Murat Kantarcioglu

Orcid: 0000-0001-9795-9063

Affiliations:
  • Virginia Polytechnic Institute, Blacksburg, VA, USA
  • University of Texas at Dallas, USA


According to our database1, Murat Kantarcioglu authored at least 306 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
How to Backdoor Consistency Models?
CoRR, 2024

A Blockchain-Based Hybrid Architecture for Auditable Consent Management.
IEEE Access, 2024

Robin Hood: A De-identification Method to Preserve Minority Representation for Disparities Research.
Proceedings of the Privacy in Statistical Databases - International Conference, 2024

Using AI Uncertainty Quantification to Improve Human Decision-Making.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Do You Know What You Are Talking About? Characterizing Query-Knowledge Relevance For Reliable Retrieval Augmented Generation.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

2023
Managing re-identification risks while providing access to the <i>All of Us</i> research program.
J. Am. Medical Informatics Assoc., April, 2023

Exploring the Effect of Randomness on Transferability of Adversarial Samples Against Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2023

A Risk-Aware Paradigm for Privacy-Preserving Machine Learning.
IEEE Data Eng. Bull., 2023

Letter from IEEE TCDE Chair.
IEEE Data Eng. Bull., 2023

Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions.
CoRR, 2023

Chainlet Orbits: Topological Address Embedding for the Bitcoin Blockchain.
CoRR, 2023

Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features.
CoRR, 2023

Evading Provenance-Based ML Detectors with Adversarial System Actions.
Proceedings of the 32nd USENIX Security Symposium, 2023

HOLMES: Efficient Distribution Testing for Secure Collaborative Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

An Investigation on the Fragility of Graph Neural Networks: The Impact of Node Feature Modification on Graph Classification Accuracy.
Proceedings of the 5th IEEE International Conference on Trust, 2023

On Improving Fairness of AI Models with Synthetic Minority Oversampling Techniques.
Proceedings of the 2023 SIAM International Conference on Data Mining, 2023

SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

United We Stand, Divided We Fall: Networks to Graph (N2G) Abstraction for Robust Graph Classification Under Graph Label Corruption.
Proceedings of the Learning on Graphs Conference, 27-30 November 2023, Virtual Event., 2023

EMP: Effective Multidimensional Persistence for Graph Representation Learning.
Proceedings of the Learning on Graphs Conference, 27-30 November 2023, Virtual Event., 2023

IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception.
Proceedings of the Thirty-Sixth International Florida Artificial Intelligence Research Society Conference, 2023

Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms.
Proceedings of the Annual Computer Security Applications Conference, 2023

Graph of Graphs: A New Knowledge Representation Mechanism for Graph Learning (Student Abstract).
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Blockchain networks: Data structures of Bitcoin, Monero, Zcash, Ethereum, Ripple, and Iota.
WIREs Data Mining Knowl. Discov., 2022

Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI).
IEEE Trans. Dependable Secur. Comput., 2022

Dynamically adjusting case reporting policy to maximize privacy and public health utility in the face of a pandemic.
J. Am. Medical Informatics Assoc., 2022

Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding.
IEEE Secur. Priv., 2022

How Adversarial Assumptions Influence Re-identification Risk Measures: A COVID-19 Case Study.
Proceedings of the Privacy in Statistical Databases - International Conference, 2022

Chartalist: Labeled Graph Datasets for UTXO and Account-based Blockchains.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Reduction Algorithms for Persistence Diagrams of Networks: CoralTDA and PrunIT.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Enforcement of Laws and Privacy Preferences in Modern Computing Systems.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

GINN: Fast GPU-TEE Based Integrity for Neural Network Training.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Private Anomaly Detection in Linear Controllers: Garbled Circuits vs. Homomorphic Encryption.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

A Scalable Tool for Realistic Health Data Re-identification Risk Assessment.
Proceedings of the AMIA 2022, 2022

Supporting COVID-19 Disparity Investigations with Dynamically Adjusting Case Reporting Policies.
Proceedings of the AMIA 2022, 2022

A Representativeness-informed Model for Research Record Selection from Electronic Medical Record Systems.
Proceedings of the AMIA 2022, 2022

