default search action
Dima Alhadidi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Ali Abbasi Tadi, Dima Alhadidi, Luis Rueda:
PPPCT: Privacy-Preserving framework for Parallel Clustering Transcriptomics data. Comput. Biol. Medicine 173: 108351 (2024) - 2023
- [j14]Ali Abbasi Tadi, Saroj Dayal, Dima Alhadidi, Noman Mohammed:
Comparative Analysis of Membership Inference Attacks in Federated and Centralized Learning. Inf. 14(11): 620 (2023) - [c24]Mahdi Daghmehchi Firoozjaei, MinChang Kim, Dima Alhadidi:
Time-Series Load Data Analysis for User Power Profiling. ICACT 2023: 382-387 - [c23]Hamid Fazli Khojir, Dima Alhadidi, Sara Rouhani, Noman Mohammed:
FedShare: Secure Aggregation based on Additive Secret Sharing in Federated Learning. IDEAS 2023: 25-33 - [c22]Saroj Dayal, Dima Alhadidi, Ali Abbasi Tadi, Noman Mohammed:
Comparative Analysis of Membership Inference Attacks in Federated Learning. IDEAS 2023: 185-192 - [c21]Mehrdad Sheikhjaberi, Dima Alhadidi:
Reducing Model Memorization to Mitigate Membership Inference Attacks. TrustCom 2023: 79-88 - [i2]Shaoquan Jiang, Dima Alhadidi, Hamid Fazli Khojir:
Key-and-Signature Compact Multi-Signatures for Blockchain: A Compiler with Realizations. CoRR abs/2301.08668 (2023) - [i1]Shaoquan Jiang, Dima Alhadidi, Hamid Fazli Khojir:
Key-and-Signature Compact Multi-Signatures: A Compiler with Realizations. IACR Cryptol. ePrint Arch. 2023: 61 (2023) - 2022
- [j13]Samaneh Mahdavifar, Dima Alhadidi, Ali A. Ghorbani:
Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder. J. Netw. Syst. Manag. 30(1): 22 (2022) - [c20]Ali Abbasi Tadi, Luis Rueda, Dima Alhadidi:
NICASN: Non-negative Matrix Factorization and Independent Component Analysis for Clustering Social Networks. Canadian AI 2022 - [c19]Tanzir Ul Islam, Noman Mohammed, Dima Alhadidi:
Private Federated Framework for Health Data. BIBM 2022: 1919-1926 - 2020
- [j12]Kazi Wasif Ahmed, Md Momin Al Aziz, Md. Nazmus Sadat, Dima Alhadidi, Noman Mohammed:
Nearest neighbour search over encrypted data using intel SGX. J. Inf. Secur. Appl. 54: 102579 (2020) - [c18]Samaneh Mahdavifar, Andi Fitriah Abdul Kadir, Rasool Fatemi, Dima Alhadidi, Ali A. Ghorbani:
Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning. DASC/PiCom/CBDCom/CyberSciTech 2020: 515-522 - [c17]Md Shamimur Rahman Shuvo, Dima Alhadidi:
Membership Inference Attacks: Analysis and Mitigation. TrustCom 2020: 1410-1419
2010 – 2019
- 2019
- [j11]Md Momin Al Aziz, Md. Nazmus Sadat, Dima Alhadidi, Shuang Wang, Xiaoqian Jiang, Cheryl L. Brown, Noman Mohammed:
Privacy-preserving techniques of genomic data - a survey. Briefings Bioinform. 20(3): 887-895 (2019) - [j10]Md Safiur Rahman Mahdi, Md Momin Al Aziz, Dima Alhadidi, Noman Mohammed:
Secure Similar Patients Query on Encrypted Genomic Data. IEEE J. Biomed. Health Informatics 23(6): 2611-2618 (2019) - 2018
- [c16]Milton King, Dima Alhadidi, Paul Cook:
Text-Based Detection of Unauthorized Users of Social Media Accounts. Canadian AI 2018: 292-297 - [c15]Toufique Morshed, Dima Alhadidi, Noman Mohammed:
Parallel Linear Regression on Encrypted Data. PST 2018: 1-5 - 2016
- [j9]Rashid Hussain Khokhar, Benjamin C. M. Fung, Farkhund Iqbal, Dima Alhadidi, Jamal Bentahar:
Privacy-preserving data mashup model for trading person-specific information. Electron. Commer. Res. Appl. 17: 19-37 (2016) - [j8]Djedjiga Mouheb, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect-oriented modeling framework for security hardening. Innov. Syst. Softw. Eng. 12(1): 41-67 (2016) - [c14]Md Momin Al Aziz, Mohammad Zahidul Hasan, Noman Mohammed, Dima Alhadidi:
Secure and Efficient Multiparty Computation on Genomic Data. IDEAS 2016: 278-283 - 2015
