Murat Kantarcioglu
Orcid: 0000-0001-9795-9063Affiliations:
- Virginia Polytechnic Institute, Blacksburg, VA, USA
- University of Texas at Dallas, USA
According to our database1,
Murat Kantarcioglu
authored at least 306 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on utdallas.edu
On csauthors.net:
Bibliography
2024
IEEE Access, 2024
Robin Hood: A De-identification Method to Preserve Minority Representation for Disparities Research.
Proceedings of the Privacy in Statistical Databases - International Conference, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Do You Know What You Are Talking About? Characterizing Query-Knowledge Relevance For Reliable Retrieval Augmented Generation.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
2023
Managing re-identification risks while providing access to the <i>All of Us</i> research program.
J. Am. Medical Informatics Assoc., April, 2023
Exploring the Effect of Randomness on Transferability of Adversarial Samples Against Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Data Eng. Bull., 2023
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions.
CoRR, 2023
CoRR, 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
An Investigation on the Fragility of Graph Neural Networks: The Impact of Node Feature Modification on Graph Classification Accuracy.
Proceedings of the 5th IEEE International Conference on Trust, 2023
Proceedings of the 2023 SIAM International Conference on Data Mining, 2023
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
United We Stand, Divided We Fall: Networks to Graph (N2G) Abstraction for Robust Graph Classification Under Graph Label Corruption.
Proceedings of the Learning on Graphs Conference, 27-30 November 2023, Virtual Event., 2023
Proceedings of the Learning on Graphs Conference, 27-30 November 2023, Virtual Event., 2023
Proceedings of the Thirty-Sixth International Florida Artificial Intelligence Research Society Conference, 2023
Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms.
Proceedings of the Annual Computer Security Applications Conference, 2023
Graph of Graphs: A New Knowledge Representation Mechanism for Graph Learning (Student Abstract).
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Blockchain networks: Data structures of Bitcoin, Monero, Zcash, Ethereum, Ripple, and Iota.
WIREs Data Mining Knowl. Discov., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Dynamically adjusting case reporting policy to maximize privacy and public health utility in the face of a pandemic.
J. Am. Medical Informatics Assoc., 2022
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding.
IEEE Secur. Priv., 2022
How Adversarial Assumptions Influence Re-identification Risk Measures: A COVID-19 Case Study.
Proceedings of the Privacy in Statistical Databases - International Conference, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Private Anomaly Detection in Linear Controllers: Garbled Circuits vs. Homomorphic Encryption.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022
Proceedings of the AMIA 2022, 2022
Supporting COVID-19 Disparity Investigations with Dynamically Adjusting Case Reporting Policies.
Proceedings of the AMIA 2022, 2022
A Representativeness-informed Model for Research Record Selection from Electronic Medical Record Systems.
Proceedings of the AMIA 2022, 2022
2021
A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems.
ACM Trans. Manag. Inf. Syst., 2021
IEEE Trans. Knowl. Data Eng., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
HOLMES: A Platform for Detecting Malicious Inputs in Secure Collaborative Computation.
IACR Cryptol. ePrint Arch., 2021
Dynamically Adjusting Case-Reporting Policy to Maximize Privacy and Utility in the Face of a Pandemic.
CoRR, 2021
SecureDL: Securing Code Execution and Access Control for Distributed Data Analytics Platforms.
CoRR, 2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
De-identifying Socioeconomic Data at the Census Tract Level for Medical Research Through Constraint-based Clustering.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
GOAT: GPU Outsourcing of Deep Learning Training With Asynchronous Probabilistic Integrity Verification Inside Trusted Execution Environment.
CoRR, 2020
CoRR, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted Execution Environments.
Proceedings of the Second IEEE International Conference on Trust, 2020
Dissecting Ethereum Blockchain Analytics: What We Learn from Topology and Geometry of the Ethereum Graph?
Proceedings of the 2020 SIAM International Conference on Data Mining, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
BitcoinHeist: Topological Data Analysis for Ransomware Prediction on the Bitcoin Blockchain.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020
2019
WIREs Data Mining Knowl. Discov., 2019
Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records.
ACM Trans. Priv. Secur., 2019
Frontiers Big Data, 2019
BitcoinHeist: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain.
CoRR, 2019
Proceedings of the First IEEE International Conference on Trust, 2019
Proceedings of the First IEEE International Conference on Trust, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2019
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
Proceedings of the AMIA 2019, 2019
2018
Synthesis Lectures on Artificial Intelligence and Machine Learning, Morgan & Claypool Publishers, ISBN: 978-3-031-01580-9, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
J. Am. Medical Informatics Assoc., 2018
CoRR, 2018
Adversarial Clustering: A Grid Based Clustering Algorithm Against Active Adversaries.
CoRR, 2018
Graph Based Proactive Secure Decomposition Algorithm for Context Dependent Attribute Based Inference Control Problem.
CoRR, 2018
Comput. Secur., 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018
Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium Workshops, 2018
Proceedings of the 2018 International Workshop on Social Sensing, 2018
Proceedings of the IEEE International Conference on Data Mining, 2018
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the AMIA 2018, 2018
2017
Proceedings of the Encyclopedia of GIS., 2017
IEEE Des. Test, 2017
Secure logical schema and decomposition algorithm for proactive context dependent attribute based inference control.
Data Knowl. Eng., 2017
CoRR, 2017
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential Privacy.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
From Myths to Norms: Demystifying Data Mining Models with Instance-Based Transparency.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Building a Dossier on the Cheap: Integrating Distributed Personal Data Resources Under Cost Constraints.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
Proceedings of the IEEE Conference on Control Technology and Applications, 2017
SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 IEEE International Congress on Big Data, 2017
Proceedings of the AMIA 2017, 2017
Security vs. privacy: How integrity attacks can be masked by the noise of differential privacy.
Proceedings of the 2017 American Control Conference, 2017
2016
Multi-Keyword search over encrypted data with scoring and search pattern obfuscation.
Int. J. Inf. Sec., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2016
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016
Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
J. Biomed. Informatics, 2015
Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students.
IEEE Secur. Priv., 2015
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
A hybrid private record linkage scheme: Separating differentially private synopses from matching records.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015
2014
IEEE Trans. Knowl. Data Eng., 2014
A trust-score-based access control in assured information sharing systems: An application of financial credit risk score models.
Risk Decis. Anal., 2014
Distributed Parallel Databases, 2014
Bioinform., 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014
SOEMPI: A Secure Open Enterprise Master Patient Index Software Toolkit for Private Record Linkage.
Proceedings of the AMIA 2014, 2014
Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing.
Proceedings of the Secure Cloud Computing, 2014
Proceedings of the Frequent Pattern Mining, 2014
CRC Press, ISBN: 978-1-4665-6943-0, 2014
2013
IEEE Trans. Knowl. Data Eng., 2013
IEEE Trans. Knowl. Data Eng., 2013
A practical approach to achieve private medical record linkage in light of public resources.
J. Am. Medical Informatics Assoc., 2013
A secure distributed logistic regression protocol for the detection of rare adverse drug events.
J. Am. Medical Informatics Assoc., 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Measuring expertise and bias in cyber security using cognitive and neuroscience approaches.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
IEEE Trans. Inf. Technol. Biomed., 2012
IEEE Trans. Dependable Secur. Comput., 2012
IEEE Trans. Dependable Secur. Comput., 2012
Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage.
Inf. Fusion, 2012
CoRR, 2012
Proceedings of the 21st World Wide Web Conference, 2012
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012
Proceedings of the ISWC 2012 Posters & Demonstrations Track, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012
Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Computer Network Security, 2012
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012
A game theoretic approach for adversarial pipeline monitoring using Wireless Sensor Networks.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012
Proceedings of the 12th IEEE International Conference on Data Mining, 2012
Proceedings of the 12th IEEE International Conference on Data Mining, 2012
A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Studying dynamic equilibrium of cloud computing adoption with application of Mean Field Games.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
2011
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance.
J. Am. Medical Informatics Assoc., 2011
Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection.
GeoInformatica, 2011
Data Min. Knowl. Discov., 2011
Proceedings of the 20th International Conference on World Wide Web, 2011
Proceedings of the 3rd Workshop on the Theory and Practice of Provenance, 2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 49th Annual Allerton Conference on Communication, 2011
2010
Proc. VLDB Endow., 2010
Int. J. Semantic Comput., 2010
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the ISWC 2010 Posters & Demonstrations Track: Collected Abstracts, 2010
Proceedings of the 4th IEEE International Conference on Semantic Computing (ICSC 2010), 2010
Proceedings of the Decision and Game Theory for Security, 2010
A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model.
Proceedings of the Decision and Game Theory for Security, 2010
Proceedings of the EDBT 2010, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Proceedings of the IEEE International Conference on Cloud Computing, 2010
2009
Proceedings of the Encyclopedia of Database Systems, 2009
Proceedings of the Encyclopedia of Database Systems, 2009
Data Knowl. Eng., 2009
Design and implementation of a secure social network system.
Comput. Syst. Sci. Eng., 2009
Proceedings of the 18th International Conference on World Wide Web, 2009
Proceedings of the Advances in Spatial and Temporal Databases, 2009
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009
Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009
Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009
Design of a temporal geosocial semantic web for military stabilization and reconstruction operations.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the 25th International Conference on Data Engineering, 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the Database Systems for Advanced Applications, 2009
2008
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008
Proceedings of the Encyclopedia of GIS., 2008
ACM Trans. Knowl. Discov. Data, 2008
IEEE Trans. Inf. Technol. Biomed., 2008
An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems.
Manuf. Serv. Oper. Manag., 2008
Int. J. Inf. Comput. Secur., 2008
The applicability of the perturbation based privacy preserving data mining for real-world data.
Data Knowl. Eng., 2008
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008
Proceedings of the Privacy in Statistical Databases, 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the Collaborative Computing: Networking, 2008
2007
J. Interconnect. Networks, 2007
Int. J. Bus. Intell. Data Min., 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the Data and Applications Security XXI, 2007
2006
Proceedings of the 22nd International Conference on Data Engineering, 2006
2005
Privacy-preserving distributed data mining and processing on horizontally partitioned data
PhD thesis, 2005
Proceedings of the Data and Applications Security XIX, 2005
2004
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data.
IEEE Trans. Knowl. Data Eng., 2004
On demand synchronization and load distribution for database grid-based Web applications.
Data Knowl. Eng., 2004
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004
Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2004
2003
Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, 2003
2002
2001
Proceedings of the Data Warehousing and Knowledge Discovery, 2001