Differentially private data release for data mining N Mohammed, R Chen, BCM Fung, PS Yu Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011 | 480 | 2011 |
Malware classification with deep convolutional neural networks M Kalash, M Rochan, N Mohammed, NDB Bruce, Y Wang, F Iqbal 2018 9th IFIP international conference on new technologies, mobility and …, 2018 | 450 | 2018 |
Privacy-preserving trajectory data publishing by local suppression R Chen, BCM Fung, N Mohammed, BC Desai, K Wang Information Sciences 231, 83-97, 2013 | 318 | 2013 |
Publishing set-valued data via differential privacy R Chen, N Mohammed, BCM Fung, BC Desai, L Xiong Proceedings of the VLDB Endowment 4 (11), 1087-1098, 2011 | 306 | 2011 |
Membership inference attack against differentially private deep learning model. MA Rahman, T Rahman, R Laganière, N Mohammed, Y Wang Trans. Data Priv. 11 (1), 61-79, 2018 | 288 | 2018 |
Centralized and distributed anonymization for high-dimensional healthcare data N Mohammed, BCM Fung, PCK Hung, CK Lee ACM Transactions on Knowledge Discovery from Data (TKDD) 4 (4), 1-33, 2010 | 210 | 2010 |
Mechanism design-based secure leader election model for intrusion detection in MANET N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya IEEE transactions on dependable and secure computing 8 (1), 89-103, 2009 | 161 | 2009 |
Anonymizing healthcare data: a case study on the blood transfusion service N Mohammed, BCM Fung, PCK Hung, C Lee Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009 | 154 | 2009 |
A game-theoretic intrusion detection model for mobile ad hoc networks H Otrok, N Mohammed, L Wang, M Debbabi, P Bhattacharya Computer communications 31 (4), 708-721, 2008 | 126 | 2008 |
Walking in the crowd: anonymizing trajectory data for pattern analysis N Mohammed, BCM Fung, M Debbabi Proceedings of the 18th ACM conference on Information and knowledge …, 2009 | 118 | 2009 |
Secure two-party differentially private data release for vertically partitioned data N Mohammed, D Alhadidi, BCM Fung, M Debbabi IEEE transactions on dependable and secure computing 11 (1), 59-71, 2013 | 110 | 2013 |
Privacy-preserving data mashup N Mohammed, BCM Fung, K Wang, PCK Hung Proceedings of the 12th international conference on extending database …, 2009 | 105 | 2009 |
Anonymity meets game theory: secure data integration with malicious participants N Mohammed, BCM Fung, M Debbabi The VLDB Journal 20, 567-588, 2011 | 102 | 2011 |
Privacy-preserving techniques of genomic data—a survey MMA Aziz, MN Sadat, D Alhadidi, S Wang, X Jiang, CL Brown, ... Briefings in bioinformatics 20 (3), 887-895, 2019 | 80 | 2019 |
Safety: secure gwas in federated environment through a hybrid solution MN Sadat, MM Al Aziz, N Mohammed, F Chen, X Jiang, S Wang IEEE/ACM transactions on computational biology and bioinformatics 16 (1), 93-102, 2018 | 69 | 2018 |
Differential-private data publishing through component analysis X Jiang, Z Ji, S Wang, N Mohammed, S Cheng, L Ohno-Machado Transactions on data privacy 6 (1), 19, 2013 | 68 | 2013 |
PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre guard extension F Chen, C Wang, W Dai, X Jiang, N Mohammed, MM Al Aziz, MN Sadat, ... BMC medical genomics 10, 77-85, 2017 | 65 | 2017 |
Privacy-preserving heterogeneous health data sharing N Mohammed, X Jiang, R Chen, BCM Fung, L Ohno-Machado Journal of the American Medical Informatics Association 20 (3), 462-469, 2013 | 64 | 2013 |
Secure Distributed Framework for Achieving ε-Differential Privacy D Alhadidi, N Mohammed, BCM Fung, M Debbabi Privacy Enhancing Technologies: 12th International Symposium, PETS 2012 …, 2012 | 64 | 2012 |
De-identification of electronic health record using neural network T Ahmed, MMA Aziz, N Mohammed Scientific reports 10 (1), 18600, 2020 | 55 | 2020 |