Publications

2020

  • CPU and GPU Accelerated Fully Homomorphic Encryption.

    Md Toufique Morshed Tamal, Md Momin Al Aziz, and Noman Mohammed.
    In Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2020.

  • Parallel Generalized Suffix Tree Construction for Genomic Data.

    Md Momin Al Aziz, Parimala Thulasiraman, and Noman Mohammed.
    In 7th International Conference on Algorithms for Computational Biology, Missoula, Montana USA, April 2020.

2019

  • Homoglyph Attack Detection with Unpaired Data.

    Yiwei Lu, Mahesh Kumar K, Noman Mohammed, and Yang Wang.
    In Proceedings of the ACM/IEEE Workshop on Security and Privacy in Edge Computing (EdgeS&P), Washington, D.C., USA, November 2019.

  • Strong Password Generation Based on User Inputs.

    Farhana Z. Glory, Atif Ul Aftab, Olivier Tremblay-Savard, and Noman Mohammed.
    In Proceedings of the IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, Canada, October 2019.

  • SecDM: A Privacy-preserving Framework for Confidential Query Processing on the Cloud.

    Gaby G. Dagher, Benjamin. C. M. Fung, Noman Mohammed, and Jeremy Clark.
    Knowledge and Information Systems (KAIS) Journal, to appear.

  • A Privacy-preserving Distributed Filtering Framework for NLP Artifacts.

    Md Nazmus Sadat, Md Momin Al Aziz, Noman Mohammed, Serguei Pakhomov, Hongfang Liu, and Xiaoqian Jiang.
    BMC Medical Informatics and Decision Making, 19:183, 2019.

  • SAFETY: Secure gwAs in Federated Environment Through a hYbrid solution.

    Md Nazmus Sadat, Md Momin Al Aziz, Noman Mohammed, Feng Chen, Xiaoqian Jiang, and Shuang Wang.
    IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16(1): 113-123, 2019.

  • SecureLR: Secure Logistic Regression Model via a Hybrid Cryptographic Protocol.

    Yichen Jiang, Jenny Hamer, Chenghong Wang, Xiaoqian Jiang, Miran Kim, Yongsoo Song, Yuhou Xia, Noman Mohammed, Md Nazmus Sadat, and Shuang Wang.
    IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16(1): 93-102, 2019.

  • Secure Similar Patients Query on Encrypted Genomic Data.

    Md Safiur Rahman Mahdi, Md Momin Al Aziz, Dima Alhadidi, and Noman Mohammed
    IEEE Journal of Biomedical and Health Informatics , to appear.

  • A Deep Learning Framework for Malware Classification.

    M. Kalash, M. Rochan, N. Mohammed, N. Bruce, Y. Wang, and F. Iqbal
    International Journal of Digital Crime and Forensics (IJDCF), to appear.

2018

  • Parallel Linear Regression on Encrypted Data.

    Toufique Morshed, Dima Alhadidi, and Noman Mohammed
    In Proceedings of the 16th Annual Conference on Privacy, Security and Trust , Belfast, UK, August 2018.

  • Secure Large-scale Genome Data Storage and Query.

    Luyao Chen, Md Momin Aziz, Noman Mohammed, and Xiaoqian Jiang
    Elsevier Journal of Computer Methods and Programs in Biomedicine , 165: 129-137, 2018.

  • Privacy-Preserving Age Estimation for Content Rating.

    Linwei Ye, Binglin Li , Noman Mohammed, and Yang Wang
    In Proceedings of the IEEE 20th International Workshop on Multimedia Signal Processing, Vancouver, Canada, August 2018.

  • Secure Count Query on Encrypted Genomic Data.

    Mohammad Zahidul Hasan, Md Safiur Rahman Mahdi, Md Nazmus Sadat, and Noman Mohammed.
    Elsevier Journal of Biomedical Informatics , 81:41-52, 2018.

  • On the Robustness of Deep Learning Models to Universal Adversarial Attack.

    Rezaul Karim, Md Amirul Islam, Noman Mohammed, and Neil Bruce.
    In Proceedings of the 15th International Conference on Computer and Robot Vision (CRV), Toronto, Canada, May 2018.

  • Secure and Efficient Regression Analysis using a Hybrid Cryptographic Framework.

    Md Nazmus Sadat, Xiaoqian Jiang, Md Momin Al Aziz, Shuang Wang, and Noman Mohammed.
    JMIR Medical Informatics , 6(1): e14, 2018.

  • Membership Inference Attack against Differentially Private Deep Learning Model.

    Md Atiqur Rahman, Tanzila Rahman, Robert Laganière, Noman Mohammed, and Yang Wang.
    Transactions on Data Privacy 11:1 (2018) 61 – 79.3.

  • Malware Classification with Deep Convolutional Neural Networks.

    M. Kalash, M. Rochan, N. Mohammed, N. Bruce, Y. Wang, and F. Iqbal.
    In Proceedings of the International Workshop on Cybercrime Investigation and Digital forensics (CID) in conjunction with the IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, February 2018.

  • Secure Count Query on Encrypted Genomic Data: A Survey.

    Z. Hasan, MSR Mahdi, and N. Mohammed.
    IEEE Internet Computing, 22(2): 71-82, 2018.

  • Obfuscated Image Classification for Secure Image-centric Friend Recommendation.

    Kazi Wasif Ahmed, Omit Chanda, Noman Mohammed, and Yang Wang.
    Special Issue on Towards Secure, Privacy-Preserving, and Reliable Smart Cities and Society, Elsevier Sustainable Cities and Society, 41: 940-948, 2017.

2017

2016

  • Secure count query on encrypted genomic data

    M. Hasan, MSR. Mahdi, and N. Mohammed.
    In Proceedings of the 3rd International Workshop on
Genome Privacy and Security (GenoPri) in conjunction with the AMIA Annual Symposium, Chicago, IL, November 2016.

  • The risk-utility tradeoff for data privacy models.

    M. Almasi, T. Siddiqui, N. Mohammed, and H. Hemmati.
    In Proceedings of the International Workshop on Cybercrime Investigation and Digital forensics (CID) in conjunction with the IFIP International Conference on New Technologies, Mobility and Security (NTMS), Cyprus, November 2016.

  • Secure and efficient multiparty computation on genomic data.

    M. Aziz, M. Hasan, N. Mohammed, and D. Alhadidi.
    In Proceedings of the 20th International Database Engineering & Applications Symposium (IDEAS), Montreal, QC, Canada, July 2016.