Md Nazmus Sadat
Md Nazmus Sadat
Verified email at cs.umanitoba.ca - Homepage
Title
Cited by
Cited by
Year
Presage: privacy-preserving genetic testing via software guard extension
F Chen, C Wang, W Dai, X Jiang, N Mohammed, MM Al Aziz, MN Sadat, ...
BMC medical genomics 10 (2), 77-85, 2017
272017
Privacy-preserving techniques of genomic data—a survey
MMA Aziz, MN Sadat, D Alhadidi, S Wang, X Jiang, CL Brown, ...
Briefings in bioinformatics 20 (3), 887-895, 2019
262019
Secure count query on encrypted genomic data
MZ Hasan, MSR Mahdi, MN Sadat, N Mohammed
Journal of biomedical informatics 81, 41-52, 2018
222018
SecureLR: Secure logistic regression model via a hybrid cryptographic protocol
Y Jiang, J Hamer, C Wang, X Jiang, M Kim, Y Song, Y Xia, N Mohammed, ...
IEEE/ACM transactions on computational biology and bioinformatics 16 (1 …, 2018
192018
Safety: secure gwas in federated environment through a hybrid solution
MN Sadat, MM Al Aziz, N Mohammed, F Chen, X Jiang, S Wang
IEEE/ACM transactions on computational biology and bioinformatics 16 (1), 93-102, 2018
172018
Safety: Secure gwas in federated environment through a hybrid solution with intel sgx and homomorphic encryption
MN Sadat, MMA Aziz, N Mohammed, F Chen, S Wang, X Jiang
arXiv preprint arXiv:1703.02577, 2017
152017
Mining the social web to analyze the impact of social media on socialization
MN Sadat, S Ahmed, MT Mohiuddin
2014 International Conference on Informatics, Electronics & Vision (ICIEV), 1-6, 2014
82014
A Neighborhood Contact History Based Spraying Heuristic for Delay Tolerant Networks
MTM Md. Nazmus Sadat
3rd International Conference on Informatics, Electronics & Vision, 2014
7*2014
A privacy-preserving distributed filtering framework for NLP artifacts
MN Sadat, MM Al Aziz, N Mohammed, S Pakhomov, H Liu, X Jiang
BMC medical informatics and decision making 19 (1), 1-10, 2019
52019
Secure and efficient regression analysis using a hybrid cryptographic framework: Development and evaluation
MN Sadat, X Jiang, MM Al Aziz, S Wang, N Mohammed
JMIR medical informatics 6 (1), e14, 2018
52018
An Improved MaxProp Based on Neighborhood Contact History for Delay Tolerant Networks
MTM Md. Nazmus Sadat
16th Int'l Conf. Computer and Information Technology, 287-291, 2014
42014
SCOTCH: Secure Counting Of encrypTed genomiC data using a Hybrid approach
W Chenghong, Y Jiang, N Mohammed, F Chen, X Jiang, MM Al Aziz, ...
AMIA Annual Symposium Proceedings 2017, 1744, 2017
32017
Nearest neighbour search over encrypted data using intel SGX
KW Ahmed, MM Al Aziz, MN Sadat, D Alhadidi, N Mohammed
Journal of Information Security and Applications 54, 102579, 2020
12020
Secure Count Query on Encrypted Heterogeneous Data
MSR Mahdi, MN Sadat, N Mohammed, X Jiang
2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2020
12020
Secure and efficient computation on biomedical data in a distributed environment
MN Sadat
IEEE, 2018
12018
On bounded message replication in delay tolerant networks
MN Sadat, MT Mohiuddin, MYS Uddin
2015 International Conference on Networking Systems and Security (NSysS), 1-10, 2015
12015
Delivery likelihood based spraying in Delay Tolerant Networks
MN Sadat, MT Mohiuddin, S Ahmed
2014 International Conference on Electrical Engineering and Information …, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–17