- [b1]Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima:
Aspect-Oriented Security Hardening of UML Design Models. Springer 2015, ISBN 978-3-319-16105-1, pp. 1-219 - [j7]Andrei Soeanu, Mourad Debbabi, Dima Alhadidi, Makram Makkawi, Mohamad Khaled Allouche, Micheline Bélanger, Nicolas Léchevin:
Transportation risk analysis using probabilistic model checking. Expert Syst. Appl. 42(9): 4410-4421 (2015) - [c13]Noman Mohammed, Samira Barouti, Dima Alhadidi, Rui Chen:
Secure and Private Management of Healthcare Databases for Data Mining. CBMS 2015: 191-196 - [c12]Faouzi Kamoun, Dima Alhadidi, Zakaria Maamar:
Weaving Risk Identification into Crowdsourcing Lifecycle. FNC/MobiSPC 2015: 41-48 - 2014
- [j6]Noman Mohammed, Dima Alhadidi, Benjamin C. M. Fung, Mourad Debbabi:
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data. IEEE Trans. Dependable Secur. Comput. 11(1): 59-71 (2014) - [c11]Samira Barouti, Feras Aljumah, Dima Alhadidi, Mourad Debbabi:
Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud. DBSec 2014: 82-97 - 2013
- [j5]Dima Alhadidi, Azzam Mourad, Hakim Idrissi Kaitouni, Mourad Debbabi:
Common weaving approach in mainstream languages for software security hardening. J. Syst. Softw. 86(10): 2654-2674 (2013) - [c10]Samira Barouti, Dima Alhadidi, Mourad Debbabi:
Symmetrically-Private Database Search in Cloud Computing. CloudCom (1) 2013: 671-678 - 2012
- [c9]Dima Alhadidi, Noman Mohammed, Benjamin C. M. Fung, Mourad Debbabi:
Secure Distributed Framework for Achieving ε-Differential Privacy. Privacy Enhancing Technologies 2012: 120-139 - 2010
- [j4]Robert Charpentier, Mourad Debbabi, Dima Alhadidi, Azzam Mourad, Nadia Belblidia, Amine Boukhtouta, Aiman Hanna, Rachid Hadjidj, Hakim Idrissi Kaitouni, Marc-André Laverdière, Hai Zhou Ling, Syrine Tlili, Xiaochun Yang, Zhenrong Yang:
Security Evaluation and Hardening of Free and Open Source Software (FOSS). Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 33 (2010) - [c8]Mariam Nouh, Raha Ziarati, Djedjiga Mouheb, Dima Alhadidi, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect weaver: a model transformation approach for UML models. CASCON 2010: 139-153 - [c7]Djedjiga Mouheb, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework. FACS 2010: 182-199
2000 – 2009
- 2009
- [j3]Dima Alhadidi, Nadia Belblidia, Mourad Debbabi, Prabir Bhattacharya:
lambda_SAOP: A Security AOP Calculus. Comput. J. 52(7): 824-849 (2009) - [j2]Amine Boukhtouta, Dima Alhadidi, Mourad Debbabi:
Capturing Returned Computable Values in AspectJ for Security Hardening. Inf. Secur. J. A Glob. Perspect. 18(2): 87-98 (2009) - [c6]Amine Boukhtouta, Dima Alhadidi, Mourad Debbabi:
A Practical Framework for the Dataflow Pointcut in AspectJ. ARES 2009: 835-840 - [c5]Dima Alhadidi, Amine Boukhtouta, Nadia Belblidia, Mourad Debbabi, Prabir Bhattacharya:
The dataflow pointcut: a formal and practical framework. AOSD 2009: 15-26 - 2008
- [j1]Dima Alhadidi, Mourad Debbabi, Prabir Bhattacharya:
New AspectJ Pointcuts for Integer Overflow and Underflow Detection. Inf. Secur. J. A Glob. Perspect. 17(5&6): 278-287 (2008) - [c4]Azzam Mourad, Dima Alhadidi, Mourad Debbabi:
Cross-Language Weaving Approach Targeting Software Security Hardening. PST 2008: 87-98 - [c3]Azzam Mourad, Dima Alhadidi, Mourad Debbabi:
Towards Language-Independent Approach for Security Concerns Weaving. SECRYPT 2008: 460-465 - 2007
- [c2]Dima Alhadidi, Nadia Belblidia, Mourad Debbabi, Prabir Bhattacharya:
An AOP Extended Lambda-Calculus. SEFM 2007: 183-194 - 2006
- [c1]Dima Alhadidi, Nadia Belblidia, Mourad Debbabi:
Security crosscutting concerns and AspectJ. PST 2006: 45
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint