC 3175
Our Academic Leadership Team

Hamid has a solid academic background in Telecommunication/computer engineering and has been involved in teaching and academic roles since 2008 as well as over 10 years of industry experience in the field of robotics and Automated Guided Vehicles (AGV). He is a professional member of Engineering Australia and ACS (Australian Computer Society).

A/Prof Salarian is a PhD graduate from the University of Wollongong in Telecommunication in 2014, received a BS degree in computer engineering (hardware major) from Ferdowsi University – Mashhad and an MS degree in computer architecture from Isfahan University of Technology, Iran in 2005 and 2008. His research focused on energy consumption in wireless sensor networks and wireless sensor actuator networks, particularly the effect of mobility in increasing system lifetime. He has published high-quality journal articles in this field.

A/Prof Salarian’s philosophy is to establish and maintain effective links with business, commerce and industry organisations relevant to the school’s teaching and learning activities to provide students with first-hand professional experience in the industry.

Associate Professor Kwong Nui Sim is the associate dean of learning and teaching at SISTC after being the Learning, Teaching and Innovation Manager at International College of Management Sydney for a short term. Prior to this, she was seconded as a senior advisor/senior lecturer at Graduate Research School in Auckland University of Technology in conjunction with her position of Senior Lecture/Learning and Teaching Consultant at AUT Learning Transformation LAB (altLAB), Auckland University of Technology, New Zealand.

From 2015 to September 2020, she was an academic developer/lecturer at the Centre for Academic Development, Victoria University of Wellington. Kwong Nui’s research field is Information Communication Technologies (ICT) and its use in tertiary educational environments, focusing on ICT beliefs and practices (software and tools use) for students and academics, which then informs ICT use in teaching, learning and researching (TLR). The applied nature of her research aligns with her academic development role and directly informs her practices at higher education institutions.

For example, the findings from her Ako Aotearoa Regional Hub Fund project in 2018 informed the need to support the use of ICT in doctoral research processes in her unit and other faculties at VUW. Being an executive member at FLANZ (Flexible Learning Association of New Zealand) as well as a treasurer at HERDSA branch in New Zealand, Kwong Nui believes that she can make a strong contribution to HERDSA community through her service and scholarship as well as to gain support from such an advanced community for her enthusiasm to develop her research capabilities further that will lead her to a more confident involvement in the higher education domain.

Zawar has more than 12 years’ academic experience in which he has effectively taught both post and undergraduate students. During his academic career, he has held many academic leadership positions in major universities and institutes. Zawar’s teaching philosophy is student centred, which enables him to create a fun and engaging learning experience for our students. His expertise lies in the areas of Cyber Security, Computer Networks, Cloud Computing, Internet of Things and Software Defined Networking.


Biography

Zawar Shah received Ph.D. degree in Electrical Engineering from the University of New South Wales (UNSW), Sydney, Australia, in 2009. He has more than fifteen years of experience in teaching various courses related to Information Technology (IT) at the tertiary level. He has held various academic leadership positions including the Head of the Computer Networks Group, Research Coordinator in IT at National University of Sciences and Technology (NUST), Pakistan and Whitireia Community Polytechnic, Auckland, New Zealand, respectively. He is currently working as a Senior Lecturer in IT at the Sydney International School of Technology and Commerce, Sydney, Australia. He has supervised many postgraduate research students, published many research articles in leading journals and conferences. He specializes in Computer Networks, Wireless Networks, Cyber Security and Cloud Computing. His research interests include Security Issues in Internet of Things (IoT), Security Issues in Software-Defined Networking (SDN), Quality of Service issues (QoS) in Wireless Networks and Blockchain based Solutions to Mitigate Cyber Attacks.


Teaching Philosophy

Teaching is a form of communication majorly aimed at effectively transferring knowledge to students. A teacher needs to be well prepared, knows his audience, be passionate about teaching, develop students’ interest in the subject and creates an enriching learning environment. I have always been very concerned about teaching with quality and excellence. That is why; I spend significant time preparing every lecture, even if I have delivered it before. I utilize student centred approach for teaching which enables me to identify and address the issues faced by students in my lectures. I am comfortable in using many learning tools e.g., Kahoot, Mentimeter etc. in my lectures to enhance student engagement. I use both formative and summative assessment methods to assess the learning of students. I try to have an interactive session with my students and encourage them to ask questions. I believe in learning through group discussions which create a very positive environment where students can discuss and learn from each other. I mark my assessments and announce results within the time frame and provide with detailed feedback on submitted work using clear and concise language.


Academic Qualifications

2009 Ph.D. in Electrical Engineering, University of New South Wales (UNSW), Sydney, Australia.

2004 M.Eng.Sc. in Telecommunications Engineering, University of New South Wales (UNSW), Sydney, Australia.

2003 Bachelor of Computer Systems Engineering, National University of Sciences & Technology (NUST), Islamabad, Pakistan.


Teaching Areas
  • Cyber Security
  • Computer Networks
  • Cloud Computing
  • Wireless Networks
  • Computer Programming
  • Web Development

Scholarship and Research Areas
  • Security Issues in Cloud Computing
  • Security Issues in Internet of Things (IoT)
  • Security Issues in Software-Defined Networking (SDN)
  • Quality of Service (QoS) Issues in Wireless Networks
  • Blockchain based Solutions to Mitigate Cyber Attacks

