Erman Ayday
Orcid: 0000-0003-3383-1081Affiliations:
- Case Western Reserve University, Cleveland, OH, USA
- Bilkent University, Ankara, Turkey
According to our database1,
Erman Ayday
authored at least 117 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
AUTOLYCUS: Exploiting Explainable Artificial Intelligence (XAI) for Model Extraction Attacks against Interpretable Models.
Proc. Priv. Enhancing Technol., 2024
Privacy-Preserving Fingerprinting Against Collusion and Correlation Threats in Genomic Data.
Proc. Priv. Enhancing Technol., 2024
Privacy-Preserving Data Linkage Across Private and Public Datasets for Collaborative Agriculture Research.
CoRR, 2024
CoRR, 2024
Proceedings of the 12th IEEE International Conference on Healthcare Informatics, 2024
Privacy-Preserving Collaborative Genomic Research: A Real-Life Deployment and Vision.
Proceedings of the 2024 Workshop on Cybersecurity in Healthcare, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proc. Priv. Enhancing Technol., October, 2023
Bioinform., October, 2023
A Privacy-Preserving Framework for Conducting Genome-Wide Association Studies Over Outsourced Patient Data.
IEEE Trans. Dependable Secur. Comput., 2023
Towards Robust Fingerprinting of Relational Databases by Mitigating Correlation Attacks.
IEEE Trans. Dependable Secur. Comput., 2023
AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks against Decision Tree Models.
CoRR, 2023
Privacy preserving identification of population stratification for collaborative genomic research.
Bioinform., 2023
Proceedings of the 5th IEEE International Conference on Trust, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies.
Proc. Priv. Enhancing Technol., 2022
ShareTrace: Contact Tracing with Asynchronous, Parallel Message Passing on a Temporal Graph.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the IEEE International Conference on E-health Networking, 2022
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the AMIA 2022, 2022
Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring Privacy.
Proceedings of the AMIA 2022, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Proc. VLDB Endow., 2021
Proc. Priv. Enhancing Technol., 2021
GenShare: Sharing Accurate Differentially-Private Statistics for Genomic Datasets with Dependent Tuples.
CoRR, 2021
CoRR, 2021
CoRR, 2021
Privacy-preserving and robust watermarking on sequential genome data using belief propagation and local differential privacy.
Bioinform., 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Entering Watch Dogs<sup>*</sup>: Evaluating Privacy Risks Against Large-Scale Facial Search and Data Collection.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
ShareTrace: an iterative message passing algorithm for efficient and effective disease risk assessment on an interaction graph.
Proceedings of the BCB '21: 12th ACM International Conference on Bioinformatics, 2021
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021
2020
CoRR, 2020
CoRR, 2020
Inference attacks against differentially private query results from genomic datasets including dependent tuples.
Bioinform., 2020
Bioinform., 2020
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Efficient Quantification of Profile Matching Risk in Social Networks Using Belief Propagation.
Proceedings of the Computer Security - ESORICS 2020, 2020
Tracking the Invisible: Privacy-Preserving Contact Tracing to Control the Spread of a Virus.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Trans. Dependable Secur. Comput., 2019
IEEE ACM Trans. Comput. Biol. Bioinform., 2019
Re-identification of individuals in genomic data-sharing beacons via allele inference.
Bioinform., 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the Biocomputing 2019: Proceedings of the Pacific Symposium, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
2018
An Inference Attack on Genomic Data Using Kinship, Complex Correlations, and Phenotype Information.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018
IEEE ACM Trans. Comput. Biol. Bioinform., 2018
A utility maximizing and privacy preserving approach for protecting kinship in genomic databases.
Bioinform., 2018
A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018
2017
A survey on information security threats and solutions for Machine to Machine (M2M) communications.
J. Parallel Distributed Comput., 2017
Profile Matching Across Unstructured Online Social Networks: Threats and Countermeasures.
CoRR, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proc. Priv. Enhancing Technol., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Medical Data Privacy Handbook, 2015
2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Protecting and evaluating genomic privacy in medical tests and personalized medicine.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Privacy-Preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Iterative similarity inference via message passing in factor graphs for Collaborative Filtering.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
ACM Trans. Sens. Networks, 2012
An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks.
IEEE Trans. Mob. Comput., 2012
IEEE Trans. Dependable Secur. Comput., 2012
A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks.
Ad Hoc Networks, 2012
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the 50th Annual Allerton Conference on Communication, 2012
2011
PhD thesis, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
2010
A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks.
Ad Hoc Networks, 2010
Proceedings of the 2010 ACM Conference on Recommender Systems, 2010
2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
2008
AuCRB: An Efficient Mechanism to Provide Availability, Reliability and Authentication for Multihop Broadcasting in Wireless Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008
2007
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007
MKPS: a multivariate polynomial scheme for symmetric key-establishment in distributed sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
2006
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006