2021
A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems.
ACM Trans. Manag. Inf. Syst., 2021

GraphBoot: Quantifying Uncertainty in Node Feature Learning on Large Networks.
IEEE Trans. Knowl. Data Eng., 2021

Modern Privacy-Preserving Record Linkage Techniques: An Overview.
IEEE Trans. Inf. Forensics Secur., 2021

Robust Transparency Against Model Inversion Attacks.
IEEE Trans. Dependable Secur. Comput., 2021

HOLMES: A Platform for Detecting Malicious Inputs in Secure Collaborative Computation.
IACR Cryptol. ePrint Arch., 2021

Multi-concept adversarial attacks.
CoRR, 2021

Dynamically Adjusting Case-Reporting Policy to Maximize Privacy and Utility in the Face of a Pandemic.
CoRR, 2021

SecureDL: Securing Code Execution and Access Control for Distributed Data Analytics Platforms.
CoRR, 2021

BiFair: Training Fair Models with Bilevel Optimization.
CoRR, 2021

Improving Fairness of AI Systems with Lossless De-biasing.
CoRR, 2021

Smart Vectorizations for Single and Multiparameter Persistence.
CoRR, 2021

The Impact of Data Distribution on Fairness and Robustness in Federated Learning.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021

Alphacore: Data Depth based Core Decomposition.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Data Science on Blockchains.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Learning Generative Deception Strategies in Combinatorial Masking Games.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

BlockFLA: Accountable Federated Learning via Hybrid Blockchain Architecture.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

AI for Security and Security for AI.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

SECAUCTEE: Securing Auction Smart Contracts using Trusted Execution Environments.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

De-identifying Socioeconomic Data at the Census Tract Level for Medical Research Through Constraint-based Clustering.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021

Defending against Backdoors in Federated Learning with Robust Learning Rate.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Does Explainable Artificial Intelligence Improve Human Decision-Making?
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Improving Accuracy of Federated Learning in Non-IID Settings.
CoRR, 2020

How to Not Get Caught When You Launder Money on Blockchain?
CoRR, 2020

GOAT: GPU Outsourcing of Deep Learning Training With Asynchronous Probabilistic Integrity Verification Inside Trusted Execution Environment.
CoRR, 2020

Leveraging Blockchain for Immutable Logging and Querying Across Multiple Sites.
CoRR, 2020

MultiModal Deception Detection: Accuracy, Applicability and Generalizability.
Proceedings of the Second IEEE International Conference on Trust, 2020

A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted Execution Environments.
Proceedings of the Second IEEE International Conference on Trust, 2020

Dissecting Ethereum Blockchain Analytics: What We Learn from Topology and Geometry of the Ethereum Graph?
Proceedings of the 2020 SIAM International Conference on Data Mining, 2020

Adversarial Classification Under Differential Privacy.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

BitcoinHeist: Topological Data Analysis for Ransomware Prediction on the Bitcoin Blockchain.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Attacking Machine Learning Models for Social Good.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

SGX-IR: Secure Information Retrieval with Trusted Processors.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Secure IoT Data Analytics in Cloud via Intel SGX.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
A survey of game theoretic approach for adversarial machine learning.
WIREs Data Mining Knowl. Discov., 2019

Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records.
ACM Trans. Priv. Secur., 2019

Research Challenges at the Intersection of Big Data, Security and Privacy.
Frontiers Big Data, 2019

BitcoinHeist: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain.
CoRR, 2019

Securing Big Data in the Age of AI.
Proceedings of the First IEEE International Conference on Trust, 2019

Secure Real-Time Heterogeneous IoT Data Management System.
Proceedings of the First IEEE International Conference on Trust, 2019

Securing Big Data: New Access Control Challenges and Approaches.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Adversarial Active Learning in the Presence of Weak and Malicious Oracles.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2019

Determining the Impact of Missing Values on Blocking in Record Linkage.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019

ChainNet: Learning on Blockchain Graphs with Topological Features.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

A Hybrid Blockchain Architecture for Privacy-Enabled and Accountable Auctions.
Proceedings of the IEEE International Conference on Blockchain, 2019

Biomedical Research Cohort Membership Disclosure on Social Media.
Proceedings of the AMIA 2019, 2019

2018
Adversarial Machine Learning
Synthesis Lectures on Artificial Intelligence and Machine Learning, Morgan & Claypool Publishers, ISBN: 978-3-031-01580-9, 2018

Horizontally Partitioned Data.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

It's all in the timing: calibrating temporal penalties for biomedical data sharing.
J. Am. Medical Informatics Assoc., 2018

CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities.
CoRR, 2018

Breaking Transferability of Adversarial Samples with Randomness.
CoRR, 2018

Enforceable Data Sharing Agreements Using Smart Contracts.
CoRR, 2018

Adversarial Clustering: A Grid Based Clustering Algorithm Against Active Adversaries.
CoRR, 2018

Graph Based Proactive Secure Decomposition Algorithm for Context Dependent Attribute Based Inference Control Problem.
CoRR, 2018

Spatial counts under differential privacy mechanism on changing spatial scales.
Comput. Secur., 2018

Towards a Privacy-Aware Qunatified Self Data Management Framework.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Privacy Preserving Synthetic Data Release Using Deep Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018

Data Mining with Algorithmic Transparency.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Forecasting Bitcoin Price with Graph Chainlets.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Adjudicating Violations in Data Sharing Agreements Using Smart Contracts.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Attacklets: Modeling High Dimensionality in Real World Cyberattacks.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Adversarial Anomaly Detection Using Centroid-Based Clustering.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

Integrating Cyber Security and Data Science for Social Media: A Position Paper.
Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium Workshops, 2018

The Future of Deception: Machine-Generated and Manipulated Images, Video, and Audio?
Proceedings of the 2018 International Workshop on Social Sensing, 2018

Blockchain Data Analytics.
Proceedings of the IEEE International Conference on Data Mining, 2018

Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

SmartProvenance: A Distributed, Blockchain Based DataProvenance System.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Detecting the Presence of an Individual in Phenotypic Summary Data.
Proceedings of the AMIA 2018, 2018

2017
Privacy and Security Challenges in GIS.
Proceedings of the Encyclopedia of GIS., 2017

Geospatial Semantic Web, Definition.
Proceedings of the Encyclopedia of GIS., 2017

Security and Privacy in Cyber-Physical Systems: A Survey of Surveys.
IEEE Des. Test, 2017

Secure logical schema and decomposition algorithm for proactive context dependent attribute based inference control.
Data Knowl. Eng., 2017

Using Blockchain and smart contracts for secure data provenance management.
CoRR, 2017

Blockchain: A Graph Primer.
CoRR, 2017

Hacking social network data mining.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive Applications.
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017

Secure and Efficient Query Processing over Hybrid Clouds.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

Securing Data Analytics on SGX with Randomization.
Proceedings of the Computer Security - ESORICS 2017, 2017

Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential Privacy.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

From Myths to Norms: Demystifying Data Mining Models with Instance-Based Transparency.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Building a Dossier on the Cheap: Integrating Distributed Personal Data Resources Under Cost Constraints.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Security and privacy trade-offs in CPS by leveraging inherent differential privacy.
Proceedings of the IEEE Conference on Control Technology and Applications, 2017

SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

An Open Source Tool for Game Theoretic Health Data De-Identification.
Proceedings of the AMIA 2017, 2017

Security vs. privacy: How integrity attacks can be masked by the noise of differential privacy.
Proceedings of the 2017 American Control Conference, 2017

2016
Multi-Keyword search over encrypted data with scoring and search pattern obfuscation.
Int. J. Inf. Sec., 2016

A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data.
IACR Cryptol. ePrint Arch., 2016

CheapSMC: A Framework to Minimize SMC Cost in Cloud.
CoRR, 2016

Modeling Adversarial Learning as Nested Stackelberg Games.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2016

A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

A Framework for Secure Data Collection and Management for Internet of Things.
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016

Optimizing secure classification performance with privacy-aware feature selection.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Practical Differentially Private Modeling of Human Movement Data.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Detecting Discrimination in a Black-Box Classifier.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Adversarial Data Mining: Big Data Meets Cyber Security.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A privacy preserving protocol for tracking participants in phase I clinical trials.
J. Biomed. Informatics, 2015

Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students.
IEEE Secur. Priv., 2015

SEMROD: Secure and Efficient MapReduce Over HybriD Clouds.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

Honeypot based unauthorized data access detection in MapReduce systems.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Design and Implementation of a Semantic Web-Based Inference Controller: A Summary.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

Privacy-aware dynamic feature selection.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

A hybrid private record linkage scheme: Separating differentially private synopses from matching records.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

BigGate: Access Control Framework for Outsourced Key-Value Stores.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Distributed Search over Encrypted Big Data.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

A Dynamic Approach to Detect Anomalous Queries on Relational Databases.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

Process-Driven Data Privacy.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

AccountableMR: Toward accountable MapReduce systems.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

TrustMR: Computation integrity assurance system for MapReduce.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
Composite Bloom Filters for Secure Record Linkage.
IEEE Trans. Knowl. Data Eng., 2014

Detecting anomalies in social network data consumption.
Soc. Netw. Anal. Min., 2014

A trust-score-based access control in assured information sharing systems: An application of financial credit risk score models.
Risk Decis. Anal., 2014

A roadmap for privacy-enhanced secure data provenance.
J. Intell. Inf. Syst., 2014

Special issue on secure and privacy-aware data management.
Distributed Parallel Databases, 2014

A Distributed Framework for Scalable Search over Encrypted Documents.
CoRR, 2014

SecureMA: protecting participant privacy in genetic association meta-analysis.
Bioinform., 2014

RDF-X: a language for sanitizing RDF graphs.
Proceedings of the 23rd International World Wide Web Conference, 2014

Preventing Cryptographic Key Leakage in Cloud Virtual Machines.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Adversarial Learning with Bayesian Hierarchical Mixtures of Experts.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

Redaction based RDF access control language.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Towards fine grained RDF access control.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Shingled Graph Disassembly: Finding the Undecideable Path.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Silver Lining: Enforcing Secure Information Flow at the Cloud Edge.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

A Hybrid Approach for Privacy-preserving Record Linkage.
Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), 2014

Efficient privacy-aware search over encrypted databases.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Inference attack against encrypted range queries on outsourced databases.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Vigiles: Fine-Grained Access Control for MapReduce Systems.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

SOEMPI: A Secure Open Enterprise Master Patient Index Software Toolkit for Private Record Linkage.
Proceedings of the AMIA 2014, 2014

Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing.
Proceedings of the Secure Cloud Computing, 2014

Privacy Issues in Association Rule Mining.
Proceedings of the Frequent Pattern Mining, 2014

Secure Data Provenance and Inference Control with Semantic Web.
CRC Press, ISBN: 978-1-4665-6943-0, 2014

2013
Incentive Compatible Privacy-Preserving Data Analysis.
IEEE Trans. Knowl. Data Eng., 2013

Preventing Private Information Inference Attacks on Social Networks.
IEEE Trans. Knowl. Data Eng., 2013

Efficient Tree Pattern Queries On Encrypted XML Documents.
Trans. Data Priv., 2013

A practical approach to achieve private medical record linkage in light of public resources.
J. Am. Medical Informatics Assoc., 2013

A secure distributed logistic regression protocol for the detection of rare adverse drug events.
J. Am. Medical Informatics Assoc., 2013

Experiments in Information Sharing
CoRR, 2013

REDACT: a framework for sanitizing RDF data.
Proceedings of the 22nd International World Wide Web Conference, 2013

Toward a Real-Time Cloud Auditing Paradigm.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Measuring expertise and bias in cyber security using cognitive and neuroscience approaches.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Risk Aware Approach to Data Confidentiality in Cloud Computing.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Incentive-Compatible Privacy-Preserving Distributed Data Mining.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

Efficient privacy-aware record integration.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Analysis of heuristic based access pattern obfuscation.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

BigSecret: A Secure Data Management Framework for Key-Value Stores.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Secure multidimensional range queries over outsourced data.
VLDB J., 2012

Secure Management of Biomedical Data With Cryptographic Hardware.
IEEE Trans. Inf. Technol. Biomed., 2012

Incentive Compatible Privacy-Preserving Distributed Classification.
IEEE Trans. Dependable Secur. Comput., 2012

A Hybrid Approach to Private Record Matching.
IEEE Trans. Dependable Secur. Comput., 2012

Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage.
Inf. Fusion, 2012

Secure Data Processing over Hybrid Clouds.
IEEE Data Eng. Bull., 2012

Policy Enforcement Framework for Cloud Data Management.
IEEE Data Eng. Bull., 2012

Efficient Query Verification on Outsourced Data: A Game-Theoretic Approach
CoRR, 2012

StormRider: harnessing "storm" for social networks.
Proceedings of the 21st World Wide Web Conference, 2012

Tag-based Information Flow Analysis for Document Classification in Provenance.
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012

Jena-HBase: A Distributed, Scalable and Effcient RDF Triple Store.
Proceedings of the ISWC 2012 Posters & Demonstrations Track, 2012

A cloud-based RDF policy engine for assured information sharing.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Cloud-Centric Assured Information Sharing.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Design and Implementation of a Cloud-Based Assured Information Sharing System.
Proceedings of the Computer Network Security, 2012

Adversarial support vector machine learning.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

Secure information integration with a semantic web-based framework.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

A game theoretic approach for adversarial pipeline monitoring using Wireless Sensor Networks.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Sparse Bayesian Adversarial Learning Using Relevance Vector Machine Ensembles.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Self-Training with Selection-by-Rejection.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Efficient Similarity Search over Encrypted Data.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Randomizing Smartphone Malware Profiles against Statistical Mining Techniques.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Studying dynamic equilibrium of cloud computing adoption with application of Mean Field Games.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

Risk-Aware Workload Distribution in Hybrid Clouds.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance.
J. Am. Medical Informatics Assoc., 2011

Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection.
GeoInformatica, 2011

Classifier evaluation and attribute selection against active adversaries.
Data Min. Knowl. Discov., 2011

Secure Data Processing in a Hybrid Cloud
CoRR, 2011

Semantic web-based social network access control.
Comput. Secur., 2011

Automatic sanitization of social network data to prevent inference attacks.
Proceedings of the 20th International Conference on World Wide Web, 2011

A Framework for Policies over Provenance.
Proceedings of the 3rd Workshop on the Theory and Practice of Provenance, 2011

Transforming provenance using redaction.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Differentiating Code from Data in x86 Binaries.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2011

A Constraint Satisfaction Cryptanalysis of Bloom Filters in Private Record Linkage.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Compression for Anti-Adversarial Learning.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011

Extraction of expanded entity phrases.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Identification of related information of interest across free text documents.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Extending the classification of nodes in social networks.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Investment in Privacy-Preserving Technologies under Uncertainty.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

Identity management for cloud computing: developments and directions.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Towards privacy preserving access control in the cloud.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Mixture of gaussian models and bayes error under differential privacy.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

A language for provenance access control.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Poster: inference attacks against searchable encryption protocols.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Impact of security risks on cloud computing adoption.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Building Disclosure Risk Aware Query Optimizers for Relational Databases.
Proc. VLDB Endow., 2010

Update-Enabled Triplification of Relational Data into Virtual RDF Stores.
Int. J. Semantic Comput., 2010

Security Issues for Cloud Computing.
Int. J. Inf. Secur. Priv., 2010

A Risk Management Framework for Health Care Data Anonymization.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Incentive Compatible Distributed Data Mining.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Efficient Processing of Large RDF Streams Using Memory Management Algorithms.
Proceedings of the ISWC 2010 Posters & Demonstrations Track: Collected Abstracts, 2010

Bi-directional Translation of Relational Data into Virtual RDF Stores.
Proceedings of the 4th IEEE International Conference on Semantic Computing (ICSC 2010), 2010

When Do Firms Invest in Privacy-Preserving Technologies?
Proceedings of the Decision and Game Theory for Security, 2010

A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model.
Proceedings of the Decision and Game Theory for Security, 2010

Private record matching using differential privacy.
Proceedings of the EDBT 2010, 2010

Scalable and Efficient Reasoning for Enforcing Role-Based Access Control.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Secure data storage and retrieval in the cloud.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Data Intensive Query Processing for Large RDF Graphs Using Cloud Computing Tools.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