Collaborations and Projects

Projects

  • Deployment of an Internet of Things (IoT) based Wireless Sensor Network to Monitor Native Birds and Animals in Zealandia, Wellington, New Zealand
  • Mitigating ARP Cache Poisoning Attack in Software-Defined Networks (SDN)
  • Comparison of IEEE 802.11ac and IEEE 802.11n in Indoor and Outdoor Environments
  • Design and Deployment of a Worldwide Interoperability for Microwave Access (WiMAX) Test bed

Grants and Awards

Research Grants

  • Street Light Power Management System, AU$50,000 from Government of Pakistan
  • Long-range, Ultra-wideband Sensor Test bed of Passive RF Sensors, AU$30,000 from Agilent Technologies, Pakistan
  • Forensic Investigation of Remnant Data on USB Storage Devices Sold in New Zealand, AU$6000, Whitireia Community Polytechnic, Auckland, New Zealand

Awards

  • Research Star Award for best researcher in the Faculty of Information Technology (IT) at Whitireia Community Polytechnic, Auckland, New Zealand.
  • Faculty Development Program Fellowship by National University of Sciences and Technology (NUST), Pakistan to pursue doctorate (PhD) studies at the University of New South Wales (UNSW), Sydney, Australia.
  • Recipient of National ICT Australia (NICTA) research scholarship.

Publications
Book Chapters
  • Mirza, M. A., Khurshid, K., Shah, Z., Shah, F., Levula, A., & Klašnja-Milićević, A. (2022). Impact of Lesson Planning on Students’ Achievement Using Learner Profile System. In Handbook on Intelligent Techniques in the Educational Process (pp. 121-143). Springer International Publishing.
  • Mirza, M. A., Khurshid, K., Hasan, A., Shah, Z. (2022). Correlating Universal Design of Learning and the Performance in Science at Elementary School Level. In Handbook on Intelligent Techniques in the Educational Process (pp. 269-298). Springer International Publishing.

Peer Reviewed Journal Papers

  • Shah, Z., Kennedy-Clark, S., Xie, Y., Rahim, M.S., Mahdavi, M. & Levula, A. (2022). Teacher Views on Teaching Sustainability in Higher Education Institutes in Australia. Sustainability, 14, 8431.
  • Mirza, M.A., Khurshid, K., Shah, Z., Ullah, I.& Binbusayyis, A. (2022). ILS Validity Analysis for Secondary Grade through Factor Analysis and Internal Consistency Reliability. Sustainability,14, 7950.
  • Shah, Z., Kyaw, A., Truong, H.P., Ullah, I.& Levula, A. (2022). Forensic Investigation of Remnant Data on USB Storage Devices Sold in New Zealand. Applied Science,12, 5928.
  • Shah, Z., Ullah, I., Li, H.,Levula, A. & Khurshid, K. (2022). Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey. Sensors, 22, 1094.
  • Khurshid, K., Ullah, I., Shah, Z., Hassan, N., & Ahanger, T. A. (2021). Protocols for Transferring Bulk Data Over Internet: Current Solutions and Future Challenges. IEEE Access, 9, 95228-95249.
  • Virdi, C., Shah, Z., Ullah, I. & Levula, A. (2021). Capacity Analysis of Internet Protocol Television (IPTV) over IEEE 802.11ac Wireless Local Area Networks (WLANs). International Journal of Computer Science and Network Security.
  • Shah, Z., Levula, A., Khurshid, K., Ahmed, J., Ullah, I., & Singh, S. (2021). Routing Protocols for Mobile Internet of Things (IoT): A Survey on Challenges and Solutions. Electronics, 10(19), 2320.
  • Shah, Z., & Cosgrove, S. (2019). Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey. Electronics, 8(10), 1095.
  • Shah, Z. (2018). Mitigating TCP Incast Issue in Cloud Data Centres using Software-Defined Networking (SDN): A Survey. KSII Transactions on Internet and Information Systems, 12(11), 5179-5202.
  • Sabeil, E., & Shah, Z. (2018). Impact of Beamforming and Interference on the Average Throughput of IEEE 802.11 ac in a Typical Home Environment. International Journal of Computer Science and Network Security, 18(11), 1-9.
  • Shah, Z., & Kolhe, A. (2017). Throughput Analysis of IEEE 802.11ac and IEEE 802.11n in a Residential Home Environment. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 9(1), 1-13.
  • Ullah, I., Shah, Z., & Baig, A. (2016). S-TFRC: An Efficient Rate Control Scheme for Multimedia Handovers. International Journal of Computer Science and Information Systems (COMSIS), 13(1), 45-69.
  • Shah, Z., Kolhe, A. & Mubarak, O. (2016). IEEE 802.11ac VS IEEE 802.11n. Throughput Comparison in Multiple Indoor Environments. International Journal of Computer Science and Information Security (IJCSIS), 14(4), 94-101.
  • Saleh, S., Shah, Z. & Baig, A. (2015). Improving QoS of IPTV and VoIP over IEEE 802.11n. Elsevier Journal of Computers and Electrical Engineering, 43, 92-111.

Peer Reviewed Conference Papers

  • Shah, Z., & Kolhe, A. (2016). IEEE 802.11ac VS IEEE 802.11n. Throughput Comparison in Multiple Indoor Environments. In Wireless Telecommunication Symposium (WTS), London, UK.
  • Shah, Z., & Cosgrove, S. (2015). Comparison of IEEE 802.11ac and IEEE 802.11n. Proceedings of the Weltec Whitireia joint Research Symposium, Wellington, New Zealand.
  • Shah, Z., Suleman, A., Baig, A., & Ullah, I. (2014). Effect of Transmission Opportunity and Frame Aggregation on VoIP Capacity over IEEE 802.11n WLANs. Proceedings of IEEE International Conference on Signal Processing and Communication Systems, Gold Coast, Australia.
  • Shah, Z., Rau, S., & Dawood, S. (2014). Reliable Data Transfer using TCP in Cloud Computing Environment. Proceedings of the Weltec Whitireia joint Research Symposium, Wellington, New Zealand.
  • Varghese, G. & Shah, Z. (2014). Transport Layer Protocols for VoIP over WiFi Networks. Proceedings of Whitireia Auckland Research Symposium, Auckland, New Zealand.
  • Shah, Z., Baig, T., & Baig, A. (2013). AVHRC: A Scheme to Improve QoS for VoIP traffic. Proceedings of IEEE Australasian Telecommunication Networks and Applications Conference, Christchurch, New Zealand.
  • Saleh, S., Shah, Z., & Baig, A. (2013). Capacity Analysis of Combined IPTV and VoIP over IEEE 802.11n. Proceedings of IEEE Local Computer Networks Conference, Sydney, Australia.
  • Shah, Z., Ilyas, U., & Khaliq, H. (2013). Evaluating Spectrum Occupancy in Islamabad using Long-range Ultra-wideband Spectrum Sensors. Proceedings of IEEE Vehicular Technology Conference, Las Vegas, USA.
  • Zeeshan, M., Sattar, K., Shah, Z., & Ullah, I. (2013). Routing and Spectrum Decision in Single Transceiver Cognitive Radio Networks. Proceedings of IEEE Vehicular Technology Conference, Las Vegas, USA.
  • Saleh, S., Shah, Z., & Baig, A. (2013). IPTV Capacity Analysis using DCCP over IEEE802.11n. Proceedings of IEEE Vehicular Technology Conference, Las Vegas, USA.
  • Shah, Z., Baig, A., & Ullah, I. (2012). “State Aware Enhancement in DCCP for Multimedia Handovers” in IEEE Global Telecommunications Conference (GLOBECOM), Anaheim, USA.
  • Ullah, I., Shah, Z., & Baig, A. (2011). “VoIP and Tracking Capacity over WiFi Networks”, in IEEE Vehicular Technology Conference (VTC), Budapest, Hungary.
  • Shah, Z., & Malaney. R. (2007). “An Architecture for Location Tracking using SIP,’’ in IEEE Global Telecommunications Conference (GLOBECOM), Washington DC, USA.
  • Shah, Z., & Malaney, R. (2007). “Reliability Issues in a SIP Based Location Tracking Architecture”, in IEEE International Conference on Wireless Broadband and Ultra-Wideband Communications (AusWireless), Sydney, Australia.
  • Shah, Z., & Malaney, R. (2007). “Experimental Deployment of Particle Filters in WiFi Networks”, in IEEE International Conference on Communications (ICC), Glasgow, UK.
  • Shah, Z., & Malaney, R. (2006). “Particle Filters and Position Tracking in WiFi Networks”, in IEEE Vehicular Technology Conference (VTC), Melbourne, Australia.

Dr. Saman Shojae Chaeikar received Master’s and Ph.D. degrees in information security from the University of Technology Malaysia, in 2010 and 2016, respectively. In 2017, he received a postdoctoral fellowship at Iran’s National Elites Foundation hosted at Toosi University of Technology. In 2021, he did his second postdoctoral fellowship at Macquarie University, Sydney, Australia. His research interests include multimedia security, security of autonomous vehicles, cryptography, and machine learning.


Academic Qualifications
  • Postdoc: Macquarie University, Sydney, Australia, May 2021 – Nov 2021, Area: Security of Autonomous Vehicles.
  • Postdoc: K. N. Toosi University of Technology, Tehran, Iran, Apr 2017 – Apr 2018, Area: Multimedia Security.
  • Ph.D.: Computer Science, University of Technology Malaysia, Kuala Lumpur, Malaysia, Mar 2011 – Apr 2016, Area: Multimedia Security.
  • Master: Computer Science, University of Technology Malaysia, Kuala Lumpur, Malaysia, Dec 2008 – Apr 2010, Area: Cryptography.

Teaching Areas
  • Ethical Hacking
  • Digital Forensics
  • Information and Network Security
  • Computer Networks
  • Cryptography
  • Artificial Intelligence

Scholarship and Research Areas
  • Multimedia Security
  • Security of Autonomous Vehicles
  • Cryptography

Grants and Awards

Awards

  • Teaching Recognition Award, Monash University, June 2023.
  • 1st Runner Up Award, International Workshop on AI-Enabled Policing and Law Enforcement, IEEE EDOC conference, October 25th -26th 2021, Gold Coast, Australia.
  • Best presentation award, the 10th International Conference on Computer Modeling and Simulation, January 8th-10th 2018, Sydney, Australia.

Grants

  • A Watermarking Tool for e-Passport Protection, University of Technology Malaysia, Kuala Lumpur, Malaysia, Jan-Jul 2013, fund value: 7,500 AUD.
  • Pixel Similarity Weight (PSW) for supervised information extraction, funded by Iran’s National Elites Foundation and hosted at K. N. Toosi University of Technology, Tehran, Iran, April 2017, fund value: 35,000 AUD.

Publication

Peer Reviewed Journal Papers

  • Shojae Chaeikar S, Mirzaei Asl F, Yazdanpanah S, Zamani M, Abdul Manaf A, Khodadadi T, Secure CAPTCHA by Genetic Algorithm (GA) and Multi-Layer Perceptron (MLP). Electronics, 2023: 12(19).
  • Tavakolifar R, Shahabi H, Alizadeh M, Bateni SM, Hashim M, Shirzadi A, Ariffin EH, Wolf ID, Shojae Chaeikar S, Spatial Prediction of Landslide using Hybrid Multi-Criteria Decision-Making Methods: A Case Study, Saqqez-Marivan Mountain Road. Land, 2023: 12.
  • Shojae Chaeikar S, Jolfaei A, Mohammad N. AI-enabled cryptographic key management model for securing communications in the Internet of Vehicles, IEEE Transactions on Intelligent Transportation Systems, 2023: 24(4), 4589-4598.
  • Yazdanpanah S, Shojae Chaeikar S, Jolfaei A. Monitoring the security of audio biomedical signals communications in wearable IoT healthcare. Digital Communications and Networks, 2023: 9, 393-399.
  • Deng N, Li Y, Ma J, Shahabi H, De Oliveira G, Shojae Chaeikar S. A Comparative Study for Landslide Susceptibility Assessment Using Machine Learning Algorithms Based on Grid Unit and Slope Unit. Frontiers in Environmental Science, 2022.
  • Karamizadeh S, Shojae Chaeikar S, Jolfaei A. Adult Content Image Recognition by Boltzmann Machine Limited and Deep Learning. Evolutionary Intelligence, 2022.
  • Shojae Chaeikar S, Ahmadi A, Karamizadeh S, Shoja Chaeikar N. SIKM – an intelligent cryptographic key management framework. Open Computer Science, 2022: 12(1), 17-26.
  • Shojae Chaeikar S, Tadayon M H, Jolfaei A, Alizadeh M. An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems. International Journal of Intelligent Systems. 2021: 37 (12), 10158-10171.
  • Shojae Chaeikar S, Yazdanpanah S, Shoja Chaeikar N. Secure SMS transmission based on social network messages. International Journal of Internet Technology and Secured Transactions. 2021: 11(2):176-92.
  • Shojae Chaeikar S, Manaf AA, Alarood AA, Zamani M. PFW: polygonal fuzzy weighted – an SVM kernel for the classification of overlapping data groups. Electronics. 2020: 9, 615.
  • Shojae Chaeikar S, Ahmadi A. Ensemble SW image steganalysis: a low dimension method for LSBR detection. Signal Processing: Image Communication. 2019:70: 233-245.
  • Shojae Chaeikar S, Zamani M, Manaf AB, Zeki AM. PSW statistical LSB image steganalysis. Multimedia Tools and Applications. 2018:77(1):805-835.
  • Yazdanpanah S, Shojae Chaeikar S. Secure SMS Method Based on Social Networks. International Journal of Scientific Research in Science, Engineering and Technology. 2016: 2(6): 368-376.
  • Alizadeh M, Hassan WH, Zamani M, Khodadadi T, Shojae Chaeikar S. A prospective study of mobile cloud computing. International Journal of Advancements in Computing Technology. 2013;5(11):198-210.
  • Shojae Chaeikar S, Zamani M, Chukwuekezie CS, Alizadeh M. Electronic Voting Systems for European Union Countries. Journal of Next Generation Information Technology. 2013 Jul 1;4(5):16.
  • Mazdak Z, Azizah BA, Shahidan MA, Shojae Chaeikar S. Mazdak technique for PSNR estimation in audio steganography. Applied Mechanics and Materials. 2012:1(229): 2798-2803.
  • Shojae Chaeikar S, Jafari M, Taherdoost H, Kar NS. Definitions and criteria of CIA security triangle in electronic voting system. International Journal of Advanced Computer Science and Information Technology. 2012 Oct;1(1):14-24.
  • Yazdanpanah S, Shojae Chaeikar S. IKM-based Security Usability Enhancement Model. IRACST-International Journal of Computer Science and Information Technology & Security (IJCSITS). 2012 Aug(4).
  • Taherdoost H, Sahibuddin S, Namayandeh M, Jalaliyoon N, Kalantari A, Shojae Chaeikar S. Smart card adoption model: Social and ethical perspectives. Science. 2012 Aug;3(4).
  • Zamani M, Abdul Manaf AB, Zeidanloo HR, Shojae Chaeikar S. Genetic substitution-based audio steganography for high capacity applications. International Journal of Internet Technology and Secured Transactions. 2011 Jan 1;3(1):97-110.
  • Zeidanloo HR, Manaf AB, Ahmad RB, Zamani M, Shojae Chaeikar S. A proposed framework for P2P Botnet detection. International Journal of Engineering and Technology. 2010 Apr 1;2(2):161.
  • Manaf AB, Zamani M, Ahmad RB, Jaryani F, Taherdoost H, Shojae Chaeikar S, Zeidanloo HR. Genetic Audio Steganography. International J. of Recent Trends in Engineering and Technology. 2010 May;3(2).
  • Zamani M, Manaf AA, Ahmad R, Jaryani F, Taherdoost H, Shojae Chaeikar S, Zeidanloo HR. A novel approach for genetic audio watermarking. Journal of Information Assurance and Security. 2010;5:102-11.

Peer Reviewed Conference Papers

  • Khodadadi T, Zamani M, Shojae Chaeikar S, Javadianasl Y, Talebkhah M, and Alizadeh M. Exploring the benefits and drawbacks of machine learning in cybersecurity to strengthen cybersecurity defences. 30th Annual IEEE Software Technology Conference (STC 2023), 2023 Sep 25-27.
  • Arab F, Zamani M, Karamizadeh S, Khodadadi T, Alizadeh M, and Shojae Chaeikar S. Comparison of Data Hiding Techniques for Video Watermarking Applications. 2022 The 7th International Conference on Computer and Communication Systems, 2022 April 22-25.
  • Khodadadi T, Javadianasl Y, Rabiei F, Alizadeh M, Zamani M, Shojae Chaeikar S. A Novel Graphical Password Authentication Scheme with Improved Usability. In 2021 4th International Symposium on Advanced Electrical and Communication Technologies (ISAECT), 2021, pp. 01-04, doi: 10.1109/ISAECT53699.2021.9668599.
  • Chaeikar SS, Jolfaei A, Mohammad N, Ostovari P. Security Principles and Challenges in Electronic Voting. In2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW) 2021 Oct 25 (pp. 38-45). IEEE.
  • Shojae Chaeikar S, Ahmadi A. SW: a blind LSBR image steganalysis technique. In the 10thInternational Conference on Computer Modeling and Simulation2018 Jan 8 (pp. 14-18). ACM.
  • Zamani M, Manaf AB, Abdullah SM, Shojae Chaeikar S. Correlation between PSNR and bit per sample rate in audio steganography. In11thInternational Conference on Signal Processing 2012 Apr 2 (pp. 163-8).
  • Yazdanpanah S, Shojae Chaeikar S, Zamani M, Kourdi R. Security features comparison of master key and IKM cryptographic key management for researchers and developers. In International Conference on Software Technology and Engineering, 3rd(ICSTE 2011) 2011. ASME Press.
  • Shojae Chaeikar S, Moghaddam HS, Zeidanloo HR. Node Based Interpretative Key Management Framework. In Security and Management 2010 (pp. 204-210).
  • Shojae Chaeikar S, Razak SA, Honarbakhsh S, Zeidanloo HR, Zamani M, Jaryani F. Interpretative key management (IKM), a novel framework. In 2010 Second International Conference on Computer Research and Development, 2010 May 7 (pp. 265-269). IEEE.
  • Zamani M, Manaf AB, Ahmad RB, Jaryani F, Shojae Chaeikar S, Zeidanloo HR. Genetic audio watermarking. In International Conference on Business Administration and Information Processing, 2010 Mar 26 (pp. 514-517). Springer, Berlin, Heidelberg.

Book Chapters

  • Shojae Chaeikar S, Manaf AB, Zamani M. Comparative analysis of Master-key and Interpretative Key Management (IKM) frameworks. In Cryptography and Security in Computing 2012. InTech.

Membership
  • Australian Computer Society (ACS).
  • Iran’s National Elites Foundation.

Professional Academic Activities

Journal Editor

  • Journal of Computer Networks and Communications, Guest editor of special issue on: Security Solutions for IoT and Cyber-Physical Systems, Hindawi, April 2021.
  • Journal of Computer Networks and Communications, Guest editor of special issue on: Advances in Machine Learning for Cybersecurity, Hindawi, April 2018.
  • Journal of Next Generation Information Technology, Convergence Information Society (CIS), South Korea, 2019.

Journal Reviewer

  • IEEE Transactions on Industrial Informatics
  • IEEE Systems Journal
  • IEEE Internet of Things Journal
  • Computers and Electrical Engineering
  • Multimedia Tools and Applications
  • Signal Processing
  • Digital Communications and Networks
  • Journal of Ambient Intelligence and Humanized Computing
  • Neurocomputing
  • Journal of Circuits, Systems, and Computers

Conference Technical Program Committee

  • Human Factors in Cybersecurity, 15th International Conference on Applied Human Factors and Ergonomics [AHFE 2024], 22-27 July, 2024, Université Côte d’Azur, Nice, France.
  • 3rd EAI International Conference on Smart Technologies and Innovation Management [EAI MTYMEX 2024], 28-29 March, 2024, Vancouver, Canada.
  • 6th International Conference on Networking and Advanced Systems [ICNAS23], 21-23 October, 2023, Algeria.
  • The 2023 International Conference on Cybersecurity [ICC2023], 16-18 June, 2023, Manhattan, New York, USA.
  • The 2nd International Conference on Artificial Intelligence and Blockchain Technology [AIBT2023], 13-15 Jan, 2023, Zibo, Shandong, China.
  • PC member of Track 5: Security, Privacy, Trust, and Incentives, The 31st International Conference on Computer Communications and Networks [ICCCN 2022], 25 – 28 July, 2022, Waikiki Beach, Honolulu, HI, USA.
  • The 2022 International Conference on Internet Engineering and Information Technology [IEIT2022], 20-21 May, 2022, Wuhan, China.
  • The 2nd International Conference on Artificial Intelligence and Blockchain Technology [ABIT2022], 25-27 Nov 2022, Zibo, Shandong, China.
  • The 2021 International Conference on Internet Engineering and Information Technology [IEIT2021], 10-12 March 2022, Wuhan, China.
  • International Conference on Artificial Intelligence and Blockchain Technology [ABIT2021], 25-27 June 2021, Beijing, China.
  • 2021 3rd International Conference on Soft Computing and its Engineering Applications [icSoftComp2021], 11-12 December 2021, Charusat, Changa, India.
  • 4th International Conference on Recent Trends in Multidisciplinary Research [ICRTMDR2021], 26-27 December 2021, Maldives.
  • 2021 Global Congress on Electrical Engineering [GC-ElecEng 2021], 3rd-5th September 2021, Valencia, Spain.
  • International Conference on Artificial Intelligence and Applications [ICAIA], 15-17 October 2021, Suzhou, Jiangsu, China.
  • 2nd International Workshop on AI-enabled Process Automation – [ICSOC] Conference, 22nd – 25th November 2021, Dubai, UAE.
  • Global 2020 Congress on Networking and Communications, 1st International Conference on Multimedia Systems, Networks and Technologies [MIC-Multimedia 2020], 6th-8th March 2020, Athens, Greece.
  • Global 2020 Congress on Engineering Sciences, Technologies and Applications [GC-Engineering 2020], 1st International Conference on Computer Science and Engineering (MIC-Computing 2020), January 17th-19th 2020, Dubai, UAE.
  • Global 2020 Congress on Electrical Engineering [GC-ElecEng 2020], 4th-5th September 2020, Valencia, Spain.
  • The 9th International Conference on Intelligent Computing and Applications [ICICA2020], February 26th-28th, 2020, Brisbane, Australia.
  • Global 2020 Congress on Communications and Computing Technologies (GC-Technology 2020), 1st International Conference on Information Technologies and Information Systems [MIC-InfoTech 2020], 9th-11th October 2020, Porto, Portugal.
  • International Conference on Artificial Intelligence and Blockchain Technology [ABIT2020], 31st July – 2nd August 2020, Beijing, China.
  • 2nd International Conference on Advancing Knowledge from Multidisciplinary Perspectives in Engineering & Technology [ICAKMPET2020], June 24th – 25th 2020, Istanbul, Turkey.
  • 2020 2nd International Conference on Soft Computing and its Engineering Applications [icSoftComp2020], 11-12 December 2020, Charusat, Changa, India.
  • 8th Annual International Conference on Geo-Spatial Knowledge and Intelligence [GSKI2020], 18-19 December 2020, Xián, Shaanxi, China.
  • International Conference on Data Science and Machine Learning [DSML2020], 24-25 October 2020, Dubai, UAE.
  • International Conference on Recent Challenges in Engineering and Technology [ICRCET2020], 30-31 October 2020, Virtual.
  • 3rd International Conference on Recent Trends in Multidisciplinary Research [ICRTMDR2020], 26-27 December 2020, Maldives.
  • The 9th Annual International Congress of Information and Communication Technology [ICICT2019], January 11th-13th, 2019, Nanning, Guangxi, China.
  • The 1st International Conference on Computer Science and Engineering [MIC-Computing 2019], January 18th-20th, 2019, Dubai, UAE.
  • The 8th International Conference on Intelligent Computing and Applications [ICICA2019], January 16th-19th, 2019, Melbourne, Australia.
  • 1st International Conference on Electrical, Biomedical and Nuclear Engineering Technologies [ElectriTek2019], 15st-17th September 2019, Irbid, Jordan.
  • The 11thInternational Conference on Computer Modeling and Simulation [ICCMS2019], 16th-19th January 2019, Melbourne, Australia.
  • Global 2019 Congress on Electrical Engineering, 2nd International Conference on Digital Signal Processing, MIC-SigProc 2019 Technical Program Committee (TPC), 18th-20th October 2019, Barcelona, Spain.
  • The 10thInternational Conference on Computer Modeling and Simulation [ICCMS2018], 8th-10th January 2018, Sydney, Australia.
  • The International Conference on Network Engineering and Information Security [NEIS2018], April 20th-22nd 2018, Wuhan, China.
  • 4th Annual International Conference on Management, Economics and Social Development [ICMESD2018], May 18th-20th, 2018, Xi’an, Shaanxi, China.
  • 1stInternational Conference on Multimedia Systems, Networks and Technologies [MIC-Multimedia2018], September 28th-30th 2018, Barcelona, Spain.
  • 6th Annual 2018 International Conference on Geo-Spatial Knowledge and Intelligence [GSKI2018], October26th-28th, 2018, Beijing, China.
  • 2018 5th International Conference on Wireless Communication and Sensor Network [WCSN2018], December 14th-16th, 2018, Wuhan, Hubei, China.
  • 2018 2nd International Conference on Advanced Education and Management Science [AEMS2018], December 22th-23th, 2018, Shanghai, China.
  • 2ndAnnual International Conference on Information System and Artificial Intelligence [ISAI2017], July 14th-16th, 2017, Tianjin, China.
  • The international conference on Artificial Intelligence and Computer Engineering [AICE2017], June 23th-25th, 2017, Suzhou, China.
  • 3rdAnnual International Workshop on Wireless Communication and Network [IWWCN2017], December 8th-10th, 2017, Chiang Mai, Thailand.
  • International Conference on Computer Engineering and Information System [CEIS2017], October 20th-22th 2017, Xiamen, China.
  • 5thAnnual 2017 International Conference on Geo-Spatial Knowledge and Intelligence [GSKI2017], December 8th-10th, 2017, Chiang Mai, Thailand.
  • 2017 2ndInternational Conference on Computer, Mechatronics and Electronic Engineering [CMEE2017], December 24th-25th, 2017, Xiamen, China.
  • Japan-Africa Conference on Electronics, Communications, and Computers [JAC-ECC2017], December 18th-20th, 2017, Alexandria, Egypt.

Book Technical Committee

  • Adversarial Multimedia Forensics. Editors: Ehsan Nowroozi, Alireza Jolfaei, Kassem Kallas. Springer, 2023.
  • Multimedia Forensics and Security, subtitle: Foundations, Innovations, and Applications. Editors: Ella Hassanien, A., Mostafa Fouad, M., Manaf, A.A., Zamani, M., Ahmad, R., Kacprzyk, J. (Eds.). ISBN: 978-3-319-44270-9, Hardcover ISBN: 978-3-319-44268-6, DOI: 10.1007/978-3-319-44270-9, Springer, 2017.

Conference Steering Committee

  • Global 2020 Congress on Computer Engineering (GC-CompEng 2020), 14th-16th August 2020, Athens, Greece.
  • Global 2019 Congress on Computer Engineering (GC-CompEng 2019), 16th-18th August 2019, Athens, Greece.

Conference Track Chair

  • Signal, Image and Speech Processing (SISP) track, 1stInternational Conference on Electrical, Biomedical and Nuclear Engineering Technologies (ElectriTek 2019), 15st-17th September 2019, Irbid, Jordan.

Conference Session Chair

  • International conference on Informatics Engineering & Information Science [ICIEIS 2011], Springer, Kuala Lumpur, Malaysia, 2011.

Keynote Speech

  • VIT – International Virtual Conference on “Current Trends in Artificial Intelligence and Information Security” on 18th October 2019.

Invited Talk

  • Recent Trends in Information Security and its Policies. VIT University, India, 17th October 2019.

Technical Committee of Iran’s National Information Security Standards

  • Video surveillance systems for use in security applications – Part 1-1: System requirements – General. (INSO 21122-1-1, 1st edition 2018 – identical with IEC 62676-1-1:2013).
  • Video surveillance systems for use in security applications – System requirements – Part 1-2: Performance requirements for video transmission. (INSO 21122-1-2, 1st edition 2018 – identical with IEC 62676-1-2:2013).
  • Video surveillance systems for use in security applications – Part 2-1: Video transmission protocols – General requirements. (INSO 21122-2-1 1st edition 2018 – identical with IEC 62676-2-1:2013).
  • Video surveillance systems for use in security applications – Part 3: Analog and digital video interfaces. (INSO 21122-3 1st edition 2018 – identical with IEC 62676-3:2013).
  • Identification cards – ICC-managed devices – Part 1: General framework. (INSO 21122-3 1st edition 2018 – identical with ISO/IEC 18328-1: 2015).
  • Identification cards – ICC-managed devices – Part 2: Physical characteristics and test methods for cards with devices. (INSO 21122-3 1st edition 2018 – identical with ISO/IEC 18328-2: 2015).
  • Identification cards – ICC-managed devices – Part 3: Organization, security and commands for interchange. (INSO 21122-3 1st edition 2018 – identical with ISO/IEC 18328-3: 2016).
  • Information technology – Identification cards – Biometric System-on-Card – Part 3: Logical information interchange mechanism. (INSO 21122-3 1st edition 2018 – identical with ISO/IEC 17839-3: 2016).
  • Information technology – Security techniques – Cryptographic techniques based on elliptic curves – Part 5: Elliptic curve generation. (INSO 21122-3 1st edition 2018 – identical with ISO/IEC 15946-5: 2017).
Our Fulltime Academic Team

Dr Soheila Gheisari completed her Ph.D. in Computer Science at the University of Technology Sydney (UTS) in 2019. During her doctoral studies, she gained practical experience as a data analyst through an internship at the Australian Bureau of Statistics (ABS), where she applied various statistical methods to analyze household survey data. Following the completion of her Ph.D., she served as a research fellow at UTS from 2019 to 2020. Additionally, she has been actively involved in teaching since July 2019, primarily at Victoria University. In her teaching role, she instructs a range of courses related to Information Technology (IT), with a particular focus on subjects related to data mining and machine learning. Her research interest includes machine learning, data science, computer vision, and AI in medicine.


Experience

  • 2019–2023 Lecturer in College of Engineering and Science Victoria University, Sydney Campus
  • 2019–2020 Research Fellow School of Health, University of Technology Sydney
  • 2021–2022 Lecturer, School of Information Technology and Engineering, Melbourne Institute Technology

Education

  • Ph.D.: Computer Science, University of Technology Sydney, 2015-2019, Thesis Title: Computer-Aided Diagnosis Systems in the Classification of Neuroblastoma Histological Images
  • Master: Engineering, Azad University, Tehran, Iran, 2003 – 2006
    Bachelor: Engineering, K. N. Toosi, Tehran, Iran, 1999-2003

Teaching Experience

  • Data Warehousing and Mining
  • Data Analytics in Cybersecurity
  • Cybersecurity Law, Regulations and Policy
  • Mathematics for Data Analytics Mathematics for Computing
  • Introduction to Data Analytics
  • Advanced Data Analytics
  • Data Visualization
  • Contemporary Topics in IT
  • Programming Fundamentals Introduction to Research
  • Supervision
  • Master’s Capstone Projects and Research Theses

Honors

  • 2022 Teaching Excellence Award, Victoria University
  • 2021 Teaching Excellence Award, Victoria University
  • 2018 Australian Postgraduate Research Internship from Australian Bureau of Statistics (ABS)

Publication

  • S Gheisari, S Shariflou, J Phu, PJ Kennedy, A Agar, M Kalloniatis, A combined convolutional and recurrent neural network for enhanced glaucoma detection, Scientific reports 11 (1), 2021
    A Rafiei, A Rezaee, F Hajati, S Gheisari, M Golzan, SSP: Early prediction of sepsis using fully connected LSTM-CNN model, Computers in biology and medicine 128, 104110, 2021
  • F Hajati, A Rezaee, S Gheisari, Genetic algorithms for scheduling examinations,
    International Conference on Advanced Information Networking and Applications, 524-532, 2021
  • CJP Sopo, F Hajati, S Gheisari, DeFungi: Direct mycological examination of microscopic fungi images, CJP Sopo, arXiv preprint arXiv:2109.07322, 2021
  • S Gheisari, A Rezaee, F Hajati, Co-evolution Genetic Algorithm Approximation Technique for ROM-Less Digital Synthesizers, International Conference on Advanced Information Networking and Applications, 2021
  • S Gheisari, A Rezaee, F Hajati, Solving Job Scheduling Problem Using Genetic Algorithm, International Conference on Advanced Information Networking and Application, 2021
  • S Gheisari, M Golzan, J Phu, PJ Kennedy, A Agar, M Kalloniatis, A combined convolutional and recurrent neural network applied to fundus videos markedly enhances glaucoma detection, Investigative Ophthalmology & Visual Science 61 (9), 2020
  • F Hajati, A Cheraghian, O Ameri Sianaki, B Zeinali, S Gheisari, Polar Topographic Derivatives for 3D Face Recognition: Application to Internet of Things Security, Web, Artificial Intelligence and Network Applications: Proceedings of the Workshops of the 33rd International Conference on Advanced Information Networking and Applications (WAINA-2019)
  • S Gheisari, DR Catchpoole, A Charlton, PJ Kennedy, Convolutional deep belief network with feature encoding for classification of neuroblastoma histological images, Journal of pathology informatics 9 (1), 17, 2018
  • S Gheisari, DR Catchpoole, A Charlton, Z Melegh, E Gradhand, Computer aided classification of neuroblastoma histological images using scale invariant feature transform with feature encoding, Diagnostics 8 (3), 56, 2018
  • F Hajati, M Tavakolian, S Gheisari, Y Gao, AS Mian, Dynamic texture comparison using derivative sparse representation: Application to video-based face recognition,
    IEEE Transactions on Human-Machine Systems 47 (6), 2017
  • F Hajati, A Cheraghian, S Gheisari, Y Gao, AS Mian, Surface geodesic pattern for 3D deformable texture matching, Pattern Recognition 62, 21-32, 2017
  • S Gheisari, D R. Catchpoole, A Charlton, P J. Kennedy, Patched Completed Local Binary Pattern is an Effective Method for Neuroblastoma Histological Image Classification, The 15th Australasian Data Mining Conference, 2017
  • S Gheisari, A Charlton, DR Catchpoole, PJ Kennedy, Computers can classify neuroblastic tumours from histopathological images using machine learning, Pathology 49, S72-S73, 2017
  • A Cheraghian, F Hajati, S Gheisari, Y Gao, 2.5 D Face Recognition Using Gabor Discrete Cosine Transform, International Journal of Computer and Information Engineering 10 (2), 308-311, 2016
  • M Tavakolian, F Hajati, AS Mian, Y Gao, S Gheisari, Derivative Variation Pattern for Illumination-Invariant Image Representation, Image Processing (ICIP), 2013
  • S Gheisari, S Javadi, A Kashaninya, 3D Face Recognition using Patch Geodesic Derivative Pattern, International Journal of Smart Electrical Engineering 2 (3), 127-132, 2013
  • A Cheraghian, F Hajati, AS Mian, Y Gao, S Gheisari, 3D Face Recognition using Topographic High-order Derivatives, Image Processing (ICIP), 2013
  • M Tavakolian, F Hajati, AS Mian, S Gheisari, 2013, Sparse Variation Pattern for Texture Classification, International Conference on Digital Image Computing: Techniques and Applications (DICTA).

Bringing over 5 years of experience in the education sector, both domestically and internationally, Matthew is committed to creating dynamic learning experiences and student success. As the current manager of the Moodle Learning Management System (LMS), Matthew is friendly and approachable, happy to help with any student queries relating to Moodle.

Matthew also teaches undergraduate units and is involved in the Academic Support Sessions on campus. If you are struggling with any aspects of your study, Matthew will be happy to help.

Stay informed

Get our latest application tips and information on courses, scholarships, and upcoming events.

Need assistance?

Fill out our enquiry form and our team will be in touch to provide support.

Ask a question