Noman Mohammed

Orcid: 0000-0001-8547-9951

According to our database1, Noman Mohammed authored at least 73 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Attribute inference privacy protection for pre-trained models.
Int. J. Inf. Sec., June, 2024

Secure Genomic String Search with Parallel Homomorphic Encryption.
Inf., 2024

Robust Privacy Amidst Innovation with Large Language Models Through a Critical Assessment of the Risks.
CoRR, 2024

Synthetic Data: Revisiting the Privacy-Utility Trade-off.
CoRR, 2024

De-identification is not always enough.
CoRR, 2024

2023
Comparative Analysis of Membership Inference Attacks in Federated and Centralized Learning.
Inf., 2023

FedShare: Secure Aggregation based on Additive Secret Sharing in Federated Learning.
Proceedings of the International Database Engineered Applications Symposium Conference, 2023

Comparative Analysis of Membership Inference Attacks in Federated Learning.
Proceedings of the International Database Engineered Applications Symposium Conference, 2023

Privacy-Preserving Learning via Data and Knowledge Distillation.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

2022
Federated learning algorithms for generalized mixed-effects model (GLMM) on horizontally partitioned data from distributed sources.
BMC Medical Informatics Decis. Mak., 2022

Generalized genomic data sharing for differentially private federated learning.
J. Biomed. Informatics, 2022

Privacy preserving collaborative learning of generalized linear mixed model.
J. Biomed. Informatics, 2022

Differentially Private Medical Texts Generation Using Generative Neural Networks.
ACM Trans. Comput. Heal., 2022

Generating Privacy Preserving Synthetic Medical Data.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

Privacy-Preserving Federated Learning Model for Healthcare Data.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Private Federated Framework for Health Data.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

2021
Online Algorithm for Differentially Private Genome-wide Association Studies.
ACM Trans. Comput. Heal., 2021

De-identification of Unstructured Clinical Texts from Sequence to Sequence Perspective.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Privacy preserving neural networks for electronic health records de-identification.
Proceedings of the BCB '21: 12th ACM International Conference on Bioinformatics, 2021

2020
sf SecDM: privacy-preserving data outsourcing framework with differential privacy.
Knowl. Inf. Syst., 2020

Nearest neighbour search over encrypted data using intel SGX.
J. Inf. Secur. Appl., 2020

A Deep Learning Framework for Malware Classification.
Int. J. Digit. Crime Forensics, 2020

PAARS: Privacy Aware Access Regulation System.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

CPU and GPU Accelerated Fully Homomorphic Encryption.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

Secure Count Query on Encrypted Heterogeneous Data.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Efficient Privacy-Preserving Approaches for Trajectory Datasets.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Parallel Generalized Suffix Tree Construction for Genomic Data.
Proceedings of the Algorithms for Computational Biology, 2020

2019
Secure Similar Patients Query on Encrypted Genomic Data.
IEEE J. Biomed. Health Informatics, 2019

SAFETY: Secure gwAs in Federated Environment through a hYbrid Solution.
IEEE ACM Trans. Comput. Biol. Bioinform., 2019

SecureLR: Secure Logistic Regression Model via a Hybrid Cryptographic Protocol.
IEEE ACM Trans. Comput. Biol. Bioinform., 2019

A privacy-preserving distributed filtering framework for NLP artifacts.
BMC Medical Informatics Decis. Mak., 2019

Privacy-preserving techniques of genomic data - a survey.
Briefings Bioinform., 2019

Homoglyph attack detection with unpaired data.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

2018
Membership Inference Attack against Differentially Private Deep Learning Model.
Trans. Data Priv., 2018

Secure count query on encrypted genomic data.
J. Biomed. Informatics, 2018

Secure Count Query on Encrypted Genomic Data: A Survey.
IEEE Internet Comput., 2018

Secure large-scale genome data storage and query.
Comput. Methods Programs Biomed., 2018

Parallel Linear Regression on Encrypted Data.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Malware Classification with Deep Convolutional Neural Networks.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Privacy-Preserving Age Estimation for Content Rating.
Proceedings of the 20th IEEE International Workshop on Multimedia Signal Processing, 2018

On the Robustness of Deep Learning Models to Universal Adversarial Attack.
Proceedings of the 15th Conference on Computer and Robot Vision, 2018

2017
Private and Efficient Query Processing on Outsourced Genomic Databases.
IEEE J. Biomed. Health Informatics, 2017

Feature Selection for Classification under Anonymity Constraint.
Trans. Data Priv., 2017

SAFETY: Secure gwAs in Federated Environment Through a hYbrid solution with Intel SGX and Homomorphic Encryption.
CoRR, 2017

Secure Count Query on Encrypted Genomic Data.
CoRR, 2017

Image-Centric Social Discovery Using Neural Network under Anonymity Constraint.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

Secure Sequence Similarity Search on Encrypted Genomic Data.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

SCOTCH: Secure Counting Of encrypTed genomiC data using a Hybrid approach.
Proceedings of the AMIA 2017, 2017

2016
The Risk-Utility Tradeoff for Data Privacy Models.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Secure and Efficient Multiparty Computation on Genomic Data.
Proceedings of the 20th International Database Engineering & Applications Symposium, 2016

2015
Secure and Private Management of Healthcare Databases for Data Mining.
Proceedings of the 28th IEEE International Symposium on Computer-Based Medical Systems, 2015

Cloud-assisted distributed private data sharing.
Proceedings of the 6th ACM Conference on Bioinformatics, 2015

Private Genome Data Dissemination.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data.
IEEE Trans. Dependable Secur. Comput., 2014

Differentially private genome data dissemination through top-down specialization.
BMC Medical Informatics Decis. Mak., 2014

2013
Differential-Private Data Publishing Through Component Analysis.
Trans. Data Priv., 2013

Privacy-preserving heterogeneous health data sharing.
J. Am. Medical Informatics Assoc., 2013

Privacy-preserving trajectory data publishing by local suppression.
Inf. Sci., 2013

2012
Secure Distributed Framework for Achieving ε-Differential Privacy.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

2011
Anonymity meets game theory: secure data integration with malicious participants.
VLDB J., 2011

Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET.
IEEE Trans. Dependable Secur. Comput., 2011

Publishing Set-Valued Data via Differential Privacy.
Proc. VLDB Endow., 2011

Differentially private data release for data mining.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

2010
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data.
ACM Trans. Knowl. Discov. Data, 2010

A Secure Mechanism Design-Based and Game Theoretical Model for MANETs.
Mob. Networks Appl., 2010

2009
Anonymizing healthcare data: a case study on the blood transfusion service.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Privacy-preserving data mashup.
Proceedings of the EDBT 2009, 2009

Walking in the crowd: anonymizing trajectory data for pattern analysis.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
A game-theoretic intrusion detection model for mobile ad hoc networks.
Comput. Commun., 2008

A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2007
An Efficient and Truthful Leader IDS Election Mechanism for MANET.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007


  Loading...