Noman Mohammed
Noman Mohammed
Assistant Professor, University of Manitoba
Verified email at cs.umanitoba.ca - Homepage
Title
Cited by
Cited by
Year
Differentially private data release for data mining
N Mohammed, R Chen, BCM Fung, PS Yu
Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011
3592011
Publishing set-valued data via differential privacy
R Chen, N Mohammed, BCM Fung, BC Desai, L Xiong
Proceedings of the VLDB Endowment 4 (11), 1087-1098, 2011
2462011
Privacy-preserving trajectory data publishing by local suppression
R Chen, BCM Fung, N Mohammed, BC Desai, K Wang
Information Sciences 231, 83-97, 2013
2262013
Centralized and distributed anonymization for high-dimensional healthcare data
N Mohammed, BCM Fung, PCK Hung, CK Lee
ACM Transactions on Knowledge Discovery from Data (TKDD) 4 (4), 1-33, 2010
1712010
Mechanism design-based secure leader election model for intrusion detection in MANET
N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya
IEEE transactions on dependable and secure computing 8 (1), 89-103, 2009
1362009
Anonymizing healthcare data: a case study on the blood transfusion service
N Mohammed, BCM Fung, PCK Hung, C Lee
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
1212009
A game-theoretic intrusion detection model for mobile ad hoc networks
H Otrok, N Mohammed, L Wang, M Debbabi, P Bhattacharya
Computer communications 31 (4), 708-721, 2008
1082008
Privacy-preserving data mashup
N Mohammed, BCM Fung, K Wang, PCK Hung
Proceedings of the 12th International Conference on Extending Database …, 2009
912009
Walking in the crowd: anonymizing trajectory data for pattern analysis
N Mohammed, BCM Fung, M Debbabi
Proceedings of the 18th ACM conference on Information and knowledge …, 2009
902009
Malware classification with deep convolutional neural networks
M Kalash, M Rochan, N Mohammed, NDB Bruce, Y Wang, F Iqbal
2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018
802018
Anonymity meets game theory: secure data integration with malicious participants
N Mohammed, BCM Fung, M Debbabi
The VLDB Journal 20 (4), 567-588, 2011
782011
Secure two-party differentially private data release for vertically partitioned data
N Mohammed, D Alhadidi, BCM Fung, M Debbabi
IEEE transactions on dependable and secure computing 11 (1), 59-71, 2013
772013
Membership Inference Attack against Differentially Private Deep Learning Model.
MA Rahman, T Rahman, R Laganière, N Mohammed, Y Wang
Trans. Data Priv. 11 (1), 61-79, 2018
562018
Privacy-preserving heterogeneous health data sharing
N Mohammed, X Jiang, R Chen, BCM Fung, L Ohno-Machado
Journal of the American Medical Informatics Association 20 (3), 462-469, 2013
432013
Secure Distributed Framework for Achieving ε-Differential Privacy
D Alhadidi, N Mohammed, BCM Fung, M Debbabi
International Symposium on Privacy Enhancing Technologies Symposium, 120-139, 2012
362012
Differential-private data publishing through component analysis
X Jiang, Z Ji, S Wang, N Mohammed, S Cheng, L Ohno-Machado
Transactions on data privacy 6 (1), 19, 2013
342013
A mechanism design-based multi-leader election scheme for intrusion detection in manet
N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya
2008 IEEE Wireless Communications and Networking Conference, 2816-2821, 2008
292008
Differentially private genome data dissemination through top-down specialization
S Wang, N Mohammed, R Chen
BMC medical informatics and decision making 14 (S1), S2, 2014
282014
Feature selection for classification under anonymity constraint
B Zhang, N Mohammed, V Dave, MA Hasan
arXiv preprint arXiv:1512.07158, 2015
232015
Secure approximation of edit distance on genomic data
MM Al Aziz, D Alhadidi, N Mohammed
BMC medical genomics 10 (2), 41, 2017
222017
The system can't perform the operation now. Try again later.
Articles 1–20