default search action
Noman Mohammed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Hossein Abedi Khorasgani, Noman Mohammed, Yang Wang:
Attribute inference privacy protection for pre-trained models. Int. J. Inf. Sec. 23(3): 2269-2285 (2024) - [j32]Md Momin Al Aziz, Toufique Morshed, Noman Mohammed:
Secure Genomic String Search with Parallel Homomorphic Encryption. Inf. 15(1): 40 (2024) - [i9]Atiquer Rahman Sarkar, Yao-Shun Chuang, Noman Mohammed, Xiaoqian Jiang:
De-identification is not always enough. CoRR abs/2402.00179 (2024) - [i8]Fatima Jahan Sarmin, Atiquer Rahman Sarkar, Yang Wang, Noman Mohammed:
Synthetic Data: Revisiting the Privacy-Utility Trade-off. CoRR abs/2407.07926 (2024) - [i7]Yao-Shun Chuang, Atiquer Rahman Sarkar, Noman Mohammed, Xiaoqian Jiang:
Robust Privacy Amidst Innovation with Large Language Models Through a Critical Assessment of the Risks. CoRR abs/2407.16166 (2024) - 2023
- [j31]Ali Abbasi Tadi, Saroj Dayal, Dima Alhadidi, Noman Mohammed:
Comparative Analysis of Membership Inference Attacks in Federated and Centralized Learning. Inf. 14(11): 620 (2023) - [c34]Fahim Faisal, Carson K. Leung, Noman Mohammed, Yang Wang:
Privacy-Preserving Learning via Data and Knowledge Distillation. DSAA 2023: 1-10 - [c33]Hamid Fazli Khojir, Dima Alhadidi, Sara Rouhani, Noman Mohammed:
FedShare: Secure Aggregation based on Additive Secret Sharing in Federated Learning. IDEAS 2023: 25-33 - [c32]Saroj Dayal, Dima Alhadidi, Ali Abbasi Tadi, Noman Mohammed:
Comparative Analysis of Membership Inference Attacks in Federated Learning. IDEAS 2023: 185-192 - 2022
- [j30]Md Momin Al Aziz, Tanbir Ahmed, Tasnia Faequa, Xiaoqian Jiang, Yiyu Yao, Noman Mohammed:
Differentially Private Medical Texts Generation Using Generative Neural Networks. ACM Trans. Comput. Heal. 3(1): 5:1-5:27 (2022) - [j29]Md. Monowar Anjum, Noman Mohammed, Wentao Li, Xiaoqian Jiang:
Privacy preserving collaborative learning of generalized linear mixed model. J. Biomed. Informatics 127: 104008 (2022) - [j28]Md Momin Al Aziz, Md. Monowar Anjum, Noman Mohammed, Xiaoqian Jiang:
Generalized genomic data sharing for differentially private federated learning. J. Biomed. Informatics 132: 104113 (2022) - [j27]Wentao Li, Jiayi Tong, Md. Monowar Anjum, Noman Mohammed, Yong Chen, Xiaoqian Jiang:
Federated learning algorithms for generalized mixed-effects model (GLMM) on horizontally partitioned data from distributed sources. BMC Medical Informatics Decis. Mak. 22(1): 269 (2022) - [c31]Tanzir Ul Islam, Noman Mohammed, Dima Alhadidi:
Private Federated Framework for Health Data. BIBM 2022: 1919-1926 - [c30]Tanzir Ul Islam, Reza Ghasemi, Noman Mohammed:
Privacy-Preserving Federated Learning Model for Healthcare Data. CCWC 2022: 281-287 - [c29]Fahim Faisal, Noman Mohammed, Carson K. Leung, Yang Wang:
Generating Privacy Preserving Synthetic Medical Data. DSAA 2022: 1-10 - 2021
- [j26]Md Momin Al Aziz, Shahin Kamali, Noman Mohammed, Xiaoqian Jiang:
Online Algorithm for Differentially Private Genome-wide Association Studies. ACM Trans. Comput. Heal. 2(2): 13:1-13:27 (2021) - [c28]Tanbir Ahmed, Md Momin Al Aziz, Noman Mohammed, Xiaoqian Jiang:
Privacy preserving neural networks for electronic health records de-identification. BCB 2021: 8:1-8:6 - [c27]Md. Monowar Anjum, Noman Mohammed, Xiaoqian Jiang:
