Aris Gkoulalas-Divanis

Orcid: 0000-0003-0011-6591

Affiliations:
  • IBM Watson Health, Cambridge, MA, USA


According to our database1, Aris Gkoulalas-Divanis authored at least 96 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Exploiting Properties of Student Networks to Enhance Learning in Distance Education.
Inf., April, 2024

Comparative Analysis of Macular and Optic Disc Perfusion Pre and Post Silicone Oil Removal: A Machine Learning Approach.
Proceedings of the Digital Health and Informatics Innovations for Sustainable Health Care Systems, 2024

The Faculty Assignment Problem in Higher Education: A Shapley Value-Based Approach.
Proceedings of the Artificial Intelligence Applications and Innovations, 2024

2022
Dynamically adjusting case reporting policy to maximize privacy and public health utility in the face of a pandemic.
J. Am. Medical Informatics Assoc., 2022

How Adversarial Assumptions Influence Re-identification Risk Measures: A COVID-19 Case Study.
Proceedings of the Privacy in Statistical Databases - International Conference, 2022

Supporting COVID-19 Disparity Investigations with Dynamically Adjusting Case Reporting Policies.
Proceedings of the AMIA 2022, 2022

2021
Modern Privacy-Preserving Record Linkage Techniques: An Overview.
IEEE Trans. Inf. Forensics Secur., 2021

Summarizing and linking electronic health records.
Distributed Parallel Databases, 2021

Dynamically Adjusting Case-Reporting Policy to Maximize Privacy and Utility in the Face of a Pandemic.
CoRR, 2021

An Unbiased Estimator for Hamming LSH Blocking.
Proceedings of the IEEE International Smart Cities Conference, 2021

Privacy Preserving Text Data Encoding and Topic Modelling.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

MultiBlock: A Scalable Iterative Approach for Progressive Entity Resolution.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Disrupting Healthcare Silos: Addressing Data Volume, Velocity and Variety With a Cloud-Native Healthcare Data Ingestion Service.
IEEE J. Biomed. Health Informatics, 2020

Anonymizing Data for Privacy-Preserving Federated Learning.
CoRR, 2020

Large-Scale Distributed Linkage of Records Containing Spatio-Temporal Information.
Proceedings of the IEEE International Smart Cities Conference, 2020

A Syntactic Approach for Privacy-Preserving Federated Learning.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

Efficient Record Linkage in Data Streams.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Differential Privacy-enabled Federated Learning for Sensitive Health Data.
CoRR, 2019

Linkage of Spatio-Temporal Data and Trajectories.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

Predicting Adverse Drug Reactions on Distributed Health Data using Federated Learning.
Proceedings of the AMIA 2019, 2019

2018
Introduction to Mobility Data Privacy.
Proceedings of the Handbook of Mobile Data Privacy., 2018

FEDERAL: A Framework for Distance-Aware Privacy-Preserving Record Linkage.
IEEE Trans. Knowl. Data Eng., 2018

Fast schemes for online record linkage.
Data Min. Knowl. Discov., 2018

FEMRL: A Framework for Large-Scale Privacy-Preserving Linkage of Patients' Electronic Health Records.
Proceedings of the IEEE International Smart Cities Conference, 2018

Summarization Algorithms for Record Linkage.
Proceedings of the 21st International Conference on Extending Database Technology, 2018

An Overview of Big Data Issues in Privacy-Preserving Record Linkage.
Proceedings of the Algorithmic Aspects of Cloud Computing - 4th International Symposium, 2018

A Frequent Itemset Hiding Toolbox.
Proceedings of the Algorithmic Aspects of Cloud Computing - 4th International Symposium, 2018

2017
Anonymizing datasets with demographics and diagnosis codes in the presence of utility constraints.
J. Biomed. Informatics, 2017

Distance-Aware Encoding of Numerical Values for Privacy-Preserving Record Linkage.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

2016
IPV: A system for identifying privacy vulnerabilities in datasets.
IBM J. Res. Dev., 2016

Message from the program chairs.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

FPVI: A scalable method for discovering privacy vulnerabilities in microdata.
Proceedings of the IEEE International Smart Cities Conference, 2016

LSHDB: a parallel and distributed engine for record linkage and similarity search.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

2015
Efficient algorithms for identifying privacy vulnerabilities.
Proceedings of the IEEE First International Smart Cities Conference, 2015

SECRETA: A Tool for Anonymizing Relational, Transaction and RT-Datasets.
Proceedings of the Medical Data Privacy Handbook, 2015

Utility-Constrained Electronic Health Record Data Publishing Through Generalization and Disassociation.
Proceedings of the Medical Data Privacy Handbook, 2015

Epilogue.
Proceedings of the Medical Data Privacy Handbook, 2015

A Survey of Anonymization Algorithms for Electronic Health Records.
Proceedings of the Medical Data Privacy Handbook, 2015

Introduction to Medical Data Privacy.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
SPUD - Semantic Processing of Urban Data.
J. Web Semant., 2014

Apriori-based algorithms for k<sup>m</sup>-anonymizing trajectory data.
Trans. Data Priv., 2014

Disassociation for electronic health record privacy.
J. Biomed. Informatics, 2014

Informatics methods in medical privacy.
J. Biomed. Informatics, 2014

Publishing data from electronic health records while preserving privacy: A survey of algorithms.
J. Biomed. Informatics, 2014

Predicting changes in hypertension control using electronic health records from a chronic disease management program.
J. Am. Medical Informatics Assoc., 2014

Toward smarter healthcare: Anonymizing medical data to support research studies.
IBM J. Res. Dev., 2014

Privacy protection in open information management platforms.
IBM J. Res. Dev., 2014

SECRETA: A System for Evaluating and Comparing RElational and Transaction Anonymization algorithms.
Proceedings of the 17th International Conference on Extending Database Technology, 2014

Privacy Issues in Association Rule Mining.
Proceedings of the Frequent Pattern Mining, 2014

2013
Anonymization of Electronic Medical Records to Support Clinical Analysis
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-1-4614-5668-1, 2013

Utility-Aware Anonymization of Diagnosis Codes.
IEEE J. Biomed. Health Informatics, 2013

Report from Dagstuhl: the liberation of mobile location data and its implications for privacy research.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2013

Efficient and flexible anonymization of transaction data.
Knowl. Inf. Syst., 2013

Semantic trajectories modeling and analysis.
ACM Comput. Surv., 2013

Anonymizing Data with Relational and Transaction Attributes.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013

Distance-Based k^m-Anonymization of Trajectory Data.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

Hiding Sensitive Patterns from Sequence Databases: Research Challenges and Solutions.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

Select-Organize-Anonymize: A Framework for Trajectory Data Anonymization.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

Permutation-Based Sequential Pattern Hiding.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

2012
Utility-guided Clustering-based Transaction Data Anonymization.
Trans. Data Priv., 2012

Assessing Disclosure Risk and Data Utility Trade-off in Transaction Data Anonymization.
Int. J. Softw. Informatics, 2012

Utility-preserving transaction data anonymization with low information loss.
Expert Syst. Appl., 2012

QuerioCity: A Linked Data Platform for Urban Information Management.
Proceedings of the Semantic Web - ISWC 2012, 2012

EWNI: Efficient Anonymization of Vulnerable Individuals in Social Networks.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2012

Private-HERMES: a benchmark framework for privacy-preserving mobility data querying and mining methods.
Proceedings of the 15th International Conference on Extending Database Technology, 2012

QuerioCity: Accessing the Information of a City.
Proceedings of the Semantic Cities, 2012

2011
Foreword for the special issue of selected papers from the 1st ECML/PKDD Workshop on Privacy and Security issues in Data Mining and Machine Learning.
Trans. Data Priv., 2011

Privacy in mobility data mining.
SIGKDD Explor., 2011

Concealing the position of individuals in location-based services.
Oper. Res., 2011

COAT: COnstraint-based anonymization of transactions.
Knowl. Inf. Syst., 2011

A publication process model to enable privacy-aware data sharing.
IBM J. Res. Dev., 2011

Revisiting sequential pattern hiding to enhance utility.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

PCTA: privacy-constrained clustering-based transaction data anonymization.
Proceedings of the 2011 International Workshop on Privacy and Anonymity in Information Society, 2011

Privacy-aware querying over sensitive trajectory data.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

2010
Association Rule Hiding for Data Mining
Advances in Database Systems 41, Kluwer, ISBN: 978-1-4419-6568-4, 2010

Providing K-Anonymity in location based services.
SIGKDD Explor., 2010

Anonymizing Transaction Data to Eliminate Sensitive Inferences.
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010

2009
Exact Knowledge Hiding through Database Extension.
IEEE Trans. Knowl. Data Eng., 2009

From itemsets through trajectories to location based services: a knowledge hiding privacy approach.
SIGKDD Explor., 2009

Hiding sensitive knowledge without side effects.
Knowl. Inf. Syst., 2009

Exact Knowledge Hiding in Transactional Databases.
Int. J. Artif. Intell. Tools, 2009

A network aware privacy model for online requests in trajectory data.
Data Knowl. Eng., 2009

Privacy challenges and solutions in the social web.
ACM Crossroads, 2009

An overview of privacy preserving data mining.
ACM Crossroads, 2009

Identifying Unsafe Routes for Network-Based Trajectory Privacy.
Proceedings of the SIAM International Conference on Data Mining, 2009

PLOT: Privacy in Location Based Services: An Open-Ended Toolbox.
Proceedings of the MDM 2009, 2009

Reconstruction-based Classification Rule Hiding through Controlled Data Modification.
Proceedings of the Artificial Intelligence Applications and Innovations III, 2009

2008
Privacy and Security in Spatiotemporal Data and Trajectories.
Proceedings of the Mobility, Data Mining and Privacy - Geographic Knowledge Discovery, 2008

Privacy in Spatiotemporal Data Mining.
Proceedings of the Mobility, Data Mining and Privacy - Geographic Knowledge Discovery, 2008

A Survey of Association Rule Hiding Methods for Privacy.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

A privacy-aware trajectory tracking query engine.
SIGKDD Explor., 2008

A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A Free Terrain Model for Trajectory K-Anonymity.
Proceedings of the Database and Expert Systems Applications, 19th International Conference, 2008

2007
A Hybrid Approach to Frequent Itemset Hiding.
Proceedings of the 19th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2007), 2007

A k-Anonymity Model for Spatio-Temporal Data.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

2006
An integer programming approach for frequent itemset hiding.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006


  Loading...