Secure two-party differentially private data release for vertically partitioned data N Mohammed, D Alhadidi, BCM Fung, M Debbabi IEEE transactions on dependable and secure computing 11 (1), 59-71, 2013 | 77 | 2013 |
Secure Distributed Framework for Achieving ε-Differential Privacy D Alhadidi, N Mohammed, BCM Fung, M Debbabi International Symposium on Privacy Enhancing Technologies Symposium, 120-139, 2012 | 36 | 2012 |
Transportation risk analysis using probabilistic model checking A Soeanu, M Debbabi, D Alhadidi, M Makkawi, M Allouche, M Bélanger, ... Expert Systems with Applications 42 (9), 4410-4421, 2015 | 26 | 2015 |
Security crosscutting concerns and AspectJ. D AlHadidi, N Belblidia, M Debbabi PST 6, 1-1, 2006 | 25 | 2006 |
Secure approximation of edit distance on genomic data MM Al Aziz, D Alhadidi, N Mohammed BMC medical genomics 10 (2), 41, 2017 | 22 | 2017 |
Secure and efficient multiparty computation on genomic data MM Al Aziz, MZ Hasan, N Mohammed, D Alhadidi Proceedings of the 20th International Database Engineering & Applications …, 2016 | 22 | 2016 |
Privacy-preserving techniques of genomic data—a survey MMA Aziz, MN Sadat, D Alhadidi, S Wang, X Jiang, CL Brown, ... Briefings in bioinformatics 20 (3), 887-895, 2019 | 21 | 2019 |
Secure and private management of healthcare databases for data mining N Mohammed, S Barouti, D Alhadidi, R Chen 2015 IEEE 28th International Symposium on Computer-Based Medical Systems …, 2015 | 20 | 2015 |
The dataflow pointcut: a formal and practical framework D Alhadidi, A Boukhtouta, N Belblidia, M Debbabi, P Bhattacharya Proceedings of the 8th ACM international conference on Aspect-oriented …, 2009 | 20 | 2009 |
Privacy-preserving data mashup model for trading person-specific information RH Khokhar, BCM Fung, F Iqbal, D Alhadidi, J Bentahar Electronic Commerce Research and Applications 17, 19-37, 2016 | 12 | 2016 |
Weaving Risk Identification into Crowdsourcing Lifecycle. F Kamoun, D Alhadidi, Z Maamar FNC/MobiSPC, 41-48, 2015 | 12 | 2015 |
Symmetrically-private database search in cloud computing S Barouti, D Alhadidi, M Debbabi 2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013 | 12 | 2013 |
Aspect weaver: a model transformation approach for UML models M Nouh, R Ziarati, D Mouheb, D Alhadidi, M Debbabi, L Wang, ... Proceedings of the 2010 Conference of the Center for Advanced Studies on …, 2010 | 11 | 2010 |
Aspect weaving in UML activity diagrams: A semantic and algorithmic framework D Mouheb, D Alhadidi, M Nouh, M Debbabi, L Wang, M Pourzandi International Workshop on Formal Aspects of Component Software, 182-199, 2010 | 11 | 2010 |
Component Certification as a Prerequisite forWidespread OSS Reuse G Kakarontzas, P Katsaros, I Stamelos Electronic Communications of the EASST 33, 2010 | 10 | 2010 |
Aspect-Oriented Security Hardening of UML Design Models D Mouheb, M Debbabi, M Pourzandi, L Wang, M Nouh, R Ziarati, ... Springer International Publishing, 2015 | 8 | 2015 |
Secure similar patients query on encrypted genomic data MSR Mahdi, MM Al Aziz, D Alhadidi, N Mohammed IEEE journal of biomedical and health informatics 23 (6), 2611-2618, 2018 | 7 | 2018 |
Secure and privacy-preserving querying of personal health records in the cloud S Barouti, F Aljumah, D Alhadidi, M Debbabi IFIP Annual Conference on Data and Applications Security and Privacy, 82-97, 2014 | 7 | 2014 |
AspectJ assessment from a security perspective D Alhadidi, N Belblidia, M Debbabi Concordia Institute for Information Systems Engineering Concordia University …, 2006 | 7 | 2006 |
λ_saop: a security AOP calculus D Alhadidi, N Belblidia, M Debbabi, P Bhattacharya The Computer Journal 52 (7), 824-849, 2009 | 6 | 2009 |