De-identification of Unstructured Clinical Texts from Sequence to Sequence Perspective. CCS 2021: 2438-2440 - [i6]Md. Monowar Anjum, Noman Mohammed, Xiaoqian Jiang:
De-identification of Unstructured Clinical Texts from Sequence to Sequence Perspective. CoRR abs/2108.07971 (2021) - [i5]Wentao Li, Jiayi Tong, Md. Monowar Anjum, Noman Mohammed, Yong Chen, Xiaoqian Jiang:
Federated Learning Algorithms for Generalized Mixed-effects Model (GLMM) on Horizontally Partitioned Data from Distributed Sources. CoRR abs/2109.14046 (2021) - 2020
- [j25]Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D. B. Bruce, Yang Wang, Farkhund Iqbal:
A Deep Learning Framework for Malware Classification. Int. J. Digit. Crime Forensics 12(1): 90-108 (2020) - [j24]Kazi Wasif Ahmed, Md Momin Al Aziz, Md. Nazmus Sadat, Dima Alhadidi, Noman Mohammed:
Nearest neighbour search over encrypted data using intel SGX. J. Inf. Secur. Appl. 54: 102579 (2020) - [j23]Gaby G. Dagher, Benjamin C. M. Fung, Noman Mohammed, Jeremy Clark:
sf SecDM: privacy-preserving data outsourcing framework with differential privacy. Knowl. Inf. Syst. 62(5): 1923-1960 (2020) - [c26]Md Momin Al Aziz, Parimala Thulasiraman, Noman Mohammed:
Parallel Generalized Suffix Tree Construction for Genomic Data. AlCoB 2020: 3-15 - [c25]Md Safiur Rahman Mahdi, Md. Nazmus Sadat, Noman Mohammed, Xiaoqian Jiang:
Secure Count Query on Encrypted Heterogeneous Data. DASC/PiCom/CBDCom/CyberSciTech 2020: 548-555 - [c24]Md Yeakub Hassan, Ullash Saha, Noman Mohammed, Stephane Durocher, Avery Miller:
Efficient Privacy-Preserving Approaches for Trajectory Datasets. DASC/PiCom/CBDCom/CyberSciTech 2020: 612-619 - [c23]Toufique Morshed, Md Momin Al Aziz, Noman Mohammed:
CPU and GPU Accelerated Fully Homomorphic Encryption. HOST 2020: 142-153 - [c22]Md. Monowar Anjum, Noman Mohammed:
PAARS: Privacy Aware Access Regulation System. UEMCON 2020: 155-161 - [i4]Toufique Morshed, Md Momin Al Aziz, Noman Mohammed:
CPU and GPU Accelerated Fully Homomorphic Encryption. CoRR abs/2005.01945 (2020) - [i3]Md. Monowar Anjum, Noman Mohammed:
PAARS: Privacy Aware Access Regulation System. CoRR abs/2012.10534 (2020)
2010 – 2019
- 2019
- [j22]Md Momin Al Aziz, Md. Nazmus Sadat, Dima Alhadidi, Shuang Wang, Xiaoqian Jiang, Cheryl L. Brown, Noman Mohammed:
Privacy-preserving techniques of genomic data - a survey. Briefings Bioinform. 20(3): 887-895 (2019) - [j21]Md. Nazmus Sadat, Md Momin Al Aziz, Noman Mohammed, Serguei Pakhomov, Hongfang Liu, Xiaoqian Jiang:
A privacy-preserving distributed filtering framework for NLP artifacts. BMC Medical Informatics Decis. Mak. 19(1): 183:1-183:10 (2019) - [j20]Md. Nazmus Sadat, Md Momin Al Aziz, Noman Mohammed, Feng Chen, Xiaoqian Jiang, Shuang Wang:
SAFETY: Secure gwAs in Federated Environment through a hYbrid Solution. IEEE ACM Trans. Comput. Biol. Bioinform. 16(1): 93-102 (2019) - [j19]Yichen Jiang, Jenny Hamer, Chenghong Wang, Xiaoqian Jiang, Miran Kim, Yongsoo Song, Yuhou Xia, Noman Mohammed, Md. Nazmus Sadat, Shuang Wang:
SecureLR: Secure Logistic Regression Model via a Hybrid Cryptographic Protocol. IEEE ACM Trans. Comput. Biol. Bioinform. 16(1): 113-123 (2019) - [j18]Md Safiur Rahman Mahdi, Md Momin Al Aziz, Dima Alhadidi, Noman Mohammed:
Secure Similar Patients Query on Encrypted Genomic Data. IEEE J. Biomed. Health Informatics 23(6): 2611-2618 (2019) - [c21]Yiwei Lu, Mahesh Kumar K., Noman Mohammed, Yang Wang:
Homoglyph attack detection with unpaired data. SEC 2019: 377-382 - 2018
- [j17]Luyao Chen, Md Momin Al Aziz, Noman Mohammed, Xiaoqian Jiang:
Secure large-scale genome data storage and query. Comput. Methods Programs Biomed. 165: 129-137 (2018) - [j16]Mohammad Zahidul Hasan, Md Safiur Rahman Mahdi, Noman Mohammed:
Secure Count Query on Encrypted Genomic Data: A Survey. IEEE Internet Comput. 22(2): 71-82 (2018) - [j15]Mohammad Zahidul Hasan, Md Safiur Rahman Mahdi, Md. Nazmus Sadat, Noman Mohammed:
Secure count query on encrypted genomic data. J. Biomed. Informatics 81: 41-52 (2018) - [j14]Md. Atiqur Rahman, Tanzila Rahman, Robert Laganière, Noman Mohammed:
Membership Inference Attack against Differentially Private Deep Learning Model. Trans. Data Priv. 11(1): 61-79 (2018) - [c20]Rezaul Karim, Md. Amirul Islam, Noman Mohammed, Neil D. B. Bruce:
On the Robustness of Deep Learning Models to Universal Adversarial Attack. CRV 2018: 55-62 - [c19]Linwei Ye, Binglin Li, Noman Mohammed, Yang Wang, Jie Liang:
Privacy-Preserving Age Estimation for Content Rating. MMSP 2018: 1-6 - [c18]Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D. B. Bruce, Yang Wang, Farkhund Iqbal:
Malware Classification with Deep Convolutional Neural Networks. NTMS 2018: 1-5 - [c17]Toufique Morshed, Dima Alhadidi, Noman Mohammed:
Parallel Linear Regression on Encrypted Data. PST 2018: 1-5 - 2017
- [j13]Baichuan Zhang, Noman Mohammed, Vachik S. Dave, Mohammad Al Hasan:
Feature Selection for Classification under Anonymity Constraint. Trans. Data Priv. 10(1): 1-25 (2017) - [j12]Reza Ghasemi, Md Momin Al Aziz, Noman Mohammed, Massoud Hadian Dehkordi, Xiaoqian Jiang:
Private and Efficient Query Processing on Outsourced Genomic Databases. IEEE J. Biomed. Health Informatics 21(5): 1466-1472 (2017) - [c16]Chenghong Wang, Yichen Jiang, Feng Chen, Noman Mohammed, Xiaoqian Jiang, Md Momin Al Aziz, Md. Nazmus Sadat, Shuang Wang:
SCOTCH: Secure Counting Of encrypTed genomiC data using a Hybrid approach. AMIA 2017 - [c15]Md Safiur Rahman Mahdi, Mohammad Zahidul Hasan, Noman Mohammed:
Secure Sequence Similarity Search on Encrypted Genomic Data. CHASE 2017: 205-213 - [c14]Kazi Wasif Ahmed, Mohammad Zahidul Hasan, Noman Mohammed:
Image-Centric Social Discovery Using Neural Network under Anonymity Constraint. IC2E 2017: 238-244 - [i2]Mohammad Zahidul Hasan, Md Safiur Rahman Mahdi, Noman Mohammed:
Secure Count Query on Encrypted Genomic Data. CoRR abs/1703.01534 (2017) - [i1]Md. Nazmus Sadat, Md Momin Al Aziz, Noman Mohammed, Feng Chen, Shuang Wang, Xiaoqian Jiang:
SAFETY: Secure gwAs in Federated Environment Through a hYbrid solution with Intel SGX and Homomorphic Encryption. CoRR abs/1703.02577 (2017) - 2016
- [c13]Md Momin Al Aziz, Mohammad Zahidul Hasan, Noman Mohammed, Dima Alhadidi:
Secure and Efficient Multiparty Computation on Genomic Data. IDEAS 2016: 278-283 - [c12]Mohammad Moein Almasi, Taha R. Siddiqui, Noman Mohammed, Hadi Hemmati:
The Risk-Utility Tradeoff for Data Privacy Models. NTMS 2016: 1-5 - 2015
- [c11]Feng Chen, Noman Mohammed, Shuang Wang, Wenbo He, Samuel Cheng, Xiaoqian Jiang:
Cloud-assisted distributed private data sharing. BCB 2015: 202-211 - [c10]Noman Mohammed, Samira Barouti, Dima Alhadidi, Rui Chen:
Secure and Private Management of Healthcare Databases for Data Mining. CBMS 2015: 191-196 - [p1]Noman Mohammed, Shuang Wang, Rui Chen, Xiaoqian Jiang:
