A distributed approach for graph mining in massive networks N Talukder, MJ Zaki Data Mining and Knowledge Discovery 30, 1024-1052, 2016 | 99 | 2016 |
Privometer: Privacy protection in social networks N Talukder, M Ouzzani, AK Elmagarmid, H Elmeleegy, M Yakout 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW …, 2010 | 96 | 2010 |
Preventing multi-query attack in location-based services N Talukder, SI Ahamed Proceedings of the third ACM conference on Wireless network security, 25-36, 2010 | 75 | 2010 |
Detecting inconsistent data records N Talukder, M Yakout, M Ouzzani, A Elmagarmid US Patent 9,037,550, 2015 | 65 | 2015 |
Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments SI Ahamed, MM Haque, ME Hoque, F Rahman, N Talukder Journal of Systems and Software 83 (2), 253-270, 2010 | 64 | 2010 |
Towards privacy protection in pervasive healthcare SI Ahamed, N Talukder, AD Kameas IET Digital Library, 2007 | 29 | 2007 |
A multi-level approach for evaluating internet topology generators R Rossi, S Fahmy, N Talukder 2013 IFIP Networking Conference, 1-9, 2013 | 28 | 2013 |
Parallel graph mining with gpus R Kessl, N Talukder, P Anchuri, M Zaki Proceedings of the 3rd International Workshop on Big Data, Streams and …, 2014 | 27 | 2014 |
Parallel graph mining with dynamic load balancing N Talukder, MJ Zaki 2016 IEEE International Conference on Big Data (Big Data), 3352-3359, 2016 | 18 | 2016 |
Usability of mobile computing technologies to assist cancer patients R Islam, SI Ahamed, N Talukder, I Obermiller HCI and Usability for Medicine and Health Care: Third Symposium of the …, 2007 | 16 | 2007 |
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications SI Ahamed, H Li, N Talukder, M Monjur, CS Hasan Journal of Systems and Software 82 (10), 1657-1677, 2009 | 14 | 2009 |
Privacy challenges in context-sensitive access control for pervasive computing environment SI Ahamed, N Talukder, MM Haque 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems …, 2007 | 14 | 2007 |
Service sharing with trust in pervasive environment: now it's time to break the jinx SI Ahamed, MM Haque, N Talukder Proceedings of the 2008 ACM symposium on Applied computing, 1622-1628, 2008 | 9 | 2008 |
Smart tracker: Light weight infrastructure-less assets tracking solution for ubiquitous computing environment N Talukder, SI Ahamed, RM Abid 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems …, 2007 | 9 | 2007 |
Avoiding privacy violation for resource sharing in ad hoc networks of pervasive computing environment KM Asif, SI Ahamed, N Talukder 31st Annual International Computer Software and Applications Conference …, 2007 | 9 | 2007 |
FPCS: A formal approach for privacy-aware context-based services N Talukder, SI Ahamed 2008 32nd Annual IEEE International Computer Software and Applications …, 2008 | 8 | 2008 |
Detecting inconsistencies in private data with secure function evaluation N Talukder, M Ouzzani, AK Elmagarmid, M Yakout | 7 | 2011 |
WiFi radar: Design and implementation of an infrastructure-less location tracking system for pervasive environment SI Ahamed, N Talukder, M Monjur 2008 32nd Annual IEEE International Computer Software and Applications …, 2008 | 4 | 2008 |
How much Room before you Rely: Balancing Privacy control and Fidelity in the Location-based Pervasive Applications N Talukder, SI Ahamed 2008 Ninth International Conference on Mobile Data Management Workshops …, 2008 | 4 | 2008 |
A formal context specific trust model (FTM) for multimedia and ubiquitous computing environment SI Ahamed, MM Haque, N Talukder Telecommunication Systems 44, 221-240, 2010 | 3 | 2010 |