Dima Alhadidi

According to our database1, Dima Alhadidi authored at least 39 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Key-and-Signature Compact Multi-Signatures: A Compiler with Realizations.
IACR Cryptol. ePrint Arch., 2023

Key-and-Signature Compact Multi-Signatures for Blockchain: A Compiler with Realizations.
CoRR, 2023

FedShare: Secure Aggregation based on Additive Secret Sharing in Federated Learning.
Proceedings of the International Database Engineered Applications Symposium Conference, 2023

Comparative Analysis of Membership Inference Attacks in Federated Learning.
Proceedings of the International Database Engineered Applications Symposium Conference, 2023

Time-Series Load Data Analysis for User Power Profiling.
Proceedings of the 25th International Conference on Advanced Communication Technology, 2023

Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder.
J. Netw. Syst. Manag., 2022

Private Federated Framework for Health Data.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

NICASN: Non-negative Matrix Factorization and Independent Component Analysis for Clustering Social Networks.
Proceedings of the 35th Canadian Conference on Artificial Intelligence, Toronto, Ontario, 2022

Nearest neighbour search over encrypted data using intel SGX.
J. Inf. Secur. Appl., 2020

Membership Inference Attacks: Analysis and Mitigation.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Secure Similar Patients Query on Encrypted Genomic Data.
IEEE J. Biomed. Health Informatics, 2019

Privacy-preserving techniques of genomic data - a survey.
Briefings Bioinform., 2019

Parallel Linear Regression on Encrypted Data.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Text-Based Detection of Unauthorized Users of Social Media Accounts.
Proceedings of the Advances in Artificial Intelligence, 2018

Aspect-oriented modeling framework for security hardening.
Innov. Syst. Softw. Eng., 2016

Privacy-preserving data mashup model for trading person-specific information.
Electron. Commer. Res. Appl., 2016

Secure and Efficient Multiparty Computation on Genomic Data.
Proceedings of the 20th International Database Engineering & Applications Symposium, 2016

Transportation risk analysis using probabilistic model checking.
Expert Syst. Appl., 2015

Weaving Risk Identification into Crowdsourcing Lifecycle.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

Secure and Private Management of Healthcare Databases for Data Mining.
Proceedings of the 28th IEEE International Symposium on Computer-Based Medical Systems, 2015

Aspect-Oriented Security Hardening of UML Design Models
Springer, ISBN: 978-3-319-16106-8, 2015

Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data.
IEEE Trans. Dependable Secur. Comput., 2014

Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Common weaving approach in mainstream languages for software security hardening.
J. Syst. Softw., 2013

Symmetrically-Private Database Search in Cloud Computing.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Secure Distributed Framework for Achieving ε-Differential Privacy.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Security Evaluation and Hardening of Free and Open Source Software (FOSS).
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010

Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework.
Proceedings of the Formal Aspects of Component Software - 7th International Workshop, 2010

Aspect weaver: a model transformation approach for UML models.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

Capturing Returned Computable Values in AspectJ for Security Hardening.
Inf. Secur. J. A Glob. Perspect., 2009

lambda_SAOP: A Security AOP Calculus.
Comput. J., 2009

The dataflow pointcut: a formal and practical framework.
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009

A Practical Framework for the Dataflow Pointcut in AspectJ.
Proceedings of the The Forth International Conference on Availability, 2009

New AspectJ Pointcuts for Integer Overflow and Underflow Detection.
Inf. Secur. J. A Glob. Perspect., 2008

Towards Language-Independent Approach for Security Concerns Weaving.
Proceedings of the SECRYPT 2008, 2008

Cross-Language Weaving Approach Targeting Software Security Hardening.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

An AOP Extended Lambda-Calculus.
Proceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007), 2007

Security crosscutting concerns and AspectJ.
Proceedings of the 2006 International Conference on Privacy, 2006