Private Genome Data Dissemination. Medical Data Privacy Handbook 2015: 443-461 - 2014
- [j11]Shuang Wang, Noman Mohammed, Rui Chen:
Differentially private genome data dissemination through top-down specialization. BMC Medical Informatics Decis. Mak. 14(S-1): S2 (2014) - [j10]Noman Mohammed, Dima Alhadidi, Benjamin C. M. Fung, Mourad Debbabi:
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data. IEEE Trans. Dependable Secur. Comput. 11(1): 59-71 (2014) - 2013
- [j9]Rui Chen, Benjamin C. M. Fung, Noman Mohammed, Bipin C. Desai, Ke Wang:
Privacy-preserving trajectory data publishing by local suppression. Inf. Sci. 231: 83-97 (2013) - [j8]Noman Mohammed, Xiaoqian Jiang, Rui Chen, Benjamin C. M. Fung, Lucila Ohno-Machado:
Privacy-preserving heterogeneous health data sharing. J. Am. Medical Informatics Assoc. 20(3): 462-469 (2013) - [j7]Xiaoqian Jiang, Zhanglong Ji, Shuang Wang, Noman Mohammed, Samuel Cheng, Lucila Ohno-Machado:
Differential-Private Data Publishing Through Component Analysis. Trans. Data Priv. 6(1): 19-34 (2013) - 2012
- [c9]Dima Alhadidi, Noman Mohammed, Benjamin C. M. Fung, Mourad Debbabi:
Secure Distributed Framework for Achieving ε-Differential Privacy. Privacy Enhancing Technologies 2012: 120-139 - 2011
- [j6]Rui Chen, Noman Mohammed, Benjamin C. M. Fung, Bipin C. Desai, Li Xiong:
Publishing Set-Valued Data via Differential Privacy. Proc. VLDB Endow. 4(11): 1087-1098 (2011) - [j5]Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. IEEE Trans. Dependable Secur. Comput. 8(1): 89-103 (2011) - [j4]Noman Mohammed, Benjamin C. M. Fung, Mourad Debbabi:
Anonymity meets game theory: secure data integration with malicious participants. VLDB J. 20(4): 567-588 (2011) - [c8]Noman Mohammed, Rui Chen, Benjamin C. M. Fung, Philip S. Yu:
Differentially private data release for data mining. KDD 2011: 493-501 - 2010
- [j3]Abderrezak Rachedi, Abderrahim Benslimane, Hadi Otrok, Noman Mohammed, Mourad Debbabi:
A Secure Mechanism Design-Based and Game Theoretical Model for MANETs. Mob. Networks Appl. 15(2): 191-204 (2010) - [j2]Noman Mohammed, Benjamin C. M. Fung, Patrick C. K. Hung, Cheuk-kwong Lee:
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data. ACM Trans. Knowl. Discov. Data 4(4): 18:1-18:33 (2010)
2000 – 2009
- 2009
- [c7]Noman Mohammed, Benjamin C. M. Fung, Mourad Debbabi:
Walking in the crowd: anonymizing trajectory data for pattern analysis. CIKM 2009: 1441-1444 - [c6]Noman Mohammed, Benjamin C. M. Fung, Ke Wang, Patrick C. K. Hung:
Privacy-preserving data mashup. EDBT 2009: 228-239 - [c5]Noman Mohammed, Benjamin C. M. Fung, Patrick C. K. Hung, Cheuk-kwong Lee:
Anonymizing healthcare data: a case study on the blood transfusion service. KDD 2009: 1285-1294 - 2008
- [j1]Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun. 31(4): 708-721 (2008) - [c4]Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. WCNC 2008: 2816-2821 - [c3]Abderrezak Rachedi, Abderrahim Benslimane, Hadi Otrok, Noman Mohammed, Mourad Debbabi:
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks. WiMob 2008: 417-422 - [c2]Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. WiMob 2008: 608-612 - 2007
- [c1]Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
An Efficient and Truthful Leader IDS Election Mechanism for MANET. WiMob 2007: 78
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-20 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint