Noman Mohammed
Noman Mohammed
Associate Professor, University of Manitoba
Verified email at - Homepage
Cited by
Cited by
Differentially private data release for data mining
N Mohammed, R Chen, BCM Fung, PS Yu
Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011
Malware classification with deep convolutional neural networks
M Kalash, M Rochan, N Mohammed, NDB Bruce, Y Wang, F Iqbal
2018 9th IFIP international conference on new technologies, mobility and …, 2018
Privacy-preserving trajectory data publishing by local suppression
R Chen, BCM Fung, N Mohammed, BC Desai, K Wang
Information Sciences 231, 83-97, 2013
Publishing set-valued data via differential privacy
R Chen, N Mohammed, BCM Fung, BC Desai, L Xiong
Proceedings of the VLDB Endowment 4 (11), 1087-1098, 2011
Membership inference attack against differentially private deep learning model.
MA Rahman, T Rahman, R Laganière, N Mohammed, Y Wang
Trans. Data Priv. 11 (1), 61-79, 2018
Centralized and distributed anonymization for high-dimensional healthcare data
N Mohammed, BCM Fung, PCK Hung, CK Lee
ACM Transactions on Knowledge Discovery from Data (TKDD) 4 (4), 1-33, 2010
Mechanism design-based secure leader election model for intrusion detection in MANET
N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya
IEEE transactions on dependable and secure computing 8 (1), 89-103, 2009
Anonymizing healthcare data: a case study on the blood transfusion service
N Mohammed, BCM Fung, PCK Hung, C Lee
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
A game-theoretic intrusion detection model for mobile ad hoc networks
H Otrok, N Mohammed, L Wang, M Debbabi, P Bhattacharya
Computer communications 31 (4), 708-721, 2008
Walking in the crowd: anonymizing trajectory data for pattern analysis
N Mohammed, BCM Fung, M Debbabi
Proceedings of the 18th ACM conference on Information and knowledge …, 2009
Secure two-party differentially private data release for vertically partitioned data
N Mohammed, D Alhadidi, BCM Fung, M Debbabi
IEEE transactions on dependable and secure computing 11 (1), 59-71, 2013
Privacy-preserving data mashup
N Mohammed, BCM Fung, K Wang, PCK Hung
Proceedings of the 12th international conference on extending database …, 2009
Anonymity meets game theory: secure data integration with malicious participants
N Mohammed, BCM Fung, M Debbabi
The VLDB Journal 20, 567-588, 2011
Privacy-preserving techniques of genomic data—a survey
MMA Aziz, MN Sadat, D Alhadidi, S Wang, X Jiang, CL Brown, ...
Briefings in bioinformatics 20 (3), 887-895, 2019
PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre guard extension
F Chen, C Wang, W Dai, X Jiang, N Mohammed, MM Al Aziz, MN Sadat, ...
BMC medical genomics 10, 77-85, 2017
Safety: secure gwas in federated environment through a hybrid solution
MN Sadat, MM Al Aziz, N Mohammed, F Chen, X Jiang, S Wang
IEEE/ACM transactions on computational biology and bioinformatics 16 (1), 93-102, 2018
Differential-private data publishing through component analysis
X Jiang, Z Ji, S Wang, N Mohammed, S Cheng, L Ohno-Machado
Transactions on data privacy 6 (1), 19, 2013
Privacy-preserving heterogeneous health data sharing
N Mohammed, X Jiang, R Chen, BCM Fung, L Ohno-Machado
Journal of the American Medical Informatics Association 20 (3), 462-469, 2013
Secure Distributed Framework for Achieving ε-Differential Privacy
D Alhadidi, N Mohammed, BCM Fung, M Debbabi
Privacy Enhancing Technologies: 12th International Symposium, PETS 2012 …, 2012
Secure approximation of edit distance on genomic data
MMA Aziz, D Alhadidi, N Mohammed
BMC medical genomics 10, 55-67, 2017
The system can't perform the operation now. Try again later.
Articles 1–20