Md Momin Al Aziz
Md Momin Al Aziz
Verified email at
Cited by
Cited by
Safety: secure gwas in federated environment through a hybrid solution
MN Sadat, MM Al Aziz, N Mohammed, F Chen, X Jiang, S Wang
IEEE/ACM transactions on computational biology and bioinformatics 16 (1), 93-102, 2018
Presage: privacy-preserving genetic testing via software guard extension
F Chen, C Wang, W Dai, X Jiang, N Mohammed, MM Al Aziz, MN Sadat, ...
BMC medical genomics 10 (2), 77-85, 2017
Privacy Preservin Techniques on Genomic Data- A Survey
MMA Aziz, MN Sadat, D Alhadidi, X Jiang, S Wang, N Mohammed
Briefings in Bioinformatics, 2017
Secure and efficient multiparty computation on genomic data
MM Al Aziz, MZ Hasan, N Mohammed, D Alhadidi
Proceedings of the 20th International Database Engineering & Applications …, 2016
Secure approximation of edit distance on genomic data
MM Al Aziz, D Alhadidi, N Mohammed
BMC medical genomics 10 (2), 55-67, 2017
Aftermath of bustamante attack on genomic beacon service
MM Al Aziz, R Ghasemi, M Waliullah, N Mohammed
BMC medical genomics 10 (2), 43-54, 2017
Private and Efficient Query Processing on Outsourced Genomic Databases
R Ghasemi, MMA Aziz, N Mohammed, MH Dehkordi, X Jiang
IEEE Journal of Biomedical and Health Informatics, 1, 2016
CoMOGrad and PHOG: from computer vision to fast and accurate protein tertiary structure retrieval
R Karim, MM Al Aziz, S Shatabda, MS Rahman, MAK Mia, F Zaman, ...
Scientific reports 5 (1), 1-11, 2015
New classes of graceful trees
M Hossain, M Aziz, M Al, M Kaykobad
Journal of Discrete mathematics 2014, 2014
Secure similar patients query on encrypted genomic data
MSR Mahdi, MM Al Aziz, D Alhadidi, N Mohammed
IEEE journal of biomedical and health informatics 23 (6), 2611-2618, 2018
A privacy-preserving distributed filtering framework for NLP artifacts
MN Sadat, MM Al Aziz, N Mohammed, S Pakhomov, H Liu, X Jiang
BMC medical informatics and decision making 19 (1), 1-10, 2019
Secure and efficient regression analysis using a hybrid cryptographic framework: Development and evaluation
MN Sadat, X Jiang, MM Al Aziz, S Wang, N Mohammed
JMIR medical informatics 6 (1), e14, 2018
Secure large-scale genome data storage and query
L Chen, MM Aziz, N Mohammed, X Jiang
Computer methods and programs in biomedicine 165, 129-137, 2018
SCOTCH: Secure Counting Of encrypTed genomiC data using a Hybrid approach
W Chenghong, Y Jiang, N Mohammed, F Chen, X Jiang, MM Al Aziz, ...
AMIA Annual Symposium Proceedings 2017, 1744, 2017
Graceful labeling of trees: Methods and Applications
MM Al Aziz, MF Hossain, T Faequa, M Kaykobad
2014 17th International Conference on Computer and Information Technology …, 2014
CPU and GPU Accelerated Fully Homomorphic Encryption
T Morshed, MM Al Aziz, N Mohammed
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
Nearest neighbour search over encrypted data using intel SGX
KW Ahmed, MM Al Aziz, MN Sadat, D Alhadidi, N Mohammed
Journal of Information Security and Applications 54, 102579, 2020
A novel and effective scoring scheme for structure classification and pairwise similarity measurement
R Karim, M Aziz, M Al, S Shatabda, MS Rahman
arXiv preprint arXiv:1610.01052, 2016
Online Algorithm for Differentially Private Genome-wide Association Studies
MMA Aziz, S Kamali, N Mohammed, X Jiang
ACM Transactions on Computing for Healthcare 2 (2), 1-27, 2021
Privacy-preserving string search on encrypted genomic data using a generalized suffix tree
MSR Mahdi, MM Al Aziz, N Mohammed, X Jiang
Informatics in Medicine Unlocked 23, 100525, 2021
The system can't perform the operation now. Try again later.
Articles 1–20