Privacy-preserving techniques of genomic data—a survey MMA Aziz, MN Sadat, D Alhadidi, S Wang, X Jiang, CL Brown, ... Briefings in bioinformatics 20 (3), 887-895, 2019 | 80 | 2019 |
Safety: secure gwas in federated environment through a hybrid solution MN Sadat, MM Al Aziz, N Mohammed, F Chen, X Jiang, S Wang IEEE/ACM transactions on computational biology and bioinformatics 16 (1), 93-102, 2018 | 66 | 2018 |
PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre guard extension F Chen, C Wang, W Dai, X Jiang, N Mohammed, MM Al Aziz, MN Sadat, ... BMC medical genomics 10, 77-85, 2017 | 64 | 2017 |
Secure count query on encrypted genomic data MZ Hasan, MSR Mahdi, MN Sadat, N Mohammed Journal of biomedical informatics 81, 41-52, 2018 | 47 | 2018 |
SecureLR: Secure logistic regression model via a hybrid cryptographic protocol Y Jiang, J Hamer, C Wang, X Jiang, M Kim, Y Song, Y Xia, N Mohammed, ... IEEE/ACM transactions on computational biology and bioinformatics 16 (1 …, 2018 | 43 | 2018 |
Safety: Secure gwas in federated environment through a hybrid solution with intel sgx and homomorphic encryption MN Sadat, MMA Aziz, N Mohammed, F Chen, S Wang, X Jiang arXiv preprint arXiv:1703.02577, 2017 | 28 | 2017 |
A privacy-preserving distributed filtering framework for NLP artifacts MN Sadat, MMA Aziz, N Mohammed, S Pakhomov, H Liu, X Jiang BMC medical informatics and decision making 19, 1-10, 2019 | 17 | 2019 |
SCOTCH: Secure Counting Of encrypTed genomiC data using a Hybrid approach W Chenghong, Y Jiang, N Mohammed, F Chen, X Jiang, MM Al Aziz, ... AMIA Annual Symposium Proceedings 2017, 1744, 2017 | 16 | 2017 |
Nearest neighbour search over encrypted data using intel SGX KW Ahmed, MM Al Aziz, MN Sadat, D Alhadidi, N Mohammed Journal of Information Security and Applications 54, 102579, 2020 | 12 | 2020 |
Mining the social web to analyze the impact of social media on socialization MN Sadat, S Ahmed, MT Mohiuddin 2014 International Conference on Informatics, Electronics & Vision (ICIEV), 1-6, 2014 | 12 | 2014 |
Secure and efficient regression analysis using a hybrid cryptographic framework: Development and evaluation MN Sadat, X Jiang, MM Al Aziz, S Wang, N Mohammed JMIR medical informatics 6 (1), e8286, 2018 | 11 | 2018 |
A Neighborhood Contact History Based Spraying Heuristic for Delay Tolerant Networks MTM Md. Nazmus Sadat 3rd International Conference on Informatics, Electronics & Vision, 2014 | 7* | 2014 |
Secure count query on encrypted heterogeneous data MSR Mahdi, MN Sadat, N Mohammed, X Jiang 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2020 | 5 | 2020 |
An Improved MaxProp Based on Neighborhood Contact History for Delay Tolerant Networks MTM Md. Nazmus Sadat 16th Int'l Conf. Computer and Information Technology, 287-291, 2014 | 5 | 2014 |
Secure and efficient computation on biomedical data in a distributed environment MN Sadat IEEE, 2018 | 1 | 2018 |
Delivery likelihood based spraying in Delay Tolerant Networks MN Sadat, MT Mohiuddin, S Ahmed 2014 International Conference on Electrical Engineering and Information …, 2014 | 1 | 2014 |
On bounded message replication in delay tolerant networks MN Sadat, MT Mohiuddin, MYS Uddin 2015 International Conference on Networking Systems and Security (NSysS), 1-10, 2015 | | 2015 |