2009
Secure Multiparty Computation Methods.
Proceedings of the Encyclopedia of Database Systems, 2009

Horizontally Partitioned Data.
Proceedings of the Encyclopedia of Database Systems, 2009

A risk management approach to RBAC.
Risk Decis. Anal., 2009

Formal anonymity models for efficient privacy-preserving joins.
Data Knowl. Eng., 2009

Design and implementation of a secure social network system.
Comput. Syst. Sci. Eng., 2009

Inferring private information using social network data.
Proceedings of the 18th International Conference on World Wide Web, 2009

A Hybrid Technique for Private Location-Based Queries with Database Protection.
Proceedings of the Advances in Spatial and Temporal Databases, 2009

Query Processing Techniques for Compliance with Data Confidence Policies.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

A semantic web based framework for social network access control.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009

Design of a temporal geosocial semantic web for military stabilization and reconstruction operations.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009

Design and implementation of a secure social network system.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

On the mitigation of bioterrorism through game theory.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Social network classification incorporating link type values.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009


Using Anonymized Data for Classification.
Proceedings of the 25th International Conference on Data Engineering, 2009

Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Privacy Preserving Decision Tree Mining from Perturbed Data.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

The Challenge of Assuring Data Trustworthiness.
Proceedings of the Database Systems for Advanced Applications, 2009

2008
A Survey of Privacy-Preserving Methods Across Horizontally Partitioned Data.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Privacy and Security Challenges in GIS.
Proceedings of the Encyclopedia of GIS., 2008

Geospatial Semantic Web, Definition.
Proceedings of the Encyclopedia of GIS., 2008

Privacy-preserving Naïve Bayes classification.
VLDB J., 2008

Privacy-preserving decision trees over vertically partitioned data.
ACM Trans. Knowl. Discov. Data, 2008

A Cryptographic Approach to Securely Share and Query Genomic Sequences.
IEEE Trans. Inf. Technol. Biomed., 2008

An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems.
Manuf. Serv. Oper. Manag., 2008

Privacy-preserving data mining in the malicious model.
Int. J. Inf. Comput. Secur., 2008

The applicability of the perturbation based privacy preserving data mining for real-world data.
Data Knowl. Eng., 2008

Transforming semi-honest protocols to ensure accountability.
Data Knowl. Eng., 2008

An Approach to Evaluate Data Trustworthiness Based on Data Provenance.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

A Privacy-Preserving Framework for Integrating Person-Specific Databases.
Proceedings of the Privacy in Statistical Databases, 2008

Simulating bioterrorism through epidemiology approximation.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

A Hybrid Approach to Private Record Linkage.
Proceedings of the 24th International Conference on Data Engineering, 2008

Incentive and Trust Issues in Assured Information Sharing.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Virtual Active Network for Live Streaming Media Delivery.
J. Interconnect. Networks, 2007

Extended RBAC-based design and implementation for a secure data warehouse.
Int. J. Bus. Intell. Data Min., 2007

Managing Risks in RBAC Employed Distributed Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Privacy-Preserving Data Mining Applications in the Malicious Model.
Proceedings of the Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

Enforcing Honesty in Assured Information Sharing Within a Distributed System.
Proceedings of the Data and Applications Security XXI, 2007

Design and Analysis of Querying Encrypted Data in Relational Databases.
Proceedings of the Data and Applications Security XXI, 2007

2006
Sovereign Joins.
Proceedings of the 22nd International Conference on Data Engineering, 2006

2005
Privacy-preserving distributed data mining and processing on horizontally partitioned data
PhD thesis, 2005

Security Issues in Querying Encrypted Data.
Proceedings of the Data and Applications Security XIX, 2005

2004
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data.
IEEE Trans. Knowl. Data Eng., 2004

On demand synchronization and load distribution for database grid-based Web applications.
Data Knowl. Eng., 2004

Privately Computing a Distributed k-nn Classifier.
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004

When do data mining results violate privacy?
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004

Privacy-preserving data integration and sharing.
Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2004

2003
Assuring privacy when big brother is watching.
Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, 2003

2002
Tools for Privacy Preserving Data Mining.
SIGKDD Explor., 2002

2001
Mining Cyclically Repeated Patterns.
Proceedings of the Data Warehousing and Knowledge Discovery, 2001


  Loading...