Noman Mohammed

According to our database1, Noman Mohammed authored at least 46 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Secure Similar Patients Query on Encrypted Genomic Data.
IEEE J. Biomedical and Health Informatics, 2019

SAFETY: Secure gwAs in Federated Environment through a hYbrid Solution.
IEEE/ACM Trans. Comput. Biology Bioinform., 2019

SecureLR: Secure Logistic Regression Model via a Hybrid Cryptographic Protocol.
IEEE/ACM Trans. Comput. Biology Bioinform., 2019

A privacy-preserving distributed filtering framework for NLP artifacts.
BMC Med. Inf. & Decision Making, 2019

Privacy-preserving techniques of genomic data - a survey.
Briefings in Bioinformatics, 2019

Homoglyph attack detection with unpaired data.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

2018
Membership Inference Attack against Differentially Private Deep Learning Model.
Transactions on Data Privacy, 2018

Secure count query on encrypted genomic data.
J. Biomed. Informatics, 2018

Secure Count Query on Encrypted Genomic Data: A Survey.
IEEE Internet Computing, 2018

Secure large-scale genome data storage and query.
Comput. Methods Programs Biomed., 2018

Parallel Linear Regression on Encrypted Data.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Malware Classification with Deep Convolutional Neural Networks.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Privacy-Preserving Age Estimation for Content Rating.
Proceedings of the 20th IEEE International Workshop on Multimedia Signal Processing, 2018

On the Robustness of Deep Learning Models to Universal Adversarial Attack.
Proceedings of the 15th Conference on Computer and Robot Vision, 2018

2017
Private and Efficient Query Processing on Outsourced Genomic Databases.
IEEE J. Biomedical and Health Informatics, 2017

Feature Selection for Classification under Anonymity Constraint.
Transactions on Data Privacy, 2017

SAFETY: Secure gwAs in Federated Environment Through a hYbrid solution with Intel SGX and Homomorphic Encryption.
CoRR, 2017

Secure Count Query on Encrypted Genomic Data.
CoRR, 2017

Image-Centric Social Discovery Using Neural Network under Anonymity Constraint.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

Secure Sequence Similarity Search on Encrypted Genomic Data.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

SCOTCH: Secure Counting Of encrypTed genomiC data using a Hybrid approach.
Proceedings of the AMIA 2017, 2017

2016
The Risk-Utility Tradeoff for Data Privacy Models.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Secure and Efficient Multiparty Computation on Genomic Data.
Proceedings of the 20th International Database Engineering & Applications Symposium, 2016

2015
Secure and Private Management of Healthcare Databases for Data Mining.
Proceedings of the 28th IEEE International Symposium on Computer-Based Medical Systems, 2015

Cloud-assisted distributed private data sharing.
Proceedings of the 6th ACM Conference on Bioinformatics, 2015

Private Genome Data Dissemination.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data.
IEEE Trans. Dependable Sec. Comput., 2014

Differentially private genome data dissemination through top-down specialization.
BMC Med. Inf. & Decision Making, 2014

2013
Differential-Private Data Publishing Through Component Analysis.
Trans. Data Privacy, 2013

Privacy-preserving heterogeneous health data sharing.
JAMIA, 2013

Privacy-preserving trajectory data publishing by local suppression.
Inf. Sci., 2013

2012
Secure Distributed Framework for Achieving ε-Differential Privacy.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

2011
Anonymity meets game theory: secure data integration with malicious participants.
VLDB J., 2011

Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET.
IEEE Trans. Dependable Sec. Comput., 2011

Publishing Set-Valued Data via Differential Privacy.
PVLDB, 2011

Differentially private data release for data mining.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

2010
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data.
TKDD, 2010

A Secure Mechanism Design-Based and Game Theoretical Model for MANETs.
MONET, 2010

2009
Anonymizing healthcare data: a case study on the blood transfusion service.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Privacy-preserving data mashup.
Proceedings of the EDBT 2009, 2009

Walking in the crowd: anonymizing trajectory data for pattern analysis.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
A game-theoretic intrusion detection model for mobile ad hoc networks.
Comput. Commun., 2008

A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2007
An Efficient and Truthful Leader IDS Election Mechanism for MANET.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007


  Loading...