Noman Mohammed
Noman Mohammed
Associate Professor, University of Manitoba
在 的电子邮件经过验证 - 首页
Differentially private data release for data mining
N Mohammed, R Chen, BCM Fung, PS Yu
Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011
Publishing set-valued data via differential privacy
R Chen, N Mohammed, BCM Fung, BC Desai, L Xiong
Proceedings of the VLDB Endowment 4 (11), 1087-1098, 2011
Privacy-preserving trajectory data publishing by local suppression
R Chen, BCM Fung, N Mohammed, BC Desai, K Wang
Information Sciences 231, 83-97, 2013
Centralized and distributed anonymization for high-dimensional healthcare data
N Mohammed, BCM Fung, PCK Hung, CK Lee
ACM Transactions on Knowledge Discovery from Data (TKDD) 4 (4), 1-33, 2010
Mechanism design-based secure leader election model for intrusion detection in MANET
N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya
IEEE transactions on dependable and secure computing 8 (1), 89-103, 2009
Malware classification with deep convolutional neural networks
M Kalash, M Rochan, N Mohammed, NDB Bruce, Y Wang, F Iqbal
2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018
Anonymizing healthcare data: a case study on the blood transfusion service
N Mohammed, BCM Fung, PCK Hung, C Lee
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
A game-theoretic intrusion detection model for mobile ad hoc networks
H Otrok, N Mohammed, L Wang, M Debbabi, P Bhattacharya
Computer communications 31 (4), 708-721, 2008
Walking in the crowd: anonymizing trajectory data for pattern analysis
N Mohammed, BCM Fung, M Debbabi
Proceedings of the 18th ACM conference on Information and knowledge …, 2009
Membership Inference Attack against Differentially Private Deep Learning Model.
MA Rahman, T Rahman, R Laganière, N Mohammed, Y Wang
Trans. Data Priv. 11 (1), 61-79, 2018
Privacy-preserving data mashup
N Mohammed, BCM Fung, K Wang, PCK Hung
Proceedings of the 12th International Conference on Extending Database …, 2009
Anonymity meets game theory: secure data integration with malicious participants
N Mohammed, BCM Fung, M Debbabi
The VLDB Journal 20 (4), 567-588, 2011
Secure two-party differentially private data release for vertically partitioned data
N Mohammed, D Alhadidi, BCM Fung, M Debbabi
IEEE transactions on dependable and secure computing 11 (1), 59-71, 2013
Privacy-preserving heterogeneous health data sharing
N Mohammed, X Jiang, R Chen, BCM Fung, L Ohno-Machado
Journal of the American Medical Informatics Association 20 (3), 462-469, 2013
Secure Distributed Framework for Achieving ε-Differential Privacy
D Alhadidi, N Mohammed, BCM Fung, M Debbabi
International Symposium on Privacy Enhancing Technologies Symposium, 120-139, 2012
Differential-private data publishing through component analysis
X Jiang, Z Ji, S Wang, N Mohammed, S Cheng, L Ohno-Machado
Transactions on data privacy 6 (1), 19, 2013
Privacy-preserving techniques of genomic data—a survey
MMA Aziz, MN Sadat, D Alhadidi, S Wang, X Jiang, CL Brown, ...
Briefings in bioinformatics 20 (3), 887-895, 2019
Differentially private genome data dissemination through top-down specialization
S Wang, N Mohammed, R Chen
BMC medical informatics and decision making 14 (1), 1-7, 2014
A mechanism design-based multi-leader election scheme for intrusion detection in manet
N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya
2008 IEEE Wireless Communications and Networking Conference, 2816-2821, 2008
Presage: privacy-preserving genetic testing via software guard extension
F Chen, C Wang, W Dai, X Jiang, N Mohammed, MM Al Aziz, MN Sadat, ...
BMC medical genomics 10 (2), 77-85, 2017
文章 1–20