Differentially private data release for data mining N Mohammed, R Chen, BCM Fung, PS Yu Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011 | 364 | 2011 |
Publishing set-valued data via differential privacy R Chen, N Mohammed, BCM Fung, BC Desai, L Xiong Proceedings of the VLDB Endowment 4 (11), 1087-1098, 2011 | 249 | 2011 |
Privacy-preserving trajectory data publishing by local suppression R Chen, BCM Fung, N Mohammed, BC Desai, K Wang Information Sciences 231, 83-97, 2013 | 231 | 2013 |
Centralized and distributed anonymization for high-dimensional healthcare data N Mohammed, BCM Fung, PCK Hung, CK Lee ACM Transactions on Knowledge Discovery from Data (TKDD) 4 (4), 1-33, 2010 | 174 | 2010 |
Mechanism design-based secure leader election model for intrusion detection in MANET N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya IEEE transactions on dependable and secure computing 8 (1), 89-103, 2009 | 137 | 2009 |
Anonymizing healthcare data: a case study on the blood transfusion service N Mohammed, BCM Fung, PCK Hung, C Lee Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009 | 121 | 2009 |
A game-theoretic intrusion detection model for mobile ad hoc networks H Otrok, N Mohammed, L Wang, M Debbabi, P Bhattacharya Computer communications 31 (4), 708-721, 2008 | 109 | 2008 |
Walking in the crowd: anonymizing trajectory data for pattern analysis N Mohammed, BCM Fung, M Debbabi Proceedings of the 18th ACM conference on Information and knowledge …, 2009 | 91 | 2009 |
Privacy-preserving data mashup N Mohammed, BCM Fung, K Wang, PCK Hung Proceedings of the 12th International Conference on Extending Database …, 2009 | 91 | 2009 |
Malware classification with deep convolutional neural networks M Kalash, M Rochan, N Mohammed, NDB Bruce, Y Wang, F Iqbal 2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018 | 87 | 2018 |
Anonymity meets game theory: secure data integration with malicious participants N Mohammed, BCM Fung, M Debbabi The VLDB Journal 20 (4), 567-588, 2011 | 82 | 2011 |
Secure two-party differentially private data release for vertically partitioned data N Mohammed, D Alhadidi, BCM Fung, M Debbabi IEEE transactions on dependable and secure computing 11 (1), 59-71, 2013 | 77 | 2013 |
Membership Inference Attack against Differentially Private Deep Learning Model. MA Rahman, T Rahman, R Laganière, N Mohammed, Y Wang Trans. Data Priv. 11 (1), 61-79, 2018 | 59 | 2018 |
Privacy-preserving heterogeneous health data sharing N Mohammed, X Jiang, R Chen, BCM Fung, L Ohno-Machado Journal of the American Medical Informatics Association 20 (3), 462-469, 2013 | 43 | 2013 |
Secure Distributed Framework for Achieving ε-Differential Privacy D Alhadidi, N Mohammed, BCM Fung, M Debbabi International Symposium on Privacy Enhancing Technologies Symposium, 120-139, 2012 | 36 | 2012 |
Differential-private data publishing through component analysis X Jiang, Z Ji, S Wang, N Mohammed, S Cheng, L Ohno-Machado Transactions on data privacy 6 (1), 19, 2013 | 35 | 2013 |
A mechanism design-based multi-leader election scheme for intrusion detection in manet N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya 2008 IEEE Wireless Communications and Networking Conference, 2816-2821, 2008 | 30 | 2008 |
Differentially private genome data dissemination through top-down specialization S Wang, N Mohammed, R Chen BMC medical informatics and decision making 14 (S1), S2, 2014 | 28 | 2014 |
Feature selection for classification under anonymity constraint B Zhang, N Mohammed, V Dave, MA Hasan arXiv preprint arXiv:1512.07158, 2015 | 23 | 2015 |
Secure approximation of edit distance on genomic data MM Al Aziz, D Alhadidi, N Mohammed BMC medical genomics 10 (2), 41, 2017 | 22 | 2017 |