var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https://dblp.org/pid/36/195.bib&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https://dblp.org/pid/36/195.bib&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https://dblp.org/pid/36/195.bib&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n EMP: Effective Multidimensional Persistence for Graph Representation Learning.\n \n \n \n \n\n\n \n Segovia-Dominguez, I.; Chen, Y.; Akcora, C. G.; Zhen, Z.; Kantarcioglu, M.; Gel, Y. R.; and Coskunuzer, B.\n\n\n \n\n\n\n CoRR, abs/2401.13713. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"EMP:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2401-13713,\n  author       = {Ignacio Segovia{-}Dominguez and\n                  Yuzhou Chen and\n                  Cuneyt Gurcan Akcora and\n                  Zhiwei Zhen and\n                  Murat Kantarcioglu and\n                  Yulia R. Gel and\n                  Baris Coskunuzer},\n  title        = {{EMP:} Effective Multidimensional Persistence for Graph Representation\n                  Learning},\n  journal      = {CoRR},\n  volume       = {abs/2401.13713},\n  year         = {2024},\n  url          = {https://doi.org/10.48550/arXiv.2401.13713},\n  doi          = {10.48550/ARXIV.2401.13713},\n  eprinttype    = {arXiv},\n  eprint       = {2401.13713},\n  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-13713.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (18)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Letter from IEEE TCDE Chair.\n \n \n \n \n\n\n \n Kantarcioglu, M.\n\n\n \n\n\n\n IEEE Data Eng. Bull., 46(1): 2. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"LetterPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/debu/Kantarcioglu23,\n  author       = {Murat Kantarcioglu},\n  title        = {Letter from {IEEE} {TCDE} Chair},\n  journal      = {{IEEE} Data Eng. Bull.},\n  volume       = {46},\n  number       = {1},\n  pages        = {2},\n  year         = {2023},\n  url          = {http://sites.computer.org/debull/A23mar/p2.pdf},\n  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/debu/Kantarcioglu23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Risk-Aware Paradigm for Privacy-Preserving Machine Learning.\n \n \n \n \n\n\n \n Kantarcioglu, M.\n\n\n \n\n\n\n IEEE Data Eng. Bull., 46(1): 4–8. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/debu/Kantarcioglu23a,\n  author       = {Murat Kantarcioglu},\n  title        = {A Risk-Aware Paradigm for Privacy-Preserving Machine Learning},\n  journal      = {{IEEE} Data Eng. Bull.},\n  volume       = {46},\n  number       = {1},\n  pages        = {4--8},\n  year         = {2023},\n  url          = {http://sites.computer.org/debull/A23mar/p4.pdf},\n  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/debu/Kantarcioglu23a.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Managing re-identification risks while providing access to the \\emphAll of Us research program.\n \n \n \n \n\n\n \n Xia, W.; Basford, M. A.; Carroll, R. J.; Clayton, E. W.; Harris, P. A.; Kantarcioglu, M.; Liu, Y.; Nyemba, S.; Vorobeychik, Y.; Wan, Z.; and Malin, B. A.\n\n\n \n\n\n\n J. Am. Medical Informatics Assoc., 30(5): 907–914. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"ManagingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jamia/XiaBCCHKLNVWM23,\n  author       = {Weiyi Xia and\n                  Melissa A. Basford and\n                  Robert J. Carroll and\n                  Ellen Wright Clayton and\n                  Paul A. Harris and\n                  Murat Kantarcioglu and\n                  Yongtai Liu and\n                  Steve Nyemba and\n                  Yevgeniy Vorobeychik and\n                  Zhiyu Wan and\n                  Bradley A. Malin},\n  title        = {Managing re-identification risks while providing access to the \\emph{All\n                  of Us} research program},\n  journal      = {J. Am. Medical Informatics Assoc.},\n  volume       = {30},\n  number       = {5},\n  pages        = {907--914},\n  year         = {2023},\n  url          = {https://doi.org/10.1093/jamia/ocad021},\n  doi          = {10.1093/JAMIA/OCAD021},\n  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jamia/XiaBCCHKLNVWM23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Exploring the Effect of Randomness on Transferability of Adversarial Samples Against Deep Neural Networks.\n \n \n \n \n\n\n \n Zhou, Y.; Kantarcioglu, M.; and Xi, B.\n\n\n \n\n\n\n IEEE Trans. Dependable Secur. Comput., 20(1): 83–99. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"ExploringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tdsc/ZhouKX23,\n  author       = {Yan Zhou and\n                  Murat Kantarcioglu and\n                  Bowei Xi},\n  title        = {Exploring the Effect of Randomness on Transferability of Adversarial\n                  Samples Against Deep Neural Networks},\n  journal      = {{IEEE} Trans. Dependable Secur. Comput.},\n  volume       = {20},\n  number       = {1},\n  pages        = {83--99},\n  year         = {2023},\n  url          = {https://doi.org/10.1109/TDSC.2021.3127439},\n  doi          = {10.1109/TDSC.2021.3127439},\n  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/tdsc/ZhouKX23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Graph of Graphs: A New Knowledge Representation Mechanism for Graph Learning (Student Abstract).\n \n \n \n \n\n\n \n Zhen, Z.; Chen, Y.; Kantarcioglu, M.; and Gel, Y. R.\n\n\n \n\n\n\n In Williams, B.; Chen, Y.; and Neville, J., editor(s), Thirty-Seventh AAAI Conference on Artificial Intelligence, AAAI 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, IAAI 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2023, Washington, DC, USA, February 7-14, 2023, pages 16386–16387, 2023. AAAI Press\n \n\n\n\n
\n\n\n\n \n \n \"GraphPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/aaai/ZhenCKG23,\n  author       = {Zhiwei Zhen and\n                  Yuzhou Chen and\n                  Murat Kantarcioglu and\n                  Yulia R. Gel},\n  editor       = {Brian Williams and\n                  Yiling Chen and\n                  Jennifer Neville},\n  title        = {Graph of Graphs: {A} New Knowledge Representation Mechanism for Graph\n                  Learning (Student Abstract)},\n  booktitle    = {Thirty-Seventh {AAAI} Conference on Artificial Intelligence, {AAAI}\n                  2023, Thirty-Fifth Conference on Innovative Applications of Artificial\n                  Intelligence, {IAAI} 2023, Thirteenth Symposium on Educational Advances\n                  in Artificial Intelligence, {EAAI} 2023, Washington, DC, USA, February\n                  7-14, 2023},\n  pages        = {16386--16387},\n  publisher    = {{AAAI} Press},\n  year         = {2023},\n  url          = {https://doi.org/10.1609/aaai.v37i13.27053},\n  doi          = {10.1609/AAAI.V37I13.27053},\n  timestamp    = {Mon, 04 Sep 2023 12:29:24 +0200},\n  biburl       = {https://dblp.org/rec/conf/aaai/ZhenCKG23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms.\n \n \n \n \n\n\n \n Shaon, F.; Rahaman, S.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Annual Computer Security Applications Conference, ACSAC 2023, Austin, TX, USA, December 4-8, 2023, pages 241–255, 2023. ACM\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/acsac/ShaonRK23,\n  author       = {Fahad Shaon and\n                  Sazzadur Rahaman and\n                  Murat Kantarcioglu},\n  title        = {The Queen's Guard: {A} Secure Enforcement of Fine-grained Access Control\n                  In Distributed Data Analytics Platforms},\n  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,\n                  TX, USA, December 4-8, 2023},\n  pages        = {241--255},\n  publisher    = {{ACM}},\n  year         = {2023},\n  url          = {https://doi.org/10.1145/3627106.3627132},\n  doi          = {10.1145/3627106.3627132},\n  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/acsac/ShaonRK23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts.\n \n \n \n \n\n\n \n Belavadi, V.; Zhou, Y.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Meng, W.; Jensen, C. D.; Cremers, C.; and Kirda, E., editor(s), Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pages 801–814, 2023. ACM\n \n\n\n\n
\n\n\n\n \n \n \"AttackPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccs/Belavadi0KT23,\n  author       = {Vibha Belavadi and\n                  Yan Zhou and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Weizhi Meng and\n                  Christian Damsgaard Jensen and\n                  Cas Cremers and\n                  Engin Kirda},\n  title        = {Attack Some while Protecting Others: Selective Attack Strategies for\n                  Attacking and Protecting Multiple Concepts},\n  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and\n                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November\n                  26-30, 2023},\n  pages        = {801--814},\n  publisher    = {{ACM}},\n  year         = {2023},\n  url          = {https://doi.org/10.1145/3576915.3623177},\n  doi          = {10.1145/3576915.3623177},\n  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/ccs/Belavadi0KT23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception.\n \n \n \n \n\n\n \n Bao, J.; Kantarcioglu, M.; Vorobeychik, Y.; and Kamhoua, C. A.\n\n\n \n\n\n\n In Franklin, M.; and Chun, S. A., editor(s), Proceedings of the Thirty-Sixth International Florida Artificial Intelligence Research Society Conference, FLAIRS 2023, Clearwater Beach, FL, USA, May 14-17, 2023, 2023. AAAI Press\n \n\n\n\n
\n\n\n\n \n \n \"IoTFlowGenerator:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/flairs/BaoKVK23,\n  author       = {Joseph Bao and\n                  Murat Kantarcioglu and\n                  Yevgeniy Vorobeychik and\n                  Charles A. Kamhoua},\n  editor       = {Michael Franklin and\n                  Soon Ae Chun},\n  title        = {IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for\n                  Cyber Deception},\n  booktitle    = {Proceedings of the Thirty-Sixth International Florida Artificial Intelligence\n                  Research Society Conference, {FLAIRS} 2023, Clearwater Beach, FL,\n                  USA, May 14-17, 2023},\n  publisher    = {{AAAI} Press},\n  year         = {2023},\n  url          = {https://doi.org/10.32473/flairs.36.133376},\n  doi          = {10.32473/FLAIRS.36.133376},\n  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/flairs/BaoKVK23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.\n \n \n \n \n\n\n \n Ray, I.; Thuraisingham, B.; Vaidya, J.; Mehrotra, S.; Atluri, V.; Ray, I.; Kantarcioglu, M.; Raskar, R.; Salimi, B.; Simske, S.; Venkatasubramanian, N.; and Singh, V. K.\n\n\n \n\n\n\n In Ranise, S.; Carbone, R.; and Takabi, D., editor(s), Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, SACMAT 2023, Trento, Italy, June 7-9, 2023, pages 145–155, 2023. ACM\n \n\n\n\n
\n\n\n\n \n \n \"SAFE-PASS:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sacmat/RayTVMARKRSSV023,\n  author       = {Indrajit Ray and\n                  Bhavani Thuraisingham and\n                  Jaideep Vaidya and\n                  Sharad Mehrotra and\n                  Vijayalakshmi Atluri and\n                  Indrakshi Ray and\n                  Murat Kantarcioglu and\n                  Ramesh Raskar and\n                  Babak Salimi and\n                  Steve Simske and\n                  Nalini Venkatasubramanian and\n                  Vivek K. Singh},\n  editor       = {Silvio Ranise and\n                  Roberto Carbone and\n                  Daniel Takabi},\n  title        = {{SAFE-PASS:} Stewardship, Advocacy, Fairness and Empowerment in Privacy,\n                  Accountability, Security, and Safety for Vulnerable Groups},\n  booktitle    = {Proceedings of the 28th {ACM} Symposium on Access Control Models and\n                  Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023},\n  pages        = {145--155},\n  publisher    = {{ACM}},\n  year         = {2023},\n  url          = {https://doi.org/10.1145/3589608.3593830},\n  doi          = {10.1145/3589608.3593830},\n  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/sacmat/RayTVMARKRSSV023.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On Improving Fairness of AI Models with Synthetic Minority Oversampling Techniques.\n \n \n \n \n\n\n \n Zhou, Y.; Kantarcioglu, M.; and Clifton, C.\n\n\n \n\n\n\n In Shekhar, S.; Zhou, Z.; Chiang, Y.; and Stiglic, G., editor(s), Proceedings of the 2023 SIAM International Conference on Data Mining, SDM 2023, Minneapolis-St. Paul Twin Cities, MN, USA, April 27-29, 2023, pages 874–882, 2023. SIAM\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sdm/0001KC23,\n  author       = {Yan Zhou and\n                  Murat Kantarcioglu and\n                  Chris Clifton},\n  editor       = {Shashi Shekhar and\n                  Zhi{-}Hua Zhou and\n                  Yao{-}Yi Chiang and\n                  Gregor Stiglic},\n  title        = {On Improving Fairness of {AI} Models with Synthetic Minority Oversampling\n                  Techniques},\n  booktitle    = {Proceedings of the 2023 {SIAM} International Conference on Data Mining,\n                  {SDM} 2023, Minneapolis-St. Paul Twin Cities, MN, USA, April 27-29,\n                  2023},\n  pages        = {874--882},\n  publisher    = {{SIAM}},\n  year         = {2023},\n  url          = {https://doi.org/10.1137/1.9781611977653.ch98},\n  doi          = {10.1137/1.9781611977653.CH98},\n  timestamp    = {Tue, 17 Oct 2023 16:39:08 +0200},\n  biburl       = {https://dblp.org/rec/conf/sdm/0001KC23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Investigation on the Fragility of Graph Neural Networks: The Impact of Node Feature Modification on Graph Classification Accuracy.\n \n \n \n \n\n\n \n Wang, C.; Zhou, Y.; Jee, K.; and Kantarcioglu, M.\n\n\n \n\n\n\n In 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2023, Atlanta, GA, USA, November 1-4, 2023, pages 169–176, 2023. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/tpsisa/WangZJK23,\n  author       = {Chengen Wang and\n                  Yan Zhou and\n                  Kangkook Jee and\n                  Murat Kantarcioglu},\n  title        = {An Investigation on the Fragility of Graph Neural Networks: The Impact\n                  of Node Feature Modification on Graph Classification Accuracy},\n  booktitle    = {5th {IEEE} International Conference on Trust, Privacy and Security\n                  in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta,\n                  GA, USA, November 1-4, 2023},\n  pages        = {169--176},\n  publisher    = {{IEEE}},\n  year         = {2023},\n  url          = {https://doi.org/10.1109/TPS-ISA58951.2023.00029},\n  doi          = {10.1109/TPS-ISA58951.2023.00029},\n  timestamp    = {Tue, 05 Mar 2024 12:00:59 +0100},\n  biburl       = {https://dblp.org/rec/conf/tpsisa/WangZJK23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Evading Provenance-Based ML Detectors with Adversarial System Actions.\n \n \n \n \n\n\n \n Mukherjee, K.; Wiedemeier, J.; Wang, T.; Wei, J.; Chen, F.; Kim, M.; Kantarcioglu, M.; and Jee, K.\n\n\n \n\n\n\n In Calandrino, J. A.; and Troncoso, C., editor(s), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pages 1199–1216, 2023. USENIX Association\n \n\n\n\n
\n\n\n\n \n \n \"EvadingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/uss/MukherjeeW0WCKK23,\n  author       = {Kunal Mukherjee and\n                  Joshua Wiedemeier and\n                  Tianhao Wang and\n                  James Wei and\n                  Feng Chen and\n                  Muhyun Kim and\n                  Murat Kantarcioglu and\n                  Kangkook Jee},\n  editor       = {Joseph A. Calandrino and\n                  Carmela Troncoso},\n  title        = {Evading Provenance-Based {ML} Detectors with Adversarial System Actions},\n  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,\n                  CA, USA, August 9-11, 2023},\n  pages        = {1199--1216},\n  publisher    = {{USENIX} Association},\n  year         = {2023},\n  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/mukherjee},\n  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/uss/MukherjeeW0WCKK23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n HOLMES: Efficient Distribution Testing for Secure Collaborative Learning.\n \n \n \n \n\n\n \n Chang, I.; Sotiraki, K.; Chen, W.; Kantarcioglu, M.; and Popa, R. A.\n\n\n \n\n\n\n In Calandrino, J. A.; and Troncoso, C., editor(s), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pages 4823–4840, 2023. USENIX Association\n \n\n\n\n
\n\n\n\n \n \n \"HOLMES:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/uss/ChangSCKP23,\n  author       = {Ian Chang and\n                  Katerina Sotiraki and\n                  Weikeng Chen and\n                  Murat Kantarcioglu and\n                  Raluca A. Popa},\n  editor       = {Joseph A. Calandrino and\n                  Carmela Troncoso},\n  title        = {{HOLMES:} Efficient Distribution Testing for Secure Collaborative\n                  Learning},\n  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,\n                  CA, USA, August 9-11, 2023},\n  pages        = {4823--4840},\n  publisher    = {{USENIX} Association},\n  year         = {2023},\n  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/chang},\n  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/uss/ChangSCKP23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception.\n \n \n \n \n\n\n \n Bao, J.; Kantarcioglu, M.; Vorobeychik, Y.; and Kamhoua, C. A.\n\n\n \n\n\n\n CoRR, abs/2305.00925. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"IoTFlowGenerator:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2305-00925,\n  author       = {Joseph Bao and\n                  Murat Kantarcioglu and\n                  Yevgeniy Vorobeychik and\n                  Charles A. Kamhoua},\n  title        = {IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for\n                  Cyber Deception},\n  journal      = {CoRR},\n  volume       = {abs/2305.00925},\n  year         = {2023},\n  url          = {https://doi.org/10.48550/arXiv.2305.00925},\n  doi          = {10.48550/ARXIV.2305.00925},\n  eprinttype    = {arXiv},\n  eprint       = {2305.00925},\n  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-00925.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features.\n \n \n \n \n\n\n \n Mukherjee, K.; Wiedemeier, J.; Wang, T.; Kim, M.; Chen, F.; Kantarcioglu, M.; and Jee, K.\n\n\n \n\n\n\n CoRR, abs/2306.00934. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"InterpretingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2306-00934,\n  author       = {Kunal Mukherjee and\n                  Joshua Wiedemeier and\n                  Tianhao Wang and\n                  Muhyun Kim and\n                  Feng Chen and\n                  Murat Kantarcioglu and\n                  Kangkook Jee},\n  title        = {Interpreting GNN-based {IDS} Detections Using Provenance Graph Structural\n                  Features},\n  journal      = {CoRR},\n  volume       = {abs/2306.00934},\n  year         = {2023},\n  url          = {https://doi.org/10.48550/arXiv.2306.00934},\n  doi          = {10.48550/ARXIV.2306.00934},\n  eprinttype    = {arXiv},\n  eprint       = {2306.00934},\n  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-00934.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Chainlet Orbits: Topological Address Embedding for the Bitcoin Blockchain.\n \n \n \n \n\n\n \n Azad, P.; Coskunuzer, B.; Kantarcioglu, M.; and Akcora, C. G.\n\n\n \n\n\n\n CoRR, abs/2306.07974. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"ChainletPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2306-07974,\n  author       = {Poupak Azad and\n                  Baris Coskunuzer and\n                  Murat Kantarcioglu and\n                  Cuneyt Gurcan Akcora},\n  title        = {Chainlet Orbits: Topological Address Embedding for the Bitcoin Blockchain},\n  journal      = {CoRR},\n  volume       = {abs/2306.07974},\n  year         = {2023},\n  url          = {https://doi.org/10.48550/arXiv.2306.07974},\n  doi          = {10.48550/ARXIV.2306.07974},\n  eprinttype    = {arXiv},\n  eprint       = {2306.07974},\n  timestamp    = {Sun, 18 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-07974.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions.\n \n \n \n \n\n\n \n Abdallah, M.; Bagchi, S.; Bopardikar, S. D.; Chan, K.; Gao, X.; Kantarcioglu, M.; Li, C.; Liu, P.; and Zhu, Q.\n\n\n \n\n\n\n CoRR, abs/2309.01281. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"GamePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2309-01281,\n  author       = {Mustafa Abdallah and\n                  Saurabh Bagchi and\n                  Shaunak D. Bopardikar and\n                  Kevin Chan and\n                  Xing Gao and\n                  Murat Kantarcioglu and\n                  Congmiao Li and\n                  Peng Liu and\n                  Quanyan Zhu},\n  title        = {Game Theory in Distributed Systems Security: Foundations, Challenges,\n                  and Future Directions},\n  journal      = {CoRR},\n  volume       = {abs/2309.01281},\n  year         = {2023},\n  url          = {https://doi.org/10.48550/arXiv.2309.01281},\n  doi          = {10.48550/ARXIV.2309.01281},\n  eprinttype    = {arXiv},\n  eprint       = {2309.01281},\n  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-01281.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Using AI Uncertainty Quantification to Improve Human Decision-Making.\n \n \n \n \n\n\n \n Marusich, L. R.; Bakdash, J. Z.; Zhou, Y.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/2309.10852. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"UsingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2309-10852,\n  author       = {Laura R. Marusich and\n                  Jonathan Z. Bakdash and\n                  Yan Zhou and\n                  Murat Kantarcioglu},\n  title        = {Using {AI} Uncertainty Quantification to Improve Human Decision-Making},\n  journal      = {CoRR},\n  volume       = {abs/2309.10852},\n  year         = {2023},\n  url          = {https://doi.org/10.48550/arXiv.2309.10852},\n  doi          = {10.48550/ARXIV.2309.10852},\n  eprinttype    = {arXiv},\n  eprint       = {2309.10852},\n  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-10852.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (14)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding.\n \n \n \n \n\n\n \n Yao, D. D.; Rahaman, S.; Xiao, Y.; Afrose, S.; Frantz, M.; Tian, K.; Meng, N.; Cifuentes, C.; Zhao, Y.; Allen, N.; Keynes, N.; Miller, B. P.; Heymann, E.; Kantarcioglu, M.; and Shaon, F.\n\n\n \n\n\n\n IEEE Secur. Priv., 20(6): 43–52. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"BeingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ieeesp/YaoRXAFTMCZAKMH22,\n  author       = {Danfeng Daphne Yao and\n                  Sazzadur Rahaman and\n                  Ya Xiao and\n                  Sharmin Afrose and\n                  Miles Frantz and\n                  Ke Tian and\n                  Na Meng and\n                  Cristina Cifuentes and\n                  Yang Zhao and\n                  Nicholas Allen and\n                  Nathan Keynes and\n                  Barton P. Miller and\n                  Elisa Heymann and\n                  Murat Kantarcioglu and\n                  Fahad Shaon},\n  title        = {Being the Developers' Friend: Our Experience Developing a High-Precision\n                  Tool for Secure Coding},\n  journal      = {{IEEE} Secur. Priv.},\n  volume       = {20},\n  number       = {6},\n  pages        = {43--52},\n  year         = {2022},\n  url          = {https://doi.org/10.1109/MSEC.2022.3159481},\n  doi          = {10.1109/MSEC.2022.3159481},\n  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ieeesp/YaoRXAFTMCZAKMH22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Dynamically adjusting case reporting policy to maximize privacy and public health utility in the face of a pandemic.\n \n \n \n \n\n\n \n Brown, J. T.; Yan, C.; Xia, W.; Yin, Z.; Wan, Z.; Gkoulalas-Divanis, A.; Kantarcioglu, M.; and Malin, B. A.\n\n\n \n\n\n\n J. Am. Medical Informatics Assoc., 29(5): 853–863. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"DynamicallyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jamia/BrownYXYWGKM22,\n  author       = {J. Thomas Brown and\n                  Chao Yan and\n                  Weiyi Xia and\n                  Zhijun Yin and\n                  Zhiyu Wan and\n                  Aris Gkoulalas{-}Divanis and\n                  Murat Kantarcioglu and\n                  Bradley A. Malin},\n  title        = {Dynamically adjusting case reporting policy to maximize privacy and\n                  public health utility in the face of a pandemic},\n  journal      = {J. Am. Medical Informatics Assoc.},\n  volume       = {29},\n  number       = {5},\n  pages        = {853--863},\n  year         = {2022},\n  url          = {https://doi.org/10.1093/jamia/ocac011},\n  doi          = {10.1093/JAMIA/OCAC011},\n  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/jamia/BrownYXYWGKM22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI).\n \n \n \n \n\n\n \n Samtani, S.; Chen, H.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n IEEE Trans. Dependable Secur. Comput., 19(4): 2149–2150. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"ExplainablePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tdsc/SamtaniCKT22,\n  author       = {Sagar Samtani and\n                  Hsinchun Chen and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  title        = {Explainable Artificial Intelligence for Cyber Threat Intelligence\n                  {(XAI-CTI)}},\n  journal      = {{IEEE} Trans. Dependable Secur. Comput.},\n  volume       = {19},\n  number       = {4},\n  pages        = {2149--2150},\n  year         = {2022},\n  url          = {https://doi.org/10.1109/TDSC.2022.3168187},\n  doi          = {10.1109/TDSC.2022.3168187},\n  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tdsc/SamtaniCKT22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Blockchain networks: Data structures of Bitcoin, Monero, Zcash, Ethereum, Ripple, and Iota.\n \n \n \n \n\n\n \n Akcora, C. G.; Gel, Y. R.; and Kantarcioglu, M.\n\n\n \n\n\n\n WIREs Data Mining Knowl. Discov., 12(1). 2022.\n \n\n\n\n
\n\n\n\n \n \n \"BlockchainPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/widm/AkcoraGK22,\n  author       = {Cuneyt Gurcan Akcora and\n                  Yulia R. Gel and\n                  Murat Kantarcioglu},\n  title        = {Blockchain networks: Data structures of Bitcoin, Monero, Zcash, Ethereum,\n                  Ripple, and Iota},\n  journal      = {WIREs Data Mining Knowl. Discov.},\n  volume       = {12},\n  number       = {1},\n  year         = {2022},\n  url          = {https://doi.org/10.1002/widm.1436},\n  doi          = {10.1002/WIDM.1436},\n  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/widm/AkcoraGK22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Representativeness-informed Model for Research Record Selection from Electronic Medical Record Systems.\n \n \n \n \n\n\n \n Borza, V. A.; Clayton, E. W.; Kantarcioglu, M.; Vorobeychik, Y.; and Malin, B. A.\n\n\n \n\n\n\n In AMIA 2022, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 5-9, 2022, 2022. AMIA\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/amia/BorzaCKVM22,\n  author       = {Victor A. Borza and\n                  Ellen Wright Clayton and\n                  Murat Kantarcioglu and\n                  Yevgeniy Vorobeychik and\n                  Bradley A. Malin},\n  title        = {A Representativeness-informed Model for Research Record Selection\n                  from Electronic Medical Record Systems},\n  booktitle    = {{AMIA} 2022, American Medical Informatics Association Annual Symposium,\n                  Washington, DC, USA, November 5-9, 2022},\n  publisher    = {{AMIA}},\n  year         = {2022},\n  url          = {https://knowledge.amia.org/76677-amia-1.4637602/f006-1.4642154/f006-1.4642155/405-1.4642474/863-1.4642471},\n  timestamp    = {Wed, 17 Apr 2024 11:46:45 +0200},\n  biburl       = {https://dblp.org/rec/conf/amia/BorzaCKVM22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Supporting COVID-19 Disparity Investigations with Dynamically Adjusting Case Reporting Policies.\n \n \n \n \n\n\n \n Brown, J. T.; Wan, Z.; Gkoulalas-Divanis, A.; Kantarcioglu, M.; and Malin, B. A.\n\n\n \n\n\n\n In AMIA 2022, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 5-9, 2022, 2022. AMIA\n \n\n\n\n
\n\n\n\n \n \n \"SupportingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/amia/BrownWGKM22,\n  author       = {James Thomas Brown and\n                  Zhiyu Wan and\n                  Aris Gkoulalas{-}Divanis and\n                  Murat Kantarcioglu and\n                  Bradley A. Malin},\n  title        = {Supporting {COVID-19} Disparity Investigations with Dynamically Adjusting\n                  Case Reporting Policies},\n  booktitle    = {{AMIA} 2022, American Medical Informatics Association Annual Symposium,\n                  Washington, DC, USA, November 5-9, 2022},\n  publisher    = {{AMIA}},\n  year         = {2022},\n  url          = {https://knowledge.amia.org/76677-amia-1.4637602/f006-1.4642154/f006-1.4642155/549-1.4642468/421-1.4642465},\n  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/amia/BrownWGKM22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Scalable Tool for Realistic Health Data Re-identification Risk Assessment.\n \n \n \n \n\n\n \n Xia, W.; Liu, Y.; Wan, Z.; Vorobeychik, Y.; Kantarcioglu, M.; Clayton, E. W.; and Malin, B. A.\n\n\n \n\n\n\n In AMIA 2022, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 5-9, 2022, 2022. AMIA\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/amia/XiaLWVKCM22,\n  author       = {Weiyi Xia and\n                  Yongtai Liu and\n                  Zhiyu Wan and\n                  Yevgeniy Vorobeychik and\n                  Murat Kantarcioglu and\n                  Ellen Wright Clayton and\n                  Bradley A. Malin},\n  title        = {A Scalable Tool for Realistic Health Data Re-identification Risk Assessment},\n  booktitle    = {{AMIA} 2022, American Medical Informatics Association Annual Symposium,\n                  Washington, DC, USA, November 5-9, 2022},\n  publisher    = {{AMIA}},\n  year         = {2022},\n  url          = {https://knowledge.amia.org/76677-amia-1.4637602/f008-1.4640715/f008-1.4640716/108-1.4640783/861-1.4640780},\n  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/amia/XiaLWVKCM22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Private Anomaly Detection in Linear Controllers: Garbled Circuits vs. Homomorphic Encryption.\n \n \n \n \n\n\n \n Alexandru, A. B.; Burbano, L.; Çeliktug, M. F.; Gomez, J.; Cárdenas, A. A.; Kantarcioglu, M.; and Katz, J.\n\n\n \n\n\n\n In 61st IEEE Conference on Decision and Control, CDC 2022, Cancun, Mexico, December 6-9, 2022, pages 7746–7753, 2022. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"PrivatePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cdc/AlexandruBCGCKK22,\n  author       = {Andreea B. Alexandru and\n                  Luis Burbano and\n                  Mestan Firat {\\c{C}}eliktug and\n                  Juanita Gomez and\n                  Alvaro A. C{\\'{a}}rdenas and\n                  Murat Kantarcioglu and\n                  Jonathan Katz},\n  title        = {Private Anomaly Detection in Linear Controllers: Garbled Circuits\n                  vs. Homomorphic Encryption},\n  booktitle    = {61st {IEEE} Conference on Decision and Control, {CDC} 2022, Cancun,\n                  Mexico, December 6-9, 2022},\n  pages        = {7746--7753},\n  publisher    = {{IEEE}},\n  year         = {2022},\n  url          = {https://doi.org/10.1109/CDC51059.2022.9992616},\n  doi          = {10.1109/CDC51059.2022.9992616},\n  timestamp    = {Wed, 18 Jan 2023 15:37:37 +0100},\n  biburl       = {https://dblp.org/rec/conf/cdc/AlexandruBCGCKK22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n GINN: Fast GPU-TEE Based Integrity for Neural Network Training.\n \n \n \n \n\n\n \n Asvadishirehjini, A.; Kantarcioglu, M.; and Malin, B. A.\n\n\n \n\n\n\n In Joshi, A.; Fernández, M.; and Verma, R. M., editor(s), CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022, pages 4–15, 2022. ACM\n \n\n\n\n
\n\n\n\n \n \n \"GINN:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/codaspy/Asvadishirehjini22,\n  author       = {Aref Asvadishirehjini and\n                  Murat Kantarcioglu and\n                  Bradley A. Malin},\n  editor       = {Anupam Joshi and\n                  Maribel Fern{\\'{a}}ndez and\n                  Rakesh M. Verma},\n  title        = {{GINN:} Fast {GPU-TEE} Based Integrity for Neural Network Training},\n  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security\n                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},\n  pages        = {4--15},\n  publisher    = {{ACM}},\n  year         = {2022},\n  url          = {https://doi.org/10.1145/3508398.3511503},\n  doi          = {10.1145/3508398.3511503},\n  timestamp    = {Wed, 20 Apr 2022 12:17:48 +0200},\n  biburl       = {https://dblp.org/rec/conf/codaspy/Asvadishirehjini22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Enforcement of Laws and Privacy Preferences in Modern Computing Systems.\n \n \n \n \n\n\n \n Kantarcioglu, M.; Carminati, B.; Samtani, S.; Mittal, S.; and Gupta, M.\n\n\n \n\n\n\n In Joshi, A.; Fernández, M.; and Verma, R. M., editor(s), CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022, pages 338–339, 2022. ACM\n \n\n\n\n
\n\n\n\n \n \n \"EnforcementPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/codaspy/KantarciogluCSM22,\n  author       = {Murat Kantarcioglu and\n                  Barbara Carminati and\n                  Sagar Samtani and\n                  Sudip Mittal and\n                  Maanak Gupta},\n  editor       = {Anupam Joshi and\n                  Maribel Fern{\\'{a}}ndez and\n                  Rakesh M. Verma},\n  title        = {Enforcement of Laws and Privacy Preferences in Modern Computing Systems},\n  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security\n                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},\n  pages        = {338--339},\n  publisher    = {{ACM}},\n  year         = {2022},\n  url          = {https://doi.org/10.1145/3508398.3519315},\n  doi          = {10.1145/3508398.3519315},\n  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/codaspy/KantarciogluCSM22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Reduction Algorithms for Persistence Diagrams of Networks: CoralTDA and PrunIT.\n \n \n \n \n\n\n \n Akcora, C. G.; Kantarcioglu, M.; Gel, Y. R.; and Coskunuzer, B.\n\n\n \n\n\n\n In Koyejo, S.; Mohamed, S.; Agarwal, A.; Belgrave, D.; Cho, K.; and Oh, A., editor(s), Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"ReductionPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/nips/AkcoraKGC22,\n  author       = {Cuneyt Gurcan Akcora and\n                  Murat Kantarcioglu and\n                  Yulia R. Gel and\n                  Baris Coskunuzer},\n  editor       = {Sanmi Koyejo and\n                  S. Mohamed and\n                  A. Agarwal and\n                  Danielle Belgrave and\n                  K. Cho and\n                  A. Oh},\n  title        = {Reduction Algorithms for Persistence Diagrams of Networks: CoralTDA\n                  and PrunIT},\n  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference\n                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,\n                  LA, USA, November 28 - December 9, 2022},\n  year         = {2022},\n  url          = {http://papers.nips.cc/paper\\_files/paper/2022/hash/9f81a6e7081497b2d458689a4ce39fc7-Abstract-Conference.html},\n  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/nips/AkcoraKGC22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Chartalist: Labeled Graph Datasets for UTXO and Account-based Blockchains.\n \n \n \n \n\n\n \n Shamsi, K.; Victor, F.; Kantarcioglu, M.; Gel, Y. R.; and Akcora, C. G.\n\n\n \n\n\n\n In Koyejo, S.; Mohamed, S.; Agarwal, A.; Belgrave, D.; Cho, K.; and Oh, A., editor(s), Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"Chartalist:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/nips/ShamsiVKGA22,\n  author       = {Kiarash Shamsi and\n                  Friedhelm Victor and\n                  Murat Kantarcioglu and\n                  Yulia R. Gel and\n                  Cuneyt Gurcan Akcora},\n  editor       = {Sanmi Koyejo and\n                  S. Mohamed and\n                  A. Agarwal and\n                  Danielle Belgrave and\n                  K. Cho and\n                  A. Oh},\n  title        = {Chartalist: Labeled Graph Datasets for {UTXO} and Account-based Blockchains},\n  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference\n                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,\n                  LA, USA, November 28 - December 9, 2022},\n  year         = {2022},\n  url          = {http://papers.nips.cc/paper\\_files/paper/2022/hash/e245189a86310b6667ac633dbb922d50-Abstract-Datasets\\_and\\_Benchmarks.html},\n  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/nips/ShamsiVKGA22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n How Adversarial Assumptions Influence Re-identification Risk Measures: A COVID-19 Case Study.\n \n \n \n \n\n\n \n Zhang, X.; Wan, Z.; Yan, C.; Brown, J. T.; Xia, W.; Gkoulalas-Divanis, A.; Kantarcioglu, M.; and Malin, B. A.\n\n\n \n\n\n\n In Domingo-Ferrer, J.; and Laurent, M., editor(s), Privacy in Statistical Databases - International Conference, PSD 2022, Paris, France, September 21-23, 2022, Proceedings, volume 13463, of Lecture Notes in Computer Science, pages 361–374, 2022. Springer\n \n\n\n\n
\n\n\n\n \n \n \"HowPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/psd/ZhangWYBXGKM22,\n  author       = {Xinmeng Zhang and\n                  Zhiyu Wan and\n                  Chao Yan and\n                  J. Thomas Brown and\n                  Weiyi Xia and\n                  Aris Gkoulalas{-}Divanis and\n                  Murat Kantarcioglu and\n                  Bradley A. Malin},\n  editor       = {Josep Domingo{-}Ferrer and\n                  Maryline Laurent},\n  title        = {How Adversarial Assumptions Influence Re-identification Risk Measures:\n                  {A} {COVID-19} Case Study},\n  booktitle    = {Privacy in Statistical Databases - International Conference, {PSD}\n                  2022, Paris, France, September 21-23, 2022, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {13463},\n  pages        = {361--374},\n  publisher    = {Springer},\n  year         = {2022},\n  url          = {https://doi.org/10.1007/978-3-031-13945-1\\_25},\n  doi          = {10.1007/978-3-031-13945-1\\_25},\n  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/psd/ZhangWYBXGKM22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Reduction Algorithms for Persistence Diagrams of Networks: CoralTDA and PrunIT.\n \n \n \n \n\n\n \n Akcora, C. G.; Kantarcioglu, M.; Gel, Y. R.; and Coskunuzer, B.\n\n\n \n\n\n\n CoRR, abs/2211.13708. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"ReductionPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2211-13708,\n  author       = {Cuneyt Gurcan Akcora and\n                  Murat Kantarcioglu and\n                  Yulia R. Gel and\n                  Baris Coskunuzer},\n  title        = {Reduction Algorithms for Persistence Diagrams of Networks: CoralTDA\n                  and PrunIT},\n  journal      = {CoRR},\n  volume       = {abs/2211.13708},\n  year         = {2022},\n  url          = {https://doi.org/10.48550/arXiv.2211.13708},\n  doi          = {10.48550/ARXIV.2211.13708},\n  eprinttype    = {arXiv},\n  eprint       = {2211.13708},\n  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-13708.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (26)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Robust Transparency Against Model Inversion Attacks.\n \n \n \n \n\n\n \n Alufaisan, Y.; Kantarcioglu, M.; and Zhou, Y.\n\n\n \n\n\n\n IEEE Trans. Dependable Secur. Comput., 18(5): 2061–2073. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"RobustPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tdsc/AlufaisanKZ21,\n  author       = {Yasmeen Alufaisan and\n                  Murat Kantarcioglu and\n                  Yan Zhou},\n  title        = {Robust Transparency Against Model Inversion Attacks},\n  journal      = {{IEEE} Trans. Dependable Secur. Comput.},\n  volume       = {18},\n  number       = {5},\n  pages        = {2061--2073},\n  year         = {2021},\n  url          = {https://doi.org/10.1109/TDSC.2020.3019508},\n  doi          = {10.1109/TDSC.2020.3019508},\n  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tdsc/AlufaisanKZ21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Modern Privacy-Preserving Record Linkage Techniques: An Overview.\n \n \n \n \n\n\n \n Gkoulalas-Divanis, A.; Vatsalan, D.; Karapiperis, D.; and Kantarcioglu, M.\n\n\n \n\n\n\n IEEE Trans. Inf. Forensics Secur., 16: 4966–4987. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"ModernPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tifs/Gkoulalas-Divanis21,\n  author       = {Aris Gkoulalas{-}Divanis and\n                  Dinusha Vatsalan and\n                  Dimitrios Karapiperis and\n                  Murat Kantarcioglu},\n  title        = {Modern Privacy-Preserving Record Linkage Techniques: An Overview},\n  journal      = {{IEEE} Trans. Inf. Forensics Secur.},\n  volume       = {16},\n  pages        = {4966--4987},\n  year         = {2021},\n  url          = {https://doi.org/10.1109/TIFS.2021.3114026},\n  doi          = {10.1109/TIFS.2021.3114026},\n  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/tifs/Gkoulalas-Divanis21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n GraphBoot: Quantifying Uncertainty in Node Feature Learning on Large Networks.\n \n \n \n \n\n\n \n Akcora, C. G.; Gel, Y. R.; Kantarcioglu, M.; Lyubchich, V.; and Thuraisingham, B.\n\n\n \n\n\n\n IEEE Trans. Knowl. Data Eng., 33(1): 116–127. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"GraphBoot:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tkde/AkcoraGKLT21,\n  author       = {Cuneyt Gurcan Akcora and\n                  Yulia R. Gel and\n                  Murat Kantarcioglu and\n                  Vyacheslav Lyubchich and\n                  Bhavani Thuraisingham},\n  title        = {GraphBoot: Quantifying Uncertainty in Node Feature Learning on Large\n                  Networks},\n  journal      = {{IEEE} Trans. Knowl. Data Eng.},\n  volume       = {33},\n  number       = {1},\n  pages        = {116--127},\n  year         = {2021},\n  url          = {https://doi.org/10.1109/TKDE.2019.2925355},\n  doi          = {10.1109/TKDE.2019.2925355},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tkde/AkcoraGKLT21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems.\n \n \n \n \n\n\n \n Samtani, S.; Kantarcioglu, M.; and Chen, H.\n\n\n \n\n\n\n ACM Trans. Manag. Inf. Syst., 12(1): 1:1–1:18. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tmis/SamtaniKC21,\n  author       = {Sagar Samtani and\n                  Murat Kantarcioglu and\n                  Hsinchun Chen},\n  title        = {A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled\n                  Privacy Analytics: Connecting Data, Algorithms, and Systems},\n  journal      = {{ACM} Trans. Manag. Inf. Syst.},\n  volume       = {12},\n  number       = {1},\n  pages        = {1:1--1:18},\n  year         = {2021},\n  url          = {https://doi.org/10.1145/3447507},\n  doi          = {10.1145/3447507},\n  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/tmis/SamtaniKC21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Does Explainable Artificial Intelligence Improve Human Decision-Making?.\n \n \n \n \n\n\n \n Alufaisan, Y.; Marusich, L. R.; Bakdash, J. Z.; Zhou, Y.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Thirty-Fifth AAAI Conference on Artificial Intelligence, AAAI 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, IAAI 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, EAAI 2021, Virtual Event, February 2-9, 2021, pages 6618–6626, 2021. AAAI Press\n \n\n\n\n
\n\n\n\n \n \n \"DoesPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/aaai/AlufaisanMB0K21,\n  author       = {Yasmeen Alufaisan and\n                  Laura R. Marusich and\n                  Jonathan Z. Bakdash and\n                  Yan Zhou and\n                  Murat Kantarcioglu},\n  title        = {Does Explainable Artificial Intelligence Improve Human Decision-Making?},\n  booktitle    = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI}\n                  2021, Thirty-Third Conference on Innovative Applications of Artificial\n                  Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances\n                  in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9,\n                  2021},\n  pages        = {6618--6626},\n  publisher    = {{AAAI} Press},\n  year         = {2021},\n  url          = {https://doi.org/10.1609/aaai.v35i8.16819},\n  doi          = {10.1609/AAAI.V35I8.16819},\n  timestamp    = {Mon, 04 Sep 2023 12:29:24 +0200},\n  biburl       = {https://dblp.org/rec/conf/aaai/AlufaisanMB0K21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Defending against Backdoors in Federated Learning with Robust Learning Rate.\n \n \n \n \n\n\n \n Özdayi, M. S.; Kantarcioglu, M.; and Gel, Y. R.\n\n\n \n\n\n\n In Thirty-Fifth AAAI Conference on Artificial Intelligence, AAAI 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, IAAI 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, EAAI 2021, Virtual Event, February 2-9, 2021, pages 9268–9276, 2021. AAAI Press\n \n\n\n\n
\n\n\n\n \n \n \"DefendingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/aaai/OzdayiKG21,\n  author       = {Mustafa Safa {\\"{O}}zdayi and\n                  Murat Kantarcioglu and\n                  Yulia R. Gel},\n  title        = {Defending against Backdoors in Federated Learning with Robust Learning\n                  Rate},\n  booktitle    = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI}\n                  2021, Thirty-Third Conference on Innovative Applications of Artificial\n                  Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances\n                  in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9,\n                  2021},\n  pages        = {9268--9276},\n  publisher    = {{AAAI} Press},\n  year         = {2021},\n  url          = {https://doi.org/10.1609/aaai.v35i10.17118},\n  doi          = {10.1609/AAAI.V35I10.17118},\n  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/aaai/OzdayiKG21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n De-identifying Socioeconomic Data at the Census Tract Level for Medical Research Through Constraint-based Clustering.\n \n \n \n \n\n\n \n Liu, Y.; Conway, D.; Wan, Z.; Kantarcioglu, M.; Vorobeychik, Y.; and Malin, B. A.\n\n\n \n\n\n\n In AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021 - November 3, 2021, 2021. AMIA\n \n\n\n\n
\n\n\n\n \n \n \"De-identifyingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/amia/LiuCWKVM21,\n  author       = {Yongtai Liu and\n                  Douglas Conway and\n                  Zhiyu Wan and\n                  Murat Kantarcioglu and\n                  Yevgeniy Vorobeychik and\n                  Bradley A. Malin},\n  title        = {De-identifying Socioeconomic Data at the Census Tract Level for Medical\n                  Research Through Constraint-based Clustering},\n  booktitle    = {{AMIA} 2021, American Medical Informatics Association Annual Symposium,\n                  San Diego, CA, USA, October 30, 2021 - November 3, 2021},\n  publisher    = {{AMIA}},\n  year         = {2021},\n  url          = {https://knowledge.amia.org/74229-amia-1.4622266/t003-1.4626466/t003-1.4626467/3573496-1.4626621/3577633-1.4626618},\n  timestamp    = {Wed, 17 Apr 2024 11:46:53 +0200},\n  biburl       = {https://dblp.org/rec/conf/amia/LiuCWKVM21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SECAUCTEE: Securing Auction Smart Contracts using Trusted Execution Environments.\n \n \n \n \n\n\n \n Desai, H.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Xiang, Y.; Wang, Z.; Wang, H.; and Niemi, V., editor(s), 2021 IEEE International Conference on Blockchain, Blockchain 2021, Melbourne, Australia, December 6-8, 2021, pages 448–455, 2021. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SECAUCTEE:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/blockchain2/DesaiK21,\n  author       = {Harsh Desai and\n                  Murat Kantarcioglu},\n  editor       = {Yang Xiang and\n                  Ziyuan Wang and\n                  Honggang Wang and\n                  Valtteri Niemi},\n  title        = {{SECAUCTEE:} Securing Auction Smart Contracts using Trusted Execution\n                  Environments},\n  booktitle    = {2021 {IEEE} International Conference on Blockchain, Blockchain 2021,\n                  Melbourne, Australia, December 6-8, 2021},\n  pages        = {448--455},\n  publisher    = {{IEEE}},\n  year         = {2021},\n  url          = {https://doi.org/10.1109/Blockchain53845.2021.00069},\n  doi          = {10.1109/BLOCKCHAIN53845.2021.00069},\n  timestamp    = {Mon, 31 Jan 2022 14:35:12 +0100},\n  biburl       = {https://dblp.org/rec/conf/blockchain2/DesaiK21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n BlockFLA: Accountable Federated Learning via Hybrid Blockchain Architecture.\n \n \n \n \n\n\n \n Desai, H. B.; Özdayi, M. S.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Joshi, A.; Carminati, B.; and Verma, R. M., editor(s), CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021, pages 101–112, 2021. ACM\n \n\n\n\n
\n\n\n\n \n \n \"BlockFLA:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/codaspy/DesaiOK21,\n  author       = {Harsh Bimal Desai and\n                  Mustafa Safa {\\"{O}}zdayi and\n                  Murat Kantarcioglu},\n  editor       = {Anupam Joshi and\n                  Barbara Carminati and\n                  Rakesh M. Verma},\n  title        = {BlockFLA: Accountable Federated Learning via Hybrid Blockchain Architecture},\n  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security\n                  and Privacy, Virtual Event, USA, April 26-28, 2021},\n  pages        = {101--112},\n  publisher    = {{ACM}},\n  year         = {2021},\n  url          = {https://doi.org/10.1145/3422337.3447837},\n  doi          = {10.1145/3422337.3447837},\n  timestamp    = {Wed, 21 Apr 2021 10:54:09 +0200},\n  biburl       = {https://dblp.org/rec/conf/codaspy/DesaiOK21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n AI for Security and Security for AI.\n \n \n \n \n\n\n \n Bertino, E.; Kantarcioglu, M.; Akcora, C. G.; Samtani, S.; Mittal, S.; and Gupta, M.\n\n\n \n\n\n\n In Joshi, A.; Carminati, B.; and Verma, R. M., editor(s), CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021, pages 333–334, 2021. ACM\n \n\n\n\n
\n\n\n\n \n \n \"AIPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/codaspy/BertinoKASMG21,\n  author       = {Elisa Bertino and\n                  Murat Kantarcioglu and\n                  Cuneyt Gurcan Akcora and\n                  Sagar Samtani and\n                  Sudip Mittal and\n                  Maanak Gupta},\n  editor       = {Anupam Joshi and\n                  Barbara Carminati and\n                  Rakesh M. Verma},\n  title        = {{AI} for Security and Security for {AI}},\n  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security\n                  and Privacy, Virtual Event, USA, April 26-28, 2021},\n  pages        = {333--334},\n  publisher    = {{ACM}},\n  year         = {2021},\n  url          = {https://doi.org/10.1145/3422337.3450357},\n  doi          = {10.1145/3422337.3450357},\n  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/codaspy/BertinoKASMG21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Learning Generative Deception Strategies in Combinatorial Masking Games.\n \n \n \n \n\n\n \n Wu, J.; Kamhoua, C. A.; Kantarcioglu, M.; and Vorobeychik, Y.\n\n\n \n\n\n\n In Bosanský, B.; Gonzalez, C.; Rass, S.; and Sinha, A., editor(s), Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings, volume 13061, of Lecture Notes in Computer Science, pages 98–117, 2021. Springer\n \n\n\n\n
\n\n\n\n \n \n \"LearningPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/gamesec/WuKKV21,\n  author       = {Junlin Wu and\n                  Charles A. Kamhoua and\n                  Murat Kantarcioglu and\n                  Yevgeniy Vorobeychik},\n  editor       = {Branislav Bosansk{\\'{y}} and\n                  Cleotilde Gonzalez and\n                  Stefan Rass and\n                  Arunesh Sinha},\n  title        = {Learning Generative Deception Strategies in Combinatorial Masking\n                  Games},\n  booktitle    = {Decision and Game Theory for Security - 12th International Conference,\n                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {13061},\n  pages        = {98--117},\n  publisher    = {Springer},\n  year         = {2021},\n  url          = {https://doi.org/10.1007/978-3-030-90370-1\\_6},\n  doi          = {10.1007/978-3-030-90370-1\\_6},\n  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/gamesec/WuKKV21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Alphacore: Data Depth based Core Decomposition.\n \n \n \n \n\n\n \n Victor, F.; Akcora, C. G.; Gel, Y. R.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Zhu, F.; Ooi, B. C.; and Miao, C., editor(s), KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Virtual Event, Singapore, August 14-18, 2021, pages 1625–1633, 2021. ACM\n \n\n\n\n
\n\n\n\n \n \n \"Alphacore:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/kdd/VictorAGK21,\n  author       = {Friedhelm Victor and\n                  Cuneyt Gurcan Akcora and\n                  Yulia R. Gel and\n                  Murat Kantarcioglu},\n  editor       = {Feida Zhu and\n                  Beng Chin Ooi and\n                  Chunyan Miao},\n  title        = {Alphacore: Data Depth based Core Decomposition},\n  booktitle    = {{KDD} '21: The 27th {ACM} {SIGKDD} Conference on Knowledge Discovery\n                  and Data Mining, Virtual Event, Singapore, August 14-18, 2021},\n  pages        = {1625--1633},\n  publisher    = {{ACM}},\n  year         = {2021},\n  url          = {https://doi.org/10.1145/3447548.3467322},\n  doi          = {10.1145/3447548.3467322},\n  timestamp    = {Mon, 16 Aug 2021 16:18:31 +0200},\n  biburl       = {https://dblp.org/rec/conf/kdd/VictorAGK21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Data Science on Blockchains.\n \n \n \n \n\n\n \n Akcora, C. G.; Kantarcioglu, M.; and Gel, Y. R.\n\n\n \n\n\n\n In Zhu, F.; Ooi, B. C.; and Miao, C., editor(s), KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Virtual Event, Singapore, August 14-18, 2021, pages 4025–4026, 2021. ACM\n \n\n\n\n
\n\n\n\n \n \n \"DataPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/kdd/AkcoraKG21,\n  author       = {Cuneyt Gurcan Akcora and\n                  Murat Kantarcioglu and\n                  Yulia R. Gel},\n  editor       = {Feida Zhu and\n                  Beng Chin Ooi and\n                  Chunyan Miao},\n  title        = {Data Science on Blockchains},\n  booktitle    = {{KDD} '21: The 27th {ACM} {SIGKDD} Conference on Knowledge Discovery\n                  and Data Mining, Virtual Event, Singapore, August 14-18, 2021},\n  pages        = {4025--4026},\n  publisher    = {{ACM}},\n  year         = {2021},\n  url          = {https://doi.org/10.1145/3447548.3470800},\n  doi          = {10.1145/3447548.3470800},\n  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/kdd/AkcoraKG21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks.\n \n \n \n \n\n\n \n Ofori-Boateng, D.; Segovia-Dominguez, I.; Akcora, C. G.; Kantarcioglu, M.; and Gel, Y. R.\n\n\n \n\n\n\n In Oliver, N.; Pérez-Cruz, F.; Kramer, S.; Read, J.; and Lozano, J. A., editor(s), Machine Learning and Knowledge Discovery in Databases. Research Track - European Conference, ECML PKDD 2021, Bilbao, Spain, September 13-17, 2021, Proceedings, Part I, volume 12975, of Lecture Notes in Computer Science, pages 788–804, 2021. Springer\n \n\n\n\n
\n\n\n\n \n \n \"TopologicalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pkdd/Ofori-BoatengSA21,\n  author       = {Dorcas Ofori{-}Boateng and\n                  Ignacio Segovia{-}Dominguez and\n                  Cuneyt Gurcan Akcora and\n                  Murat Kantarcioglu and\n                  Yulia R. Gel},\n  editor       = {Nuria Oliver and\n                  Fernando P{\\'{e}}rez{-}Cruz and\n                  Stefan Kramer and\n                  Jesse Read and\n                  Jos{\\'{e}} Antonio Lozano},\n  title        = {Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks},\n  booktitle    = {Machine Learning and Knowledge Discovery in Databases. Research Track\n                  - European Conference, {ECML} {PKDD} 2021, Bilbao, Spain, September\n                  13-17, 2021, Proceedings, Part {I}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {12975},\n  pages        = {788--804},\n  publisher    = {Springer},\n  year         = {2021},\n  url          = {https://doi.org/10.1007/978-3-030-86486-6\\_48},\n  doi          = {10.1007/978-3-030-86486-6\\_48},\n  timestamp    = {Wed, 28 Jun 2023 16:19:42 +0200},\n  biburl       = {https://dblp.org/rec/conf/pkdd/Ofori-BoatengSA21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The Impact of Data Distribution on Fairness and Robustness in Federated Learning.\n \n \n \n \n\n\n \n Özdayi, M. S.; and Kantarcioglu, M.\n\n\n \n\n\n\n In 3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2021, Atlanta, GA, USA, December 13-15, 2021, pages 191–196, 2021. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/tpsisa/OzdayiK21,\n  author       = {Mustafa Safa {\\"{O}}zdayi and\n                  Murat Kantarcioglu},\n  title        = {The Impact of Data Distribution on Fairness and Robustness in Federated\n                  Learning},\n  booktitle    = {3rd {IEEE} International Conference on Trust, Privacy and Security\n                  in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta,\n                  GA, USA, December 13-15, 2021},\n  pages        = {191--196},\n  publisher    = {{IEEE}},\n  year         = {2021},\n  url          = {https://doi.org/10.1109/TPSISA52974.2021.00022},\n  doi          = {10.1109/TPSISA52974.2021.00022},\n  timestamp    = {Thu, 21 Apr 2022 16:21:01 +0200},\n  biburl       = {https://dblp.org/rec/conf/tpsisa/OzdayiK21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Blockchain Networks: Data Structures of Bitcoin, Monero, Zcash, Ethereum, Ripple and Iota.\n \n \n \n \n\n\n \n Akcora, C. G.; Kantarcioglu, M.; and Gel, Y. R.\n\n\n \n\n\n\n CoRR, abs/2103.08712. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"BlockchainPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2103-08712,\n  author       = {Cuneyt Gurcan Akcora and\n                  Murat Kantarcioglu and\n                  Yulia R. Gel},\n  title        = {Blockchain Networks: Data Structures of Bitcoin, Monero, Zcash, Ethereum,\n                  Ripple and Iota},\n  journal      = {CoRR},\n  volume       = {abs/2103.08712},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2103.08712},\n  eprinttype    = {arXiv},\n  eprint       = {2103.08712},\n  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-08712.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Smart Vectorizations for Single and Multiparameter Persistence.\n \n \n \n \n\n\n \n Coskunuzer, B.; Akcora, C. G.; Segovia-Dominguez, I.; Zhen, Z.; Kantarcioglu, M.; and Gel, Y. R.\n\n\n \n\n\n\n CoRR, abs/2104.04787. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"SmartPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2104-04787,\n  author       = {Baris Coskunuzer and\n                  Cuneyt Gurcan Akcora and\n                  Ignacio Segovia{-}Dominguez and\n                  Zhiwei Zhen and\n                  Murat Kantarcioglu and\n                  Yulia R. Gel},\n  title        = {Smart Vectorizations for Single and Multiparameter Persistence},\n  journal      = {CoRR},\n  volume       = {abs/2104.04787},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2104.04787},\n  eprinttype    = {arXiv},\n  eprint       = {2104.04787},\n  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-04787.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Improving Fairness of AI Systems with Lossless De-biasing.\n \n \n \n \n\n\n \n Zhou, Y.; Kantarcioglu, M.; and Clifton, C.\n\n\n \n\n\n\n CoRR, abs/2105.04534. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"ImprovingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2105-04534,\n  author       = {Yan Zhou and\n                  Murat Kantarcioglu and\n                  Chris Clifton},\n  title        = {Improving Fairness of {AI} Systems with Lossless De-biasing},\n  journal      = {CoRR},\n  volume       = {abs/2105.04534},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2105.04534},\n  eprinttype    = {arXiv},\n  eprint       = {2105.04534},\n  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-04534.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks.\n \n \n \n \n\n\n \n Ofori-Boateng, D.; Segovia-Dominguez, I.; Kantarcioglu, M.; Akcora, C. G.; and Gel, Y. R.\n\n\n \n\n\n\n CoRR, abs/2106.01806. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"TopologicalPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2106-01806,\n  author       = {Dorcas Ofori{-}Boateng and\n                  Ignacio Segovia{-}Dominguez and\n                  Murat Kantarcioglu and\n                  Cuneyt Gurcan Akcora and\n                  Yulia R. Gel},\n  title        = {Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks},\n  journal      = {CoRR},\n  volume       = {abs/2106.01806},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2106.01806},\n  eprinttype    = {arXiv},\n  eprint       = {2106.01806},\n  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-01806.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n BiFair: Training Fair Models with Bilevel Optimization.\n \n \n \n \n\n\n \n Özdayi, M. S.; Kantarcioglu, M.; and Iyer, R.\n\n\n \n\n\n\n CoRR, abs/2106.04757. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"BiFair:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2106-04757,\n  author       = {Mustafa Safa {\\"{O}}zdayi and\n                  Murat Kantarcioglu and\n                  Rishabh Iyer},\n  title        = {BiFair: Training Fair Models with Bilevel Optimization},\n  journal      = {CoRR},\n  volume       = {abs/2106.04757},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2106.04757},\n  eprinttype    = {arXiv},\n  eprint       = {2106.04757},\n  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-04757.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SecureDL: Securing Code Execution and Access Control for Distributed Data Analytics Platforms.\n \n \n \n \n\n\n \n Shaon, F.; Rahaman, S.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/2106.13123. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"SecureDL:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2106-13123,\n  author       = {Fahad Shaon and\n                  Sazzadur Rahaman and\n                  Murat Kantarcioglu},\n  title        = {SecureDL: Securing Code Execution and Access Control for Distributed\n                  Data Analytics Platforms},\n  journal      = {CoRR},\n  volume       = {abs/2106.13123},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2106.13123},\n  eprinttype    = {arXiv},\n  eprint       = {2106.13123},\n  timestamp    = {Wed, 30 Jun 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-13123.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Dynamically Adjusting Case-Reporting Policy to Maximize Privacy and Utility in the Face of a Pandemic.\n \n \n \n \n\n\n \n Brown, J. T.; Yan, C.; Xia, W.; Yin, Z.; Wan, Z.; Gkoulalas-Divanis, A.; Kantarcioglu, M.; and Malin, B. A.\n\n\n \n\n\n\n CoRR, abs/2106.14649. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"DynamicallyPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2106-14649,\n  author       = {J. Thomas Brown and\n                  Chao Yan and\n                  Weiyi Xia and\n                  Zhijun Yin and\n                  Zhiyu Wan and\n                  Aris Gkoulalas{-}Divanis and\n                  Murat Kantarcioglu and\n                  Bradley A. Malin},\n  title        = {Dynamically Adjusting Case-Reporting Policy to Maximize Privacy and\n                  Utility in the Face of a Pandemic},\n  journal      = {CoRR},\n  volume       = {abs/2106.14649},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2106.14649},\n  eprinttype    = {arXiv},\n  eprint       = {2106.14649},\n  timestamp    = {Wed, 30 Jun 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-14649.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Learning Generative Deception Strategies in Combinatorial Masking Games.\n \n \n \n \n\n\n \n Wu, J.; Kamhoua, C. A.; Kantarcioglu, M.; and Vorobeychik, Y.\n\n\n \n\n\n\n CoRR, abs/2109.11637. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"LearningPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2109-11637,\n  author       = {Junlin Wu and\n                  Charles A. Kamhoua and\n                  Murat Kantarcioglu and\n                  Yevgeniy Vorobeychik},\n  title        = {Learning Generative Deception Strategies in Combinatorial Masking\n                  Games},\n  journal      = {CoRR},\n  volume       = {abs/2109.11637},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2109.11637},\n  eprinttype    = {arXiv},\n  eprint       = {2109.11637},\n  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-11637.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Multi-concept adversarial attacks.\n \n \n \n \n\n\n \n Belavadi, V.; Zhou, Y.; Kantarcioglu, M.; and Thuraisingham, B. M.\n\n\n \n\n\n\n CoRR, abs/2110.10287. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Multi-conceptPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2110-10287,\n  author       = {Vibha Belavadi and\n                  Yan Zhou and\n                  Murat Kantarcioglu and\n                  Bhavani M. Thuraisingham},\n  title        = {Multi-concept adversarial attacks},\n  journal      = {CoRR},\n  volume       = {abs/2110.10287},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2110.10287},\n  eprinttype    = {arXiv},\n  eprint       = {2110.10287},\n  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-10287.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The Impact of Data Distribution on Fairness and Robustness in Federated Learning.\n \n \n \n \n\n\n \n Özdayi, M. S.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/2112.01274. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2112-01274,\n  author       = {Mustafa Safa {\\"{O}}zdayi and\n                  Murat Kantarcioglu},\n  title        = {The Impact of Data Distribution on Fairness and Robustness in Federated\n                  Learning},\n  journal      = {CoRR},\n  volume       = {abs/2112.01274},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2112.01274},\n  eprinttype    = {arXiv},\n  eprint       = {2112.01274},\n  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-01274.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n HOLMES: A Platform for Detecting Malicious Inputs in Secure Collaborative Computation.\n \n \n \n \n\n\n \n Chen, W.; Sotiraki, K.; Chang, I.; Kantarcioglu, M.; and Popa, R. A.\n\n\n \n\n\n\n IACR Cryptol. ePrint Arch.,1517. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"HOLMES:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/ChenSCKP21,\n  author       = {Weikeng Chen and\n                  Katerina Sotiraki and\n                  Ian Chang and\n                  Murat Kantarcioglu and\n                  Raluca Ada Popa},\n  title        = {{HOLMES:} {A} Platform for Detecting Malicious Inputs in Secure Collaborative\n                  Computation},\n  journal      = {{IACR} Cryptol. ePrint Arch.},\n  pages        = {1517},\n  year         = {2021},\n  url          = {https://eprint.iacr.org/2021/1517},\n  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/iacr/ChenSCKP21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (18)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Secure IoT Data Analytics in Cloud via Intel SGX.\n \n \n \n \n\n\n \n Islam, M. S.; Özdayi, M. S.; Khan, L.; and Kantarcioglu, M.\n\n\n \n\n\n\n In 13th IEEE International Conference on Cloud Computing, CLOUD 2020, Virtual Event, 18-24 October 2020, pages 43–52, 2020. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/IEEEcloud/IslamOKK20,\n  author       = {Md Shihabul Islam and\n                  Mustafa Safa {\\"{O}}zdayi and\n                  Latifur Khan and\n                  Murat Kantarcioglu},\n  title        = {Secure IoT Data Analytics in Cloud via Intel {SGX}},\n  booktitle    = {13th {IEEE} International Conference on Cloud Computing, {CLOUD} 2020,\n                  Virtual Event, 18-24 October 2020},\n  pages        = {43--52},\n  publisher    = {{IEEE}},\n  year         = {2020},\n  url          = {https://doi.org/10.1109/CLOUD49709.2020.00020},\n  doi          = {10.1109/CLOUD49709.2020.00020},\n  timestamp    = {Fri, 15 Jan 2021 13:20:47 +0100},\n  biburl       = {https://dblp.org/rec/conf/IEEEcloud/IslamOKK20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Deployment-quality and Accessible Solutions for Cryptography Code Development.\n \n \n \n \n\n\n \n Rahaman, S.; Xiao, Y.; Afrose, S.; Tian, K.; Frantz, M.; Meng, N.; Miller, B. P.; Shaon, F.; Kantarcioglu, M.; and Yao, D. (.\n\n\n \n\n\n\n In Roussev, V.; Thuraisingham, B.; Carminati, B.; and Kantarcioglu, M., editor(s), CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020, pages 174–176, 2020. ACM\n \n\n\n\n
\n\n\n\n \n \n \"Deployment-qualityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/codaspy/RahamanXATFMMSK20,\n  author       = {Sazzadur Rahaman and\n                  Ya Xiao and\n                  Sharmin Afrose and\n                  Ke Tian and\n                  Miles Frantz and\n                  Na Meng and\n                  Barton P. Miller and\n                  Fahad Shaon and\n                  Murat Kantarcioglu and\n                  Danfeng (Daphne) Yao},\n  editor       = {Vassil Roussev and\n                  Bhavani Thuraisingham and\n                  Barbara Carminati and\n                  Murat Kantarcioglu},\n  title        = {Deployment-quality and Accessible Solutions for Cryptography Code\n                  Development},\n  booktitle    = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security\n                  and Privacy, New Orleans, LA, USA, March 16-18, 2020},\n  pages        = {174--176},\n  publisher    = {{ACM}},\n  year         = {2020},\n  url          = {https://doi.org/10.1145/3374664.3379536},\n  doi          = {10.1145/3374664.3379536},\n  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},\n  biburl       = {https://dblp.org/rec/conf/codaspy/RahamanXATFMMSK20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SGX-IR: Secure Information Retrieval with Trusted Processors.\n \n \n \n \n\n\n \n Shaon, F.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Singhal, A.; and Vaidya, J., editor(s), Data and Applications Security and Privacy XXXIV - 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings, volume 12122, of Lecture Notes in Computer Science, pages 367–387, 2020. Springer\n \n\n\n\n
\n\n\n\n \n \n \"SGX-IR:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dbsec/ShaonK20,\n  author       = {Fahad Shaon and\n                  Murat Kantarcioglu},\n  editor       = {Anoop Singhal and\n                  Jaideep Vaidya},\n  title        = {{SGX-IR:} Secure Information Retrieval with Trusted Processors},\n  booktitle    = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP}\n                  {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26,\n                  2020, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {12122},\n  pages        = {367--387},\n  publisher    = {Springer},\n  year         = {2020},\n  url          = {https://doi.org/10.1007/978-3-030-49669-2\\_21},\n  doi          = {10.1007/978-3-030-49669-2\\_21},\n  timestamp    = {Thu, 18 Jun 2020 13:44:27 +0200},\n  biburl       = {https://dblp.org/rec/conf/dbsec/ShaonK20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Attacking Machine Learning Models for Social Good.\n \n \n \n \n\n\n \n Belavadi, V.; Zhou, Y.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Zhu, Q.; Baras, J. S.; Poovendran, R.; and Chen, J., editor(s), Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings, volume 12513, of Lecture Notes in Computer Science, pages 457–471, 2020. Springer\n \n\n\n\n
\n\n\n\n \n \n \"AttackingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/gamesec/BelavadiZKT20,\n  author       = {Vibha Belavadi and\n                  Yan Zhou and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Quanyan Zhu and\n                  John S. Baras and\n                  Radha Poovendran and\n                  Juntao Chen},\n  title        = {Attacking Machine Learning Models for Social Good},\n  booktitle    = {Decision and Game Theory for Security - 11th International Conference,\n                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {12513},\n  pages        = {457--471},\n  publisher    = {Springer},\n  year         = {2020},\n  url          = {https://doi.org/10.1007/978-3-030-64793-3\\_25},\n  doi          = {10.1007/978-3-030-64793-3\\_25},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/gamesec/BelavadiZKT20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n BitcoinHeist: Topological Data Analysis for Ransomware Prediction on the Bitcoin Blockchain.\n \n \n \n \n\n\n \n Akcora, C. G.; Li, Y.; Gel, Y. R.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Bessiere, C., editor(s), Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, IJCAI 2020, pages 4439–4445, 2020. ijcai.org\n \n\n\n\n
\n\n\n\n \n \n \"BitcoinHeist:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ijcai/AkcoraLGK20,\n  author       = {Cuneyt Gurcan Akcora and\n                  Yitao Li and\n                  Yulia R. Gel and\n                  Murat Kantarcioglu},\n  editor       = {Christian Bessiere},\n  title        = {BitcoinHeist: Topological Data Analysis for Ransomware Prediction\n                  on the Bitcoin Blockchain},\n  booktitle    = {Proceedings of the Twenty-Ninth International Joint Conference on\n                  Artificial Intelligence, {IJCAI} 2020},\n  pages        = {4439--4445},\n  publisher    = {ijcai.org},\n  year         = {2020},\n  url          = {https://doi.org/10.24963/ijcai.2020/612},\n  doi          = {10.24963/IJCAI.2020/612},\n  timestamp    = {Mon, 20 Jul 2020 12:38:52 +0200},\n  biburl       = {https://dblp.org/rec/conf/ijcai/AkcoraLGK20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Adversarial Classification Under Differential Privacy.\n \n \n \n \n\n\n \n Giraldo, J.; Cárdenas, A. A.; Kantarcioglu, M.; and Katz, J.\n\n\n \n\n\n\n In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020, 2020. The Internet Society\n \n\n\n\n
\n\n\n\n \n \n \"AdversarialPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ndss/GiraldoCKK20,\n  author       = {Jairo Giraldo and\n                  Alvaro A. C{\\'{a}}rdenas and\n                  Murat Kantarcioglu and\n                  Jonathan Katz},\n  title        = {Adversarial Classification Under Differential Privacy},\n  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}\n                  2020, San Diego, California, USA, February 23-26, 2020},\n  publisher    = {The Internet Society},\n  year         = {2020},\n  url          = {https://www.ndss-symposium.org/ndss-paper/adversarial-classification-under-differential-privacy/},\n  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},\n  biburl       = {https://dblp.org/rec/conf/ndss/GiraldoCKK20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Dissecting Ethereum Blockchain Analytics: What We Learn from Topology and Geometry of the Ethereum Graph?.\n \n \n \n \n\n\n \n Li, Y.; Islambekov, U.; Akcora, C. G.; Smirnova, E.; Gel, Y. R.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Demeniconi, C.; and Chawla, N. V., editor(s), Proceedings of the 2020 SIAM International Conference on Data Mining, SDM 2020, Cincinnati, Ohio, USA, May 7-9, 2020, pages 523–531, 2020. SIAM\n \n\n\n\n
\n\n\n\n \n \n \"DissectingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sdm/LiIASGK20,\n  author       = {Yitao Li and\n                  Umar Islambekov and\n                  Cuneyt Gurcan Akcora and\n                  Ekaterina Smirnova and\n                  Yulia R. Gel and\n                  Murat Kantarcioglu},\n  editor       = {Carlotta Demeniconi and\n                  Nitesh V. Chawla},\n  title        = {Dissecting Ethereum Blockchain Analytics: What We Learn from Topology\n                  and Geometry of the Ethereum Graph?},\n  booktitle    = {Proceedings of the 2020 {SIAM} International Conference on Data Mining,\n                  {SDM} 2020, Cincinnati, Ohio, USA, May 7-9, 2020},\n  pages        = {523--531},\n  publisher    = {{SIAM}},\n  year         = {2020},\n  url          = {https://doi.org/10.1137/1.9781611976236.59},\n  doi          = {10.1137/1.9781611976236.59},\n  timestamp    = {Mon, 20 Jul 2020 11:23:45 +0200},\n  biburl       = {https://dblp.org/rec/conf/sdm/LiIASGK20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n MultiModal Deception Detection: Accuracy, Applicability and Generalizability.\n \n \n \n \n\n\n \n Belavadi, V.; Zhou, Y.; Bakdash, J. Z.; Kantarcioglu, M.; Krawczyk, D. C.; Nguyen, L.; Rakic, J.; and Thuraisingham, B.\n\n\n \n\n\n\n In Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020, Atlanta, GA, USA, October 28-31, 2020, pages 99–106, 2020. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"MultiModalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/tpsisa/BelavadiZBKKNRT20,\n  author       = {Vibha Belavadi and\n                  Yan Zhou and\n                  Jonathan Z. Bakdash and\n                  Murat Kantarcioglu and\n                  Daniel C. Krawczyk and\n                  Linda Nguyen and\n                  Jelena Rakic and\n                  Bhavani Thuraisingham},\n  title        = {MultiModal Deception Detection: Accuracy, Applicability and Generalizability},\n  booktitle    = {Second {IEEE} International Conference on Trust, Privacy and Security\n                  in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta,\n                  GA, USA, October 28-31, 2020},\n  pages        = {99--106},\n  publisher    = {{IEEE}},\n  year         = {2020},\n  url          = {https://doi.org/10.1109/TPS-ISA50397.2020.00023},\n  doi          = {10.1109/TPS-ISA50397.2020.00023},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/tpsisa/BelavadiZBKKNRT20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted Execution Environments.\n \n \n \n \n\n\n \n Asvadishirehjini, A.; Kantarcioglu, M.; and Malin, B. A.\n\n\n \n\n\n\n In Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020, Atlanta, GA, USA, October 28-31, 2020, pages 138–147, 2020. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/tpsisa/Asvadishirehjini20,\n  author       = {Aref Asvadishirehjini and\n                  Murat Kantarcioglu and\n                  Bradley A. Malin},\n  title        = {A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted\n                  Execution Environments},\n  booktitle    = {Second {IEEE} International Conference on Trust, Privacy and Security\n                  in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta,\n                  GA, USA, October 28-31, 2020},\n  pages        = {138--147},\n  publisher    = {{IEEE}},\n  year         = {2020},\n  url          = {https://doi.org/10.1109/TPS-ISA50397.2020.00028},\n  doi          = {10.1109/TPS-ISA50397.2020.00028},\n  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/tpsisa/Asvadishirehjini20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020.\n \n \n \n \n\n\n \n Roussev, V.; Thuraisingham, B.; Carminati, B.; and Kantarcioglu, M.,\n editors.\n \n\n\n \n\n\n\n ACM. 2020.\n Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020.\n\n\n\n
\n\n\n\n \n \n \"CODASPYPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@proceedings{DBLP:conf/codaspy/2020,\n  editor       = {Vassil Roussev and\n                  Bhavani Thuraisingham and\n                  Barbara Carminati and\n                  Murat Kantarcioglu},\n  title        = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security\n                  and Privacy, New Orleans, LA, USA, March 16-18, 2020},\n  publisher    = {{ACM}},\n  year         = {2020},\n  note      = {Due to the escalation of the {COVID-19} situation around the world,\n                  CODASPY'20 was postponed to early fall 2020.},\n  url          = {https://doi.org/10.1145/3374664},\n  doi          = {10.1145/3374664},\n  isbn         = {978-1-4503-7107-0},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/codaspy/2020.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Leveraging Blockchain for Immutable Logging and Querying Across Multiple Sites.\n \n \n \n \n\n\n \n Özdayi, M. S.; Kantarcioglu, M.; and Malin, B. A.\n\n\n \n\n\n\n CoRR, abs/2001.08529. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"LeveragingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2001-08529,\n  author       = {Mustafa Safa {\\"{O}}zdayi and\n                  Murat Kantarcioglu and\n                  Bradley A. Malin},\n  title        = {Leveraging Blockchain for Immutable Logging and Querying Across Multiple\n                  Sites},\n  journal      = {CoRR},\n  volume       = {abs/2001.08529},\n  year         = {2020},\n  url          = {https://arxiv.org/abs/2001.08529},\n  eprinttype    = {arXiv},\n  eprint       = {2001.08529},\n  timestamp    = {Fri, 24 Jan 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-08529.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Does Explainable Artificial Intelligence Improve Human Decision-Making?.\n \n \n \n \n\n\n \n Alufaisan, Y.; Marusich, L. R.; Bakdash, J. Z.; Zhou, Y.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/2006.11194. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"DoesPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2006-11194,\n  author       = {Yasmeen Alufaisan and\n                  Laura R. Marusich and\n                  Jonathan Z. Bakdash and\n                  Yan Zhou and\n                  Murat Kantarcioglu},\n  title        = {Does Explainable Artificial Intelligence Improve Human Decision-Making?},\n  journal      = {CoRR},\n  volume       = {abs/2006.11194},\n  year         = {2020},\n  url          = {https://arxiv.org/abs/2006.11194},\n  eprinttype    = {arXiv},\n  eprint       = {2006.11194},\n  timestamp    = {Tue, 23 Jun 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-11194.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Defending Against Backdoors in Federated Learning with Robust Learning Rate.\n \n \n \n \n\n\n \n Özdayi, M. S.; Kantarcioglu, M.; and Gel, Y. R.\n\n\n \n\n\n\n CoRR, abs/2007.03767. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"DefendingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2007-03767,\n  author       = {Mustafa Safa {\\"{O}}zdayi and\n                  Murat Kantarcioglu and\n                  Yulia R. Gel},\n  title        = {Defending Against Backdoors in Federated Learning with Robust Learning\n                  Rate},\n  journal      = {CoRR},\n  volume       = {abs/2007.03767},\n  year         = {2020},\n  url          = {https://arxiv.org/abs/2007.03767},\n  eprinttype    = {arXiv},\n  eprint       = {2007.03767},\n  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-03767.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure IoT Data Analytics in Cloud via Intel SGX.\n \n \n \n \n\n\n \n Islam, M. S.; Özdayi, M. S.; Khan, L.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/2008.05286. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2008-05286,\n  author       = {Md Shihabul Islam and\n                  Mustafa Safa {\\"{O}}zdayi and\n                  Latifur Khan and\n                  Murat Kantarcioglu},\n  title        = {Secure IoT Data Analytics in Cloud via Intel {SGX}},\n  journal      = {CoRR},\n  volume       = {abs/2008.05286},\n  year         = {2020},\n  url          = {https://arxiv.org/abs/2008.05286},\n  eprinttype    = {arXiv},\n  eprint       = {2008.05286},\n  timestamp    = {Mon, 17 Aug 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-05286.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n BlockFLA: Accountable Federated Learning via Hybrid Blockchain Architecture.\n \n \n \n \n\n\n \n Desai, H. B.; Özdayi, M. S.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/2010.07427. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"BlockFLA:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2010-07427,\n  author       = {Harsh Bimal Desai and\n                  Mustafa Safa {\\"{O}}zdayi and\n                  Murat Kantarcioglu},\n  title        = {BlockFLA: Accountable Federated Learning via Hybrid Blockchain Architecture},\n  journal      = {CoRR},\n  volume       = {abs/2010.07427},\n  year         = {2020},\n  url          = {https://arxiv.org/abs/2010.07427},\n  eprinttype    = {arXiv},\n  eprint       = {2010.07427},\n  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-07427.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n GOAT: GPU Outsourcing of Deep Learning Training With Asynchronous Probabilistic Integrity Verification Inside Trusted Execution Environment.\n \n \n \n \n\n\n \n Asvadishirehjini, A.; Kantarcioglu, M.; and Malin, B. A.\n\n\n \n\n\n\n CoRR, abs/2010.08855. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"GOAT:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2010-08855,\n  author       = {Aref Asvadishirehjini and\n                  Murat Kantarcioglu and\n                  Bradley A. Malin},\n  title        = {{GOAT:} {GPU} Outsourcing of Deep Learning Training With Asynchronous\n                  Probabilistic Integrity Verification Inside Trusted Execution Environment},\n  journal      = {CoRR},\n  volume       = {abs/2010.08855},\n  year         = {2020},\n  url          = {https://arxiv.org/abs/2010.08855},\n  eprinttype    = {arXiv},\n  eprint       = {2010.08855},\n  timestamp    = {Wed, 21 Oct 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-08855.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n How to Not Get Caught When You Launder Money on Blockchain?.\n \n \n \n \n\n\n \n Akcora, C. G.; Purusotham, S.; Gel, Y. R.; Krawiec-Thayer, M.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/2010.15082. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"HowPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2010-15082,\n  author       = {Cuneyt Gurcan Akcora and\n                  Sudhanva Purusotham and\n                  Yulia R. Gel and\n                  Mitchell Krawiec{-}Thayer and\n                  Murat Kantarcioglu},\n  title        = {How to Not Get Caught When You Launder Money on Blockchain?},\n  journal      = {CoRR},\n  volume       = {abs/2010.15082},\n  year         = {2020},\n  url          = {https://arxiv.org/abs/2010.15082},\n  eprinttype    = {arXiv},\n  eprint       = {2010.15082},\n  timestamp    = {Tue, 03 Nov 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-15082.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Improving Accuracy of Federated Learning in Non-IID Settings.\n \n \n \n \n\n\n \n Özdayi, M. S.; Kantarcioglu, M.; and Iyer, R.\n\n\n \n\n\n\n CoRR, abs/2010.15582. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"ImprovingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2010-15582,\n  author       = {Mustafa Safa {\\"{O}}zdayi and\n                  Murat Kantarcioglu and\n                  Rishabh Iyer},\n  title        = {Improving Accuracy of Federated Learning in Non-IID Settings},\n  journal      = {CoRR},\n  volume       = {abs/2010.15582},\n  year         = {2020},\n  url          = {https://arxiv.org/abs/2010.15582},\n  eprinttype    = {arXiv},\n  eprint       = {2010.15582},\n  timestamp    = {Tue, 03 Nov 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-15582.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (17)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Research Challenges at the Intersection of Big Data, Security and Privacy.\n \n \n \n \n\n\n \n Kantarcioglu, M.; and Ferrari, E.\n\n\n \n\n\n\n Frontiers Big Data, 2: 1. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"ResearchPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fdata/KantarciogluF19,\n  author       = {Murat Kantarcioglu and\n                  Elena Ferrari},\n  title        = {Research Challenges at the Intersection of Big Data, Security and\n                  Privacy},\n  journal      = {Frontiers Big Data},\n  volume       = {2},\n  pages        = {1},\n  year         = {2019},\n  url          = {https://doi.org/10.3389/fdata.2019.00001},\n  doi          = {10.3389/FDATA.2019.00001},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/fdata/KantarciogluF19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records.\n \n \n \n \n\n\n \n Rao, F.; Cao, J.; Bertino, E.; and Kantarcioglu, M.\n\n\n \n\n\n\n ACM Trans. Priv. Secur., 22(3): 15:1–15:36. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"HybridPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tissec/RaoCBK19,\n  author       = {Fang{-}Yu Rao and\n                  Jianneng Cao and\n                  Elisa Bertino and\n                  Murat Kantarcioglu},\n  title        = {Hybrid Private Record Linkage: Separating Differentially Private Synopses\n                  from Matching Records},\n  journal      = {{ACM} Trans. Priv. Secur.},\n  volume       = {22},\n  number       = {3},\n  pages        = {15:1--15:36},\n  year         = {2019},\n  url          = {https://doi.org/10.1145/3318462},\n  doi          = {10.1145/3318462},\n  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tissec/RaoCBK19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A survey of game theoretic approach for adversarial machine learning.\n \n \n \n \n\n\n \n Zhou, Y.; Kantarcioglu, M.; and Xi, B.\n\n\n \n\n\n\n WIREs Data Mining Knowl. Discov., 9(3). 2019.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/widm/ZhouKX19,\n  author       = {Yan Zhou and\n                  Murat Kantarcioglu and\n                  Bowei Xi},\n  title        = {A survey of game theoretic approach for adversarial machine learning},\n  journal      = {WIREs Data Mining Knowl. Discov.},\n  volume       = {9},\n  number       = {3},\n  year         = {2019},\n  url          = {https://doi.org/10.1002/widm.1259},\n  doi          = {10.1002/WIDM.1259},\n  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/widm/ZhouKX19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Biomedical Research Cohort Membership Disclosure on Social Media.\n \n \n \n \n\n\n \n Liu, Y.; Yan, C.; Yin, Z.; Wan, Z.; Xia, W.; Kantarcioglu, M.; Vorobeychik, Y.; Clayton, E. W.; and Malin, B. A.\n\n\n \n\n\n\n In AMIA 2019, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 16-20, 2019, 2019. AMIA\n \n\n\n\n
\n\n\n\n \n \n \"BiomedicalPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/amia/LiuYYWXKVCM19,\n  author       = {Yongtai Liu and\n                  Chao Yan and\n                  Zhijun Yin and\n                  Zhiyu Wan and\n                  Weiyi Xia and\n                  Murat Kantarcioglu and\n                  Yevgeniy Vorobeychik and\n                  Ellen Wright Clayton and\n                  Bradley A. Malin},\n  title        = {Biomedical Research Cohort Membership Disclosure on Social Media},\n  booktitle    = {{AMIA} 2019, American Medical Informatics Association Annual Symposium,\n                  Washington, DC, USA, November 16-20, 2019},\n  publisher    = {{AMIA}},\n  year         = {2019},\n  url          = {https://knowledge.amia.org/69862-amia-1.4570936/t004-1.4574923/t004-1.4574924/3198717-1.4575045/3203610-1.4575042},\n  timestamp    = {Wed, 17 Apr 2024 11:47:08 +0200},\n  biburl       = {https://dblp.org/rec/conf/amia/LiuYYWXKVCM19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Hybrid Blockchain Architecture for Privacy-Enabled and Accountable Auctions.\n \n \n \n \n\n\n \n Desai, H.; Kantarcioglu, M.; and Kagal, L.\n\n\n \n\n\n\n In IEEE International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019, pages 34–43, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/blockchain2/DesaiKK19,\n  author       = {Harsh Desai and\n                  Murat Kantarcioglu and\n                  Lalana Kagal},\n  title        = {A Hybrid Blockchain Architecture for Privacy-Enabled and Accountable\n                  Auctions},\n  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,\n                  GA, USA, July 14-17, 2019},\n  pages        = {34--43},\n  publisher    = {{IEEE}},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/Blockchain.2019.00014},\n  doi          = {10.1109/BLOCKCHAIN.2019.00014},\n  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/blockchain2/DesaiKK19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects.\n \n \n \n \n\n\n \n Rahaman, S.; Xiao, Y.; Afrose, S.; Shaon, F.; Tian, K.; Frantz, M.; Kantarcioglu, M.; and Yao, D. (.\n\n\n \n\n\n\n In Cavallaro, L.; Kinder, J.; Wang, X.; and Katz, J., editor(s), Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, pages 2455–2472, 2019. ACM\n \n\n\n\n
\n\n\n\n \n \n \"CryptoGuard:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccs/RahamanXASTFKY19,\n  author       = {Sazzadur Rahaman and\n                  Ya Xiao and\n                  Sharmin Afrose and\n                  Fahad Shaon and\n                  Ke Tian and\n                  Miles Frantz and\n                  Murat Kantarcioglu and\n                  Danfeng (Daphne) Yao},\n  editor       = {Lorenzo Cavallaro and\n                  Johannes Kinder and\n                  XiaoFeng Wang and\n                  Jonathan Katz},\n  title        = {CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities\n                  in Massive-sized Java Projects},\n  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and\n                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},\n  pages        = {2455--2472},\n  publisher    = {{ACM}},\n  year         = {2019},\n  url          = {https://doi.org/10.1145/3319535.3345659},\n  doi          = {10.1145/3319535.3345659},\n  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/ccs/RahamanXASTFKY19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development.\n \n \n \n \n\n\n \n Rahaman, S.; Xiao, Y.; Afrose, S.; Tian, K.; Frantz, M.; Meng, N.; Miller, B. P.; Shaon, F.; Kantarcioglu, M.; and Yao, D. (.\n\n\n \n\n\n\n In Cavallaro, L.; Kinder, J.; Wang, X.; and Katz, J., editor(s), Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, pages 2545–2547, 2019. ACM\n \n\n\n\n
\n\n\n\n \n \n \"Poster:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccs/RahamanXATFMMSK19,\n  author       = {Sazzadur Rahaman and\n                  Ya Xiao and\n                  Sharmin Afrose and\n                  Ke Tian and\n                  Miles Frantz and\n                  Na Meng and\n                  Barton P. Miller and\n                  Fahad Shaon and\n                  Murat Kantarcioglu and\n                  Danfeng (Daphne) Yao},\n  editor       = {Lorenzo Cavallaro and\n                  Johannes Kinder and\n                  XiaoFeng Wang and\n                  Jonathan Katz},\n  title        = {Poster: Deployment-quality and Accessible Solutions for Cryptography\n                  Code Development},\n  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and\n                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},\n  pages        = {2545--2547},\n  publisher    = {{ACM}},\n  year         = {2019},\n  url          = {https://doi.org/10.1145/3319535.3363252},\n  doi          = {10.1145/3319535.3363252},\n  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/ccs/RahamanXATFMMSK19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ChainNet: Learning on Blockchain Graphs with Topological Features.\n \n \n \n \n\n\n \n Abay, N. C.; Akcora, C. G.; Gel, Y. R.; Kantarcioglu, M.; Islambekov, U. D.; Tian, Y.; and Thuraisingham, B.\n\n\n \n\n\n\n In Wang, J.; Shim, K.; and Wu, X., editor(s), 2019 IEEE International Conference on Data Mining, ICDM 2019, Beijing, China, November 8-11, 2019, pages 946–951, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"ChainNet:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdm/AbayAGKITT19,\n  author       = {Nazmiye Ceren Abay and\n                  Cuneyt Gurcan Akcora and\n                  Yulia R. Gel and\n                  Murat Kantarcioglu and\n                  Umar D. Islambekov and\n                  Yahui Tian and\n                  Bhavani Thuraisingham},\n  editor       = {Jianyong Wang and\n                  Kyuseok Shim and\n                  Xindong Wu},\n  title        = {ChainNet: Learning on Blockchain Graphs with Topological Features},\n  booktitle    = {2019 {IEEE} International Conference on Data Mining, {ICDM} 2019,\n                  Beijing, China, November 8-11, 2019},\n  pages        = {946--951},\n  publisher    = {{IEEE}},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/ICDM.2019.00105},\n  doi          = {10.1109/ICDM.2019.00105},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/icdm/AbayAGKITT19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Adversarial Active Learning in the Presence of Weak and Malicious Oracles.\n \n \n \n \n\n\n \n Zhou, Y.; Kantarcioglu, M.; and Xi, B.\n\n\n \n\n\n\n In U, L. H.; and Lauw, H. W., editor(s), Trends and Applications in Knowledge Discovery and Data Mining - PAKDD 2019 Workshops, BDM, DLKT, LDRC, PAISI, WeL, Macau, China, April 14-17, 2019, Revised Selected Papers, volume 11607, of Lecture Notes in Computer Science, pages 77–89, 2019. Springer\n \n\n\n\n
\n\n\n\n \n \n \"AdversarialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pakdd/ZhouKX19,\n  author       = {Yan Zhou and\n                  Murat Kantarcioglu and\n                  Bowei Xi},\n  editor       = {Leong Hou U and\n                  Hady W. Lauw},\n  title        = {Adversarial Active Learning in the Presence of Weak and Malicious\n                  Oracles},\n  booktitle    = {Trends and Applications in Knowledge Discovery and Data Mining - {PAKDD}\n                  2019 Workshops, BDM, DLKT, LDRC, PAISI, WeL, Macau, China, April 14-17,\n                  2019, Revised Selected Papers},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {11607},\n  pages        = {77--89},\n  publisher    = {Springer},\n  year         = {2019},\n  url          = {https://doi.org/10.1007/978-3-030-26142-9\\_8},\n  doi          = {10.1007/978-3-030-26142-9\\_8},\n  timestamp    = {Thu, 12 Sep 2019 15:27:44 +0200},\n  biburl       = {https://dblp.org/rec/conf/pakdd/ZhouKX19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Determining the Impact of Missing Values on Blocking in Record Linkage.\n \n \n \n \n\n\n \n Anindya, I. C.; Kantarcioglu, M.; and Malin, B. A.\n\n\n \n\n\n\n In Yang, Q.; Zhou, Z.; Gong, Z.; Zhang, M.; and Huang, S., editor(s), Advances in Knowledge Discovery and Data Mining - 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part III, volume 11441, of Lecture Notes in Computer Science, pages 262–274, 2019. Springer\n \n\n\n\n
\n\n\n\n \n \n \"DeterminingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pakdd/AnindyaKM19,\n  author       = {Imrul Chowdhury Anindya and\n                  Murat Kantarcioglu and\n                  Bradley A. Malin},\n  editor       = {Qiang Yang and\n                  Zhi{-}Hua Zhou and\n                  Zhiguo Gong and\n                  Min{-}Ling Zhang and\n                  Sheng{-}Jun Huang},\n  title        = {Determining the Impact of Missing Values on Blocking in Record Linkage},\n  booktitle    = {Advances in Knowledge Discovery and Data Mining - 23rd Pacific-Asia\n                  Conference, {PAKDD} 2019, Macau, China, April 14-17, 2019, Proceedings,\n                  Part {III}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {11441},\n  pages        = {262--274},\n  publisher    = {Springer},\n  year         = {2019},\n  url          = {https://doi.org/10.1007/978-3-030-16142-2\\_21},\n  doi          = {10.1007/978-3-030-16142-2\\_21},\n  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/pakdd/AnindyaKM19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Securing Big Data: New Access Control Challenges and Approaches.\n \n \n \n \n\n\n \n Kantarcioglu, M.\n\n\n \n\n\n\n In Kerschbaum, F.; Mashatan, A.; Niu, J.; and Lee, A. J., editor(s), Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019, Toronto, ON, Canada, June 03-06, 2019, pages 1–2, 2019. ACM\n \n\n\n\n
\n\n\n\n \n \n \"SecuringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sacmat/Kantarcioglu19,\n  author       = {Murat Kantarcioglu},\n  editor       = {Florian Kerschbaum and\n                  Atefeh Mashatan and\n                  Jianwei Niu and\n                  Adam J. Lee},\n  title        = {Securing Big Data: New Access Control Challenges and Approaches},\n  booktitle    = {Proceedings of the 24th {ACM} Symposium on Access Control Models and\n                  Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019},\n  pages        = {1--2},\n  publisher    = {{ACM}},\n  year         = {2019},\n  url          = {https://doi.org/10.1145/3322431.3326330},\n  doi          = {10.1145/3322431.3326330},\n  timestamp    = {Sun, 02 Jun 2019 13:58:07 +0200},\n  biburl       = {https://dblp.org/rec/conf/sacmat/Kantarcioglu19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Securing Big Data in the Age of AI.\n \n \n \n \n\n\n \n Kantarcioglu, M.; and Shaon, F.\n\n\n \n\n\n\n In First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2019, Los Angeles, CA, USA, December 12-14, 2019, pages 218–220, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SecuringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/tpsisa/KantarciogluS19,\n  author       = {Murat Kantarcioglu and\n                  Fahad Shaon},\n  title        = {Securing Big Data in the Age of {AI}},\n  booktitle    = {First {IEEE} International Conference on Trust, Privacy and Security\n                  in Intelligent Systems and Applications, {TPS-ISA} 2019, Los Angeles,\n                  CA, USA, December 12-14, 2019},\n  pages        = {218--220},\n  publisher    = {{IEEE}},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/TPS-ISA48467.2019.00035},\n  doi          = {10.1109/TPS-ISA48467.2019.00035},\n  timestamp    = {Tue, 26 Jan 2021 14:05:24 +0100},\n  biburl       = {https://dblp.org/rec/conf/tpsisa/KantarciogluS19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure Real-Time Heterogeneous IoT Data Management System.\n \n \n \n \n\n\n \n Islam, M. S.; Verma, H.; Khan, L.; and Kantarcioglu, M.\n\n\n \n\n\n\n In First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2019, Los Angeles, CA, USA, December 12-14, 2019, pages 228–235, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/tpsisa/IslamVKK19,\n  author       = {Md Shihabul Islam and\n                  Harsh Verma and\n                  Latifur Khan and\n                  Murat Kantarcioglu},\n  title        = {Secure Real-Time Heterogeneous IoT Data Management System},\n  booktitle    = {First {IEEE} International Conference on Trust, Privacy and Security\n                  in Intelligent Systems and Applications, {TPS-ISA} 2019, Los Angeles,\n                  CA, USA, December 12-14, 2019},\n  pages        = {228--235},\n  publisher    = {{IEEE}},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/TPS-ISA48467.2019.00037},\n  doi          = {10.1109/TPS-ISA48467.2019.00037},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/tpsisa/IslamVKK19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, March 25-27, 2019.\n \n \n \n \n\n\n \n Ahn, G.; Thuraisingham, B.; Kantarcioglu, M.; and Krishnan, R.,\n editors.\n \n\n\n \n\n\n\n ACM. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"ProceedingsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@proceedings{DBLP:conf/codaspy/2019,\n  editor       = {Gail{-}Joon Ahn and\n                  Bhavani Thuraisingham and\n                  Murat Kantarcioglu and\n                  Ram Krishnan},\n  title        = {Proceedings of the Ninth {ACM} Conference on Data and Application\n                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,\n                  2019},\n  publisher    = {{ACM}},\n  year         = {2019},\n  url          = {https://doi.org/10.1145/3292006},\n  doi          = {10.1145/3292006},\n  isbn         = {978-1-4503-6099-9},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/codaspy/2019.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n BitcoinHeist: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain.\n \n \n \n \n\n\n \n Akcora, C. G.; Li, Y.; Gel, Y. R.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/1906.07852. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"BitcoinHeist:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1906-07852,\n  author       = {Cuneyt Gurcan Akcora and\n                  Yitao Li and\n                  Yulia R. Gel and\n                  Murat Kantarcioglu},\n  title        = {BitcoinHeist: Topological Data Analysis for Ransomware Detection on\n                  the Bitcoin Blockchain},\n  journal      = {CoRR},\n  volume       = {abs/1906.07852},\n  year         = {2019},\n  url          = {http://arxiv.org/abs/1906.07852},\n  eprinttype    = {arXiv},\n  eprint       = {1906.07852},\n  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-07852.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ChainNet: Learning on Blockchain Graphs with Topological Features.\n \n \n \n \n\n\n \n Abay, N. C.; Akcora, C. G.; Gel, Y. R.; Islambekov, U. D.; Kantarcioglu, M.; Tian, Y.; and Thuraisingham, B.\n\n\n \n\n\n\n CoRR, abs/1908.06971. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"ChainNet:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1908-06971,\n  author       = {Nazmiye Ceren Abay and\n                  Cuneyt Gurcan Akcora and\n                  Yulia R. Gel and\n                  Umar D. Islambekov and\n                  Murat Kantarcioglu and\n                  Yahui Tian and\n                  Bhavani Thuraisingham},\n  title        = {ChainNet: Learning on Blockchain Graphs with Topological Features},\n  journal      = {CoRR},\n  volume       = {abs/1908.06971},\n  year         = {2019},\n  url          = {http://arxiv.org/abs/1908.06971},\n  eprinttype    = {arXiv},\n  eprint       = {1908.06971},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-06971.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Dissecting Ethereum Blockchain Analytics: What We Learn from Topology and Geometry of Ethereum Graph.\n \n \n \n \n\n\n \n Li, Y.; Islambekov, U.; Akcora, C. G.; Smirnova, E.; Gel, Y. R.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/1912.10105. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"DissectingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1912-10105,\n  author       = {Yitao Li and\n                  Umar Islambekov and\n                  Cuneyt Gurcan Akcora and\n                  Ekaterina Smirnova and\n                  Yulia R. Gel and\n                  Murat Kantarcioglu},\n  title        = {Dissecting Ethereum Blockchain Analytics: What We Learn from Topology\n                  and Geometry of Ethereum Graph},\n  journal      = {CoRR},\n  volume       = {abs/1912.10105},\n  year         = {2019},\n  url          = {http://arxiv.org/abs/1912.10105},\n  eprinttype    = {arXiv},\n  eprint       = {1912.10105},\n  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-10105.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (23)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Adversarial Machine Learning.\n \n \n \n \n\n\n \n Vorobeychik, Y.; and Kantarcioglu, M.\n\n\n \n\n\n\n of Synthesis Lectures on Artificial Intelligence and Machine LearningMorgan & Claypool Publishers, 2018.\n \n\n\n\n
\n\n\n\n \n \n \"AdversarialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@book{DBLP:series/synthesis/2018Vorobeychik,\n  author       = {Yevgeniy Vorobeychik and\n                  Murat Kantarcioglu},\n  title        = {Adversarial Machine Learning},\n  series       = {Synthesis Lectures on Artificial Intelligence and Machine Learning},\n  publisher    = {Morgan {\\&} Claypool Publishers},\n  year         = {2018},\n  url          = {https://doi.org/10.2200/S00861ED1V01Y201806AIM039},\n  doi          = {10.2200/S00861ED1V01Y201806AIM039},\n  isbn         = {978-3-031-00452-0},\n  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/series/synthesis/2018Vorobeychik.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Spatial counts under differential privacy mechanism on changing spatial scales.\n \n \n \n \n\n\n \n Jiang, J.; Xi, B.; and Kantarcioglu, M.\n\n\n \n\n\n\n Comput. Secur., 77: 642–652. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"SpatialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/compsec/JiangXK18,\n  author       = {Jun Jiang and\n                  Bowei Xi and\n                  Murat Kantarcioglu},\n  title        = {Spatial counts under differential privacy mechanism on changing spatial\n                  scales},\n  journal      = {Comput. Secur.},\n  volume       = {77},\n  pages        = {642--652},\n  year         = {2018},\n  url          = {https://doi.org/10.1016/j.cose.2017.11.018},\n  doi          = {10.1016/J.COSE.2017.11.018},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/compsec/JiangXK18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n It's all in the timing: calibrating temporal penalties for biomedical data sharing.\n \n \n \n \n\n\n \n Xia, W.; Wan, Z.; Yin, Z.; Gaupp, J.; Liu, Y.; Clayton, E. W.; Kantarcioglu, M.; Vorobeychik, Y.; and Malin, B. A.\n\n\n \n\n\n\n J. Am. Medical Informatics Assoc., 25(1): 25–31. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"It'sPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jamia/XiaWYGLCKVM18,\n  author       = {Weiyi Xia and\n                  Zhiyu Wan and\n                  Zhijun Yin and\n                  James Gaupp and\n                  Yongtai Liu and\n                  Ellen Wright Clayton and\n                  Murat Kantarcioglu and\n                  Yevgeniy Vorobeychik and\n                  Bradley A. Malin},\n  title        = {It's all in the timing: calibrating temporal penalties for biomedical\n                  data sharing},\n  journal      = {J. Am. Medical Informatics Assoc.},\n  volume       = {25},\n  number       = {1},\n  pages        = {25--31},\n  year         = {2018},\n  url          = {https://doi.org/10.1093/jamia/ocx101},\n  doi          = {10.1093/JAMIA/OCX101},\n  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jamia/XiaWYGLCKVM18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Detecting the Presence of an Individual in Phenotypic Summary Data.\n \n \n \n \n\n\n \n Liu, Y.; Wan, Z.; Xia, W.; Kantarcioglu, M.; Vorobeychik, Y.; Clayton, E. W.; Kho, A. N.; Carrell, D. S.; and Malin, B. A.\n\n\n \n\n\n\n In AMIA 2018, American Medical Informatics Association Annual Symposium, San Francisco, CA, November 3-7, 2018, 2018. AMIA\n \n\n\n\n
\n\n\n\n \n \n \"DetectingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/amia/LiuWXKVCKCM18,\n  author       = {Yongtai Liu and\n                  Zhiyu Wan and\n                  Weiyi Xia and\n                  Murat Kantarcioglu and\n                  Yevgeniy Vorobeychik and\n                  Ellen Wright Clayton and\n                  Abel N. Kho and\n                  David S. Carrell and\n                  Bradley A. Malin},\n  title        = {Detecting the Presence of an Individual in Phenotypic Summary Data},\n  booktitle    = {{AMIA} 2018, American Medical Informatics Association Annual Symposium,\n                  San Francisco, CA, November 3-7, 2018},\n  publisher    = {{AMIA}},\n  year         = {2018},\n  url          = {https://knowledge.amia.org/67852-amia-1.4259402/t004-1.4263758/t004-1.4263759/2976460-1.4263892/2977112-1.4263889},\n  timestamp    = {Wed, 17 Apr 2024 11:47:15 +0200},\n  biburl       = {https://dblp.org/rec/conf/amia/LiuWXKVCKCM18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SmartProvenance: A Distributed, Blockchain Based DataProvenance System.\n \n \n \n \n\n\n \n Ramachandran, A.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Zhao, Z.; Ahn, G.; Krishnan, R.; and Ghinita, G., editor(s), Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pages 35–42, 2018. ACM\n \n\n\n\n
\n\n\n\n \n \n \"SmartProvenance:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/codaspy/RamachandranK18,\n  author       = {Aravind Ramachandran and\n                  Murat Kantarcioglu},\n  editor       = {Ziming Zhao and\n                  Gail{-}Joon Ahn and\n                  Ram Krishnan and\n                  Gabriel Ghinita},\n  title        = {SmartProvenance: {A} Distributed, Blockchain Based DataProvenance\n                  System},\n  booktitle    = {Proceedings of the Eighth {ACM} Conference on Data and Application\n                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,\n                  2018},\n  pages        = {35--42},\n  publisher    = {{ACM}},\n  year         = {2018},\n  url          = {https://doi.org/10.1145/3176258.3176333},\n  doi          = {10.1145/3176258.3176333},\n  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/codaspy/RamachandranK18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers.\n \n \n \n \n\n\n \n Sun, H.; Dong, B.; Zhang, B.; Wang, W. H.; and Kantarcioglu, M.\n\n\n \n\n\n\n In 34th IEEE International Conference on Data Engineering, ICDE 2018, Paris, France, April 16-19, 2018, pages 377–388, 2018. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"SensitivePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icde/SunDZWK18,\n  author       = {Haipei Sun and\n                  Boxiang Dong and\n                  Bo Zhang and\n                  Wendy Hui Wang and\n                  Murat Kantarcioglu},\n  title        = {Sensitive Task Assignments in Crowdsourcing Markets with Colluding\n                  Workers},\n  booktitle    = {34th {IEEE} International Conference on Data Engineering, {ICDE} 2018,\n                  Paris, France, April 16-19, 2018},\n  pages        = {377--388},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2018},\n  url          = {https://doi.org/10.1109/ICDE.2018.00042},\n  doi          = {10.1109/ICDE.2018.00042},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icde/SunDZWK18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Blockchain Data Analytics.\n \n \n \n \n\n\n \n Akcora, C. G.; Kantarcioglu, M.; and Gel, Y. R.\n\n\n \n\n\n\n In IEEE International Conference on Data Mining, ICDM 2018, Singapore, November 17-20, 2018, pages 6, 2018. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"BlockchainPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdm/AkcoraKG18,\n  author       = {Cuneyt Gurcan Akcora and\n                  Murat Kantarcioglu and\n                  Yulia R. Gel},\n  title        = {Blockchain Data Analytics},\n  booktitle    = {{IEEE} International Conference on Data Mining, {ICDM} 2018, Singapore,\n                  November 17-20, 2018},\n  pages        = {6},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2018},\n  url          = {https://doi.org/10.1109/ICDM.2018.00013},\n  doi          = {10.1109/ICDM.2018.00013},\n  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},\n  biburl       = {https://dblp.org/rec/conf/icdm/AkcoraKG18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The Future of Deception: Machine-Generated and Manipulated Images, Video, and Audio?.\n \n \n \n \n\n\n \n Bakdash, J. Z.; Sample, C.; Rankin, M.; Kantarcioglu, M.; Holmes, J. S.; Kase, S.; Zaroukian, E. G.; and Szymanski, B. K.\n\n\n \n\n\n\n In 2018 International Workshop on Social Sensing, SocialSens@IoTDI 2018, Orlando, FL, USA, April 17, 2018, pages 2, 2018. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iotdi/BakdashSRKHKZS18,\n  author       = {Jonathan Z. Bakdash and\n                  Char Sample and\n                  Monica Rankin and\n                  Murat Kantarcioglu and\n                  Jennifer S. Holmes and\n                  Sue Kase and\n                  Erin G. Zaroukian and\n                  Boleslaw K. Szymanski},\n  title        = {The Future of Deception: Machine-Generated and Manipulated Images,\n                  Video, and Audio?},\n  booktitle    = {2018 International Workshop on Social Sensing, SocialSens@IoTDI 2018,\n                  Orlando, FL, USA, April 17, 2018},\n  pages        = {2},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2018},\n  url          = {https://doi.ieeecomputersociety.org/10.1109/SocialSens.2018.00009},\n  doi          = {10.1109/SOCIALSENS.2018.00009},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/iotdi/BakdashSRKHKZS18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Integrating Cyber Security and Data Science for Social Media: A Position Paper.\n \n \n \n \n\n\n \n Thuraisingham, B.; Kantarcioglu, M.; and Khan, L.\n\n\n \n\n\n\n In 2018 IEEE International Parallel and Distributed Processing Symposium Workshops, IPDPS Workshops 2018, Vancouver, BC, Canada, May 21-25, 2018, pages 1163–1165, 2018. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"IntegratingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ipps/ThuraisinghamKK18,\n  author       = {Bhavani Thuraisingham and\n                  Murat Kantarcioglu and\n                  Latifur Khan},\n  title        = {Integrating Cyber Security and Data Science for Social Media: {A}\n                  Position Paper},\n  booktitle    = {2018 {IEEE} International Parallel and Distributed Processing Symposium\n                  Workshops, {IPDPS} Workshops 2018, Vancouver, BC, Canada, May 21-25,\n                  2018},\n  pages        = {1163--1165},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2018},\n  url          = {https://doi.org/10.1109/IPDPSW.2018.00178},\n  doi          = {10.1109/IPDPSW.2018.00178},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/ipps/ThuraisinghamKK18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Adversarial Anomaly Detection Using Centroid-Based Clustering.\n \n \n \n \n\n\n \n Anindya, I. C.; and Kantarcioglu, M.\n\n\n \n\n\n\n In 2018 IEEE International Conference on Information Reuse and Integration, IRI 2018, Salt Lake City, UT, USA, July 6-9, 2018, pages 1–8, 2018. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"AdversarialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iri/AnindyaK18,\n  author       = {Imrul Chowdhury Anindya and\n                  Murat Kantarcioglu},\n  title        = {Adversarial Anomaly Detection Using Centroid-Based Clustering},\n  booktitle    = {2018 {IEEE} International Conference on Information Reuse and Integration,\n                  {IRI} 2018, Salt Lake City, UT, USA, July 6-9, 2018},\n  pages        = {1--8},\n  publisher    = {{IEEE}},\n  year         = {2018},\n  url          = {https://doi.org/10.1109/IRI.2018.00009},\n  doi          = {10.1109/IRI.2018.00009},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/iri/AnindyaK18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Attacklets: Modeling High Dimensionality in Real World Cyberattacks.\n \n \n \n \n\n\n \n Akcora, C. G.; Bakdash, J. Z.; Gel, Y. R.; Kantarcioglu, M.; Marusich, L. R.; and Thuraisingham, B.\n\n\n \n\n\n\n In 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018, Miami, FL, USA, November 9-11, 2018, pages 55–57, 2018. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"Attacklets:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/AkcoraBGKMT18,\n  author       = {Cuneyt Gurcan Akcora and\n                  Jonathan Z. Bakdash and\n                  Yulia R. Gel and\n                  Murat Kantarcioglu and\n                  Laura R. Marusich and\n                  Bhavani Thuraisingham},\n  title        = {Attacklets: Modeling High Dimensionality in Real World Cyberattacks},\n  booktitle    = {2018 {IEEE} International Conference on Intelligence and Security\n                  Informatics, {ISI} 2018, Miami, FL, USA, November 9-11, 2018},\n  pages        = {55--57},\n  publisher    = {{IEEE}},\n  year         = {2018},\n  url          = {https://doi.org/10.1109/ISI.2018.8587399},\n  doi          = {10.1109/ISI.2018.8587399},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/isi/AkcoraBGKMT18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Adjudicating Violations in Data Sharing Agreements Using Smart Contracts.\n \n \n \n \n\n\n \n Desai, H.; Liu, K.; Kantarcioglu, M.; and Kagal, L.\n\n\n \n\n\n\n In IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018, pages 1553–1560, 2018. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"AdjudicatingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ithings/DesaiLKK18,\n  author       = {Harsh Desai and\n                  Kevin Liu and\n                  Murat Kantarcioglu and\n                  Lalana Kagal},\n  title        = {Adjudicating Violations in Data Sharing Agreements Using Smart Contracts},\n  booktitle    = {{IEEE} International Conference on Internet of Things (iThings) and\n                  {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber,\n                  Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData),\n                  iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July\n                  30 - August 3, 2018},\n  pages        = {1553--1560},\n  publisher    = {{IEEE}},\n  year         = {2018},\n  url          = {https://doi.org/10.1109/Cybermatics\\_2018.2018.00261},\n  doi          = {10.1109/CYBERMATICS\\_2018.2018.00261},\n  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/ithings/DesaiLKK18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Data Mining with Algorithmic Transparency.\n \n \n \n \n\n\n \n Zhou, Y.; Alufaisan, Y.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Phung, D. Q.; Tseng, V. S.; Webb, G. I.; Ho, B.; Ganji, M.; and Rashidi, L., editor(s), Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part I, volume 10937, of Lecture Notes in Computer Science, pages 130–142, 2018. Springer\n \n\n\n\n
\n\n\n\n \n \n \"DataPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pakdd/ZhouAK18,\n  author       = {Yan Zhou and\n                  Yasmeen Alufaisan and\n                  Murat Kantarcioglu},\n  editor       = {Dinh Q. Phung and\n                  Vincent S. Tseng and\n                  Geoffrey I. Webb and\n                  Bao Ho and\n                  Mohadeseh Ganji and\n                  Lida Rashidi},\n  title        = {Data Mining with Algorithmic Transparency},\n  booktitle    = {Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia\n                  Conference, {PAKDD} 2018, Melbourne, VIC, Australia, June 3-6, 2018,\n                  Proceedings, Part {I}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {10937},\n  pages        = {130--142},\n  publisher    = {Springer},\n  year         = {2018},\n  url          = {https://doi.org/10.1007/978-3-319-93034-3\\_11},\n  doi          = {10.1007/978-3-319-93034-3\\_11},\n  timestamp    = {Tue, 16 Jul 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/pakdd/ZhouAK18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Forecasting Bitcoin Price with Graph Chainlets.\n \n \n \n \n\n\n \n Akcora, C. G.; Dey, A. K.; Gel, Y. R.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Phung, D. Q.; Tseng, V. S.; Webb, G. I.; Ho, B.; Ganji, M.; and Rashidi, L., editor(s), Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part III, volume 10939, of Lecture Notes in Computer Science, pages 765–776, 2018. Springer\n \n\n\n\n
\n\n\n\n \n \n \"ForecastingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pakdd/AkcoraDGK18,\n  author       = {Cuneyt Gurcan Akcora and\n                  Asim Kumer Dey and\n                  Yulia R. Gel and\n                  Murat Kantarcioglu},\n  editor       = {Dinh Q. Phung and\n                  Vincent S. Tseng and\n                  Geoffrey I. Webb and\n                  Bao Ho and\n                  Mohadeseh Ganji and\n                  Lida Rashidi},\n  title        = {Forecasting Bitcoin Price with Graph Chainlets},\n  booktitle    = {Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia\n                  Conference, {PAKDD} 2018, Melbourne, VIC, Australia, June 3-6, 2018,\n                  Proceedings, Part {III}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {10939},\n  pages        = {765--776},\n  publisher    = {Springer},\n  year         = {2018},\n  url          = {https://doi.org/10.1007/978-3-319-93040-4\\_60},\n  doi          = {10.1007/978-3-319-93040-4\\_60},\n  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},\n  biburl       = {https://dblp.org/rec/conf/pakdd/AkcoraDGK18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy Preserving Synthetic Data Release Using Deep Learning.\n \n \n \n \n\n\n \n Abay, N. C.; Zhou, Y.; Kantarcioglu, M.; Thuraisingham, B.; and Sweeney, L.\n\n\n \n\n\n\n In Berlingerio, M.; Bonchi, F.; Gärtner, T.; Hurley, N.; and Ifrim, G., editor(s), Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2018, Dublin, Ireland, September 10-14, 2018, Proceedings, Part I, volume 11051, of Lecture Notes in Computer Science, pages 510–526, 2018. Springer\n \n\n\n\n
\n\n\n\n \n \n \"PrivacyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pkdd/AbayZKTS18,\n  author       = {Nazmiye Ceren Abay and\n                  Yan Zhou and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham and\n                  Latanya Sweeney},\n  editor       = {Michele Berlingerio and\n                  Francesco Bonchi and\n                  Thomas G{\\"{a}}rtner and\n                  Neil Hurley and\n                  Georgiana Ifrim},\n  title        = {Privacy Preserving Synthetic Data Release Using Deep Learning},\n  booktitle    = {Machine Learning and Knowledge Discovery in Databases - European Conference,\n                  {ECML} {PKDD} 2018, Dublin, Ireland, September 10-14, 2018, Proceedings,\n                  Part {I}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {11051},\n  pages        = {510--526},\n  publisher    = {Springer},\n  year         = {2018},\n  url          = {https://doi.org/10.1007/978-3-030-10925-7\\_31},\n  doi          = {10.1007/978-3-030-10925-7\\_31},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/pkdd/AbayZKTS18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards a Privacy-Aware Qunatified Self Data Management Framework.\n \n \n \n \n\n\n \n Thuraisingham, B.; Kantarcioglu, M.; Bertino, E.; Bakdash, J. Z.; and Fernández, M.\n\n\n \n\n\n\n In Bertino, E.; Lin, D.; and Lobo, J., editor(s), Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018, pages 173–184, 2018. ACM\n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sacmat/ThuraisinghamKB18,\n  author       = {Bhavani Thuraisingham and\n                  Murat Kantarcioglu and\n                  Elisa Bertino and\n                  Jonathan Z. Bakdash and\n                  Maribel Fern{\\'{a}}ndez},\n  editor       = {Elisa Bertino and\n                  Dan Lin and\n                  Jorge Lobo},\n  title        = {Towards a Privacy-Aware Qunatified Self Data Management Framework},\n  booktitle    = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models\n                  and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15,\n                  2018},\n  pages        = {173--184},\n  publisher    = {{ACM}},\n  year         = {2018},\n  url          = {https://doi.org/10.1145/3205977.3205997},\n  doi          = {10.1145/3205977.3205997},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sacmat/ThuraisinghamKB18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018.\n \n \n \n \n\n\n \n Verma, R. M.; and Kantarcioglu, M.,\n editors.\n \n\n\n \n\n\n\n ACM. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"ProceedingsPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@proceedings{DBLP:conf/codaspy/2018iwspa,\n  editor       = {Rakesh M. Verma and\n                  Murat Kantarcioglu},\n  title        = {Proceedings of the Fourth {ACM} International Workshop on Security\n                  and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21,\n                  2018},\n  publisher    = {{ACM}},\n  year         = {2018},\n  url          = {http://dl.acm.org/citation.cfm?id=3180445},\n  timestamp    = {Mon, 19 Mar 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/codaspy/2018iwspa.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Horizontally Partitioned Data.\n \n \n \n \n\n\n \n Kantarcioglu, M.\n\n\n \n\n\n\n In Liu, L.; and Özsu, M. T., editor(s), Encyclopedia of Database Systems, Second Edition. Springer, 2018.\n \n\n\n\n
\n\n\n\n \n \n \"HorizontallyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:reference/db/Kantarcioglu18,\n  author       = {Murat Kantarcioglu},\n  editor       = {Ling Liu and\n                  M. Tamer {\\"{O}}zsu},\n  title        = {Horizontally Partitioned Data},\n  booktitle    = {Encyclopedia of Database Systems, Second Edition},\n  publisher    = {Springer},\n  year         = {2018},\n  url          = {https://doi.org/10.1007/978-1-4614-8265-9\\_1391},\n  doi          = {10.1007/978-1-4614-8265-9\\_1391},\n  timestamp    = {Thu, 14 Feb 2019 09:43:36 +0100},\n  biburl       = {https://dblp.org/rec/reference/db/Kantarcioglu18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Graph Based Proactive Secure Decomposition Algorithm for Context Dependent Attribute Based Inference Control Problem.\n \n \n \n \n\n\n \n Turan, U.; Toroslu, I. H.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/1803.00497. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"GraphPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1803-00497,\n  author       = {Ugur Turan and\n                  Ismail H. Toroslu and\n                  Murat Kantarcioglu},\n  title        = {Graph Based Proactive Secure Decomposition Algorithm for Context Dependent\n                  Attribute Based Inference Control Problem},\n  journal      = {CoRR},\n  volume       = {abs/1803.00497},\n  year         = {2018},\n  url          = {http://arxiv.org/abs/1803.00497},\n  eprinttype    = {arXiv},\n  eprint       = {1803.00497},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-00497.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Adversarial Clustering: A Grid Based Clustering Algorithm Against Active Adversaries.\n \n \n \n \n\n\n \n Wei, W.; Xi, B.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/1804.04780. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"AdversarialPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1804-04780,\n  author       = {Wutao Wei and\n                  Bowei Xi and\n                  Murat Kantarcioglu},\n  title        = {Adversarial Clustering: {A} Grid Based Clustering Algorithm Against\n                  Active Adversaries},\n  journal      = {CoRR},\n  volume       = {abs/1804.04780},\n  year         = {2018},\n  url          = {http://arxiv.org/abs/1804.04780},\n  eprinttype    = {arXiv},\n  eprint       = {1804.04780},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-04780.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Enforceable Data Sharing Agreements Using Smart Contracts.\n \n \n \n \n\n\n \n Liu, K.; Desai, H.; Kagal, L.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/1804.10645. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"EnforceablePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1804-10645,\n  author       = {Kevin Liu and\n                  Harsh Desai and\n                  Lalana Kagal and\n                  Murat Kantarcioglu},\n  title        = {Enforceable Data Sharing Agreements Using Smart Contracts},\n  journal      = {CoRR},\n  volume       = {abs/1804.10645},\n  year         = {2018},\n  url          = {http://arxiv.org/abs/1804.10645},\n  eprinttype    = {arXiv},\n  eprint       = {1804.10645},\n  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-10645.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Breaking Transferability of Adversarial Samples with Randomness.\n \n \n \n \n\n\n \n Zhou, Y.; Kantarcioglu, M.; and Xi, B.\n\n\n \n\n\n\n CoRR, abs/1805.04613. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"BreakingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1805-04613,\n  author       = {Yan Zhou and\n                  Murat Kantarcioglu and\n                  Bowei Xi},\n  title        = {Breaking Transferability of Adversarial Samples with Randomness},\n  journal      = {CoRR},\n  volume       = {abs/1805.04613},\n  year         = {2018},\n  url          = {http://arxiv.org/abs/1805.04613},\n  eprinttype    = {arXiv},\n  eprint       = {1805.04613},\n  timestamp    = {Tue, 16 Jul 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-04613.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities.\n \n \n \n \n\n\n \n Rahaman, S.; Xiao, Y.; Tian, K.; Shaon, F.; Kantarcioglu, M.; and Yao, D.\n\n\n \n\n\n\n CoRR, abs/1806.06881. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"CHIRON:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1806-06881,\n  author       = {Sazzadur Rahaman and\n                  Ya Xiao and\n                  Ke Tian and\n                  Fahad Shaon and\n                  Murat Kantarcioglu and\n                  Danfeng Yao},\n  title        = {{CHIRON:} Deployment-quality Detection of Java Cryptographic Vulnerabilities},\n  journal      = {CoRR},\n  volume       = {abs/1806.06881},\n  year         = {2018},\n  url          = {http://arxiv.org/abs/1806.06881},\n  eprinttype    = {arXiv},\n  eprint       = {1806.06881},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-06881.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (20)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Secure logical schema and decomposition algorithm for proactive context dependent attribute based inference control.\n \n \n \n \n\n\n \n Turan, U.; Toroslu, I. H.; and Kantarcioglu, M.\n\n\n \n\n\n\n Data Knowl. Eng., 111: 1–21. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/dke/TuranTK17,\n  author       = {Ugur Turan and\n                  Ismail Hakki Toroslu and\n                  Murat Kantarcioglu},\n  title        = {Secure logical schema and decomposition algorithm for proactive context\n                  dependent attribute based inference control},\n  journal      = {Data Knowl. Eng.},\n  volume       = {111},\n  pages        = {1--21},\n  year         = {2017},\n  url          = {https://doi.org/10.1016/j.datak.2017.02.002},\n  doi          = {10.1016/J.DATAK.2017.02.002},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/dke/TuranTK17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Security and Privacy in Cyber-Physical Systems: A Survey of Surveys.\n \n \n \n \n\n\n \n Giraldo, J.; Sarkar, E.; Cárdenas, A. A.; Maniatakos, M.; and Kantarcioglu, M.\n\n\n \n\n\n\n IEEE Des. Test, 34(4): 7–17. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/dt/GiraldoSCMK17,\n  author       = {Jairo Giraldo and\n                  Esha Sarkar and\n                  Alvaro A. C{\\'{a}}rdenas and\n                  Michail Maniatakos and\n                  Murat Kantarcioglu},\n  title        = {Security and Privacy in Cyber-Physical Systems: {A} Survey of Surveys},\n  journal      = {{IEEE} Des. Test},\n  volume       = {34},\n  number       = {4},\n  pages        = {7--17},\n  year         = {2017},\n  url          = {https://doi.org/10.1109/MDAT.2017.2709310},\n  doi          = {10.1109/MDAT.2017.2709310},\n  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/dt/GiraldoSCMK17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Security vs. privacy: How integrity attacks can be masked by the noise of differential privacy.\n \n \n \n \n\n\n \n Giraldo, J.; Cárdenas, A. A.; and Kantarcioglu, M.\n\n\n \n\n\n\n In 2017 American Control Conference, ACC 2017, Seattle, WA, USA, May 24-26, 2017, pages 1679–1684, 2017. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/amcc/GiraldoCK17,\n  author       = {Jairo Giraldo and\n                  Alvaro A. C{\\'{a}}rdenas and\n                  Murat Kantarcioglu},\n  title        = {Security vs. privacy: How integrity attacks can be masked by the noise\n                  of differential privacy},\n  booktitle    = {2017 American Control Conference, {ACC} 2017, Seattle, WA, USA, May\n                  24-26, 2017},\n  pages        = {1679--1684},\n  publisher    = {{IEEE}},\n  year         = {2017},\n  url          = {https://doi.org/10.23919/ACC.2017.7963194},\n  doi          = {10.23919/ACC.2017.7963194},\n  timestamp    = {Fri, 03 Dec 2021 13:04:31 +0100},\n  biburl       = {https://dblp.org/rec/conf/amcc/GiraldoCK17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Open Source Tool for Game Theoretic Health Data De-Identification.\n \n \n \n \n\n\n \n Prasser, F.; Gaupp, J.; Wan, Z.; Xia, W.; Vorobeychik, Y.; Kantarcioglu, M.; Kuhn, K. A.; and Malin, B. A.\n\n\n \n\n\n\n In AMIA 2017, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 4-8, 2017, 2017. AMIA\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/amia/PrasserGWXVKKM17,\n  author       = {Fabian Prasser and\n                  James Gaupp and\n                  Zhiyu Wan and\n                  Weiyi Xia and\n                  Yevgeniy Vorobeychik and\n                  Murat Kantarcioglu and\n                  Klaus A. Kuhn and\n                  Bradley A. Malin},\n  title        = {An Open Source Tool for Game Theoretic Health Data De-Identification},\n  booktitle    = {{AMIA} 2017, American Medical Informatics Association Annual Symposium,\n                  Washington, DC, USA, November 4-8, 2017},\n  publisher    = {{AMIA}},\n  year         = {2017},\n  url          = {https://knowledge.amia.org/65881-amiab-1.4254737/t003-1.4258387/f003-1.4258388/2732143-1.4258551/2731708-1.4258548},\n  timestamp    = {Wed, 17 Apr 2024 11:47:24 +0200},\n  biburl       = {https://dblp.org/rec/conf/amia/PrasserGWXVKKM17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper.\n \n \n \n \n\n\n \n Thuraisingham, B.; Kantarcioglu, M.; Bertino, E.; and Clifton, C.\n\n\n \n\n\n\n In Karypis, G.; and Zhang, J., editor(s), 2017 IEEE International Congress on Big Data, BigData Congress 2017, Honolulu, HI, USA, June 25-30, 2017, pages 256–265, 2017. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/bigdata/ThuraisinghamKB17,\n  author       = {Bhavani Thuraisingham and\n                  Murat Kantarcioglu and\n                  Elisa Bertino and\n                  Chris Clifton},\n  editor       = {George Karypis and\n                  Jia Zhang},\n  title        = {Towards a Framework for Developing Cyber Privacy Metrics: {A} Vision\n                  Paper},\n  booktitle    = {2017 {IEEE} International Congress on Big Data, BigData Congress 2017,\n                  Honolulu, HI, USA, June 25-30, 2017},\n  pages        = {256--265},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2017},\n  url          = {https://doi.org/10.1109/BigDataCongress.2017.92},\n  doi          = {10.1109/BIGDATACONGRESS.2017.92},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/bigdata/ThuraisinghamKB17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors.\n \n \n \n \n\n\n \n Shaon, F.; Kantarcioglu, M.; Lin, Z.; and Khan, L.\n\n\n \n\n\n\n In Thuraisingham, B.; Evans, D.; Malkin, T.; and Xu, D., editor(s), Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pages 1211–1228, 2017. ACM\n \n\n\n\n
\n\n\n\n \n \n \"SGX-BigMatrix:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccs/ShaonKLK17,\n  author       = {Fahad Shaon and\n                  Murat Kantarcioglu and\n                  Zhiqiang Lin and\n                  Latifur Khan},\n  editor       = {Bhavani Thuraisingham and\n                  David Evans and\n                  Tal Malkin and\n                  Dongyan Xu},\n  title        = {SGX-BigMatrix: {A} Practical Encrypted Data Analytic Framework With\n                  Trusted Processors},\n  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and\n                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -\n                  November 03, 2017},\n  pages        = {1211--1228},\n  publisher    = {{ACM}},\n  year         = {2017},\n  url          = {https://doi.org/10.1145/3133956.3134095},\n  doi          = {10.1145/3133956.3134095},\n  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},\n  biburl       = {https://dblp.org/rec/conf/ccs/ShaonKLK17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Security and privacy trade-offs in CPS by leveraging inherent differential privacy.\n \n \n \n \n\n\n \n Giraldo, J.; Cárdenas, A. A.; and Kantarcioglu, M.\n\n\n \n\n\n\n In IEEE Conference on Control Technology and Applications, CCTA 2017, Mauna Lani Resort, HI, USA, August 27-30, 2017, pages 1313–1318, 2017. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccta/GiraldoCK17,\n  author       = {Jairo Giraldo and\n                  Alvaro A. C{\\'{a}}rdenas and\n                  Murat Kantarcioglu},\n  title        = {Security and privacy trade-offs in {CPS} by leveraging inherent differential\n                  privacy},\n  booktitle    = {{IEEE} Conference on Control Technology and Applications, {CCTA} 2017,\n                  Mauna Lani Resort, HI, USA, August 27-30, 2017},\n  pages        = {1313--1318},\n  publisher    = {{IEEE}},\n  year         = {2017},\n  url          = {https://doi.org/10.1109/CCTA.2017.8062640},\n  doi          = {10.1109/CCTA.2017.8062640},\n  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/ccta/GiraldoCK17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Building a Dossier on the Cheap: Integrating Distributed Personal Data Resources Under Cost Constraints.\n \n \n \n \n\n\n \n Anindya, I. C.; Roy, H.; Kantarcioglu, M.; and Malin, B. A.\n\n\n \n\n\n\n In Lim, E.; Winslett, M.; Sanderson, M.; Fu, A. W.; Sun, J.; Culpepper, J. S.; Lo, E.; Ho, J. C.; Donato, D.; Agrawal, R.; Zheng, Y.; Castillo, C.; Sun, A.; Tseng, V. S.; and Li, C., editor(s), Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, CIKM 2017, Singapore, November 06 - 10, 2017, pages 1549–1558, 2017. ACM\n \n\n\n\n
\n\n\n\n \n \n \"BuildingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cikm/AnindyaRKM17,\n  author       = {Imrul Chowdhury Anindya and\n                  Harichandan Roy and\n                  Murat Kantarcioglu and\n                  Bradley A. Malin},\n  editor       = {Ee{-}Peng Lim and\n                  Marianne Winslett and\n                  Mark Sanderson and\n                  Ada Wai{-}Chee Fu and\n                  Jimeng Sun and\n                  J. Shane Culpepper and\n                  Eric Lo and\n                  Joyce C. Ho and\n                  Debora Donato and\n                  Rakesh Agrawal and\n                  Yu Zheng and\n                  Carlos Castillo and\n                  Aixin Sun and\n                  Vincent S. Tseng and\n                  Chenliang Li},\n  title        = {Building a Dossier on the Cheap: Integrating Distributed Personal\n                  Data Resources Under Cost Constraints},\n  booktitle    = {Proceedings of the 2017 {ACM} on Conference on Information and Knowledge\n                  Management, {CIKM} 2017, Singapore, November 06 - 10, 2017},\n  pages        = {1549--1558},\n  publisher    = {{ACM}},\n  year         = {2017},\n  url          = {https://doi.org/10.1145/3132847.3132951},\n  doi          = {10.1145/3132847.3132951},\n  timestamp    = {Tue, 29 Aug 2023 16:24:43 +0200},\n  biburl       = {https://dblp.org/rec/conf/cikm/AnindyaRKM17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n From Myths to Norms: Demystifying Data Mining Models with Instance-Based Transparency.\n \n \n \n \n\n\n \n Alufaisan, Y.; Zhou, Y.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In 3rd IEEE International Conference on Collaboration and Internet Computing, CIC 2017, San Jose, CA, USA, October 15-17, 2017, pages 257–266, 2017. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"FromPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/coinco/AlufaisanZKT17,\n  author       = {Yasmeen Alufaisan and\n                  Yan Zhou and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  title        = {From Myths to Norms: Demystifying Data Mining Models with Instance-Based\n                  Transparency},\n  booktitle    = {3rd {IEEE} International Conference on Collaboration and Internet\n                  Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017},\n  pages        = {257--266},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2017},\n  url          = {https://doi.org/10.1109/CIC.2017.00042},\n  doi          = {10.1109/CIC.2017.00042},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/coinco/AlufaisanZKT17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential Privacy.\n \n \n \n \n\n\n \n Tong, X.; Xi, B.; Kantarcioglu, M.; and Inan, A.\n\n\n \n\n\n\n In Livraga, G.; and Zhu, S., editor(s), Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings, volume 10359, of Lecture Notes in Computer Science, pages 123–141, 2017. Springer\n \n\n\n\n
\n\n\n\n \n \n \"GaussianPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dbsec/TongXKI17,\n  author       = {Xiaosu Tong and\n                  Bowei Xi and\n                  Murat Kantarcioglu and\n                  Ali Inan},\n  editor       = {Giovanni Livraga and\n                  Sencun Zhu},\n  title        = {Gaussian Mixture Models for Classification and Hypothesis Tests Under\n                  Differential Privacy},\n  booktitle    = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}\n                  {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,\n                  2017, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {10359},\n  pages        = {123--141},\n  publisher    = {Springer},\n  year         = {2017},\n  url          = {https://doi.org/10.1007/978-3-319-61176-1\\_7},\n  doi          = {10.1007/978-3-319-61176-1\\_7},\n  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},\n  biburl       = {https://dblp.org/rec/conf/dbsec/TongXKI17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Securing Data Analytics on SGX with Randomization.\n \n \n \n \n\n\n \n Chandra, S.; Karande, V.; Lin, Z.; Khan, L.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Foley, S. N.; Gollmann, D.; and Snekkenes, E., editor(s), Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I, volume 10492, of Lecture Notes in Computer Science, pages 352–369, 2017. Springer\n \n\n\n\n
\n\n\n\n \n \n \"SecuringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/esorics/ChandraKLKKT17,\n  author       = {Swarup Chandra and\n                  Vishal Karande and\n                  Zhiqiang Lin and\n                  Latifur Khan and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Simon N. Foley and\n                  Dieter Gollmann and\n                  Einar Snekkenes},\n  title        = {Securing Data Analytics on {SGX} with Randomization},\n  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research\n                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,\n                  Part {I}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {10492},\n  pages        = {352--369},\n  publisher    = {Springer},\n  year         = {2017},\n  url          = {https://doi.org/10.1007/978-3-319-66402-6\\_21},\n  doi          = {10.1007/978-3-319-66402-6\\_21},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/esorics/ChandraKLKKT17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms.\n \n \n \n \n\n\n \n Giraldo, J.; Cárdenas, A. A.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, Hanover, MD, USA, April 4-5, 2017, pages 1–12, 2017. ACM\n \n\n\n\n
\n\n\n\n \n \n \"LeveragingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/hotsos/GiraldoCK17,\n  author       = {Jairo Giraldo and\n                  Alvaro A. C{\\'{a}}rdenas and\n                  Murat Kantarcioglu},\n  title        = {Leveraging Unique {CPS} Properties to Design Better Privacy-Enhancing\n                  Algorithms},\n  booktitle    = {Proceedings of the Hot Topics in Science of Security: Symposium and\n                  Bootcamp, HoTSoS 2017, Hanover, MD, USA, April 4-5, 2017},\n  pages        = {1--12},\n  publisher    = {{ACM}},\n  year         = {2017},\n  url          = {https://doi.org/10.1145/3055305.3055313},\n  doi          = {10.1145/3055305.3055313},\n  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/hotsos/GiraldoCK17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure and Efficient Query Processing over Hybrid Clouds.\n \n \n \n \n\n\n \n Oktay, K. Y.; Kantarcioglu, M.; and Mehrotra, S.\n\n\n \n\n\n\n In 33rd IEEE International Conference on Data Engineering, ICDE 2017, San Diego, CA, USA, April 19-22, 2017, pages 733–744, 2017. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icde/OktayKM17,\n  author       = {Kerim Yasin Oktay and\n                  Murat Kantarcioglu and\n                  Sharad Mehrotra},\n  title        = {Secure and Efficient Query Processing over Hybrid Clouds},\n  booktitle    = {33rd {IEEE} International Conference on Data Engineering, {ICDE} 2017,\n                  San Diego, CA, USA, April 19-22, 2017},\n  pages        = {733--744},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2017},\n  url          = {https://doi.org/10.1109/ICDE.2017.125},\n  doi          = {10.1109/ICDE.2017.125},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icde/OktayKM17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive Applications.\n \n \n \n \n\n\n \n Bertino, E.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Zhang, C.; Palanisamy, B.; Khan, L.; and Sarvestani, S. S., editor(s), 2017 IEEE International Conference on Information Reuse and Integration, IRI 2017, San Diego, CA, USA, August 4-6, 2017, pages 108–114, 2017. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iri/BertinoK17,\n  author       = {Elisa Bertino and\n                  Murat Kantarcioglu},\n  editor       = {Chengcui Zhang and\n                  Balaji Palanisamy and\n                  Latifur Khan and\n                  Sahra Sedigh Sarvestani},\n  title        = {A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive\n                  Applications},\n  booktitle    = {2017 {IEEE} International Conference on Information Reuse and Integration,\n                  {IRI} 2017, San Diego, CA, USA, August 4-6, 2017},\n  pages        = {108--114},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2017},\n  url          = {https://doi.org/10.1109/IRI.2017.91},\n  doi          = {10.1109/IRI.2017.91},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/iri/BertinoK17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Hacking social network data mining.\n \n \n \n \n\n\n \n Alufaisan, Y.; Zhou, Y.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pages 54–59, 2017. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"HackingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/AlufaisanZKT17,\n  author       = {Yasmeen Alufaisan and\n                  Yan Zhou and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  title        = {Hacking social network data mining},\n  booktitle    = {2017 {IEEE} International Conference on Intelligence and Security\n                  Informatics, {ISI} 2017, Beijing, China, July 22-24, 2017},\n  pages        = {54--59},\n  publisher    = {{IEEE}},\n  year         = {2017},\n  url          = {https://doi.org/10.1109/ISI.2017.8004874},\n  doi          = {10.1109/ISI.2017.8004874},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/isi/AlufaisanZKT17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017.\n \n \n \n \n\n\n \n Wang, C.; and Kantarcioglu, M.,\n editors.\n \n\n\n \n\n\n\n ACM. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"ProceedingsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@proceedings{DBLP:conf/ccs/2017scc,\n  editor       = {Cong Wang and\n                  Murat Kantarcioglu},\n  title        = {Proceedings of the Fifth {ACM} International Workshop on Security\n                  in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,\n                  April 2, 2017},\n  publisher    = {{ACM}},\n  year         = {2017},\n  url          = {https://doi.org/10.1145/3055259},\n  doi          = {10.1145/3055259},\n  isbn         = {978-1-4503-4970-3},\n  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/ccs/2017scc.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Geospatial Semantic Web, Definition.\n \n \n \n \n\n\n \n Thuraisingham, B.; Khan, L.; Subbiah, G.; Alam, A.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Shekhar, S.; Xiong, H.; and Zhou, X., editor(s), Encyclopedia of GIS, pages 746. Springer, 2017.\n \n\n\n\n
\n\n\n\n \n \n \"GeospatialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:reference/gis/ThuraisinghamKSAK17,\n  author       = {Bhavani Thuraisingham and\n                  Latifur Khan and\n                  Ganesh Subbiah and\n                  Ashraful Alam and\n                  Murat Kantarcioglu},\n  editor       = {Shashi Shekhar and\n                  Hui Xiong and\n                  Xun Zhou},\n  title        = {Geospatial Semantic Web, Definition},\n  booktitle    = {Encyclopedia of {GIS}},\n  pages        = {746},\n  publisher    = {Springer},\n  year         = {2017},\n  url          = {https://doi.org/10.1007/978-3-319-17885-1\\_515},\n  doi          = {10.1007/978-3-319-17885-1\\_515},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/reference/gis/ThuraisinghamKSAK17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy and Security Challenges in GIS.\n \n \n \n \n\n\n \n Thuraisingham, B.; Khan, L.; Subbiah, G.; Alam, A.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Shekhar, S.; Xiong, H.; and Zhou, X., editor(s), Encyclopedia of GIS, pages 1641–1647. Springer, 2017.\n \n\n\n\n
\n\n\n\n \n \n \"PrivacyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:reference/gis/ThuraisinghamKSAK17a,\n  author       = {Bhavani Thuraisingham and\n                  Latifur Khan and\n                  Ganesh Subbiah and\n                  Ashraful Alam and\n                  Murat Kantarcioglu},\n  editor       = {Shashi Shekhar and\n                  Hui Xiong and\n                  Xun Zhou},\n  title        = {Privacy and Security Challenges in {GIS}},\n  booktitle    = {Encyclopedia of {GIS}},\n  pages        = {1641--1647},\n  publisher    = {Springer},\n  year         = {2017},\n  url          = {https://doi.org/10.1007/978-3-319-17885-1\\_1018},\n  doi          = {10.1007/978-3-319-17885-1\\_1018},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/reference/gis/ThuraisinghamKSAK17a.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Blockchain: A Graph Primer.\n \n \n \n \n\n\n \n Akcora, C. G.; Gel, Y. R.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/1708.08749. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"Blockchain:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1708-08749,\n  author       = {Cuneyt Gurcan Akcora and\n                  Yulia R. Gel and\n                  Murat Kantarcioglu},\n  title        = {Blockchain: {A} Graph Primer},\n  journal      = {CoRR},\n  volume       = {abs/1708.08749},\n  year         = {2017},\n  url          = {http://arxiv.org/abs/1708.08749},\n  eprinttype    = {arXiv},\n  eprint       = {1708.08749},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-08749.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Using Blockchain and smart contracts for secure data provenance management.\n \n \n \n \n\n\n \n Ramachandran, A.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/1709.10000. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"UsingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1709-10000,\n  author       = {Aravind Ramachandran and\n                  Murat Kantarcioglu},\n  title        = {Using Blockchain and smart contracts for secure data provenance management},\n  journal      = {CoRR},\n  volume       = {abs/1709.10000},\n  year         = {2017},\n  url          = {http://arxiv.org/abs/1709.10000},\n  eprinttype    = {arXiv},\n  eprint       = {1709.10000},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-10000.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (13)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Multi-Keyword search over encrypted data with scoring and search pattern obfuscation.\n \n \n \n \n\n\n \n Örencik, C.; Selcuk, A.; Savas, E.; and Kantarcioglu, M.\n\n\n \n\n\n\n Int. J. Inf. Sec., 15(3): 251–269. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"Multi-KeywordPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijisec/OrencikSSK16,\n  author       = {Cengiz {\\"{O}}rencik and\n                  Ayse Selcuk and\n                  Erkay Savas and\n                  Murat Kantarcioglu},\n  title        = {Multi-Keyword search over encrypted data with scoring and search pattern\n                  obfuscation},\n  journal      = {Int. J. Inf. Sec.},\n  volume       = {15},\n  number       = {3},\n  pages        = {251--269},\n  year         = {2016},\n  url          = {https://doi.org/10.1007/s10207-015-0294-9},\n  doi          = {10.1007/S10207-015-0294-9},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijisec/OrencikSSK16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Adversarial Data Mining: Big Data Meets Cyber Security.\n \n \n \n \n\n\n \n Kantarcioglu, M.; and Xi, B.\n\n\n \n\n\n\n In Weippl, E. R.; Katzenbeisser, S.; Kruegel, C.; Myers, A. C.; and Halevi, S., editor(s), Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pages 1866–1867, 2016. ACM\n \n\n\n\n
\n\n\n\n \n \n \"AdversarialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccs/KantarciogluX16,\n  author       = {Murat Kantarcioglu and\n                  Bowei Xi},\n  editor       = {Edgar R. Weippl and\n                  Stefan Katzenbeisser and\n                  Christopher Kruegel and\n                  Andrew C. Myers and\n                  Shai Halevi},\n  title        = {Adversarial Data Mining: Big Data Meets Cyber Security},\n  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and\n                  Communications Security, Vienna, Austria, October 24-28, 2016},\n  pages        = {1866--1867},\n  publisher    = {{ACM}},\n  year         = {2016},\n  url          = {https://doi.org/10.1145/2976749.2976753},\n  doi          = {10.1145/2976749.2976753},\n  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},\n  biburl       = {https://dblp.org/rec/conf/ccs/KantarciogluX16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Detecting Discrimination in a Black-Box Classifier.\n \n \n \n \n\n\n \n Alufaisan, Y.; Kantarcioglu, M.; and Zhou, Y.\n\n\n \n\n\n\n In 2nd IEEE International Conference on Collaboration and Internet Computing, CIC 2016, Pittsburgh, PA, USA, November 1-3, 2016, pages 329–338, 2016. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"DetectingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/coinco/AlufaisanKZ16,\n  author       = {Yasmeen Alufaisan and\n                  Murat Kantarcioglu and\n                  Yan Zhou},\n  title        = {Detecting Discrimination in a Black-Box Classifier},\n  booktitle    = {2nd {IEEE} International Conference on Collaboration and Internet\n                  Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016},\n  pages        = {329--338},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2016},\n  url          = {https://doi.org/10.1109/CIC.2016.051},\n  doi          = {10.1109/CIC.2016.051},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/coinco/AlufaisanKZ16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Practical Differentially Private Modeling of Human Movement Data.\n \n \n \n \n\n\n \n Roy, H.; Kantarcioglu, M.; and Sweeney, L.\n\n\n \n\n\n\n In Ranise, S.; and Swarup, V., editor(s), Data and Applications Security and Privacy XXX - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings, volume 9766, of Lecture Notes in Computer Science, pages 170–178, 2016. Springer\n \n\n\n\n
\n\n\n\n \n \n \"PracticalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dbsec/RoyKS16,\n  author       = {Harichandan Roy and\n                  Murat Kantarcioglu and\n                  Latanya Sweeney},\n  editor       = {Silvio Ranise and\n                  Vipin Swarup},\n  title        = {Practical Differentially Private Modeling of Human Movement Data},\n  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}\n                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.\n                  Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {9766},\n  pages        = {170--178},\n  publisher    = {Springer},\n  year         = {2016},\n  url          = {https://doi.org/10.1007/978-3-319-41483-6\\_13},\n  doi          = {10.1007/978-3-319-41483-6\\_13},\n  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},\n  biburl       = {https://dblp.org/rec/conf/dbsec/RoyKS16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data.\n \n \n \n \n\n\n \n Shaon, F.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Ranise, S.; and Swarup, V., editor(s), Data and Applications Security and Privacy XXX - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings, volume 9766, of Lecture Notes in Computer Science, pages 179–195, 2016. Springer\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dbsec/ShaonK16,\n  author       = {Fahad Shaon and\n                  Murat Kantarcioglu},\n  editor       = {Silvio Ranise and\n                  Vipin Swarup},\n  title        = {A Practical Framework for Executing Complex Queries over Encrypted\n                  Multimedia Data},\n  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}\n                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.\n                  Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {9766},\n  pages        = {179--195},\n  publisher    = {Springer},\n  year         = {2016},\n  url          = {https://doi.org/10.1007/978-3-319-41483-6\\_14},\n  doi          = {10.1007/978-3-319-41483-6\\_14},\n  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/dbsec/ShaonK16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud.\n \n \n \n \n\n\n \n Pattuk, E.; Kantarcioglu, M.; Ulusoy, H.; and Malin, B. A.\n\n\n \n\n\n\n In Ranise, S.; and Swarup, V., editor(s), Data and Applications Security and Privacy XXX - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings, volume 9766, of Lecture Notes in Computer Science, pages 285–294, 2016. Springer\n \n\n\n\n
\n\n\n\n \n \n \"CheapSMC:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dbsec/PattukKUM16,\n  author       = {Erman Pattuk and\n                  Murat Kantarcioglu and\n                  Huseyin Ulusoy and\n                  Bradley A. Malin},\n  editor       = {Silvio Ranise and\n                  Vipin Swarup},\n  title        = {CheapSMC: {A} Framework to Minimize Secure Multiparty Computation\n                  Cost in the Cloud},\n  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}\n                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.\n                  Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {9766},\n  pages        = {285--294},\n  publisher    = {Springer},\n  year         = {2016},\n  url          = {https://doi.org/10.1007/978-3-319-41483-6\\_20},\n  doi          = {10.1007/978-3-319-41483-6\\_20},\n  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/dbsec/PattukKUM16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Optimizing secure classification performance with privacy-aware feature selection.\n \n \n \n \n\n\n \n Pattuk, E.; Kantarcioglu, M.; Ulusoy, H.; and Malin, B. A.\n\n\n \n\n\n\n In 32nd IEEE International Conference on Data Engineering, ICDE 2016, Helsinki, Finland, May 16-20, 2016, pages 217–228, 2016. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"OptimizingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icde/PattukKUM16,\n  author       = {Erman Pattuk and\n                  Murat Kantarcioglu and\n                  Huseyin Ulusoy and\n                  Bradley A. Malin},\n  title        = {Optimizing secure classification performance with privacy-aware feature\n                  selection},\n  booktitle    = {32nd {IEEE} International Conference on Data Engineering, {ICDE} 2016,\n                  Helsinki, Finland, May 16-20, 2016},\n  pages        = {217--228},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2016},\n  url          = {https://doi.org/10.1109/ICDE.2016.7498242},\n  doi          = {10.1109/ICDE.2016.7498242},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icde/PattukKUM16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Framework for Secure Data Collection and Management for Internet of Things.\n \n \n \n \n\n\n \n Fernández, M.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Proceedings of the 2nd Annual Industrial Control System Security Workshop, ICSS 2016, Los Angeles, CA, USA, December 6, 2016, pages 30–37, 2016. ACM\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icss2/FernandezKT16,\n  author       = {Maribel Fern{\\'{a}}ndez and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  title        = {A Framework for Secure Data Collection and Management for Internet\n                  of Things},\n  booktitle    = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,\n                  {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},\n  pages        = {30--37},\n  publisher    = {{ACM}},\n  year         = {2016},\n  url          = {https://doi.org/10.1145/3018981.3018982},\n  doi          = {10.1145/3018981.3018982},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/icss2/FernandezKT16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper.\n \n \n \n \n\n\n \n Thuraisingham, B.; Kantarcioglu, M.; Khan, L.; Carminati, B.; Ferrari, E.; and Bahri, L.\n\n\n \n\n\n\n In 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, IPDPS Workshops 2016, Chicago, IL, USA, May 23-27, 2016, pages 1813–1820, 2016. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Emergency-DrivenPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ipps/ThuraisinghamKK16,\n  author       = {Bhavani Thuraisingham and\n                  Murat Kantarcioglu and\n                  Latifur Khan and\n                  Barbara Carminati and\n                  Elena Ferrari and\n                  Leila Bahri},\n  title        = {Emergency-Driven Assured Information Sharing in Secure Online Social\n                  Networks: {A} Position Paper},\n  booktitle    = {2016 {IEEE} International Parallel and Distributed Processing Symposium\n                  Workshops, {IPDPS} Workshops 2016, Chicago, IL, USA, May 23-27, 2016},\n  pages        = {1813--1820},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2016},\n  url          = {https://doi.org/10.1109/IPDPSW.2016.201},\n  doi          = {10.1109/IPDPSW.2016.201},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/ipps/ThuraisinghamKK16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.\n \n \n \n \n\n\n \n Thuraisingham, B.; Kantarcioglu, M.; Hamlen, K. W.; Khan, L.; Finin, T.; Joshi, A.; Oates, T.; and Bertino, E.\n\n\n \n\n\n\n In 17th IEEE International Conference on Information Reuse and Integration, IRI 2016, Pittsburgh, PA, USA, July 28-30, 2016, pages 1–10, 2016. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iri/ThuraisinghamKH16,\n  author       = {Bhavani Thuraisingham and\n                  Murat Kantarcioglu and\n                  Kevin W. Hamlen and\n                  Latifur Khan and\n                  Tim Finin and\n                  Anupam Joshi and\n                  Tim Oates and\n                  Elisa Bertino},\n  title        = {A Data Driven Approach for the Science of Cyber Security: Challenges\n                  and Directions},\n  booktitle    = {17th {IEEE} International Conference on Information Reuse and Integration,\n                  {IRI} 2016, Pittsburgh, PA, USA, July 28-30, 2016},\n  pages        = {1--10},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2016},\n  url          = {https://doi.org/10.1109/IRI.2016.10},\n  doi          = {10.1109/IRI.2016.10},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/iri/ThuraisinghamKH16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Modeling Adversarial Learning as Nested Stackelberg Games.\n \n \n \n \n\n\n \n Zhou, Y.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Bailey, J.; Khan, L.; Washio, T.; Dobbie, G.; Huang, J. Z.; and Wang, R., editor(s), Advances in Knowledge Discovery and Data Mining - 20th Pacific-Asia Conference, PAKDD 2016, Auckland, New Zealand, April 19-22, 2016, Proceedings, Part II, volume 9652, of Lecture Notes in Computer Science, pages 350–362, 2016. Springer\n \n\n\n\n
\n\n\n\n \n \n \"ModelingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pakdd/ZhouK16,\n  author       = {Yan Zhou and\n                  Murat Kantarcioglu},\n  editor       = {James Bailey and\n                  Latifur Khan and\n                  Takashi Washio and\n                  Gillian Dobbie and\n                  Joshua Zhexue Huang and\n                  Ruili Wang},\n  title        = {Modeling Adversarial Learning as Nested Stackelberg Games},\n  booktitle    = {Advances in Knowledge Discovery and Data Mining - 20th Pacific-Asia\n                  Conference, {PAKDD} 2016, Auckland, New Zealand, April 19-22, 2016,\n                  Proceedings, Part {II}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {9652},\n  pages        = {350--362},\n  publisher    = {Springer},\n  year         = {2016},\n  url          = {https://doi.org/10.1007/978-3-319-31750-2\\_28},\n  doi          = {10.1007/978-3-319-31750-2\\_28},\n  timestamp    = {Tue, 16 Jul 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/pakdd/ZhouK16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CheapSMC: A Framework to Minimize SMC Cost in Cloud.\n \n \n \n \n\n\n \n Pattuk, E.; Kantarcioglu, M.; Ulusoy, H.; and Malin, B. A.\n\n\n \n\n\n\n CoRR, abs/1605.00300. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"CheapSMC:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/PattukKUM16,\n  author       = {Erman Pattuk and\n                  Murat Kantarcioglu and\n                  Huseyin Ulusoy and\n                  Bradley A. Malin},\n  title        = {CheapSMC: {A} Framework to Minimize {SMC} Cost in Cloud},\n  journal      = {CoRR},\n  volume       = {abs/1605.00300},\n  year         = {2016},\n  url          = {http://arxiv.org/abs/1605.00300},\n  eprinttype    = {arXiv},\n  eprint       = {1605.00300},\n  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/PattukKUM16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data.\n \n \n \n \n\n\n \n Shaon, F.; and Kantarcioglu, M.\n\n\n \n\n\n\n IACR Cryptol. ePrint Arch.,426. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/ShaonK16,\n  author       = {Fahad Shaon and\n                  Murat Kantarcioglu},\n  title        = {A Practical Framework for Executing Complex Queries over Encrypted\n                  Multimedia Data},\n  journal      = {{IACR} Cryptol. ePrint Arch.},\n  pages        = {426},\n  year         = {2016},\n  url          = {http://eprint.iacr.org/2016/426},\n  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/iacr/ShaonK16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (15)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students.\n \n \n \n \n\n\n \n Verma, R. M.; Kantarcioglu, M.; Marchette, D. J.; Leiss, E. L.; and Solorio, T.\n\n\n \n\n\n\n IEEE Secur. Priv., 13(6): 60–65. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ieeesp/VermaKMLS15,\n  author       = {Rakesh M. Verma and\n                  Murat Kantarcioglu and\n                  David J. Marchette and\n                  Ernst L. Leiss and\n                  Thamar Solorio},\n  title        = {Security Analytics: Essential Data Analytics Knowledge for Cybersecurity\n                  Professionals and Students},\n  journal      = {{IEEE} Secur. Priv.},\n  volume       = {13},\n  number       = {6},\n  pages        = {60--65},\n  year         = {2015},\n  url          = {https://doi.org/10.1109/MSP.2015.121},\n  doi          = {10.1109/MSP.2015.121},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ieeesp/VermaKMLS15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A privacy preserving protocol for tracking participants in phase I clinical trials.\n \n \n \n \n\n\n \n Emam, K. E.; Farah, H.; Samet, S.; Essex, A.; Jonker, E.; Kantarcioglu, M.; and Earle, C.\n\n\n \n\n\n\n J. Biomed. Informatics, 57: 145–162. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jbi/EmamFSEJKE15,\n  author       = {Khaled El Emam and\n                  Hanna Farah and\n                  Saeed Samet and\n                  Aleksander Essex and\n                  Elizabeth Jonker and\n                  Murat Kantarcioglu and\n                  Craig Earle},\n  title        = {A privacy preserving protocol for tracking participants in phase {I}\n                  clinical trials},\n  journal      = {J. Biomed. Informatics},\n  volume       = {57},\n  pages        = {145--162},\n  year         = {2015},\n  url          = {https://doi.org/10.1016/j.jbi.2015.06.019},\n  doi          = {10.1016/J.JBI.2015.06.019},\n  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/jbi/EmamFSEJKE15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n TrustMR: Computation integrity assurance system for MapReduce.\n \n \n \n \n\n\n \n Ulusoy, H.; Kantarcioglu, M.; and Pattuk, E.\n\n\n \n\n\n\n In 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29 - November 1, 2015, pages 441–450, 2015. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"TrustMR:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/bigdataconf/UlusoyKP15,\n  author       = {Huseyin Ulusoy and\n                  Murat Kantarcioglu and\n                  Erman Pattuk},\n  title        = {TrustMR: Computation integrity assurance system for MapReduce},\n  booktitle    = {2015 {IEEE} International Conference on Big Data {(IEEE} BigData 2015),\n                  Santa Clara, CA, USA, October 29 - November 1, 2015},\n  pages        = {441--450},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2015},\n  url          = {https://doi.org/10.1109/BigData.2015.7363785},\n  doi          = {10.1109/BIGDATA.2015.7363785},\n  timestamp    = {Fri, 19 Nov 2021 16:08:20 +0100},\n  biburl       = {https://dblp.org/rec/conf/bigdataconf/UlusoyKP15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n AccountableMR: Toward accountable MapReduce systems.\n \n \n \n \n\n\n \n Ulusoy, H.; Kantarcioglu, M.; Pattuk, E.; and Kagal, L.\n\n\n \n\n\n\n In 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29 - November 1, 2015, pages 451–460, 2015. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"AccountableMR:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/bigdataconf/UlusoyKPK15,\n  author       = {Huseyin Ulusoy and\n                  Murat Kantarcioglu and\n                  Erman Pattuk and\n                  Lalana Kagal},\n  title        = {AccountableMR: Toward accountable MapReduce systems},\n  booktitle    = {2015 {IEEE} International Conference on Big Data {(IEEE} BigData 2015),\n                  Santa Clara, CA, USA, October 29 - November 1, 2015},\n  pages        = {451--460},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2015},\n  url          = {https://doi.org/10.1109/BigData.2015.7363786},\n  doi          = {10.1109/BIGDATA.2015.7363786},\n  timestamp    = {Wed, 31 Mar 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/bigdataconf/UlusoyKPK15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems.\n \n \n \n \n\n\n \n Ulusoy, H.; Colombo, P.; Ferrari, E.; Kantarcioglu, M.; and Pattuk, E.\n\n\n \n\n\n\n In Bao, F.; Miller, S.; Zhou, J.; and Ahn, G., editor(s), Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015, pages 285–296, 2015. ACM\n \n\n\n\n
\n\n\n\n \n \n \"GuardMR:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccs/UlusoyCFKP15,\n  author       = {Huseyin Ulusoy and\n                  Pietro Colombo and\n                  Elena Ferrari and\n                  Murat Kantarcioglu and\n                  Erman Pattuk},\n  editor       = {Feng Bao and\n                  Steven Miller and\n                  Jianying Zhou and\n                  Gail{-}Joon Ahn},\n  title        = {GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems},\n  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and\n                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,\n                  2015},\n  pages        = {285--296},\n  publisher    = {{ACM}},\n  year         = {2015},\n  url          = {https://doi.org/10.1145/2714576.2714624},\n  doi          = {10.1145/2714576.2714624},\n  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},\n  biburl       = {https://dblp.org/rec/conf/ccs/UlusoyCFKP15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Process-Driven Data Privacy.\n \n \n \n \n\n\n \n Xia, W.; Kantarcioglu, M.; Wan, Z.; Heatherly, R.; Vorobeychik, Y.; and Malin, B. A.\n\n\n \n\n\n\n In Bailey, J.; Moffat, A.; Aggarwal, C. C.; de Rijke, M.; Kumar, R.; Murdock, V.; Sellis, T. K.; and Yu, J. X., editor(s), Proceedings of the 24th ACM International Conference on Information and Knowledge Management, CIKM 2015, Melbourne, VIC, Australia, October 19 - 23, 2015, pages 1021–1030, 2015. ACM\n \n\n\n\n
\n\n\n\n \n \n \"Process-DrivenPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cikm/XiaKWHVM15,\n  author       = {Weiyi Xia and\n                  Murat Kantarcioglu and\n                  Zhiyu Wan and\n                  Raymond Heatherly and\n                  Yevgeniy Vorobeychik and\n                  Bradley A. Malin},\n  editor       = {James Bailey and\n                  Alistair Moffat and\n                  Charu C. Aggarwal and\n                  Maarten de Rijke and\n                  Ravi Kumar and\n                  Vanessa Murdock and\n                  Timos K. Sellis and\n                  Jeffrey Xu Yu},\n  title        = {Process-Driven Data Privacy},\n  booktitle    = {Proceedings of the 24th {ACM} International Conference on Information\n                  and Knowledge Management, {CIKM} 2015, Melbourne, VIC, Australia,\n                  October 19 - 23, 2015},\n  pages        = {1021--1030},\n  publisher    = {{ACM}},\n  year         = {2015},\n  url          = {https://doi.org/10.1145/2806416.2806580},\n  doi          = {10.1145/2806416.2806580},\n  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/cikm/XiaKWHVM15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students.\n \n \n \n \n\n\n \n Chan, W.; Cybenko, G.; Kantarcioglu, M.; Leiss, E. L.; Solorio, T.; Thuraisingham, B.; and Verma, R. M.\n\n\n \n\n\n\n In Huang, S.; and Verma, R. M., editor(s), Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2015, San Antonio, TX, USA, March 4, 2015, pages 55–57, 2015. ACM\n \n\n\n\n
\n\n\n\n \n \n \"Panel:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/codaspy/ChanCKLSTV15,\n  author       = {Wenyaw Chan and\n                  George Cybenko and\n                  Murat Kantarcioglu and\n                  Ernst L. Leiss and\n                  Thamar Solorio and\n                  Bhavani Thuraisingham and\n                  Rakesh M. Verma},\n  editor       = {Stephen Huang and\n                  Rakesh M. Verma},\n  title        = {Panel: Essential Data Analytics Knowledge forCyber-security Professionals\n                  and Students},\n  booktitle    = {Proceedings of the 2015 {ACM} International Workshop on International\n                  Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2015, San\n                  Antonio, TX, USA, March 4, 2015},\n  pages        = {55--57},\n  publisher    = {{ACM}},\n  year         = {2015},\n  url          = {https://doi.org/10.1145/2713579.2713590},\n  doi          = {10.1145/2713579.2713590},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/codaspy/ChanCKLSTV15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n BigGate: Access Control Framework for Outsourced Key-Value Stores.\n \n \n \n \n\n\n \n Pattuk, E.; Kantarcioglu, M.; and Ulusoy, H.\n\n\n \n\n\n\n In Park, J.; and Squicciarini, A. C., editor(s), Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015, pages 171–182, 2015. ACM\n \n\n\n\n
\n\n\n\n \n \n \"BigGate:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/codaspy/PattukKU15,\n  author       = {Erman Pattuk and\n                  Murat Kantarcioglu and\n                  Huseyin Ulusoy},\n  editor       = {Jaehong Park and\n                  Anna Cinzia Squicciarini},\n  title        = {BigGate: Access Control Framework for Outsourced Key-Value Stores},\n  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security\n                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},\n  pages        = {171--182},\n  publisher    = {{ACM}},\n  year         = {2015},\n  url          = {https://doi.org/10.1145/2699026.2699110},\n  doi          = {10.1145/2699026.2699110},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/codaspy/PattukKU15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Dynamic Approach to Detect Anomalous Queries on Relational Databases.\n \n \n \n \n\n\n \n Islam, M. S.; Kuzu, M.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Park, J.; and Squicciarini, A. C., editor(s), Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015, pages 245–252, 2015. ACM\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/codaspy/IslamKK15,\n  author       = {Mohammad Saiful Islam and\n                  Mehmet Kuzu and\n                  Murat Kantarcioglu},\n  editor       = {Jaehong Park and\n                  Anna Cinzia Squicciarini},\n  title        = {A Dynamic Approach to Detect Anomalous Queries on Relational Databases},\n  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security\n                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},\n  pages        = {245--252},\n  publisher    = {{ACM}},\n  year         = {2015},\n  url          = {https://doi.org/10.1145/2699026.2699120},\n  doi          = {10.1145/2699026.2699120},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/codaspy/IslamKK15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Distributed Search over Encrypted Big Data.\n \n \n \n \n\n\n \n Kuzu, M.; Islam, M. S.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Park, J.; and Squicciarini, A. C., editor(s), Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015, pages 271–278, 2015. ACM\n \n\n\n\n
\n\n\n\n \n \n \"DistributedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/codaspy/KuzuIK15,\n  author       = {Mehmet Kuzu and\n                  Mohammad Saiful Islam and\n                  Murat Kantarcioglu},\n  editor       = {Jaehong Park and\n                  Anna Cinzia Squicciarini},\n  title        = {Distributed Search over Encrypted Big Data},\n  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security\n                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},\n  pages        = {271--278},\n  publisher    = {{ACM}},\n  year         = {2015},\n  url          = {https://doi.org/10.1145/2699026.2699116},\n  doi          = {10.1145/2699026.2699116},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/codaspy/KuzuIK15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy-aware dynamic feature selection.\n \n \n \n \n\n\n \n Pattuk, E.; Kantarcioglu, M.; Ulusoy, H.; and Malin, B. A.\n\n\n \n\n\n\n In Gehrke, J.; Lehner, W.; Shim, K.; Cha, S. K.; and Lohman, G. M., editor(s), 31st IEEE International Conference on Data Engineering, ICDE 2015, Seoul, South Korea, April 13-17, 2015, pages 78–88, 2015. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Privacy-awarePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icde/PattukKUM15,\n  author       = {Erman Pattuk and\n                  Murat Kantarcioglu and\n                  Huseyin Ulusoy and\n                  Bradley A. Malin},\n  editor       = {Johannes Gehrke and\n                  Wolfgang Lehner and\n                  Kyuseok Shim and\n                  Sang Kyun Cha and\n                  Guy M. Lohman},\n  title        = {Privacy-aware dynamic feature selection},\n  booktitle    = {31st {IEEE} International Conference on Data Engineering, {ICDE} 2015,\n                  Seoul, South Korea, April 13-17, 2015},\n  pages        = {78--88},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2015},\n  url          = {https://doi.org/10.1109/ICDE.2015.7113274},\n  doi          = {10.1109/ICDE.2015.7113274},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icde/PattukKUM15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A hybrid private record linkage scheme: Separating differentially private synopses from matching records.\n \n \n \n \n\n\n \n Cao, J.; Rao, F.; Bertino, E.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Gehrke, J.; Lehner, W.; Shim, K.; Cha, S. K.; and Lohman, G. M., editor(s), 31st IEEE International Conference on Data Engineering, ICDE 2015, Seoul, South Korea, April 13-17, 2015, pages 1011–1022, 2015. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icde/CaoRBK15,\n  author       = {Jianneng Cao and\n                  Fang{-}Yu Rao and\n                  Elisa Bertino and\n                  Murat Kantarcioglu},\n  editor       = {Johannes Gehrke and\n                  Wolfgang Lehner and\n                  Kyuseok Shim and\n                  Sang Kyun Cha and\n                  Guy M. Lohman},\n  title        = {A hybrid private record linkage scheme: Separating differentially\n                  private synopses from matching records},\n  booktitle    = {31st {IEEE} International Conference on Data Engineering, {ICDE} 2015,\n                  Seoul, South Korea, April 13-17, 2015},\n  pages        = {1011--1022},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2015},\n  url          = {https://doi.org/10.1109/ICDE.2015.7113352},\n  doi          = {10.1109/ICDE.2015.7113352},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icde/CaoRBK15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Design and Implementation of a Semantic Web-Based Inference Controller: A Summary.\n \n \n \n \n\n\n \n Thuraisingham, B.; Cadenhead, T.; Kantarcioglu, M.; and Khadilkar, V.\n\n\n \n\n\n\n In 2015 IEEE International Conference on Information Reuse and Integration, IRI 2015, San Francisco, CA, USA, August 13-15, 2015, pages 451–456, 2015. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"DesignPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iri/ThuraisinghamCK15,\n  author       = {Bhavani Thuraisingham and\n                  Tyrone Cadenhead and\n                  Murat Kantarcioglu and\n                  Vaibhav Khadilkar},\n  title        = {Design and Implementation of a Semantic Web-Based Inference Controller:\n                  {A} Summary},\n  booktitle    = {2015 {IEEE} International Conference on Information Reuse and Integration,\n                  {IRI} 2015, San Francisco, CA, USA, August 13-15, 2015},\n  pages        = {451--456},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2015},\n  url          = {https://doi.org/10.1109/IRI.2015.75},\n  doi          = {10.1109/IRI.2015.75},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/iri/ThuraisinghamCK15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Honeypot based unauthorized data access detection in MapReduce systems.\n \n \n \n \n\n\n \n Ulusoy, H.; Kantarcioglu, M.; Thuraisingham, B.; and Khan, L.\n\n\n \n\n\n\n In 2015 IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Baltimore, MD, USA, May 27-29, 2015, pages 126–131, 2015. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"HoneypotPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/UlusoyKTK15,\n  author       = {Huseyin Ulusoy and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham and\n                  Latifur Khan},\n  title        = {Honeypot based unauthorized data access detection in MapReduce systems},\n  booktitle    = {2015 {IEEE} International Conference on Intelligence and Security\n                  Informatics, {ISI} 2015, Baltimore, MD, USA, May 27-29, 2015},\n  pages        = {126--131},\n  publisher    = {{IEEE}},\n  year         = {2015},\n  url          = {https://doi.org/10.1109/ISI.2015.7165951},\n  doi          = {10.1109/ISI.2015.7165951},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/isi/UlusoyKTK15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SEMROD: Secure and Efficient MapReduce Over HybriD Clouds.\n \n \n \n \n\n\n \n Oktay, K. Y.; Mehrotra, S.; Khadilkar, V.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Sellis, T. K.; Davidson, S. B.; and Ives, Z. G., editor(s), Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31 - June 4, 2015, pages 153–166, 2015. ACM\n \n\n\n\n
\n\n\n\n \n \n \"SEMROD:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigmod/OktayMKK15,\n  author       = {Kerim Yasin Oktay and\n                  Sharad Mehrotra and\n                  Vaibhav Khadilkar and\n                  Murat Kantarcioglu},\n  editor       = {Timos K. Sellis and\n                  Susan B. Davidson and\n                  Zachary G. Ives},\n  title        = {{SEMROD:} Secure and Efficient MapReduce Over HybriD Clouds},\n  booktitle    = {Proceedings of the 2015 {ACM} {SIGMOD} International Conference on\n                  Management of Data, Melbourne, Victoria, Australia, May 31 - June\n                  4, 2015},\n  pages        = {153--166},\n  publisher    = {{ACM}},\n  year         = {2015},\n  url          = {https://doi.org/10.1145/2723372.2723741},\n  doi          = {10.1145/2723372.2723741},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/sigmod/OktayMKK15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (23)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Secure Data Provenance and Inference Control with Semantic Web.\n \n \n \n \n\n\n \n Thuraisingham, B.; Cadenhead, T.; Kantarcioglu, M.; and Khadilkar, V.\n\n\n \n\n\n\n CRC Press, 2014.\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@book{DBLP:books/daglib/0036463,\n  author       = {Bhavani Thuraisingham and\n                  Tyrone Cadenhead and\n                  Murat Kantarcioglu and\n                  Vaibhav Khadilkar},\n  title        = {Secure Data Provenance and Inference Control with Semantic Web},\n  publisher    = {{CRC} Press},\n  year         = {2014},\n  url          = {https://www.crcpress.com/Secure-Data-Provenance-and-Inference-Control-with-Semantic-Web/Thuraisingham-Cadenhead-Kantarcioglu-Khadilkar/9781466569430},\n  isbn         = {978-1-4665-6943-0},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/books/daglib/0036463.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SecureMA: protecting participant privacy in genetic association meta-analysis.\n \n \n \n \n\n\n \n Xie, W.; Kantarcioglu, M.; Bush, W. S.; Crawford, D. C.; Denny, J. C.; Heatherly, R.; and Malin, B. A.\n\n\n \n\n\n\n Bioinform., 30(23): 3334–3341. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"SecureMA:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/bioinformatics/XieKBCDHM14,\n  author       = {Wei Xie and\n                  Murat Kantarcioglu and\n                  William S. Bush and\n                  Dana C. Crawford and\n                  Joshua C. Denny and\n                  Raymond Heatherly and\n                  Bradley A. Malin},\n  title        = {SecureMA: protecting participant privacy in genetic association meta-analysis},\n  journal      = {Bioinform.},\n  volume       = {30},\n  number       = {23},\n  pages        = {3334--3341},\n  year         = {2014},\n  url          = {https://doi.org/10.1093/bioinformatics/btu561},\n  doi          = {10.1093/BIOINFORMATICS/BTU561},\n  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/bioinformatics/XieKBCDHM14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Special issue on secure and privacy-aware data management.\n \n \n \n \n\n\n \n Ferrari, E.; and Kantarcioglu, M.\n\n\n \n\n\n\n Distributed Parallel Databases, 32(1): 1–3. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"SpecialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/dpd/FerrariK14,\n  author       = {Elena Ferrari and\n                  Murat Kantarcioglu},\n  title        = {Special issue on secure and privacy-aware data management},\n  journal      = {Distributed Parallel Databases},\n  volume       = {32},\n  number       = {1},\n  pages        = {1--3},\n  year         = {2014},\n  url          = {https://doi.org/10.1007/s10619-014-7144-z},\n  doi          = {10.1007/S10619-014-7144-Z},\n  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/dpd/FerrariK14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A roadmap for privacy-enhanced secure data provenance.\n \n \n \n \n\n\n \n Bertino, E.; Ghinita, G.; Kantarcioglu, M.; Nguyen, D.; Park, J.; Sandhu, R. S.; Sultana, S.; Thuraisingham, B.; and Xu, S.\n\n\n \n\n\n\n J. Intell. Inf. Syst., 43(3): 481–501. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jiis/BertinoGKNPSSTX14,\n  author       = {Elisa Bertino and\n                  Gabriel Ghinita and\n                  Murat Kantarcioglu and\n                  Dang Nguyen and\n                  Jae Park and\n                  Ravi S. Sandhu and\n                  Salmin Sultana and\n                  Bhavani Thuraisingham and\n                  Shouhuai Xu},\n  title        = {A roadmap for privacy-enhanced secure data provenance},\n  journal      = {J. Intell. Inf. Syst.},\n  volume       = {43},\n  number       = {3},\n  pages        = {481--501},\n  year         = {2014},\n  url          = {https://doi.org/10.1007/s10844-014-0322-7},\n  doi          = {10.1007/S10844-014-0322-7},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jiis/BertinoGKNPSSTX14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A trust-score-based access control in assured information sharing systems: An application of financial credit risk score models.\n \n \n \n \n\n\n \n Bensoussan, A.; Kantarcioglu, M.; and Hoe, S. C.\n\n\n \n\n\n\n Risk Decis. Anal., 5(2-3): 129–138. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/rda/BensoussanKH14,\n  author       = {Alain Bensoussan and\n                  Murat Kantarcioglu and\n                  SingRu Celine Hoe},\n  title        = {A trust-score-based access control in assured information sharing\n                  systems: An application of financial credit risk score models},\n  journal      = {Risk Decis. Anal.},\n  volume       = {5},\n  number       = {2-3},\n  pages        = {129--138},\n  year         = {2014},\n  url          = {https://doi.org/10.3233/RDA-140105},\n  doi          = {10.3233/RDA-140105},\n  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/rda/BensoussanKH14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Detecting anomalies in social network data consumption.\n \n \n \n \n\n\n \n Akcora, C. G.; Carminati, B.; Ferrari, E.; and Kantarcioglu, M.\n\n\n \n\n\n\n Soc. Netw. Anal. Min., 4(1): 231. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"DetectingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/snam/AkcoraCFK14,\n  author       = {Cuneyt Gurcan Akcora and\n                  Barbara Carminati and\n                  Elena Ferrari and\n                  Murat Kantarcioglu},\n  title        = {Detecting anomalies in social network data consumption},\n  journal      = {Soc. Netw. Anal. Min.},\n  volume       = {4},\n  number       = {1},\n  pages        = {231},\n  year         = {2014},\n  url          = {https://doi.org/10.1007/s13278-014-0231-3},\n  doi          = {10.1007/S13278-014-0231-3},\n  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/snam/AkcoraCFK14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Composite Bloom Filters for Secure Record Linkage.\n \n \n \n \n\n\n \n Durham, E. A.; Kantarcioglu, M.; Xue, Y.; Tóth, C.; Kuzu, M.; and Malin, B. A.\n\n\n \n\n\n\n IEEE Trans. Knowl. Data Eng., 26(12): 2956–2968. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"CompositePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tkde/DurhamKXTKM14,\n  author       = {Elizabeth Ashley Durham and\n                  Murat Kantarcioglu and\n                  Yuan Xue and\n                  Csaba T{\\'{o}}th and\n                  Mehmet Kuzu and\n                  Bradley A. Malin},\n  title        = {Composite Bloom Filters for Secure Record Linkage},\n  journal      = {{IEEE} Trans. Knowl. Data Eng.},\n  volume       = {26},\n  number       = {12},\n  pages        = {2956--2968},\n  year         = {2014},\n  url          = {https://doi.org/10.1109/TKDE.2013.91},\n  doi          = {10.1109/TKDE.2013.91},\n  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/tkde/DurhamKXTKM14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SOEMPI: A Secure Open Enterprise Master Patient Index Software Toolkit for Private Record Linkage.\n \n \n \n \n\n\n \n Tóth, C.; Durham, E. A.; Kantarcioglu, M.; Xue, Y.; and Malin, B. A.\n\n\n \n\n\n\n In AMIA 2014, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 15-19, 2014, 2014. AMIA\n \n\n\n\n
\n\n\n\n \n \n \"SOEMPI:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/amia/TothDKXM14,\n  author       = {Csaba T{\\'{o}}th and\n                  Elizabeth Ashley Durham and\n                  Murat Kantarcioglu and\n                  Yuan Xue and\n                  Bradley A. Malin},\n  title        = {{SOEMPI:} {A} Secure Open Enterprise Master Patient Index Software\n                  Toolkit for Private Record Linkage},\n  booktitle    = {{AMIA} 2014, American Medical Informatics Association Annual Symposium,\n                  Washington, DC, USA, November 15-19, 2014},\n  publisher    = {{AMIA}},\n  year         = {2014},\n  url          = {https://knowledge.amia.org/56638-amia-1.1540970/t-004-1.1544972/f-004-1.1544973/a-212-1.1545037/a-213-1.1545034},\n  timestamp    = {Wed, 17 Apr 2024 11:47:48 +0200},\n  biburl       = {https://dblp.org/rec/conf/amia/TothDKXM14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Vigiles: Fine-Grained Access Control for MapReduce Systems.\n \n \n \n \n\n\n \n Ulusoy, H.; Kantarcioglu, M.; Pattuk, E.; and Hamlen, K. W.\n\n\n \n\n\n\n In 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27 - July 2, 2014, pages 40–47, 2014. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Vigiles:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/bigdata/UlusoyKPH14,\n  author       = {Huseyin Ulusoy and\n                  Murat Kantarcioglu and\n                  Erman Pattuk and\n                  Kevin W. Hamlen},\n  title        = {Vigiles: Fine-Grained Access Control for MapReduce Systems},\n  booktitle    = {2014 {IEEE} International Congress on Big Data, Anchorage, AK, USA,\n                  June 27 - July 2, 2014},\n  pages        = {40--47},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2014},\n  url          = {https://doi.org/10.1109/BigData.Congress.2014.16},\n  doi          = {10.1109/BIGDATA.CONGRESS.2014.16},\n  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},\n  biburl       = {https://dblp.org/rec/conf/bigdata/UlusoyKPH14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Inference attack against encrypted range queries on outsourced databases.\n \n \n \n \n\n\n \n Islam, M. S.; Kuzu, M.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Bertino, E.; Sandhu, R. S.; and Park, J., editor(s), Fourth ACM Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, USA - March 03 - 05, 2014, pages 235–246, 2014. ACM\n \n\n\n\n
\n\n\n\n \n \n \"InferencePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/codaspy/IslamKK14,\n  author       = {Mohammad Saiful Islam and\n                  Mehmet Kuzu and\n                  Murat Kantarcioglu},\n  editor       = {Elisa Bertino and\n                  Ravi S. Sandhu and\n                  Jaehong Park},\n  title        = {Inference attack against encrypted range queries on outsourced databases},\n  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,\n                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},\n  pages        = {235--246},\n  publisher    = {{ACM}},\n  year         = {2014},\n  url          = {https://doi.org/10.1145/2557547.2557561},\n  doi          = {10.1145/2557547.2557561},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/codaspy/IslamKK14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Efficient privacy-aware search over encrypted databases.\n \n \n \n \n\n\n \n Kuzu, M.; Islam, M. S.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Bertino, E.; Sandhu, R. S.; and Park, J., editor(s), Fourth ACM Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, USA - March 03 - 05, 2014, pages 249–256, 2014. ACM\n \n\n\n\n
\n\n\n\n \n \n \"EfficientPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/codaspy/KuzuIK14,\n  author       = {Mehmet Kuzu and\n                  Mohammad Saiful Islam and\n                  Murat Kantarcioglu},\n  editor       = {Elisa Bertino and\n                  Ravi S. Sandhu and\n                  Jaehong Park},\n  title        = {Efficient privacy-aware search over encrypted databases},\n  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,\n                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},\n  pages        = {249--256},\n  publisher    = {{ACM}},\n  year         = {2014},\n  url          = {https://doi.org/10.1145/2557547.2557570},\n  doi          = {10.1145/2557547.2557570},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/codaspy/KuzuIK14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Hybrid Approach for Privacy-preserving Record Linkage.\n \n \n \n \n\n\n \n Kantarcioglu, M.\n\n\n \n\n\n\n In Candan, K. S.; Amer-Yahia, S.; Schweikardt, N.; Christophides, V.; and Leroy, V., editor(s), Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), Athens, Greece, March 28, 2014, volume 1133, of CEUR Workshop Proceedings, pages 384, 2014. CEUR-WS.org\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/edbt/Kantarcioglu14,\n  author       = {Murat Kantarcioglu},\n  editor       = {K. Sel{\\c{c}}uk Candan and\n                  Sihem Amer{-}Yahia and\n                  Nicole Schweikardt and\n                  Vassilis Christophides and\n                  Vincent Leroy},\n  title        = {A Hybrid Approach for Privacy-preserving Record Linkage},\n  booktitle    = {Proceedings of the Workshops of the {EDBT/ICDT} 2014 Joint Conference\n                  {(EDBT/ICDT} 2014), Athens, Greece, March 28, 2014},\n  series       = {{CEUR} Workshop Proceedings},\n  volume       = {1133},\n  pages        = {384},\n  publisher    = {CEUR-WS.org},\n  year         = {2014},\n  url          = {https://ceur-ws.org/Vol-1133/paper-64.pdf},\n  timestamp    = {Fri, 10 Mar 2023 16:23:45 +0100},\n  biburl       = {https://dblp.org/rec/conf/edbt/Kantarcioglu14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Silver Lining: Enforcing Secure Information Flow at the Cloud Edge.\n \n \n \n \n\n\n \n Khan, S. M.; Hamlen, K. W.; and Kantarcioglu, M.\n\n\n \n\n\n\n In 2014 IEEE International Conference on Cloud Engineering, Boston, MA, USA, March 11-14, 2014, pages 37–46, 2014. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"SilverPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ic2e/KhanHK14,\n  author       = {Safwan Mahmud Khan and\n                  Kevin W. Hamlen and\n                  Murat Kantarcioglu},\n  title        = {Silver Lining: Enforcing Secure Information Flow at the Cloud Edge},\n  booktitle    = {2014 {IEEE} International Conference on Cloud Engineering, Boston,\n                  MA, USA, March 11-14, 2014},\n  pages        = {37--46},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2014},\n  url          = {https://doi.org/10.1109/IC2E.2014.83},\n  doi          = {10.1109/IC2E.2014.83},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/ic2e/KhanHK14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Shingled Graph Disassembly: Finding the Undecideable Path.\n \n \n \n \n\n\n \n Wartell, R.; Zhou, Y.; Hamlen, K. W.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Tseng, V. S.; Ho, T. B.; Zhou, Z.; Chen, A. L. P.; and Kao, H., editor(s), Advances in Knowledge Discovery and Data Mining - 18th Pacific-Asia Conference, PAKDD 2014, Tainan, Taiwan, May 13-16, 2014. Proceedings, Part I, volume 8443, of Lecture Notes in Computer Science, pages 273–285, 2014. Springer\n \n\n\n\n
\n\n\n\n \n \n \"ShingledPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pakdd/WartellZHK14,\n  author       = {Richard Wartell and\n                  Yan Zhou and\n                  Kevin W. Hamlen and\n                  Murat Kantarcioglu},\n  editor       = {Vincent S. Tseng and\n                  Tu Bao Ho and\n                  Zhi{-}Hua Zhou and\n                  Arbee L. P. Chen and\n                  Hung{-}Yu Kao},\n  title        = {Shingled Graph Disassembly: Finding the Undecideable Path},\n  booktitle    = {Advances in Knowledge Discovery and Data Mining - 18th Pacific-Asia\n                  Conference, {PAKDD} 2014, Tainan, Taiwan, May 13-16, 2014. Proceedings,\n                  Part {I}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {8443},\n  pages        = {273--285},\n  publisher    = {Springer},\n  year         = {2014},\n  url          = {https://doi.org/10.1007/978-3-319-06608-0\\_23},\n  doi          = {10.1007/978-3-319-06608-0\\_23},\n  timestamp    = {Tue, 16 Jul 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/pakdd/WartellZHK14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards fine grained RDF access control.\n \n \n \n \n\n\n \n Rachapalli, J.; Khadilkar, V.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Osborn, S. L.; Tripunitara, M. V.; and Molloy, I. M., editor(s), 19th ACM Symposium on Access Control Models and Technologies, SACMAT '14, London, ON, Canada - June 25 - 27, 2014, pages 165–176, 2014. ACM\n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sacmat/RachapalliKKT14,\n  author       = {Jyothsna Rachapalli and\n                  Vaibhav Khadilkar and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Sylvia L. Osborn and\n                  Mahesh V. Tripunitara and\n                  Ian M. Molloy},\n  title        = {Towards fine grained {RDF} access control},\n  booktitle    = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}\n                  '14, London, ON, Canada - June 25 - 27, 2014},\n  pages        = {165--176},\n  publisher    = {{ACM}},\n  year         = {2014},\n  url          = {https://doi.org/10.1145/2613087.2613092},\n  doi          = {10.1145/2613087.2613092},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sacmat/RachapalliKKT14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Redaction based RDF access control language.\n \n \n \n \n\n\n \n Rachapalli, J.; Khadilkar, V.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Osborn, S. L.; Tripunitara, M. V.; and Molloy, I. M., editor(s), 19th ACM Symposium on Access Control Models and Technologies, SACMAT '14, London, ON, Canada - June 25 - 27, 2014, pages 177–180, 2014. ACM\n \n\n\n\n
\n\n\n\n \n \n \"RedactionPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sacmat/RachapalliKKT14a,\n  author       = {Jyothsna Rachapalli and\n                  Vaibhav Khadilkar and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Sylvia L. Osborn and\n                  Mahesh V. Tripunitara and\n                  Ian M. Molloy},\n  title        = {Redaction based {RDF} access control language},\n  booktitle    = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}\n                  '14, London, ON, Canada - June 25 - 27, 2014},\n  pages        = {177--180},\n  publisher    = {{ACM}},\n  year         = {2014},\n  url          = {https://doi.org/10.1145/2613087.2613108},\n  doi          = {10.1145/2613087.2613108},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sacmat/RachapalliKKT14a.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Adversarial Learning with Bayesian Hierarchical Mixtures of Experts.\n \n \n \n \n\n\n \n Zhou, Y.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Zaki, M. J.; Obradovic, Z.; Tan, P.; Banerjee, A.; Kamath, C.; and Parthasarathy, S., editor(s), Proceedings of the 2014 SIAM International Conference on Data Mining, Philadelphia, Pennsylvania, USA, April 24-26, 2014, pages 929–937, 2014. SIAM\n \n\n\n\n
\n\n\n\n \n \n \"AdversarialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sdm/ZhouK14,\n  author       = {Yan Zhou and\n                  Murat Kantarcioglu},\n  editor       = {Mohammed Javeed Zaki and\n                  Zoran Obradovic and\n                  Pang{-}Ning Tan and\n                  Arindam Banerjee and\n                  Chandrika Kamath and\n                  Srinivasan Parthasarathy},\n  title        = {Adversarial Learning with Bayesian Hierarchical Mixtures of Experts},\n  booktitle    = {Proceedings of the 2014 {SIAM} International Conference on Data Mining,\n                  Philadelphia, Pennsylvania, USA, April 24-26, 2014},\n  pages        = {929--937},\n  publisher    = {{SIAM}},\n  year         = {2014},\n  url          = {https://doi.org/10.1137/1.9781611973440.106},\n  doi          = {10.1137/1.9781611973440.106},\n  timestamp    = {Fri, 06 Oct 2023 11:45:43 +0200},\n  biburl       = {https://dblp.org/rec/conf/sdm/ZhouK14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Preventing Cryptographic Key Leakage in Cloud Virtual Machines.\n \n \n \n \n\n\n \n Pattuk, E.; Kantarcioglu, M.; Lin, Z.; and Ulusoy, H.\n\n\n \n\n\n\n In Fu, K.; and Jung, J., editor(s), Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014, pages 703–718, 2014. USENIX Association\n \n\n\n\n
\n\n\n\n \n \n \"PreventingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/uss/PattukKLU14,\n  author       = {Erman Pattuk and\n                  Murat Kantarcioglu and\n                  Zhiqiang Lin and\n                  Huseyin Ulusoy},\n  editor       = {Kevin Fu and\n                  Jaeyeon Jung},\n  title        = {Preventing Cryptographic Key Leakage in Cloud Virtual Machines},\n  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,\n                  USA, August 20-22, 2014},\n  pages        = {703--718},\n  publisher    = {{USENIX} Association},\n  year         = {2014},\n  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/pattuk},\n  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},\n  biburl       = {https://dblp.org/rec/conf/uss/PattukKLU14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n RDF-X: a language for sanitizing RDF graphs.\n \n \n \n \n\n\n \n Rachapalli, J.; Khadilkar, V.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Chung, C.; Broder, A. Z.; Shim, K.; and Suel, T., editor(s), 23rd International World Wide Web Conference, WWW '14, Seoul, Republic of Korea, April 7-11, 2014, Companion Volume, pages 363–364, 2014. ACM\n \n\n\n\n
\n\n\n\n \n \n \"RDF-X:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/www/RachapalliKKT14,\n  author       = {Jyothsna Rachapalli and\n                  Vaibhav Khadilkar and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Chin{-}Wan Chung and\n                  Andrei Z. Broder and\n                  Kyuseok Shim and\n                  Torsten Suel},\n  title        = {{RDF-X:} a language for sanitizing {RDF} graphs},\n  booktitle    = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic\n                  of Korea, April 7-11, 2014, Companion Volume},\n  pages        = {363--364},\n  publisher    = {{ACM}},\n  year         = {2014},\n  url          = {https://doi.org/10.1145/2567948.2577367},\n  doi          = {10.1145/2567948.2577367},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/www/RachapalliKKT14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy Issues in Association Rule Mining.\n \n \n \n \n\n\n \n Gkoulalas-Divanis, A.; Haritsa, J. R.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Aggarwal, C. C.; and Han, J., editor(s), Frequent Pattern Mining, pages 369–401. Springer, 2014.\n \n\n\n\n
\n\n\n\n \n \n \"PrivacyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:books/sp/fpm14/Gkoulalas-DivanisHK14,\n  author       = {Aris Gkoulalas{-}Divanis and\n                  Jayant R. Haritsa and\n                  Murat Kantarcioglu},\n  editor       = {Charu C. Aggarwal and\n                  Jiawei Han},\n  title        = {Privacy Issues in Association Rule Mining},\n  booktitle    = {Frequent Pattern Mining},\n  pages        = {369--401},\n  publisher    = {Springer},\n  year         = {2014},\n  url          = {https://doi.org/10.1007/978-3-319-07821-2\\_15},\n  doi          = {10.1007/978-3-319-07821-2\\_15},\n  timestamp    = {Mon, 05 Jun 2017 13:20:20 +0200},\n  biburl       = {https://dblp.org/rec/books/sp/fpm14/Gkoulalas-DivanisHK14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing.\n \n \n \n \n\n\n \n Oktay, K. Y.; Gomathisankaran, M.; Kantarcioglu, M.; Mehrotra, S.; and Singhal, A.\n\n\n \n\n\n\n In Jajodia, S.; Kant, K.; Samarati, P.; Singhal, A.; Swarup, V.; and Wang, C., editor(s), Secure Cloud Computing, pages 213–238. Springer, 2014.\n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:books/sp/securecloud14/OktayGKMS14,\n  author       = {Kerim Yasin Oktay and\n                  Mahadevan Gomathisankaran and\n                  Murat Kantarcioglu and\n                  Sharad Mehrotra and\n                  Anoop Singhal},\n  editor       = {Sushil Jajodia and\n                  Krishna Kant and\n                  Pierangela Samarati and\n                  Anoop Singhal and\n                  Vipin Swarup and\n                  Cliff Wang},\n  title        = {Towards Data Confidentiality and a Vulnerability Analysis Framework\n                  for Cloud Computing},\n  booktitle    = {Secure Cloud Computing},\n  pages        = {213--238},\n  publisher    = {Springer},\n  year         = {2014},\n  url          = {https://doi.org/10.1007/978-1-4614-9278-8\\_10},\n  doi          = {10.1007/978-1-4614-9278-8\\_10},\n  timestamp    = {Thu, 13 Feb 2020 15:16:45 +0100},\n  biburl       = {https://dblp.org/rec/books/sp/securecloud14/OktayGKMS14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2014, Miami, Florida, USA, October 22-25, 2014.\n \n \n \n \n\n\n \n Bertino, E.; Chen, S.; Aberer, K.; Krishnamurthy, P.; and Kantarcioglu, M.,\n editors.\n \n\n\n \n\n\n\n ICST / IEEE. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"10thPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@proceedings{DBLP:conf/colcom/2014,\n  editor       = {Elisa Bertino and\n                  Shu{-}Ching Chen and\n                  Karl Aberer and\n                  Prashant Krishnamurthy and\n                  Murat Kantarcioglu},\n  title        = {10th {IEEE} International Conference on Collaborative Computing: Networking,\n                  Applications and Worksharing, CollaborateCom 2014, Miami, Florida,\n                  USA, October 22-25, 2014},\n  publisher    = {{ICST} / {IEEE}},\n  year         = {2014},\n  url          = {http://eudl.eu/proceedings/COLLABORATECOM/2014},\n  isbn         = {978-1-63190-043-3},\n  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/colcom/2014.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Distributed Framework for Scalable Search over Encrypted Documents.\n \n \n \n \n\n\n \n Kuzu, M.; Islam, M. S.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/1408.5539. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/KuzuIK14,\n  author       = {Mehmet Kuzu and\n                  Mohammad Saiful Islam and\n                  Murat Kantarcioglu},\n  title        = {A Distributed Framework for Scalable Search over Encrypted Documents},\n  journal      = {CoRR},\n  volume       = {abs/1408.5539},\n  year         = {2014},\n  url          = {http://arxiv.org/abs/1408.5539},\n  eprinttype    = {arXiv},\n  eprint       = {1408.5539},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/KuzuIK14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (17)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A practical approach to achieve private medical record linkage in light of public resources.\n \n \n \n \n\n\n \n Kuzu, M.; Kantarcioglu, M.; Durham, E. A.; Tóth, C.; and Malin, B. A.\n\n\n \n\n\n\n J. Am. Medical Informatics Assoc., 20(2): 285–292. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jamia/KuzuKDTM13,\n  author       = {Mehmet Kuzu and\n                  Murat Kantarcioglu and\n                  Elizabeth Ashley Durham and\n                  Csaba T{\\'{o}}th and\n                  Bradley A. Malin},\n  title        = {A practical approach to achieve private medical record linkage in\n                  light of public resources},\n  journal      = {J. Am. Medical Informatics Assoc.},\n  volume       = {20},\n  number       = {2},\n  pages        = {285--292},\n  year         = {2013},\n  url          = {https://doi.org/10.1136/amiajnl-2012-000917},\n  doi          = {10.1136/AMIAJNL-2012-000917},\n  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jamia/KuzuKDTM13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A secure distributed logistic regression protocol for the detection of rare adverse drug events.\n \n \n \n \n\n\n \n Emam, K. E.; Samet, S.; Arbuckle, L.; Tamblyn, R.; Earle, C.; and Kantarcioglu, M.\n\n\n \n\n\n\n J. Am. Medical Informatics Assoc., 20(3): 453–461. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jamia/EmamSATEK13,\n  author       = {Khaled El Emam and\n                  Saeed Samet and\n                  Luk Arbuckle and\n                  Robyn Tamblyn and\n                  Craig Earle and\n                  Murat Kantarcioglu},\n  title        = {A secure distributed logistic regression protocol for the detection\n                  of rare adverse drug events},\n  journal      = {J. Am. Medical Informatics Assoc.},\n  volume       = {20},\n  number       = {3},\n  pages        = {453--461},\n  year         = {2013},\n  url          = {https://doi.org/10.1136/amiajnl-2011-000735},\n  doi          = {10.1136/AMIAJNL-2011-000735},\n  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/jamia/EmamSATEK13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Efficient Tree Pattern Queries On Encrypted XML Documents.\n \n \n \n \n\n\n \n Rao, F.; Cao, J.; Kuzu, M.; Bertino, E.; and Kantarcioglu, M.\n\n\n \n\n\n\n Trans. Data Priv., 6(3): 199–226. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"EfficientPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tdp/RaoCKBK13,\n  author       = {Fang{-}Yu Rao and\n                  Jianneng Cao and\n                  Mehmet Kuzu and\n                  Elisa Bertino and\n                  Murat Kantarcioglu},\n  title        = {Efficient Tree Pattern Queries On Encrypted {XML} Documents},\n  journal      = {Trans. Data Priv.},\n  volume       = {6},\n  number       = {3},\n  pages        = {199--226},\n  year         = {2013},\n  url          = {http://www.tdp.cat/issues11/abs.a156a13.php},\n  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/tdp/RaoCKBK13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Incentive Compatible Privacy-Preserving Data Analysis.\n \n \n \n \n\n\n \n Kantarcioglu, M.; and Jiang, W.\n\n\n \n\n\n\n IEEE Trans. Knowl. Data Eng., 25(6): 1323–1335. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"IncentivePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tkde/KantarciogluJ13,\n  author       = {Murat Kantarcioglu and\n                  Wei Jiang},\n  title        = {Incentive Compatible Privacy-Preserving Data Analysis},\n  journal      = {{IEEE} Trans. Knowl. Data Eng.},\n  volume       = {25},\n  number       = {6},\n  pages        = {1323--1335},\n  year         = {2013},\n  url          = {https://doi.org/10.1109/TKDE.2012.61},\n  doi          = {10.1109/TKDE.2012.61},\n  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tkde/KantarciogluJ13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Preventing Private Information Inference Attacks on Social Networks.\n \n \n \n \n\n\n \n Heatherly, R.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n IEEE Trans. Knowl. Data Eng., 25(8): 1849–1862. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"PreventingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tkde/HeatherlyKT13,\n  author       = {Raymond Heatherly and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  title        = {Preventing Private Information Inference Attacks on Social Networks},\n  journal      = {{IEEE} Trans. Knowl. Data Eng.},\n  volume       = {25},\n  number       = {8},\n  pages        = {1849--1862},\n  year         = {2013},\n  url          = {https://doi.org/10.1109/TKDE.2012.120},\n  doi          = {10.1109/TKDE.2012.120},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tkde/HeatherlyKT13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n BigSecret: A Secure Data Management Framework for Key-Value Stores.\n \n \n \n \n\n\n \n Pattuk, E.; Kantarcioglu, M.; Khadilkar, V.; Ulusoy, H.; and Mehrotra, S.\n\n\n \n\n\n\n In 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28 - July 3, 2013, pages 147–154, 2013. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"BigSecret:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/IEEEcloud/PattukKKUM13,\n  author       = {Erman Pattuk and\n                  Murat Kantarcioglu and\n                  Vaibhav Khadilkar and\n                  Huseyin Ulusoy and\n                  Sharad Mehrotra},\n  title        = {BigSecret: {A} Secure Data Management Framework for Key-Value Stores},\n  booktitle    = {2013 {IEEE} Sixth International Conference on Cloud Computing, Santa\n                  Clara, CA, USA, June 28 - July 3, 2013},\n  pages        = {147--154},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2013},\n  url          = {https://doi.org/10.1109/CLOUD.2013.37},\n  doi          = {10.1109/CLOUD.2013.37},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/IEEEcloud/PattukKKUM13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data.\n \n \n \n \n\n\n \n Örencik, C.; Kantarcioglu, M.; and Savas, E.\n\n\n \n\n\n\n In 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28 - July 3, 2013, pages 390–397, 2013. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/IEEEcloud/OrencikKS13,\n  author       = {Cengiz {\\"{O}}rencik and\n                  Murat Kantarcioglu and\n                  Erkay Savas},\n  title        = {A Practical and Secure Multi-keyword Search Method over Encrypted\n                  Cloud Data},\n  booktitle    = {2013 {IEEE} Sixth International Conference on Cloud Computing, Santa\n                  Clara, CA, USA, June 28 - July 3, 2013},\n  pages        = {390--397},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2013},\n  url          = {https://doi.org/10.1109/CLOUD.2013.18},\n  doi          = {10.1109/CLOUD.2013.18},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/IEEEcloud/OrencikKS13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Analysis of heuristic based access pattern obfuscation.\n \n \n \n \n\n\n \n Ulusoy, H.; Kantarcioglu, M.; Thuraisingham, B.; Cankaya, E. C.; and Pattuk, E.\n\n\n \n\n\n\n In Bertino, E.; Georgakopoulos, D.; Srivatsa, M.; Nepal, S.; and Vinciarelli, A., editor(s), 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013, pages 537–544, 2013. ICST / IEEE\n \n\n\n\n
\n\n\n\n \n \n \"AnalysisPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/colcom/UlusoyKTCP13,\n  author       = {Huseyin Ulusoy and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham and\n                  Ebru Celikel Cankaya and\n                  Erman Pattuk},\n  editor       = {Elisa Bertino and\n                  Dimitrios Georgakopoulos and\n                  Mudhakar Srivatsa and\n                  Surya Nepal and\n                  Alessandro Vinciarelli},\n  title        = {Analysis of heuristic based access pattern obfuscation},\n  booktitle    = {9th {IEEE} International Conference on Collaborative Computing: Networking,\n                  Applications and Worksharing, Austin, TX, USA, October 20-23, 2013},\n  pages        = {537--544},\n  publisher    = {{ICST} / {IEEE}},\n  year         = {2013},\n  url          = {https://doi.org/10.4108/icst.collaboratecom.2013.254199},\n  doi          = {10.4108/ICST.COLLABORATECOM.2013.254199},\n  timestamp    = {Fri, 15 Mar 2024 12:30:44 +0100},\n  biburl       = {https://dblp.org/rec/conf/colcom/UlusoyKTCP13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Efficient tree pattern queries on encrypted XML documents.\n \n \n \n \n\n\n \n Cao, J.; Rao, F.; Kuzu, M.; Bertino, E.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Guerrini, G., editor(s), Joint 2013 EDBT/ICDT Conferences, EDBT/ICDT '13, Genoa, Italy, March 22, 2013, Workshop Proceedings, pages 111–120, 2013. ACM\n \n\n\n\n
\n\n\n\n \n \n \"EfficientPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/edbt/CaoRKBK13,\n  author       = {Jianneng Cao and\n                  Fang{-}Yu Rao and\n                  Mehmet Kuzu and\n                  Elisa Bertino and\n                  Murat Kantarcioglu},\n  editor       = {Giovanna Guerrini},\n  title        = {Efficient tree pattern queries on encrypted {XML} documents},\n  booktitle    = {Joint 2013 {EDBT/ICDT} Conferences, {EDBT/ICDT} '13, Genoa, Italy,\n                  March 22, 2013, Workshop Proceedings},\n  pages        = {111--120},\n  publisher    = {{ACM}},\n  year         = {2013},\n  url          = {https://doi.org/10.1145/2457317.2457338},\n  doi          = {10.1145/2457317.2457338},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/edbt/CaoRKBK13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Efficient privacy-aware record integration.\n \n \n \n \n\n\n \n Kuzu, M.; Kantarcioglu, M.; Inan, A.; Bertino, E.; Durham, E.; and Malin, B. A.\n\n\n \n\n\n\n In Guerrini, G.; and Paton, N. W., editor(s), Joint 2013 EDBT/ICDT Conferences, EDBT '13 Proceedings, Genoa, Italy, March 18-22, 2013, pages 167–178, 2013. ACM\n \n\n\n\n
\n\n\n\n \n \n \"EfficientPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/edbt/KuzuKIBDM13,\n  author       = {Mehmet Kuzu and\n                  Murat Kantarcioglu and\n                  Ali Inan and\n                  Elisa Bertino and\n                  Elizabeth Durham and\n                  Bradley A. Malin},\n  editor       = {Giovanna Guerrini and\n                  Norman W. Paton},\n  title        = {Efficient privacy-aware record integration},\n  booktitle    = {Joint 2013 {EDBT/ICDT} Conferences, {EDBT} '13 Proceedings, Genoa,\n                  Italy, March 18-22, 2013},\n  pages        = {167--178},\n  publisher    = {{ACM}},\n  year         = {2013},\n  url          = {https://doi.org/10.1145/2452376.2452398},\n  doi          = {10.1145/2452376.2452398},\n  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/edbt/KuzuKIBDM13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Incentive-Compatible Privacy-Preserving Distributed Data Mining.\n \n \n \n \n\n\n \n Kantarcioglu, M.\n\n\n \n\n\n\n In Ding, W.; Washio, T.; Xiong, H.; Karypis, G.; Thuraisingham, B.; Cook, D. J.; and Wu, X., editor(s), 13th IEEE International Conference on Data Mining Workshops, ICDM Workshops, TX, USA, December 7-10, 2013, pages 859, 2013. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Incentive-CompatiblePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdm/Kantarcioglu13,\n  author       = {Murat Kantarcioglu},\n  editor       = {Wei Ding and\n                  Takashi Washio and\n                  Hui Xiong and\n                  George Karypis and\n                  Bhavani Thuraisingham and\n                  Diane J. Cook and\n                  Xindong Wu},\n  title        = {Incentive-Compatible Privacy-Preserving Distributed Data Mining},\n  booktitle    = {13th {IEEE} International Conference on Data Mining Workshops, {ICDM}\n                  Workshops, TX, USA, December 7-10, 2013},\n  pages        = {859},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2013},\n  url          = {https://doi.org/10.1109/ICDMW.2013.67},\n  doi          = {10.1109/ICDMW.2013.67},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icdm/Kantarcioglu13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Risk Aware Approach to Data Confidentiality in Cloud Computing.\n \n \n \n \n\n\n \n Oktay, K. Y.; Khadilkar, V.; Kantarcioglu, M.; and Mehrotra, S.\n\n\n \n\n\n\n In Bagchi, A.; and Ray, I., editor(s), Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, volume 8303, of Lecture Notes in Computer Science, pages 27–42, 2013. Springer\n \n\n\n\n
\n\n\n\n \n \n \"RiskPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iciss/OktayKKM13,\n  author       = {Kerim Yasin Oktay and\n                  Vaibhav Khadilkar and\n                  Murat Kantarcioglu and\n                  Sharad Mehrotra},\n  editor       = {Aditya Bagchi and\n                  Indrakshi Ray},\n  title        = {Risk Aware Approach to Data Confidentiality in Cloud Computing},\n  booktitle    = {Information Systems Security - 9th International Conference, {ICISS}\n                  2013, Kolkata, India, December 16-20, 2013. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {8303},\n  pages        = {27--42},\n  publisher    = {Springer},\n  year         = {2013},\n  url          = {https://doi.org/10.1007/978-3-642-45204-8\\_3},\n  doi          = {10.1007/978-3-642-45204-8\\_3},\n  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},\n  biburl       = {https://dblp.org/rec/conf/iciss/OktayKKM13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Measuring expertise and bias in cyber security using cognitive and neuroscience approaches.\n \n \n \n \n\n\n \n Krawczyk, D. C.; Bartlett, J.; Kantarcioglu, M.; Hamlen, K. W.; and Thuraisingham, B.\n\n\n \n\n\n\n In Glass, K.; Colbaugh, R.; Sanfilippo, A.; Kao, A.; Gabbay, M.; Corley, C. D.; Li, J.; Khan, L.; Wynne, A.; Coote, L.; Mao, W.; Zeng, D.; and Yaghoobi, A., editor(s), 2013 IEEE International Conference on Intelligence and Security Informatics, Seattle, WA, USA, June 4-7, 2013, pages 364–367, 2013. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"MeasuringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/KrawczykBKHT13,\n  author       = {Daniel C. Krawczyk and\n                  James Bartlett and\n                  Murat Kantarcioglu and\n                  Kevin W. Hamlen and\n                  Bhavani Thuraisingham},\n  editor       = {Kristin Glass and\n                  Richard Colbaugh and\n                  Antonio Sanfilippo and\n                  Anne Kao and\n                  Michael Gabbay and\n                  Courtney D. Corley and\n                  Jiexun Li and\n                  Latifur Khan and\n                  Adam Wynne and\n                  Lisa Coote and\n                  Wenji Mao and\n                  Daniel Zeng and\n                  Ahmad Yaghoobi},\n  title        = {Measuring expertise and bias in cyber security using cognitive and\n                  neuroscience approaches},\n  booktitle    = {2013 {IEEE} International Conference on Intelligence and Security\n                  Informatics, Seattle, WA, USA, June 4-7, 2013},\n  pages        = {364--367},\n  publisher    = {{IEEE}},\n  year         = {2013},\n  url          = {https://doi.org/10.1109/ISI.2013.6578859},\n  doi          = {10.1109/ISI.2013.6578859},\n  timestamp    = {Mon, 15 May 2023 16:24:40 +0200},\n  biburl       = {https://dblp.org/rec/conf/isi/KrawczykBKHT13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Toward a Real-Time Cloud Auditing Paradigm.\n \n \n \n \n\n\n \n Nix, R.; Kantarcioglu, M.; and Shetty, S.\n\n\n \n\n\n\n In IEEE Ninth World Congress on Services, SERVICES 2013, Santa Clara, CA, USA, June 28 - July 3, 2013, pages 255–259, 2013. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"TowardPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/services/NixKS13,\n  author       = {Robert Nix and\n                  Murat Kantarcioglu and\n                  Sachin Shetty},\n  title        = {Toward a Real-Time Cloud Auditing Paradigm},\n  booktitle    = {{IEEE} Ninth World Congress on Services, {SERVICES} 2013, Santa Clara,\n                  CA, USA, June 28 - July 3, 2013},\n  pages        = {255--259},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2013},\n  url          = {https://doi.org/10.1109/SERVICES.2013.43},\n  doi          = {10.1109/SERVICES.2013.43},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/services/NixKS13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n REDACT: a framework for sanitizing RDF data.\n \n \n \n \n\n\n \n Rachapalli, J.; Khadilkar, V.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Carr, L.; Laender, A. H. F.; Lóscio, B. F.; King, I.; Fontoura, M.; Vrandecic, D.; Aroyo, L.; de Oliveira, J. P. M.; Lima, F.; and Wilde, E., editor(s), 22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013, Companion Volume, pages 157–158, 2013. International World Wide Web Conferences Steering Committee / ACM\n \n\n\n\n
\n\n\n\n \n \n \"REDACT:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/www/RachapalliKKT13,\n  author       = {Jyothsna Rachapalli and\n                  Vaibhav Khadilkar and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Leslie Carr and\n                  Alberto H. F. Laender and\n                  Bernadette Farias L{\\'{o}}scio and\n                  Irwin King and\n                  Marcus Fontoura and\n                  Denny Vrandecic and\n                  Lora Aroyo and\n                  Jos{\\'{e}} Palazzo M. de Oliveira and\n                  Fernanda Lima and\n                  Erik Wilde},\n  title        = {{REDACT:} a framework for sanitizing {RDF} data},\n  booktitle    = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,\n                  Brazil, May 13-17, 2013, Companion Volume},\n  pages        = {157--158},\n  publisher    = {International World Wide Web Conferences Steering Committee / {ACM}},\n  year         = {2013},\n  url          = {https://doi.org/10.1145/2487788.2487865},\n  doi          = {10.1145/2487788.2487865},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/www/RachapalliKKT13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings.\n \n \n \n \n\n\n \n Das, S. K.; Nita-Rotaru, C.; and Kantarcioglu, M.,\n editors.\n \n\n\n \n\n\n\n Volume 8252, of Lecture Notes in Computer Science.Springer. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"DecisionPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@proceedings{DBLP:conf/gamesec/2013,\n  editor       = {Sajal K. Das and\n                  Cristina Nita{-}Rotaru and\n                  Murat Kantarcioglu},\n  title        = {Decision and Game Theory for Security - 4th International Conference,\n                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {8252},\n  publisher    = {Springer},\n  year         = {2013},\n  url          = {https://doi.org/10.1007/978-3-319-02786-9},\n  doi          = {10.1007/978-3-319-02786-9},\n  isbn         = {978-3-319-02785-2},\n  timestamp    = {Tue, 10 Sep 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/gamesec/2013.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Experiments in Information Sharing.\n \n \n \n \n\n\n \n Berg, N.; Chen, C.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/1305.5176. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"ExperimentsPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1305-5176,\n  author       = {Nathan Berg and\n                  Chunyu Chen and\n                  Murat Kantarcioglu},\n  title        = {Experiments in Information Sharing},\n  journal      = {CoRR},\n  volume       = {abs/1305.5176},\n  year         = {2013},\n  url          = {http://arxiv.org/abs/1305.5176},\n  eprinttype    = {arXiv},\n  eprint       = {1305.5176},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1305-5176.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (29)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Policy Enforcement Framework for Cloud Data Management.\n \n \n \n \n\n\n \n Hamlen, K. W.; Kagal, L.; and Kantarcioglu, M.\n\n\n \n\n\n\n IEEE Data Eng. Bull., 35(4): 39–45. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"PolicyPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/debu/HamlenKK12,\n  author       = {Kevin W. Hamlen and\n                  Lalana Kagal and\n                  Murat Kantarcioglu},\n  title        = {Policy Enforcement Framework for Cloud Data Management},\n  journal      = {{IEEE} Data Eng. Bull.},\n  volume       = {35},\n  number       = {4},\n  pages        = {39--45},\n  year         = {2012},\n  url          = {http://sites.computer.org/debull/A12dec/policy.pdf},\n  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/debu/HamlenKK12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure Data Processing over Hybrid Clouds.\n \n \n \n \n\n\n \n Khadilkar, V.; Oktay, K. Y.; Kantarcioglu, M.; and Mehrotra, S.\n\n\n \n\n\n\n IEEE Data Eng. Bull., 35(4): 46–54. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/debu/KhadilkarOKM12,\n  author       = {Vaibhav Khadilkar and\n                  Kerim Yasin Oktay and\n                  Murat Kantarcioglu and\n                  Sharad Mehrotra},\n  title        = {Secure Data Processing over Hybrid Clouds},\n  journal      = {{IEEE} Data Eng. Bull.},\n  volume       = {35},\n  number       = {4},\n  pages        = {46--54},\n  year         = {2012},\n  url          = {http://sites.computer.org/debull/A12dec/hybrid.pdf},\n  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/debu/KhadilkarOKM12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage.\n \n \n \n \n\n\n \n Durham, E.; Xue, Y.; Kantarcioglu, M.; and Malin, B. A.\n\n\n \n\n\n\n Inf. Fusion, 13(4): 245–259. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"QuantifyingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/inffus/DurhamXKM12,\n  author       = {Elizabeth Durham and\n                  Yuan Xue and\n                  Murat Kantarcioglu and\n                  Bradley A. Malin},\n  title        = {Quantifying the correctness, computational complexity, and security\n                  of privacy-preserving string comparators for record linkage},\n  journal      = {Inf. Fusion},\n  volume       = {13},\n  number       = {4},\n  pages        = {245--259},\n  year         = {2012},\n  url          = {https://doi.org/10.1016/j.inffus.2011.04.004},\n  doi          = {10.1016/J.INFFUS.2011.04.004},\n  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/inffus/DurhamXKM12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Incentive Compatible Privacy-Preserving Distributed Classification.\n \n \n \n \n\n\n \n Nix, R.; and Kantarcioglu, M.\n\n\n \n\n\n\n IEEE Trans. Dependable Secur. Comput., 9(4): 451–462. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"IncentivePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tdsc/NixK12,\n  author       = {Robert Nix and\n                  Murat Kantarcioglu},\n  title        = {Incentive Compatible Privacy-Preserving Distributed Classification},\n  journal      = {{IEEE} Trans. Dependable Secur. Comput.},\n  volume       = {9},\n  number       = {4},\n  pages        = {451--462},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/TDSC.2011.52},\n  doi          = {10.1109/TDSC.2011.52},\n  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tdsc/NixK12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Hybrid Approach to Private Record Matching.\n \n \n \n \n\n\n \n Inan, A.; Kantarcioglu, M.; Ghinita, G.; and Bertino, E.\n\n\n \n\n\n\n IEEE Trans. Dependable Secur. Comput., 9(5): 684–698. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tdsc/InanKGB12,\n  author       = {Ali Inan and\n                  Murat Kantarcioglu and\n                  Gabriel Ghinita and\n                  Elisa Bertino},\n  title        = {A Hybrid Approach to Private Record Matching},\n  journal      = {{IEEE} Trans. Dependable Secur. Comput.},\n  volume       = {9},\n  number       = {5},\n  pages        = {684--698},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/TDSC.2012.46},\n  doi          = {10.1109/TDSC.2012.46},\n  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tdsc/InanKGB12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure Management of Biomedical Data With Cryptographic Hardware.\n \n \n \n \n\n\n \n Canim, M.; Kantarcioglu, M.; and Malin, B. A.\n\n\n \n\n\n\n IEEE Trans. Inf. Technol. Biomed., 16(1): 166–175. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/titb/CanimKM12,\n  author       = {Mustafa Canim and\n                  Murat Kantarcioglu and\n                  Bradley A. Malin},\n  title        = {Secure Management of Biomedical Data With Cryptographic Hardware},\n  journal      = {{IEEE} Trans. Inf. Technol. Biomed.},\n  volume       = {16},\n  number       = {1},\n  pages        = {166--175},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/TITB.2011.2171701},\n  doi          = {10.1109/TITB.2011.2171701},\n  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/titb/CanimKM12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure multidimensional range queries over outsourced data.\n \n \n \n \n\n\n \n Hore, B.; Mehrotra, S.; Canim, M.; and Kantarcioglu, M.\n\n\n \n\n\n\n VLDB J., 21(3): 333–358. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/vldb/HoreMCK12,\n  author       = {Bijit Hore and\n                  Sharad Mehrotra and\n                  Mustafa Canim and\n                  Murat Kantarcioglu},\n  title        = {Secure multidimensional range queries over outsourced data},\n  journal      = {{VLDB} J.},\n  volume       = {21},\n  number       = {3},\n  pages        = {333--358},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/s00778-011-0245-7},\n  doi          = {10.1007/S00778-011-0245-7},\n  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/vldb/HoreMCK12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Risk-Aware Workload Distribution in Hybrid Clouds.\n \n \n \n \n\n\n \n Oktay, K. Y.; Khadilkar, V.; Hore, B.; Kantarcioglu, M.; Mehrotra, S.; and Thuraisingham, B.\n\n\n \n\n\n\n In Chang, R., editor(s), 2012 IEEE Fifth International Conference on Cloud Computing, Honolulu, HI, USA, June 24-29, 2012, pages 229–236, 2012. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Risk-AwarePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/IEEEcloud/OktayKHKMT12,\n  author       = {Kerim Yasin Oktay and\n                  Vaibhav Khadilkar and\n                  Bijit Hore and\n                  Murat Kantarcioglu and\n                  Sharad Mehrotra and\n                  Bhavani Thuraisingham},\n  editor       = {Rong Chang},\n  title        = {Risk-Aware Workload Distribution in Hybrid Clouds},\n  booktitle    = {2012 {IEEE} Fifth International Conference on Cloud Computing, Honolulu,\n                  HI, USA, June 24-29, 2012},\n  pages        = {229--236},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/CLOUD.2012.128},\n  doi          = {10.1109/CLOUD.2012.128},\n  timestamp    = {Wed, 09 Aug 2023 12:14:21 +0200},\n  biburl       = {https://dblp.org/rec/conf/IEEEcloud/OktayKHKMT12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Studying dynamic equilibrium of cloud computing adoption with application of Mean Field Games.\n \n \n \n \n\n\n \n Hoe, S. C.; Kantarcioglu, M.; and Bensoussan, A.\n\n\n \n\n\n\n In 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012, Allerton Park & Retreat Center, Monticello, IL, USA, October 1-5, 2012, pages 220–224, 2012. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"StudyingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/allerton/HoeKB12,\n  author       = {SingRu Celine Hoe and\n                  Murat Kantarcioglu and\n                  Alain Bensoussan},\n  title        = {Studying dynamic equilibrium of cloud computing adoption with application\n                  of Mean Field Games},\n  booktitle    = {50th Annual Allerton Conference on Communication, Control, and Computing,\n                  Allerton 2012, Allerton Park {\\&} Retreat Center, Monticello, IL,\n                  USA, October 1-5, 2012},\n  pages        = {220--224},\n  publisher    = {{IEEE}},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/Allerton.2012.6483221},\n  doi          = {10.1109/ALLERTON.2012.6483221},\n  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},\n  biburl       = {https://dblp.org/rec/conf/allerton/HoeKB12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data.\n \n \n \n \n\n\n \n Nix, R.; Kantarcioglu, M.; and Han, K. J.\n\n\n \n\n\n\n In Cuppens-Boulahia, N.; Cuppens, F.; and García-Alfaro, J., editor(s), Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings, volume 7371, of Lecture Notes in Computer Science, pages 129–144, 2012. Springer\n \n\n\n\n
\n\n\n\n \n \n \"ApproximatePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dbsec/NixKH12,\n  author       = {Robert Nix and\n                  Murat Kantarcioglu and\n                  Keesook J. Han},\n  editor       = {Nora Cuppens{-}Boulahia and\n                  Fr{\\'{e}}d{\\'{e}}ric Cuppens and\n                  Joaqu{\\'{\\i}}n Garc{\\'{\\i}}a{-}Alfaro},\n  title        = {Approximate Privacy-Preserving Data Mining on Vertically Partitioned\n                  Data},\n  booktitle    = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP}\n                  {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012.\n                  Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7371},\n  pages        = {129--144},\n  publisher    = {Springer},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/978-3-642-31540-4\\_11},\n  doi          = {10.1007/978-3-642-31540-4\\_11},\n  timestamp    = {Fri, 27 Dec 2019 21:29:17 +0100},\n  biburl       = {https://dblp.org/rec/conf/dbsec/NixKH12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Randomizing Smartphone Malware Profiles against Statistical Mining Techniques.\n \n \n \n \n\n\n \n Shastry, A.; Kantarcioglu, M.; Zhou, Y.; and Thuraisingham, B.\n\n\n \n\n\n\n In Cuppens-Boulahia, N.; Cuppens, F.; and García-Alfaro, J., editor(s), Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings, volume 7371, of Lecture Notes in Computer Science, pages 239–254, 2012. Springer\n \n\n\n\n
\n\n\n\n \n \n \"RandomizingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dbsec/ShastryKZT12,\n  author       = {Abhijith Shastry and\n                  Murat Kantarcioglu and\n                  Yan Zhou and\n                  Bhavani Thuraisingham},\n  editor       = {Nora Cuppens{-}Boulahia and\n                  Fr{\\'{e}}d{\\'{e}}ric Cuppens and\n                  Joaqu{\\'{\\i}}n Garc{\\'{\\i}}a{-}Alfaro},\n  title        = {Randomizing Smartphone Malware Profiles against Statistical Mining\n                  Techniques},\n  booktitle    = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP}\n                  {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012.\n                  Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7371},\n  pages        = {239--254},\n  publisher    = {Springer},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/978-3-642-31540-4\\_18},\n  doi          = {10.1007/978-3-642-31540-4\\_18},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/dbsec/ShastryKZT12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets.\n \n \n \n \n\n\n \n Hoe, S. C.; Kantarcioglu, M.; and Bensoussan, A.\n\n\n \n\n\n\n In Grossklags, J.; and Walrand, J. C., editor(s), Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings, volume 7638, of Lecture Notes in Computer Science, pages 60–77, 2012. Springer\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/gamesec/HoeKB12,\n  author       = {SingRu Celine Hoe and\n                  Murat Kantarcioglu and\n                  Alain Bensoussan},\n  editor       = {Jens Grossklags and\n                  Jean C. Walrand},\n  title        = {A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets},\n  booktitle    = {Decision and Game Theory for Security - Third International Conference,\n                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7638},\n  pages        = {60--77},\n  publisher    = {Springer},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/978-3-642-34266-0\\_4},\n  doi          = {10.1007/978-3-642-34266-0\\_4},\n  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},\n  biburl       = {https://dblp.org/rec/conf/gamesec/HoeKB12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing.\n \n \n \n \n\n\n \n Nix, R.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Grossklags, J.; and Walrand, J. C., editor(s), Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings, volume 7638, of Lecture Notes in Computer Science, pages 296–308, 2012. Springer\n \n\n\n\n
\n\n\n\n \n \n \"ContractualPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/gamesec/NixK12,\n  author       = {Robert Nix and\n                  Murat Kantarcioglu},\n  editor       = {Jens Grossklags and\n                  Jean C. Walrand},\n  title        = {Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing},\n  booktitle    = {Decision and Game Theory for Security - Third International Conference,\n                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7638},\n  pages        = {296--308},\n  publisher    = {Springer},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/978-3-642-34266-0\\_18},\n  doi          = {10.1007/978-3-642-34266-0\\_18},\n  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/gamesec/NixK12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Efficient Similarity Search over Encrypted Data.\n \n \n \n \n\n\n \n Kuzu, M.; Islam, M. S.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Kementsietsidis, A.; and Salles, M. A. V., editor(s), IEEE 28th International Conference on Data Engineering (ICDE 2012), Washington, DC, USA (Arlington, Virginia), 1-5 April, 2012, pages 1156–1167, 2012. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"EfficientPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icde/KuzuIK12,\n  author       = {Mehmet Kuzu and\n                  Mohammad Saiful Islam and\n                  Murat Kantarcioglu},\n  editor       = {Anastasios Kementsietsidis and\n                  Marcos Antonio Vaz Salles},\n  title        = {Efficient Similarity Search over Encrypted Data},\n  booktitle    = {{IEEE} 28th International Conference on Data Engineering {(ICDE} 2012),\n                  Washington, DC, {USA} (Arlington, Virginia), 1-5 April, 2012},\n  pages        = {1156--1167},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/ICDE.2012.23},\n  doi          = {10.1109/ICDE.2012.23},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icde/KuzuIK12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks.\n \n \n \n \n\n\n \n Lim, H.; Ghinita, G.; Bertino, E.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Kementsietsidis, A.; and Salles, M. A. V., editor(s), IEEE 28th International Conference on Data Engineering (ICDE 2012), Washington, DC, USA (Arlington, Virginia), 1-5 April, 2012, pages 1192–1203, 2012. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icde/LimGBK12,\n  author       = {Hyo{-}Sang Lim and\n                  Gabriel Ghinita and\n                  Elisa Bertino and\n                  Murat Kantarcioglu},\n  editor       = {Anastasios Kementsietsidis and\n                  Marcos Antonio Vaz Salles},\n  title        = {A Game-Theoretic Approach for High-Assurance of Data Trustworthiness\n                  in Sensor Networks},\n  booktitle    = {{IEEE} 28th International Conference on Data Engineering {(ICDE} 2012),\n                  Washington, DC, {USA} (Arlington, Virginia), 1-5 April, 2012},\n  pages        = {1192--1203},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/ICDE.2012.78},\n  doi          = {10.1109/ICDE.2012.78},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icde/LimGBK12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Self-Training with Selection-by-Rejection.\n \n \n \n \n\n\n \n Zhou, Y.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Zaki, M. J.; Siebes, A.; Yu, J. X.; Goethals, B.; Webb, G. I.; and Wu, X., editor(s), 12th IEEE International Conference on Data Mining, ICDM 2012, Brussels, Belgium, December 10-13, 2012, pages 795–803, 2012. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Self-TrainingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdm/ZhouKT12,\n  author       = {Yan Zhou and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Mohammed Javeed Zaki and\n                  Arno Siebes and\n                  Jeffrey Xu Yu and\n                  Bart Goethals and\n                  Geoffrey I. Webb and\n                  Xindong Wu},\n  title        = {Self-Training with Selection-by-Rejection},\n  booktitle    = {12th {IEEE} International Conference on Data Mining, {ICDM} 2012,\n                  Brussels, Belgium, December 10-13, 2012},\n  pages        = {795--803},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/ICDM.2012.56},\n  doi          = {10.1109/ICDM.2012.56},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icdm/ZhouKT12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Sparse Bayesian Adversarial Learning Using Relevance Vector Machine Ensembles.\n \n \n \n \n\n\n \n Zhou, Y.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Zaki, M. J.; Siebes, A.; Yu, J. X.; Goethals, B.; Webb, G. I.; and Wu, X., editor(s), 12th IEEE International Conference on Data Mining, ICDM 2012, Brussels, Belgium, December 10-13, 2012, pages 1206–1211, 2012. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"SparsePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdm/ZhouKT12a,\n  author       = {Yan Zhou and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Mohammed Javeed Zaki and\n                  Arno Siebes and\n                  Jeffrey Xu Yu and\n                  Bart Goethals and\n                  Geoffrey I. Webb and\n                  Xindong Wu},\n  title        = {Sparse Bayesian Adversarial Learning Using Relevance Vector Machine\n                  Ensembles},\n  booktitle    = {12th {IEEE} International Conference on Data Mining, {ICDM} 2012,\n                  Brussels, Belgium, December 10-13, 2012},\n  pages        = {1206--1211},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/ICDM.2012.58},\n  doi          = {10.1109/ICDM.2012.58},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icdm/ZhouKT12a.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A game theoretic approach for adversarial pipeline monitoring using Wireless Sensor Networks.\n \n \n \n \n\n\n \n Islam, M. S.; Nix, R.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Zhang, C.; Joshi, J.; Bertino, E.; and Thuraisingham, B., editor(s), IEEE 13th International Conference on Information Reuse & Integration, IRI 2012, Las Vegas, NV, USA, August 8-10, 2012, pages 37–44, 2012. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iri/IslamNK12,\n  author       = {Mohammad Saiful Islam and\n                  Robert Nix and\n                  Murat Kantarcioglu},\n  editor       = {Chengcui Zhang and\n                  James Joshi and\n                  Elisa Bertino and\n                  Bhavani Thuraisingham},\n  title        = {A game theoretic approach for adversarial pipeline monitoring using\n                  Wireless Sensor Networks},\n  booktitle    = {{IEEE} 13th International Conference on Information Reuse {\\&} Integration,\n                  {IRI} 2012, Las Vegas, NV, USA, August 8-10, 2012},\n  pages        = {37--44},\n  publisher    = {{IEEE}},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/IRI.2012.6302988},\n  doi          = {10.1109/IRI.2012.6302988},\n  timestamp    = {Wed, 29 Jun 2022 15:37:42 +0200},\n  biburl       = {https://dblp.org/rec/conf/iri/IslamNK12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure information integration with a semantic web-based framework.\n \n \n \n \n\n\n \n Parikh, P.; Kantarcioglu, M.; Khadilkar, V.; Thuraisingham, B.; and Khan, L.\n\n\n \n\n\n\n In Zhang, C.; Joshi, J.; Bertino, E.; and Thuraisingham, B., editor(s), IEEE 13th International Conference on Information Reuse & Integration, IRI 2012, Las Vegas, NV, USA, August 8-10, 2012, pages 659–663, 2012. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iri/ParikhKKTK12,\n  author       = {Pranav Parikh and\n                  Murat Kantarcioglu and\n                  Vaibhav Khadilkar and\n                  Bhavani Thuraisingham and\n                  Latifur Khan},\n  editor       = {Chengcui Zhang and\n                  James Joshi and\n                  Elisa Bertino and\n                  Bhavani Thuraisingham},\n  title        = {Secure information integration with a semantic web-based framework},\n  booktitle    = {{IEEE} 13th International Conference on Information Reuse {\\&} Integration,\n                  {IRI} 2012, Las Vegas, NV, USA, August 8-10, 2012},\n  pages        = {659--663},\n  publisher    = {{IEEE}},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/IRI.2012.6303072},\n  doi          = {10.1109/IRI.2012.6303072},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/iri/ParikhKKTK12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Adversarial support vector machine learning.\n \n \n \n \n\n\n \n Zhou, Y.; Kantarcioglu, M.; Thuraisingham, B.; and Xi, B.\n\n\n \n\n\n\n In Yang, Q.; Agarwal, D.; and Pei, J., editor(s), The 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '12, Beijing, China, August 12-16, 2012, pages 1059–1067, 2012. ACM\n \n\n\n\n
\n\n\n\n \n \n \"AdversarialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/kdd/ZhouKTX12,\n  author       = {Yan Zhou and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham and\n                  Bowei Xi},\n  editor       = {Qiang Yang and\n                  Deepak Agarwal and\n                  Jian Pei},\n  title        = {Adversarial support vector machine learning},\n  booktitle    = {The 18th {ACM} {SIGKDD} International Conference on Knowledge Discovery\n                  and Data Mining, {KDD} '12, Beijing, China, August 12-16, 2012},\n  pages        = {1059--1067},\n  publisher    = {{ACM}},\n  year         = {2012},\n  url          = {https://doi.org/10.1145/2339530.2339697},\n  doi          = {10.1145/2339530.2339697},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/kdd/ZhouKTX12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Design and Implementation of a Cloud-Based Assured Information Sharing System.\n \n \n \n \n\n\n \n Cadenhead, T.; Kantarcioglu, M.; Khadilkar, V.; and Thuraisingham, B.\n\n\n \n\n\n\n In Kotenko, I. V.; and Skormin, V. A., editor(s), Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, volume 7531, of Lecture Notes in Computer Science, pages 36–50, 2012. Springer\n \n\n\n\n
\n\n\n\n \n \n \"DesignPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mmmacns/CadenheadKKT12,\n  author       = {Tyrone Cadenhead and\n                  Murat Kantarcioglu and\n                  Vaibhav Khadilkar and\n                  Bhavani Thuraisingham},\n  editor       = {Igor V. Kotenko and\n                  Victor A. Skormin},\n  title        = {Design and Implementation of a Cloud-Based Assured Information Sharing\n                  System},\n  booktitle    = {Computer Network Security - 6th International Conference on Mathematical\n                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}\n                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7531},\n  pages        = {36--50},\n  publisher    = {Springer},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/978-3-642-33704-8\\_4},\n  doi          = {10.1007/978-3-642-33704-8\\_4},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/mmmacns/CadenheadKKT12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.\n \n \n \n \n\n\n \n Islam, M. S.; Kuzu, M.; and Kantarcioglu, M.\n\n\n \n\n\n\n In 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012, 2012. The Internet Society\n \n\n\n\n
\n\n\n\n \n \n \"AccessPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ndss/IslamKK12,\n  author       = {Mohammad Saiful Islam and\n                  Mehmet Kuzu and\n                  Murat Kantarcioglu},\n  title        = {Access Pattern disclosure on Searchable Encryption: Ramification,\n                  Attack and Mitigation},\n  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}\n                  2012, San Diego, California, USA, February 5-8, 2012},\n  publisher    = {The Internet Society},\n  year         = {2012},\n  url          = {https://www.ndss-symposium.org/ndss2012/access-pattern-disclosure-searchable-encryption-ramification-attack-and-mitigation},\n  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},\n  biburl       = {https://dblp.org/rec/conf/ndss/IslamKK12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cloud-Centric Assured Information Sharing.\n \n \n \n \n\n\n \n Thuraisingham, B.; Khadilkar, V.; Rachapalli, J.; Cadenhead, T.; Kantarcioglu, M.; Hamlen, K. W.; Khan, L.; and Husain, M. F.\n\n\n \n\n\n\n In Chau, M.; Wang, G. A.; Yue, W. T.; and Chen, H., editor(s), Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings, volume 7299, of Lecture Notes in Computer Science, pages 1–26, 2012. Springer\n \n\n\n\n
\n\n\n\n \n \n \"Cloud-CentricPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/paisi/ThuraisinghamKRCKHKH12,\n  author       = {Bhavani Thuraisingham and\n                  Vaibhav Khadilkar and\n                  Jyothsna Rachapalli and\n                  Tyrone Cadenhead and\n                  Murat Kantarcioglu and\n                  Kevin W. Hamlen and\n                  Latifur Khan and\n                  Mohammad Farhan Husain},\n  editor       = {Michael Chau and\n                  G. Alan Wang and\n                  Wei Thoo Yue and\n                  Hsinchun Chen},\n  title        = {Cloud-Centric Assured Information Sharing},\n  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}\n                  2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7299},\n  pages        = {1--26},\n  publisher    = {Springer},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/978-3-642-30428-6\\_1},\n  doi          = {10.1007/978-3-642-30428-6\\_1},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/paisi/ThuraisinghamKRCKHKH12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A cloud-based RDF policy engine for assured information sharing.\n \n \n \n \n\n\n \n Cadenhead, T.; Khadilkar, V.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Atluri, V.; Vaidya, J.; Kern, A.; and Kantarcioglu, M., editor(s), 17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012, pages 113–116, 2012. ACM\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sacmat/CadenheadKKT12,\n  author       = {Tyrone Cadenhead and\n                  Vaibhav Khadilkar and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Vijay Atluri and\n                  Jaideep Vaidya and\n                  Axel Kern and\n                  Murat Kantarcioglu},\n  title        = {A cloud-based {RDF} policy engine for assured information sharing},\n  booktitle    = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}\n                  '12, Newark, NJ, {USA} - June 20 - 22, 2012},\n  pages        = {113--116},\n  publisher    = {{ACM}},\n  year         = {2012},\n  url          = {https://doi.org/10.1145/2295136.2295157},\n  doi          = {10.1145/2295136.2295157},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sacmat/CadenheadKKT12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Jena-HBase: A Distributed, Scalable and Effcient RDF Triple Store.\n \n \n \n \n\n\n \n Khadilkar, V.; Kantarcioglu, M.; Thuraisingham, B.; and Castagna, P.\n\n\n \n\n\n\n In Glimm, B.; and Huynh, D., editor(s), Proceedings of the ISWC 2012 Posters & Demonstrations Track, Boston, USA, November 11-15, 2012, volume 914, of CEUR Workshop Proceedings, 2012. CEUR-WS.org\n \n\n\n\n
\n\n\n\n \n \n \"Jena-HBase:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/semweb/KhadilkarKTC12,\n  author       = {Vaibhav Khadilkar and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham and\n                  Paolo Castagna},\n  editor       = {Birte Glimm and\n                  David Huynh},\n  title        = {Jena-HBase: {A} Distributed, Scalable and Effcient {RDF} Triple Store},\n  booktitle    = {Proceedings of the {ISWC} 2012 Posters {\\&} Demonstrations Track,\n                  Boston, USA, November 11-15, 2012},\n  series       = {{CEUR} Workshop Proceedings},\n  volume       = {914},\n  publisher    = {CEUR-WS.org},\n  year         = {2012},\n  url          = {https://ceur-ws.org/Vol-914/paper\\_14.pdf},\n  timestamp    = {Fri, 10 Mar 2023 16:23:05 +0100},\n  biburl       = {https://dblp.org/rec/conf/semweb/KhadilkarKTC12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Tag-based Information Flow Analysis for Document Classification in Provenance.\n \n \n \n \n\n\n \n Rachapalli, J.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Acar, U. A.; and Green, T. J., editor(s), 4th Workshop on the Theory and Practice of Provenance, TaPP'12, Boston, MA, USA, June 14-15, 2012, 2012. USENIX Association\n \n\n\n\n
\n\n\n\n \n \n \"Tag-basedPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/tapp/RachapalliKT12,\n  author       = {Jyothsna Rachapalli and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Umut A. Acar and\n                  Todd J. Green},\n  title        = {Tag-based Information Flow Analysis for Document Classification in\n                  Provenance},\n  booktitle    = {4th Workshop on the Theory and Practice of Provenance, TaPP'12, Boston,\n                  MA, USA, June 14-15, 2012},\n  publisher    = {{USENIX} Association},\n  year         = {2012},\n  url          = {https://www.usenix.org/conference/tapp12/workshop-program/presentation/rachapalli},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/tapp/RachapalliKT12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n StormRider: harnessing \"storm\" for social networks.\n \n \n \n \n\n\n \n Khadilkar, V.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Mille, A.; Gandon, F.; Misselis, J.; Rabinovich, M.; and Staab, S., editor(s), Proceedings of the 21st World Wide Web Conference, WWW 2012, Lyon, France, April 16-20, 2012 (Companion Volume), pages 543–544, 2012. ACM\n \n\n\n\n
\n\n\n\n \n \n \"StormRider:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/www/KhadilkarKT12,\n  author       = {Vaibhav Khadilkar and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Alain Mille and\n                  Fabien Gandon and\n                  Jacques Misselis and\n                  Michael Rabinovich and\n                  Steffen Staab},\n  title        = {StormRider: harnessing "storm" for social networks},\n  booktitle    = {Proceedings of the 21st World Wide Web Conference, {WWW} 2012, Lyon,\n                  France, April 16-20, 2012 (Companion Volume)},\n  pages        = {543--544},\n  publisher    = {{ACM}},\n  year         = {2012},\n  url          = {https://doi.org/10.1145/2187980.2188118},\n  doi          = {10.1145/2187980.2188118},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/www/KhadilkarKT12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n 17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012.\n \n \n \n \n\n\n \n Atluri, V.; Vaidya, J.; Kern, A.; and Kantarcioglu, M.,\n editors.\n \n\n\n \n\n\n\n ACM. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"17thPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@proceedings{DBLP:conf/sacmat/2012,\n  editor       = {Vijay Atluri and\n                  Jaideep Vaidya and\n                  Axel Kern and\n                  Murat Kantarcioglu},\n  title        = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}\n                  '12, Newark, NJ, {USA} - June 20 - 22, 2012},\n  publisher    = {{ACM}},\n  year         = {2012},\n  url          = {https://doi.org/10.1145/2295136},\n  doi          = {10.1145/2295136},\n  isbn         = {978-1-4503-1295-0},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/sacmat/2012.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Efficient Query Verification on Outsourced Data: A Game-Theoretic Approach.\n \n \n \n \n\n\n \n Nix, R.; and Kantarcioglu, M.\n\n\n \n\n\n\n CoRR, abs/1202.1567. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"EfficientPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1202-1567,\n  author       = {Robert Nix and\n                  Murat Kantarcioglu},\n  title        = {Efficient Query Verification on Outsourced Data: {A} Game-Theoretic\n                  Approach},\n  journal      = {CoRR},\n  volume       = {abs/1202.1567},\n  year         = {2012},\n  url          = {http://arxiv.org/abs/1202.1567},\n  eprinttype    = {arXiv},\n  eprint       = {1202.1567},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1202-1567.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (21)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Semantic web-based social network access control.\n \n \n \n \n\n\n \n Carminati, B.; Ferrari, E.; Heatherly, R.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n Comput. Secur., 30(2-3): 108–115. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"SemanticPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/compsec/CarminatiFHKT11,\n  author       = {Barbara Carminati and\n                  Elena Ferrari and\n                  Raymond Heatherly and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  title        = {Semantic web-based social network access control},\n  journal      = {Comput. Secur.},\n  volume       = {30},\n  number       = {2-3},\n  pages        = {108--115},\n  year         = {2011},\n  url          = {https://doi.org/10.1016/j.cose.2010.08.003},\n  doi          = {10.1016/J.COSE.2010.08.003},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/compsec/CarminatiFHKT11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Classifier evaluation and attribute selection against active adversaries.\n \n \n \n \n\n\n \n Kantarcioglu, M.; Xi, B.; and Clifton, C.\n\n\n \n\n\n\n Data Min. Knowl. Discov., 22(1-2): 291–335. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"ClassifierPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/datamine/KantarciogluXC11,\n  author       = {Murat Kantarcioglu and\n                  Bowei Xi and\n                  Chris Clifton},\n  title        = {Classifier evaluation and attribute selection against active adversaries},\n  journal      = {Data Min. Knowl. Discov.},\n  volume       = {22},\n  number       = {1-2},\n  pages        = {291--335},\n  year         = {2011},\n  url          = {https://doi.org/10.1007/s10618-010-0197-3},\n  doi          = {10.1007/S10618-010-0197-3},\n  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/datamine/KantarciogluXC11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection.\n \n \n \n \n\n\n \n Ghinita, G.; Kalnis, P.; Kantarcioglu, M.; and Bertino, E.\n\n\n \n\n\n\n GeoInformatica, 15(4): 699–726. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"ApproximatePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/geoinformatica/GhinitaKKB11,\n  author       = {Gabriel Ghinita and\n                  Panos Kalnis and\n                  Murat Kantarcioglu and\n                  Elisa Bertino},\n  title        = {Approximate and exact hybrid algorithms for private nearest-neighbor\n                  queries with database protection},\n  journal      = {GeoInformatica},\n  volume       = {15},\n  number       = {4},\n  pages        = {699--726},\n  year         = {2011},\n  url          = {https://doi.org/10.1007/s10707-010-0121-4},\n  doi          = {10.1007/S10707-010-0121-4},\n  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/geoinformatica/GhinitaKKB11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A secure protocol for protecting the identity of providers when disclosing data for disease surveillance.\n \n \n \n \n\n\n \n Emam, K. E.; Hu, J.; Mercer, J.; Peyton, L.; Kantarcioglu, M.; Malin, B. A.; Buckeridge, D. L.; Samet, S.; and Earle, C.\n\n\n \n\n\n\n J. Am. Medical Informatics Assoc., 18(3): 212–217. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jamia/EmamHMPKMBSE11,\n  author       = {Khaled El Emam and\n                  Jun Hu and\n                  Jay Mercer and\n                  Liam Peyton and\n                  Murat Kantarcioglu and\n                  Bradley A. Malin and\n                  David L. Buckeridge and\n                  Saeed Samet and\n                  Craig Earle},\n  title        = {A secure protocol for protecting the identity of providers when disclosing\n                  data for disease surveillance},\n  journal      = {J. Am. Medical Informatics Assoc.},\n  volume       = {18},\n  number       = {3},\n  pages        = {212--217},\n  year         = {2011},\n  url          = {https://doi.org/10.1136/amiajnl-2011-000100},\n  doi          = {10.1136/AMIAJNL-2011-000100},\n  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jamia/EmamHMPKMBSE11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Impact of security risks on cloud computing adoption.\n \n \n \n \n\n\n \n Kantarcioglu, M.; Bensoussan, A.; and Hoe, S. C.\n\n\n \n\n\n\n In 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011, Allerton Park & Retreat Center, Monticello, IL, USA, 28-30 September, 2011, pages 670–674, 2011. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"ImpactPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/allerton/KantarciogluBH11,\n  author       = {Murat Kantarcioglu and\n                  Alain Bensoussan and\n                  SingRu Celine Hoe},\n  title        = {Impact of security risks on cloud computing adoption},\n  booktitle    = {49th Annual Allerton Conference on Communication, Control, and Computing,\n                  Allerton 2011, Allerton Park {\\&} Retreat Center, Monticello, IL,\n                  USA, 28-30 September, 2011},\n  pages        = {670--674},\n  publisher    = {{IEEE}},\n  year         = {2011},\n  url          = {https://doi.org/10.1109/Allerton.2011.6120232},\n  doi          = {10.1109/ALLERTON.2011.6120232},\n  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},\n  biburl       = {https://dblp.org/rec/conf/allerton/KantarciogluBH11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Poster: inference attacks against searchable encryption protocols.\n \n \n \n \n\n\n \n Islam, M. S.; Kuzu, M.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Chen, Y.; Danezis, G.; and Shmatikov, V., editor(s), Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011, pages 845–448, 2011. ACM\n \n\n\n\n
\n\n\n\n \n \n \"Poster:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccs/IslamKK11,\n  author       = {Mohammad Saiful Islam and\n                  Mehmet Kuzu and\n                  Murat Kantarcioglu},\n  editor       = {Yan Chen and\n                  George Danezis and\n                  Vitaly Shmatikov},\n  title        = {Poster: inference attacks against searchable encryption protocols},\n  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications\n                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},\n  pages        = {845--448},\n  publisher    = {{ACM}},\n  year         = {2011},\n  url          = {https://dl.acm.org/citation.cfm?id=2093508},\n  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},\n  biburl       = {https://dblp.org/rec/conf/ccs/IslamKK11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A language for provenance access control.\n \n \n \n \n\n\n \n Cadenhead, T.; Khadilkar, V.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Sandhu, R. S.; and Bertino, E., editor(s), First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pages 133–144, 2011. ACM\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/codaspy/CadenheadKKT11,\n  author       = {Tyrone Cadenhead and\n                  Vaibhav Khadilkar and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Ravi S. Sandhu and\n                  Elisa Bertino},\n  title        = {A language for provenance access control},\n  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,\n                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},\n  pages        = {133--144},\n  publisher    = {{ACM}},\n  year         = {2011},\n  url          = {https://doi.org/10.1145/1943513.1943532},\n  doi          = {10.1145/1943513.1943532},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/codaspy/CadenheadKKT11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Mixture of gaussian models and bayes error under differential privacy.\n \n \n \n \n\n\n \n Xi, B.; Kantarcioglu, M.; and Inan, A.\n\n\n \n\n\n\n In Sandhu, R. S.; and Bertino, E., editor(s), First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings, pages 179–190, 2011. ACM\n \n\n\n\n
\n\n\n\n \n \n \"MixturePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/codaspy/XiKI11,\n  author       = {Bowei Xi and\n                  Murat Kantarcioglu and\n                  Ali Inan},\n  editor       = {Ravi S. Sandhu and\n                  Elisa Bertino},\n  title        = {Mixture of gaussian models and bayes error under differential privacy},\n  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,\n                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},\n  pages        = {179--190},\n  publisher    = {{ACM}},\n  year         = {2011},\n  url          = {https://doi.org/10.1145/1943513.1943537},\n  doi          = {10.1145/1943513.1943537},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/codaspy/XiKI11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards privacy preserving access control in the cloud.\n \n \n \n \n\n\n \n Nabeel, M.; Bertino, E.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Georgakopoulos, D.; and Joshi, J. B. D., editor(s), 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA, 15-18 October, 2011, pages 172–180, 2011. ICST / IEEE\n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/colcom/NabeelBKT11,\n  author       = {Mohamed Nabeel and\n                  Elisa Bertino and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Dimitrios Georgakopoulos and\n                  James B. D. Joshi},\n  title        = {Towards privacy preserving access control in the cloud},\n  booktitle    = {7th International Conference on Collaborative Computing: Networking,\n                  Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA,\n                  15-18 October, 2011},\n  pages        = {172--180},\n  publisher    = {{ICST} / {IEEE}},\n  year         = {2011},\n  url          = {https://doi.org/10.4108/icst.collaboratecom.2011.247061},\n  doi          = {10.4108/ICST.COLLABORATECOM.2011.247061},\n  timestamp    = {Fri, 15 Mar 2024 12:30:44 +0100},\n  biburl       = {https://dblp.org/rec/conf/colcom/NabeelBKT11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Identity management for cloud computing: developments and directions.\n \n \n \n \n\n\n \n Hamlen, K. W.; Liu, P.; Kantarcioglu, M.; Thuraisingham, B.; and Yu, T.\n\n\n \n\n\n\n In Sheldon, F. T.; Abercrombie, R. K.; and Krings, A. W., editor(s), Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2011, Oak Ridge, TN, USA, October 12-14, 2011, pages 32, 2011. ACM\n \n\n\n\n
\n\n\n\n \n \n \"IdentityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/csiirw/HamlenLKTY11,\n  author       = {Kevin W. Hamlen and\n                  Peng Liu and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham and\n                  Ting Yu},\n  editor       = {Frederick T. Sheldon and\n                  Robert K. Abercrombie and\n                  Axel W. Krings},\n  title        = {Identity management for cloud computing: developments and directions},\n  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence\n                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,\n                  2011},\n  pages        = {32},\n  publisher    = {{ACM}},\n  year         = {2011},\n  url          = {https://doi.org/10.1145/2179298.2179333},\n  doi          = {10.1145/2179298.2179333},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/csiirw/HamlenLKTY11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Investment in Privacy-Preserving Technologies under Uncertainty.\n \n \n \n \n\n\n \n Kantarcioglu, M.; Bensoussan, A.; and Hoe, S. C.\n\n\n \n\n\n\n In Baras, J. S.; Katz, J.; and Altman, E., editor(s), Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings, volume 7037, of Lecture Notes in Computer Science, pages 219–238, 2011. Springer\n \n\n\n\n
\n\n\n\n \n \n \"InvestmentPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/gamesec/KantarciogluBH11,\n  author       = {Murat Kantarcioglu and\n                  Alain Bensoussan and\n                  SingRu Celine Hoe},\n  editor       = {John S. Baras and\n                  Jonathan Katz and\n                  Eitan Altman},\n  title        = {Investment in Privacy-Preserving Technologies under Uncertainty},\n  booktitle    = {Decision and Game Theory for Security - Second International Conference,\n                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.\n                  Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7037},\n  pages        = {219--238},\n  publisher    = {Springer},\n  year         = {2011},\n  url          = {https://doi.org/10.1007/978-3-642-25280-8\\_17},\n  doi          = {10.1007/978-3-642-25280-8\\_17},\n  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},\n  biburl       = {https://dblp.org/rec/conf/gamesec/KantarciogluBH11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Extending the classification of nodes in social networks.\n \n \n \n \n\n\n \n Heatherly, R.; and Kantarcioglu, M.\n\n\n \n\n\n\n In 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, Beijing, China, 10-12 July, 2011, pages 77–82, 2011. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"ExtendingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/HeatherlyK11,\n  author       = {Raymond Heatherly and\n                  Murat Kantarcioglu},\n  title        = {Extending the classification of nodes in social networks},\n  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security\n                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},\n  pages        = {77--82},\n  publisher    = {{IEEE}},\n  year         = {2011},\n  url          = {https://doi.org/10.1109/ISI.2011.5984054},\n  doi          = {10.1109/ISI.2011.5984054},\n  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},\n  biburl       = {https://dblp.org/rec/conf/isi/HeatherlyK11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Identification of related information of interest across free text documents.\n \n \n \n \n\n\n \n Johnson, J. R. (.; Miller, A.; Khan, L.; Thuraisingham, B.; and Kantarcioglu, M.\n\n\n \n\n\n\n In 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, Beijing, China, 10-12 July, 2011, pages 101–106, 2011. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"IdentificationPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/JohnsonMKTK11,\n  author       = {James R. (Bob) Johnson and\n                  Anita Miller and\n                  Latifur Khan and\n                  Bhavani Thuraisingham and\n                  Murat Kantarcioglu},\n  title        = {Identification of related information of interest across free text\n                  documents},\n  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security\n                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},\n  pages        = {101--106},\n  publisher    = {{IEEE}},\n  year         = {2011},\n  url          = {https://doi.org/10.1109/ISI.2011.5984058},\n  doi          = {10.1109/ISI.2011.5984058},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/isi/JohnsonMKTK11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Extraction of expanded entity phrases.\n \n \n \n \n\n\n \n Johnson, J. R. (.; Miller, A.; Khan, L.; Thuraisingham, B.; and Kantarcioglu, M.\n\n\n \n\n\n\n In 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, Beijing, China, 10-12 July, 2011, pages 107–112, 2011. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"ExtractionPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/JohnsonMKTK11a,\n  author       = {James R. (Bob) Johnson and\n                  Anita Miller and\n                  Latifur Khan and\n                  Bhavani Thuraisingham and\n                  Murat Kantarcioglu},\n  title        = {Extraction of expanded entity phrases},\n  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security\n                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},\n  pages        = {107--112},\n  publisher    = {{IEEE}},\n  year         = {2011},\n  url          = {https://doi.org/10.1109/ISI.2011.5984059},\n  doi          = {10.1109/ISI.2011.5984059},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/isi/JohnsonMKTK11a.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Compression for Anti-Adversarial Learning.\n \n \n \n \n\n\n \n Zhou, Y.; Inge, W. M.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Huang, J. Z.; Cao, L.; and Srivastava, J., editor(s), Advances in Knowledge Discovery and Data Mining - 15th Pacific-Asia Conference, PAKDD 2011, Shenzhen, China, May 24-27, 2011, Proceedings, Part II, volume 6635, of Lecture Notes in Computer Science, pages 198–209, 2011. Springer\n \n\n\n\n
\n\n\n\n \n \n \"CompressionPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pakdd/ZhouIK11,\n  author       = {Yan Zhou and\n                  W. Meador Inge and\n                  Murat Kantarcioglu},\n  editor       = {Joshua Zhexue Huang and\n                  Longbing Cao and\n                  Jaideep Srivastava},\n  title        = {Compression for Anti-Adversarial Learning},\n  booktitle    = {Advances in Knowledge Discovery and Data Mining - 15th Pacific-Asia\n                  Conference, {PAKDD} 2011, Shenzhen, China, May 24-27, 2011, Proceedings,\n                  Part {II}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {6635},\n  pages        = {198--209},\n  publisher    = {Springer},\n  year         = {2011},\n  url          = {https://doi.org/10.1007/978-3-642-20847-8\\_17},\n  doi          = {10.1007/978-3-642-20847-8\\_17},\n  timestamp    = {Tue, 16 Jul 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/pakdd/ZhouIK11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Constraint Satisfaction Cryptanalysis of Bloom Filters in Private Record Linkage.\n \n \n \n \n\n\n \n Kuzu, M.; Kantarcioglu, M.; Durham, E.; and Malin, B. A.\n\n\n \n\n\n\n In Fischer-Hübner, S.; and Hopper, N., editor(s), Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings, volume 6794, of Lecture Notes in Computer Science, pages 226–245, 2011. Springer\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pet/KuzuKDM11,\n  author       = {Mehmet Kuzu and\n                  Murat Kantarcioglu and\n                  Elizabeth Durham and\n                  Bradley A. Malin},\n  editor       = {Simone Fischer{-}H{\\"{u}}bner and\n                  Nicholas Hopper},\n  title        = {A Constraint Satisfaction Cryptanalysis of Bloom Filters in Private\n                  Record Linkage},\n  booktitle    = {Privacy Enhancing Technologies - 11th International Symposium, {PETS}\n                  2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {6794},\n  pages        = {226--245},\n  publisher    = {Springer},\n  year         = {2011},\n  url          = {https://doi.org/10.1007/978-3-642-22263-4\\_13},\n  doi          = {10.1007/978-3-642-22263-4\\_13},\n  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/pet/KuzuKDM11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Differentiating Code from Data in x86 Binaries.\n \n \n \n \n\n\n \n Wartell, R.; Zhou, Y.; Hamlen, K. W.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Gunopulos, D.; Hofmann, T.; Malerba, D.; and Vazirgiannis, M., editor(s), Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2011, Athens, Greece, September 5-9, 2011, Proceedings, Part III, volume 6913, of Lecture Notes in Computer Science, pages 522–536, 2011. Springer\n \n\n\n\n
\n\n\n\n \n \n \"DifferentiatingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pkdd/WartellZHKT11,\n  author       = {Richard Wartell and\n                  Yan Zhou and\n                  Kevin W. Hamlen and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Dimitrios Gunopulos and\n                  Thomas Hofmann and\n                  Donato Malerba and\n                  Michalis Vazirgiannis},\n  title        = {Differentiating Code from Data in x86 Binaries},\n  booktitle    = {Machine Learning and Knowledge Discovery in Databases - European Conference,\n                  {ECML} {PKDD} 2011, Athens, Greece, September 5-9, 2011, Proceedings,\n                  Part {III}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {6913},\n  pages        = {522--536},\n  publisher    = {Springer},\n  year         = {2011},\n  url          = {https://doi.org/10.1007/978-3-642-23808-6\\_34},\n  doi          = {10.1007/978-3-642-23808-6\\_34},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/pkdd/WartellZHKT11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Transforming provenance using redaction.\n \n \n \n \n\n\n \n Cadenhead, T.; Khadilkar, V.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Breu, R.; Crampton, J.; and Lobo, J., editor(s), 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings, pages 93–102, 2011. ACM\n \n\n\n\n
\n\n\n\n \n \n \"TransformingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sacmat/CadenheadKKT11,\n  author       = {Tyrone Cadenhead and\n                  Vaibhav Khadilkar and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Ruth Breu and\n                  Jason Crampton and\n                  Jorge Lobo},\n  title        = {Transforming provenance using redaction},\n  booktitle    = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}\n                  2011, Innsbruck, Austria, June 15-17, 2011, Proceedings},\n  pages        = {93--102},\n  publisher    = {{ACM}},\n  year         = {2011},\n  url          = {https://doi.org/10.1145/1998441.1998456},\n  doi          = {10.1145/1998441.1998456},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sacmat/CadenheadKKT11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Framework for Policies over Provenance.\n \n \n \n \n\n\n \n Cadenhead, T.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Buneman, P.; and Freire, J., editor(s), 3rd Workshop on the Theory and Practice of Provenance, TaPP'11, Heraklion, Crete, Greece, June 20-21, 2011, 2011. USENIX Association\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/tapp/CadenheadKT11,\n  author       = {Tyrone Cadenhead and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Peter Buneman and\n                  Juliana Freire},\n  title        = {A Framework for Policies over Provenance},\n  booktitle    = {3rd Workshop on the Theory and Practice of Provenance, TaPP'11, Heraklion,\n                  Crete, Greece, June 20-21, 2011},\n  publisher    = {{USENIX} Association},\n  year         = {2011},\n  url          = {https://www.usenix.org/conference/tapp11/framework-policies-over-provenance},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/tapp/CadenheadKT11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Automatic sanitization of social network data to prevent inference attacks.\n \n \n \n \n\n\n \n Heatherly, R.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Srinivasan, S.; Ramamritham, K.; Kumar, A.; Ravindra, M. P.; Bertino, E.; and Kumar, R., editor(s), Proceedings of the 20th International Conference on World Wide Web, WWW 2011, Hyderabad, India, March 28 - April 1, 2011 (Companion Volume), pages 55–56, 2011. ACM\n \n\n\n\n
\n\n\n\n \n \n \"AutomaticPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/www/HeatherlyK11,\n  author       = {Raymond Heatherly and\n                  Murat Kantarcioglu},\n  editor       = {Sadagopan Srinivasan and\n                  Krithi Ramamritham and\n                  Arun Kumar and\n                  M. P. Ravindra and\n                  Elisa Bertino and\n                  Ravi Kumar},\n  title        = {Automatic sanitization of social network data to prevent inference\n                  attacks},\n  booktitle    = {Proceedings of the 20th International Conference on World Wide Web,\n                  {WWW} 2011, Hyderabad, India, March 28 - April 1, 2011 (Companion\n                  Volume)},\n  pages        = {55--56},\n  publisher    = {{ACM}},\n  year         = {2011},\n  url          = {https://doi.org/10.1145/1963192.1963221},\n  doi          = {10.1145/1963192.1963221},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/www/HeatherlyK11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure Data Processing in a Hybrid Cloud.\n \n \n \n \n\n\n \n Khadilkar, V.; Kantarcioglu, M.; Thuraisingham, B.; and Mehrotra, S.\n\n\n \n\n\n\n CoRR, abs/1105.1982. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1105-1982,\n  author       = {Vaibhav Khadilkar and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham and\n                  Sharad Mehrotra},\n  title        = {Secure Data Processing in a Hybrid Cloud},\n  journal      = {CoRR},\n  volume       = {abs/1105.1982},\n  year         = {2011},\n  url          = {http://arxiv.org/abs/1105.1982},\n  eprinttype    = {arXiv},\n  eprint       = {1105.1982},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1105-1982.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (13)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Security Issues for Cloud Computing.\n \n \n \n \n\n\n \n Hamlen, K. W.; Kantarcioglu, M.; Khan, L.; and Thuraisingham, B.\n\n\n \n\n\n\n Int. J. Inf. Secur. Priv., 4(2): 36–48. 2010.\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijisp/HamlenKKT10,\n  author       = {Kevin W. Hamlen and\n                  Murat Kantarcioglu and\n                  Latifur Khan and\n                  Bhavani Thuraisingham},\n  title        = {Security Issues for Cloud Computing},\n  journal      = {Int. J. Inf. Secur. Priv.},\n  volume       = {4},\n  number       = {2},\n  pages        = {36--48},\n  year         = {2010},\n  url          = {https://doi.org/10.4018/jisp.2010040103},\n  doi          = {10.4018/JISP.2010040103},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijisp/HamlenKKT10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Update-Enabled Triplification of Relational Data into Virtual RDF Stores.\n \n \n \n \n\n\n \n Ramanujam, S.; Khadilkar, V.; Khan, L.; Kantarcioglu, M.; Thuraisingham, B.; and Seida, S.\n\n\n \n\n\n\n Int. J. Semantic Comput., 4(4): 423–451. 2010.\n \n\n\n\n
\n\n\n\n \n \n \"Update-EnabledPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijsc/RamanujamKKKTS10,\n  author       = {Sunitha Ramanujam and\n                  Vaibhav Khadilkar and\n                  Latifur Khan and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham and\n                  Steven Seida},\n  title        = {Update-Enabled Triplification of Relational Data into Virtual {RDF}\n                  Stores},\n  journal      = {Int. J. Semantic Comput.},\n  volume       = {4},\n  number       = {4},\n  pages        = {423--451},\n  year         = {2010},\n  url          = {https://doi.org/10.1142/S1793351X10001073},\n  doi          = {10.1142/S1793351X10001073},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijsc/RamanujamKKKTS10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Building Disclosure Risk Aware Query Optimizers for Relational Databases.\n \n \n \n \n\n\n \n Canim, M.; Kantarcioglu, M.; Hore, B.; and Mehrotra, S.\n\n\n \n\n\n\n Proc. VLDB Endow., 3(1): 13–24. 2010.\n \n\n\n\n
\n\n\n\n \n \n \"BuildingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/pvldb/CanimKHM10,\n  author       = {Mustafa Canim and\n                  Murat Kantarcioglu and\n                  Bijit Hore and\n                  Sharad Mehrotra},\n  title        = {Building Disclosure Risk Aware Query Optimizers for Relational Databases},\n  journal      = {Proc. {VLDB} Endow.},\n  volume       = {3},\n  number       = {1},\n  pages        = {13--24},\n  year         = {2010},\n  url          = {http://www.vldb.org/pvldb/vldb2010/pvldb\\_vol3/R01.pdf},\n  doi          = {10.14778/1920841.1920849},\n  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/pvldb/CanimKHM10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Data Intensive Query Processing for Large RDF Graphs Using Cloud Computing Tools.\n \n \n \n \n\n\n \n Husain, M. F.; Khan, L.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In IEEE International Conference on Cloud Computing, CLOUD 2010, Miami, FL, USA, 5-10 July, 2010, pages 1–10, 2010. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"DataPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/IEEEcloud/HusainKKT10,\n  author       = {Mohammad Farhan Husain and\n                  Latifur Khan and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  title        = {Data Intensive Query Processing for Large {RDF} Graphs Using Cloud\n                  Computing Tools},\n  booktitle    = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2010,\n                  Miami, FL, USA, 5-10 July, 2010},\n  pages        = {1--10},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2010},\n  url          = {https://doi.org/10.1109/CLOUD.2010.36},\n  doi          = {10.1109/CLOUD.2010.36},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/IEEEcloud/HusainKKT10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure data storage and retrieval in the cloud.\n \n \n \n \n\n\n \n Thuraisingham, B.; Khadilkar, V.; Gupta, A.; Kantarcioglu, M.; and Khan, L.\n\n\n \n\n\n\n In Aberer, K.; and Joshi, J., editor(s), The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA, 9-12 October 2010, pages 1–8, 2010. ICST / IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/colcom/ThuraisinghamKGKK10,\n  author       = {Bhavani Thuraisingham and\n                  Vaibhav Khadilkar and\n                  Anuj Gupta and\n                  Murat Kantarcioglu and\n                  Latifur Khan},\n  editor       = {Karl Aberer and\n                  James Joshi},\n  title        = {Secure data storage and retrieval in the cloud},\n  booktitle    = {The 6th International Conference on Collaborative Computing: Networking,\n                  Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA,\n                  9-12 October 2010},\n  pages        = {1--8},\n  publisher    = {{ICST} / {IEEE}},\n  year         = {2010},\n  url          = {https://doi.org/10.4108/icst.collaboratecom.2010.15},\n  doi          = {10.4108/ICST.COLLABORATECOM.2010.15},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/colcom/ThuraisinghamKGKK10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Scalable and Efficient Reasoning for Enforcing Role-Based Access Control.\n \n \n \n \n\n\n \n Cadenhead, T.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Foresti, S.; and Jajodia, S., editor(s), Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings, volume 6166, of Lecture Notes in Computer Science, pages 209–224, 2010. Springer\n \n\n\n\n
\n\n\n\n \n \n \"ScalablePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dbsec/CadenheadKT10,\n  author       = {Tyrone Cadenhead and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Sara Foresti and\n                  Sushil Jajodia},\n  title        = {Scalable and Efficient Reasoning for Enforcing Role-Based Access Control},\n  booktitle    = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}\n                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {6166},\n  pages        = {209--224},\n  publisher    = {Springer},\n  year         = {2010},\n  url          = {https://doi.org/10.1007/978-3-642-13739-6\\_14},\n  doi          = {10.1007/978-3-642-13739-6\\_14},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/dbsec/CadenheadKT10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Private record matching using differential privacy.\n \n \n \n \n\n\n \n Inan, A.; Kantarcioglu, M.; Ghinita, G.; and Bertino, E.\n\n\n \n\n\n\n In Manolescu, I.; Spaccapietra, S.; Teubner, J.; Kitsuregawa, M.; Léger, A.; Naumann, F.; Ailamaki, A.; and Özcan, F., editor(s), EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, Switzerland, March 22-26, 2010, Proceedings, volume 426, of ACM International Conference Proceeding Series, pages 123–134, 2010. ACM\n \n\n\n\n
\n\n\n\n \n \n \"PrivatePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/edbt/InanKGB10,\n  author       = {Ali Inan and\n                  Murat Kantarcioglu and\n                  Gabriel Ghinita and\n                  Elisa Bertino},\n  editor       = {Ioana Manolescu and\n                  Stefano Spaccapietra and\n                  Jens Teubner and\n                  Masaru Kitsuregawa and\n                  Alain L{\\'{e}}ger and\n                  Felix Naumann and\n                  Anastasia Ailamaki and\n                  Fatma {\\"{O}}zcan},\n  title        = {Private record matching using differential privacy},\n  booktitle    = {{EDBT} 2010, 13th International Conference on Extending Database Technology,\n                  Lausanne, Switzerland, March 22-26, 2010, Proceedings},\n  series       = {{ACM} International Conference Proceeding Series},\n  volume       = {426},\n  pages        = {123--134},\n  publisher    = {{ACM}},\n  year         = {2010},\n  url          = {https://doi.org/10.1145/1739041.1739059},\n  doi          = {10.1145/1739041.1739059},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/edbt/InanKGB10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n When Do Firms Invest in Privacy-Preserving Technologies?.\n \n \n \n \n\n\n \n Kantarcioglu, M.; Bensoussan, A.; and Hoe, S. C.\n\n\n \n\n\n\n In Alpcan, T.; Buttyán, L.; and Baras, J. S., editor(s), Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings, volume 6442, of Lecture Notes in Computer Science, pages 72–86, 2010. Springer\n \n\n\n\n
\n\n\n\n \n \n \"WhenPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/gamesec/KantarciogluBH10,\n  author       = {Murat Kantarcioglu and\n                  Alain Bensoussan and\n                  SingRu Celine Hoe},\n  editor       = {Tansu Alpcan and\n                  Levente Butty{\\'{a}}n and\n                  John S. Baras},\n  title        = {When Do Firms Invest in Privacy-Preserving Technologies?},\n  booktitle    = {Decision and Game Theory for Security - First International Conference,\n                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {6442},\n  pages        = {72--86},\n  publisher    = {Springer},\n  year         = {2010},\n  url          = {https://doi.org/10.1007/978-3-642-17197-0\\_5},\n  doi          = {10.1007/978-3-642-17197-0\\_5},\n  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},\n  biburl       = {https://dblp.org/rec/conf/gamesec/KantarciogluBH10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model.\n \n \n \n \n\n\n \n Bensoussan, A.; Kantarcioglu, M.; and Hoe, S. C.\n\n\n \n\n\n\n In Alpcan, T.; Buttyán, L.; and Baras, J. S., editor(s), Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings, volume 6442, of Lecture Notes in Computer Science, pages 135–148, 2010. Springer\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/gamesec/BensoussanKH10,\n  author       = {Alain Bensoussan and\n                  Murat Kantarcioglu and\n                  SingRu Celine Hoe},\n  editor       = {Tansu Alpcan and\n                  Levente Butty{\\'{a}}n and\n                  John S. Baras},\n  title        = {A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet\n                  Defense Model},\n  booktitle    = {Decision and Game Theory for Security - First International Conference,\n                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {6442},\n  pages        = {135--148},\n  publisher    = {Springer},\n  year         = {2010},\n  url          = {https://doi.org/10.1007/978-3-642-17197-0\\_9},\n  doi          = {10.1007/978-3-642-17197-0\\_9},\n  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/gamesec/BensoussanKH10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Bi-directional Translation of Relational Data into Virtual RDF Stores.\n \n \n \n \n\n\n \n Ramanujam, S.; Khadilkar, V.; Khan, L.; Seida, S.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Proceedings of the 4th IEEE International Conference on Semantic Computing (ICSC 2010), September 22-24, 2010, Carnegie Mellon University, Pittsburgh, PA, USA, pages 268–276, 2010. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Bi-directionalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/semco/RamanujamKKSKT10,\n  author       = {Sunitha Ramanujam and\n                  Vaibhav Khadilkar and\n                  Latifur Khan and\n                  Steven Seida and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  title        = {Bi-directional Translation of Relational Data into Virtual {RDF} Stores},\n  booktitle    = {Proceedings of the 4th {IEEE} International Conference on Semantic\n                  Computing {(ICSC} 2010), September 22-24, 2010, Carnegie Mellon University,\n                  Pittsburgh, PA, {USA}},\n  pages        = {268--276},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2010},\n  url          = {https://doi.org/10.1109/ICSC.2010.61},\n  doi          = {10.1109/ICSC.2010.61},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/semco/RamanujamKKSKT10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Efficient Processing of Large RDF Streams Using Memory Management Algorithms.\n \n \n \n \n\n\n \n Khadilkar, V.; Kantarcioglu, M.; Khan, L.; and Thuraisingham, B.\n\n\n \n\n\n\n In Polleres, A.; and Chen, H., editor(s), Proceedings of the ISWC 2010 Posters & Demonstrations Track: Collected Abstracts, Shanghai, China, November 9, 2010, volume 658, of CEUR Workshop Proceedings, 2010. CEUR-WS.org\n \n\n\n\n
\n\n\n\n \n \n \"EfficientPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/semweb/KhadilkarKKT10,\n  author       = {Vaibhav Khadilkar and\n                  Murat Kantarcioglu and\n                  Latifur Khan and\n                  Bhavani Thuraisingham},\n  editor       = {Axel Polleres and\n                  Huajun Chen},\n  title        = {Efficient Processing of Large {RDF} Streams Using Memory Management\n                  Algorithms},\n  booktitle    = {Proceedings of the {ISWC} 2010 Posters {\\&} Demonstrations Track:\n                  Collected Abstracts, Shanghai, China, November 9, 2010},\n  series       = {{CEUR} Workshop Proceedings},\n  volume       = {658},\n  publisher    = {CEUR-WS.org},\n  year         = {2010},\n  url          = {https://ceur-ws.org/Vol-658/paper467.pdf},\n  timestamp    = {Fri, 10 Mar 2023 16:23:09 +0100},\n  biburl       = {https://dblp.org/rec/conf/semweb/KhadilkarKKT10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Incentive Compatible Distributed Data Mining.\n \n \n \n \n\n\n \n Kantarcioglu, M.; and Nix, R.\n\n\n \n\n\n\n In Elmagarmid, A. K.; and Agrawal, D., editor(s), Proceedings of the 2010 IEEE Second International Conference on Social Computing, SocialCom / IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010, Minneapolis, Minnesota, USA, August 20-22, 2010, pages 735–742, 2010. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"IncentivePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/socialcom/KantarciogluN10,\n  author       = {Murat Kantarcioglu and\n                  Robert Nix},\n  editor       = {Ahmed K. Elmagarmid and\n                  Divyakant Agrawal},\n  title        = {Incentive Compatible Distributed Data Mining},\n  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on\n                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,\n                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,\n                  August 20-22, 2010},\n  pages        = {735--742},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2010},\n  url          = {https://doi.org/10.1109/SocialCom.2010.114},\n  doi          = {10.1109/SOCIALCOM.2010.114},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/socialcom/KantarciogluN10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Risk Management Framework for Health Care Data Anonymization.\n \n \n \n \n\n\n \n Grandison, T.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Fu, K.; Kohno, T.; and Rubin, A. D., editor(s), 1st USENIX Workshop on Health Security and Privacy, HealthSec'10, Washington, D.C., USA, August 10, 2010, 2010. USENIX Association\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/uss/GrandisonK10,\n  author       = {Tyrone Grandison and\n                  Murat Kantarcioglu},\n  editor       = {Kevin Fu and\n                  Tadayoshi Kohno and\n                  Aviel D. Rubin},\n  title        = {A Risk Management Framework for Health Care Data Anonymization},\n  booktitle    = {1st {USENIX} Workshop on Health Security and Privacy, HealthSec'10,\n                  Washington, D.C., USA, August 10, 2010},\n  publisher    = {{USENIX} Association},\n  year         = {2010},\n  url          = {https://www.usenix.org/conference/healthsec10/risk-management-framework-health-care-data-anonymization},\n  timestamp    = {Mon, 01 Feb 2021 08:43:06 +0100},\n  biburl       = {https://dblp.org/rec/conf/uss/GrandisonK10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (21)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Design and implementation of a secure social network system.\n \n \n \n\n\n \n Layfield, R.; Thuraisingham, B.; Khan, L.; and Kantarcioglu, M.\n\n\n \n\n\n\n Comput. Syst. Sci. Eng., 24(2). 2009.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/csse/LayfieldTKK09,\n  author       = {Ryan Layfield and\n                  Bhavani Thuraisingham and\n                  Latifur Khan and\n                  Murat Kantarcioglu},\n  title        = {Design and implementation of a secure social network system},\n  journal      = {Comput. Syst. Sci. Eng.},\n  volume       = {24},\n  number       = {2},\n  year         = {2009},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/csse/LayfieldTKK09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Formal anonymity models for efficient privacy-preserving joins.\n \n \n \n \n\n\n \n Kantarcioglu, M.; Inan, A.; Jiang, W.; and Malin, B. A.\n\n\n \n\n\n\n Data Knowl. Eng., 68(11): 1206–1223. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"FormalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/dke/KantarciogluIJM09,\n  author       = {Murat Kantarcioglu and\n                  Ali Inan and\n                  Wei Jiang and\n                  Bradley A. Malin},\n  title        = {Formal anonymity models for efficient privacy-preserving joins},\n  journal      = {Data Knowl. Eng.},\n  volume       = {68},\n  number       = {11},\n  pages        = {1206--1223},\n  year         = {2009},\n  url          = {https://doi.org/10.1016/j.datak.2009.06.011},\n  doi          = {10.1016/J.DATAK.2009.06.011},\n  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/dke/KantarciogluIJM09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A risk management approach to RBAC.\n \n \n \n \n\n\n \n Celikel, E.; Kantarcioglu, M.; Thuraisingham, B.; and Bertino, E.\n\n\n \n\n\n\n Risk Decis. Anal., 1(1): 21–33. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/rda/CelikelKTB09,\n  author       = {Ebru Celikel and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham and\n                  Elisa Bertino},\n  title        = {A risk management approach to {RBAC}},\n  journal      = {Risk Decis. Anal.},\n  volume       = {1},\n  number       = {1},\n  pages        = {21--33},\n  year         = {2009},\n  url          = {https://doi.org/10.3233/RDA-2008-0002},\n  doi          = {10.3233/RDA-2008-0002},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/rda/CelikelKTB09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The Challenge of Assuring Data Trustworthiness.\n \n \n \n \n\n\n \n Bertino, E.; Dai, C.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Zhou, X.; Yokota, H.; Deng, K.; and Liu, Q., editor(s), Database Systems for Advanced Applications, 14th International Conference, DASFAA 2009, Brisbane, Australia, April 21-23, 2009. Proceedings, volume 5463, of Lecture Notes in Computer Science, pages 22–33, 2009. Springer\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dasfaa/BertinoDK09,\n  author       = {Elisa Bertino and\n                  Chenyun Dai and\n                  Murat Kantarcioglu},\n  editor       = {Xiaofang Zhou and\n                  Haruo Yokota and\n                  Ke Deng and\n                  Qing Liu},\n  title        = {The Challenge of Assuring Data Trustworthiness},\n  booktitle    = {Database Systems for Advanced Applications, 14th International Conference,\n                  {DASFAA} 2009, Brisbane, Australia, April 21-23, 2009. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {5463},\n  pages        = {22--33},\n  publisher    = {Springer},\n  year         = {2009},\n  url          = {https://doi.org/10.1007/978-3-642-00887-0\\_2},\n  doi          = {10.1007/978-3-642-00887-0\\_2},\n  timestamp    = {Sat, 08 Feb 2020 12:58:03 +0100},\n  biburl       = {https://dblp.org/rec/conf/dasfaa/BertinoDK09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy Preserving Decision Tree Mining from Perturbed Data.\n \n \n \n \n\n\n \n Liu, L.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), Proceedings (CD-ROM and online), 5-8 January 2009, Waikoloa, Big Island, HI, USA, pages 1–10, 2009. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"PrivacyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/hicss/LiuKT09,\n  author       = {Li Liu and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  title        = {Privacy Preserving Decision Tree Mining from Perturbed Data},\n  booktitle    = {42st Hawaii International International Conference on Systems Science\n                  {(HICSS-42} 2009), Proceedings {(CD-ROM} and online), 5-8 January\n                  2009, Waikoloa, Big Island, HI, {USA}},\n  pages        = {1--10},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2009},\n  url          = {https://doi.org/10.1109/HICSS.2009.353},\n  doi          = {10.1109/HICSS.2009.353},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/hicss/LiuKT09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis.\n \n \n \n \n\n\n \n Thuraisingham, B.; Khan, L.; Kantarcioglu, M.; Chib, S.; Han, J.; and Son, S. H.\n\n\n \n\n\n\n In 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), Proceedings (CD-ROM and online), 5-8 January 2009, Waikoloa, Big Island, HI, USA, pages 1–12, 2009. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Real-TimePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/hicss/ThuraisinghamKKCHS09,\n  author       = {Bhavani Thuraisingham and\n                  Latifur Khan and\n                  Murat Kantarcioglu and\n                  Sonia Chib and\n                  Jiawei Han and\n                  Sang Hyuk Son},\n  title        = {Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis},\n  booktitle    = {42st Hawaii International International Conference on Systems Science\n                  {(HICSS-42} 2009), Proceedings {(CD-ROM} and online), 5-8 January\n                  2009, Waikoloa, Big Island, HI, {USA}},\n  pages        = {1--12},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2009},\n  url          = {https://doi.org/10.1109/HICSS.2009.363},\n  doi          = {10.1109/HICSS.2009.363},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/hicss/ThuraisinghamKKCHS09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Using Anonymized Data for Classification.\n \n \n \n \n\n\n \n Inan, A.; Kantarcioglu, M.; and Bertino, E.\n\n\n \n\n\n\n In Ioannidis, Y. E.; Lee, D. L.; and Ng, R. T., editor(s), Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China, pages 429–440, 2009. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"UsingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icde/InanKB09,\n  author       = {Ali Inan and\n                  Murat Kantarcioglu and\n                  Elisa Bertino},\n  editor       = {Yannis E. Ioannidis and\n                  Dik Lun Lee and\n                  Raymond T. Ng},\n  title        = {Using Anonymized Data for Classification},\n  booktitle    = {Proceedings of the 25th International Conference on Data Engineering,\n                  {ICDE} 2009, March 29 2009 - April 2 2009, Shanghai, China},\n  pages        = {429--440},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2009},\n  url          = {https://doi.org/10.1109/ICDE.2009.19},\n  doi          = {10.1109/ICDE.2009.19},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icde/InanKB09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On the mitigation of bioterrorism through game theory.\n \n \n \n \n\n\n \n Layfield, R.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings, pages 1–6, 2009. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/LayfieldKT09,\n  author       = {Ryan Layfield and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  title        = {On the mitigation of bioterrorism through game theory},\n  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,\n                  {ISI} 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings},\n  pages        = {1--6},\n  publisher    = {{IEEE}},\n  year         = {2009},\n  url          = {https://doi.org/10.1109/ISI.2009.5137262},\n  doi          = {10.1109/ISI.2009.5137262},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/isi/LayfieldKT09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Social network classification incorporating link type values.\n \n \n \n \n\n\n \n Heatherly, R.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings, pages 19–24, 2009. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SocialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/HeatherlyKT09,\n  author       = {Raymond Heatherly and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  title        = {Social network classification incorporating link type values},\n  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,\n                  {ISI} 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings},\n  pages        = {19--24},\n  publisher    = {{IEEE}},\n  year         = {2009},\n  url          = {https://doi.org/10.1109/ISI.2009.5137265},\n  doi          = {10.1109/ISI.2009.5137265},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/isi/HeatherlyKT09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Design and implementation of a secure social network system.\n \n \n \n \n\n\n \n Layfield, R.; Thuraisingham, B.; Khan, L.; Kantarcioglu, M.; and Rachapalli, J.\n\n\n \n\n\n\n In IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings, pages 236–247, 2009. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"DesignPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/LayfieldTKKR09,\n  author       = {Ryan Layfield and\n                  Bhavani Thuraisingham and\n                  Latifur Khan and\n                  Murat Kantarcioglu and\n                  Jyothsna Rachapalli},\n  title        = {Design and implementation of a secure social network system},\n  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,\n                  {ISI} 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings},\n  pages        = {236--247},\n  publisher    = {{IEEE}},\n  year         = {2009},\n  url          = {https://doi.org/10.1109/ISI.2009.5137318},\n  doi          = {10.1109/ISI.2009.5137318},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/isi/LayfieldTKKR09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Assured Information Sharing Life Cycle.\n \n \n \n \n\n\n \n Finin, T.; Joshi, A.; Kargupta, H.; Yesha, Y.; Sachs, J.; Bertino, E.; Li, N.; Clifton, C.; Spafford, G.; Thuraisingham, B.; Kantarcioglu, M.; Bensoussan, A.; Berg, N.; Khan, L.; Han, J.; Zhai, C.; Sandhu, R. S.; Xu, S.; Massaro, J.; and Adamic, L. A.\n\n\n \n\n\n\n In IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings, pages 307–309, 2009. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"AssuredPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/FininJKYSBLCSTKBBKHZSXMA09,\n  author       = {Tim Finin and\n                  Anupam Joshi and\n                  Hillol Kargupta and\n                  Yelena Yesha and\n                  Joel Sachs and\n                  Elisa Bertino and\n                  Ninghui Li and\n                  Chris Clifton and\n                  Gene Spafford and\n                  Bhavani Thuraisingham and\n                  Murat Kantarcioglu and\n                  Alain Bensoussan and\n                  Nathan Berg and\n                  Latifur Khan and\n                  Jiawei Han and\n                  ChengXiang Zhai and\n                  Ravi S. Sandhu and\n                  Shouhuai Xu and\n                  Jim Massaro and\n                  Lada A. Adamic},\n  title        = {Assured Information Sharing Life Cycle},\n  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,\n                  {ISI} 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings},\n  pages        = {307--309},\n  publisher    = {{IEEE}},\n  year         = {2009},\n  url          = {https://doi.org/10.1109/ISI.2009.5137331},\n  doi          = {10.1109/ISI.2009.5137331},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/isi/FininJKYSBLCSTKBBKHZSXMA09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Design of a temporal geosocial semantic web for military stabilization and reconstruction operations.\n \n \n \n \n\n\n \n Thuraisingham, B.; Khan, L.; Kantarcioglu, M.; and Khadilkar, V.\n\n\n \n\n\n\n In Chen, H.; Dacier, M.; Moens, M.; Paass, G.; and Yang, C. C., editor(s), Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009, pages 63–74, 2009. ACM\n \n\n\n\n
\n\n\n\n \n \n \"DesignPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/kdd/ThuraisinghamKKK09,\n  author       = {Bhavani Thuraisingham and\n                  Latifur Khan and\n                  Murat Kantarcioglu and\n                  Vaibhav Khadilkar},\n  editor       = {Hsinchun Chen and\n                  Marc Dacier and\n                  Marie{-}Francine Moens and\n                  Gerhard Paass and\n                  Christopher C. Yang},\n  title        = {Design of a temporal geosocial semantic web for military stabilization\n                  and reconstruction operations},\n  booktitle    = {Proceedings of the {ACM} {SIGKDD} Workshop on CyberSecurity and Intelligence\n                  Informatics, Paris, France, June 28, 2009},\n  pages        = {63--74},\n  publisher    = {{ACM}},\n  year         = {2009},\n  url          = {https://doi.org/10.1145/1599272.1599285},\n  doi          = {10.1145/1599272.1599285},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/kdd/ThuraisinghamKKK09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations.\n \n \n \n \n\n\n \n Thuraisingham, B.; Kantarcioglu, M.; and Khan, L.\n\n\n \n\n\n\n In Chen, H.; Yang, C. C.; Chau, M.; and Li, S., editor(s), Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings, volume 5477, of Lecture Notes in Computer Science, pages 1, 2009. Springer\n \n\n\n\n
\n\n\n\n \n \n \"BuildingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/paisi/ThuraisinghamKK09,\n  author       = {Bhavani Thuraisingham and\n                  Murat Kantarcioglu and\n                  Latifur Khan},\n  editor       = {Hsinchun Chen and\n                  Christopher C. Yang and\n                  Michael Chau and\n                  Shu{-}Hsing Li},\n  title        = {Building a Geosocial Semantic Web for Military Stabilization and Reconstruction\n                  Operations},\n  booktitle    = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI}\n                  2009, Bangkok, Thailand, April 27, 2009. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {5477},\n  pages        = {1},\n  publisher    = {Springer},\n  year         = {2009},\n  url          = {https://doi.org/10.1007/978-3-642-01393-5\\_1},\n  doi          = {10.1007/978-3-642-01393-5\\_1},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/paisi/ThuraisinghamKK09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining.\n \n \n \n \n\n\n \n Kantarcioglu, M.; Nix, R.; and Vaidya, J.\n\n\n \n\n\n\n In Theeramunkong, T.; Kijsirikul, B.; Cercone, N.; and Ho, T. B., editor(s), Advances in Knowledge Discovery and Data Mining, 13th Pacific-Asia Conference, PAKDD 2009, Bangkok, Thailand, April 27-30, 2009, Proceedings, volume 5476, of Lecture Notes in Computer Science, pages 515–524, 2009. Springer\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pakdd/KantarciogluNV09,\n  author       = {Murat Kantarcioglu and\n                  Robert Nix and\n                  Jaideep Vaidya},\n  editor       = {Thanaruk Theeramunkong and\n                  Boonserm Kijsirikul and\n                  Nick Cercone and\n                  Tu Bao Ho},\n  title        = {An Efficient Approximate Protocol for Privacy-Preserving Association\n                  Rule Mining},\n  booktitle    = {Advances in Knowledge Discovery and Data Mining, 13th Pacific-Asia\n                  Conference, {PAKDD} 2009, Bangkok, Thailand, April 27-30, 2009, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {5476},\n  pages        = {515--524},\n  publisher    = {Springer},\n  year         = {2009},\n  url          = {https://doi.org/10.1007/978-3-642-01307-2\\_48},\n  doi          = {10.1007/978-3-642-01307-2\\_48},\n  timestamp    = {Fri, 25 Dec 2020 01:15:13 +0100},\n  biburl       = {https://dblp.org/rec/conf/pakdd/KantarciogluNV09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A semantic web based framework for social network access control.\n \n \n \n \n\n\n \n Carminati, B.; Ferrari, E.; Heatherly, R.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Carminati, B.; and Joshi, J., editor(s), 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pages 177–186, 2009. ACM\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sacmat/CarminatiFHKT09,\n  author       = {Barbara Carminati and\n                  Elena Ferrari and\n                  Raymond Heatherly and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Barbara Carminati and\n                  James Joshi},\n  title        = {A semantic web based framework for social network access control},\n  booktitle    = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}\n                  2009, Stresa, Italy, June 3-5, 2009, Proceedings},\n  pages        = {177--186},\n  publisher    = {{ACM}},\n  year         = {2009},\n  url          = {https://doi.org/10.1145/1542207.1542237},\n  doi          = {10.1145/1542207.1542237},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sacmat/CarminatiFHKT09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning.\n \n \n \n \n\n\n \n Canim, M.; Kantarcioglu, M.; and Inan, A.\n\n\n \n\n\n\n In Jonker, W.; and Petkovic, M., editor(s), Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings, volume 5776, of Lecture Notes in Computer Science, pages 1–16, 2009. Springer\n \n\n\n\n
\n\n\n\n \n \n \"QueryPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sdmw/CanimKI09,\n  author       = {Mustafa Canim and\n                  Murat Kantarcioglu and\n                  Ali Inan},\n  editor       = {Willem Jonker and\n                  Milan Petkovic},\n  title        = {Query Optimization in Encrypted Relational Databases by Vertical Schema\n                  Partitioning},\n  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,\n                  August 28, 2009. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {5776},\n  pages        = {1--16},\n  publisher    = {Springer},\n  year         = {2009},\n  url          = {https://doi.org/10.1007/978-3-642-04219-5\\_1},\n  doi          = {10.1007/978-3-642-04219-5\\_1},\n  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},\n  biburl       = {https://dblp.org/rec/conf/sdmw/CanimKI09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Query Processing Techniques for Compliance with Data Confidence Policies.\n \n \n \n \n\n\n \n Dai, C.; Lin, D.; Kantarcioglu, M.; Bertino, E.; Celikel, E.; and Thuraisingham, B.\n\n\n \n\n\n\n In Jonker, W.; and Petkovic, M., editor(s), Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings, volume 5776, of Lecture Notes in Computer Science, pages 49–67, 2009. Springer\n \n\n\n\n
\n\n\n\n \n \n \"QueryPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sdmw/DaiLKBCT09,\n  author       = {Chenyun Dai and\n                  Dan Lin and\n                  Murat Kantarcioglu and\n                  Elisa Bertino and\n                  Ebru Celikel and\n                  Bhavani Thuraisingham},\n  editor       = {Willem Jonker and\n                  Milan Petkovic},\n  title        = {Query Processing Techniques for Compliance with Data Confidence Policies},\n  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,\n                  August 28, 2009. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {5776},\n  pages        = {49--67},\n  publisher    = {Springer},\n  year         = {2009},\n  url          = {https://doi.org/10.1007/978-3-642-04219-5\\_4},\n  doi          = {10.1007/978-3-642-04219-5\\_4},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sdmw/DaiLKBCT09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Hybrid Technique for Private Location-Based Queries with Database Protection.\n \n \n \n \n\n\n \n Ghinita, G.; Kalnis, P.; Kantarcioglu, M.; and Bertino, E.\n\n\n \n\n\n\n In Mamoulis, N.; Seidl, T.; Pedersen, T. B.; Torp, K.; and Assent, I., editor(s), Advances in Spatial and Temporal Databases, 11th International Symposium, SSTD 2009, Aalborg, Denmark, July 8-10, 2009, Proceedings, volume 5644, of Lecture Notes in Computer Science, pages 98–116, 2009. Springer\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ssd/GhinitaKKB09,\n  author       = {Gabriel Ghinita and\n                  Panos Kalnis and\n                  Murat Kantarcioglu and\n                  Elisa Bertino},\n  editor       = {Nikos Mamoulis and\n                  Thomas Seidl and\n                  Torben Bach Pedersen and\n                  Kristian Torp and\n                  Ira Assent},\n  title        = {A Hybrid Technique for Private Location-Based Queries with Database\n                  Protection},\n  booktitle    = {Advances in Spatial and Temporal Databases, 11th International Symposium,\n                  {SSTD} 2009, Aalborg, Denmark, July 8-10, 2009, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {5644},\n  pages        = {98--116},\n  publisher    = {Springer},\n  year         = {2009},\n  url          = {https://doi.org/10.1007/978-3-642-02982-0\\_9},\n  doi          = {10.1007/978-3-642-02982-0\\_9},\n  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},\n  biburl       = {https://dblp.org/rec/conf/ssd/GhinitaKKB09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Inferring private information using social network data.\n \n \n \n \n\n\n \n Lindamood, J.; Heatherly, R.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Quemada, J.; León, G.; Maarek, Y. S.; and Nejdl, W., editor(s), Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pages 1145–1146, 2009. ACM\n \n\n\n\n
\n\n\n\n \n \n \"InferringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/www/LindamoodHKT09,\n  author       = {Jack Lindamood and\n                  Raymond Heatherly and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Juan Quemada and\n                  Gonzalo Le{\\'{o}}n and\n                  Yo{\\"{e}}lle S. Maarek and\n                  Wolfgang Nejdl},\n  title        = {Inferring private information using social network data},\n  booktitle    = {Proceedings of the 18th International Conference on World Wide Web,\n                  {WWW} 2009, Madrid, Spain, April 20-24, 2009},\n  pages        = {1145--1146},\n  publisher    = {{ACM}},\n  year         = {2009},\n  url          = {https://doi.org/10.1145/1526709.1526899},\n  doi          = {10.1145/1526709.1526899},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/www/LindamoodHKT09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Horizontally Partitioned Data.\n \n \n \n \n\n\n \n Kantarcioglu, M.\n\n\n \n\n\n\n In Liu, L.; and Özsu, M. T., editor(s), Encyclopedia of Database Systems, pages 1321–1322. Springer US, 2009.\n \n\n\n\n
\n\n\n\n \n \n \"HorizontallyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:reference/db/Kantarcioglu09,\n  author       = {Murat Kantarcioglu},\n  editor       = {Ling Liu and\n                  M. Tamer {\\"{O}}zsu},\n  title        = {Horizontally Partitioned Data},\n  booktitle    = {Encyclopedia of Database Systems},\n  pages        = {1321--1322},\n  publisher    = {Springer {US}},\n  year         = {2009},\n  url          = {https://doi.org/10.1007/978-0-387-39940-9\\_1391},\n  doi          = {10.1007/978-0-387-39940-9\\_1391},\n  timestamp    = {Sun, 02 Jun 2019 21:10:27 +0200},\n  biburl       = {https://dblp.org/rec/reference/db/Kantarcioglu09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure Multiparty Computation Methods.\n \n \n \n \n\n\n \n Kantarcioglu, M.; and Vaidya, J.\n\n\n \n\n\n\n In Liu, L.; and Özsu, M. T., editor(s), Encyclopedia of Database Systems, pages 2535–2539. Springer US, 2009.\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:reference/db/KantarciogluV09,\n  author       = {Murat Kantarcioglu and\n                  Jaideep Vaidya},\n  editor       = {Ling Liu and\n                  M. Tamer {\\"{O}}zsu},\n  title        = {Secure Multiparty Computation Methods},\n  booktitle    = {Encyclopedia of Database Systems},\n  pages        = {2535--2539},\n  publisher    = {Springer {US}},\n  year         = {2009},\n  url          = {https://doi.org/10.1007/978-0-387-39940-9\\_1388},\n  doi          = {10.1007/978-0-387-39940-9\\_1388},\n  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/reference/db/KantarciogluV09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (15)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n The applicability of the perturbation based privacy preserving data mining for real-world data.\n \n \n \n \n\n\n \n Liu, L.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n Data Knowl. Eng., 65(1): 5–21. 2008.\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/dke/LiuKT08,\n  author       = {Li Liu and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  title        = {The applicability of the perturbation based privacy preserving data\n                  mining for real-world data},\n  journal      = {Data Knowl. Eng.},\n  volume       = {65},\n  number       = {1},\n  pages        = {5--21},\n  year         = {2008},\n  url          = {https://doi.org/10.1016/j.datak.2007.06.011},\n  doi          = {10.1016/J.DATAK.2007.06.011},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/dke/LiuKT08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Transforming semi-honest protocols to ensure accountability.\n \n \n \n \n\n\n \n Jiang, W.; Clifton, C.; and Kantarcioglu, M.\n\n\n \n\n\n\n Data Knowl. Eng., 65(1): 57–74. 2008.\n \n\n\n\n
\n\n\n\n \n \n \"TransformingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/dke/JiangCK08,\n  author       = {Wei Jiang and\n                  Chris Clifton and\n                  Murat Kantarcioglu},\n  title        = {Transforming semi-honest protocols to ensure accountability},\n  journal      = {Data Knowl. Eng.},\n  volume       = {65},\n  number       = {1},\n  pages        = {57--74},\n  year         = {2008},\n  url          = {https://doi.org/10.1016/j.datak.2007.06.014},\n  doi          = {10.1016/J.DATAK.2007.06.014},\n  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/dke/JiangCK08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy-preserving data mining in the malicious model.\n \n \n \n \n\n\n \n Kantarcioglu, M.; and Kardes, O.\n\n\n \n\n\n\n Int. J. Inf. Comput. Secur., 2(4): 353–375. 2008.\n \n\n\n\n
\n\n\n\n \n \n \"Privacy-preservingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijics/KantarciogluK08,\n  author       = {Murat Kantarcioglu and\n                  Onur Kardes},\n  title        = {Privacy-preserving data mining in the malicious model},\n  journal      = {Int. J. Inf. Comput. Secur.},\n  volume       = {2},\n  number       = {4},\n  pages        = {353--375},\n  year         = {2008},\n  url          = {https://doi.org/10.1504/IJICS.2008.022488},\n  doi          = {10.1504/IJICS.2008.022488},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijics/KantarciogluK08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems.\n \n \n \n \n\n\n \n Clifton, C.; Iyer, A. V.; Cho, R.; Jiang, W.; Kantarcioglu, M.; and Vaidya, J.\n\n\n \n\n\n\n Manuf. Serv. Oper. Manag., 10(1): 108–125. 2008.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/msom/CliftonICJKV08,\n  author       = {Chris Clifton and\n                  Ananth V. Iyer and\n                  Richard Cho and\n                  Wei Jiang and\n                  Murat Kantarcioglu and\n                  Jaideep Vaidya},\n  title        = {An Approach to Securely Identifying Beneficial Collaboration in Decentralized\n                  Logistics Systems},\n  journal      = {Manuf. Serv. Oper. Manag.},\n  volume       = {10},\n  number       = {1},\n  pages        = {108--125},\n  year         = {2008},\n  url          = {https://doi.org/10.1287/msom.1070.0167},\n  doi          = {10.1287/MSOM.1070.0167},\n  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/msom/CliftonICJKV08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Cryptographic Approach to Securely Share and Query Genomic Sequences.\n \n \n \n \n\n\n \n Kantarcioglu, M.; Jiang, W.; Liu, Y.; and Malin, B. A.\n\n\n \n\n\n\n IEEE Trans. Inf. Technol. Biomed., 12(5): 606–617. 2008.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/titb/KantarciogluJLM08,\n  author       = {Murat Kantarcioglu and\n                  Wei Jiang and\n                  Ying Liu and\n                  Bradley A. Malin},\n  title        = {A Cryptographic Approach to Securely Share and Query Genomic Sequences},\n  journal      = {{IEEE} Trans. Inf. Technol. Biomed.},\n  volume       = {12},\n  number       = {5},\n  pages        = {606--617},\n  year         = {2008},\n  url          = {https://doi.org/10.1109/TITB.2007.908465},\n  doi          = {10.1109/TITB.2007.908465},\n  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/titb/KantarciogluJLM08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy-preserving decision trees over vertically partitioned data.\n \n \n \n \n\n\n \n Vaidya, J.; Clifton, C.; Kantarcioglu, M.; and Patterson, A. S.\n\n\n \n\n\n\n ACM Trans. Knowl. Discov. Data, 2(3): 14:1–14:27. 2008.\n \n\n\n\n
\n\n\n\n \n \n \"Privacy-preservingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tkdd/VaidyaCKP08,\n  author       = {Jaideep Vaidya and\n                  Chris Clifton and\n                  Murat Kantarcioglu and\n                  A. Scott Patterson},\n  title        = {Privacy-preserving decision trees over vertically partitioned data},\n  journal      = {{ACM} Trans. Knowl. Discov. Data},\n  volume       = {2},\n  number       = {3},\n  pages        = {14:1--14:27},\n  year         = {2008},\n  url          = {https://doi.org/10.1145/1409620.1409624},\n  doi          = {10.1145/1409620.1409624},\n  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tkdd/VaidyaCKP08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy-preserving Naïve Bayes classification.\n \n \n \n \n\n\n \n Vaidya, J.; Kantarcioglu, M.; and Clifton, C.\n\n\n \n\n\n\n VLDB J., 17(4): 879–898. 2008.\n \n\n\n\n
\n\n\n\n \n \n \"Privacy-preservingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/vldb/VaidyaKC08,\n  author       = {Jaideep Vaidya and\n                  Murat Kantarcioglu and\n                  Chris Clifton},\n  title        = {Privacy-preserving Na{\\"{\\i}}ve Bayes classification},\n  journal      = {{VLDB} J.},\n  volume       = {17},\n  number       = {4},\n  pages        = {879--898},\n  year         = {2008},\n  url          = {https://doi.org/10.1007/s00778-006-0041-y},\n  doi          = {10.1007/S00778-006-0041-Y},\n  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/vldb/VaidyaKC08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Incentive and Trust Issues in Assured Information Sharing.\n \n \n \n \n\n\n \n Layfield, R.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Bertino, E.; and Joshi, J. B. D., editor(s), Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, volume 10, of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 113–125, 2008. Springer / ICST\n \n\n\n\n
\n\n\n\n \n \n \"IncentivePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/colcom/LayfieldKT08,\n  author       = {Ryan Layfield and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Elisa Bertino and\n                  James B. D. Joshi},\n  title        = {Incentive and Trust Issues in Assured Information Sharing},\n  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing,\n                  4th International Conference, CollaborateCom 2008, Orlando, FL, USA,\n                  November 13-16, 2008, Revised Selected Papers},\n  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics\n                  and Telecommunications Engineering},\n  volume       = {10},\n  pages        = {113--125},\n  publisher    = {Springer / {ICST}},\n  year         = {2008},\n  url          = {https://doi.org/10.1007/978-3-642-03354-4\\_10},\n  doi          = {10.1007/978-3-642-03354-4\\_10},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/colcom/LayfieldKT08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Hybrid Approach to Private Record Linkage.\n \n \n \n \n\n\n \n Inan, A.; Kantarcioglu, M.; Bertino, E.; and Scannapieco, M.\n\n\n \n\n\n\n In Alonso, G.; Blakeley, J. A.; and Chen, A. L. P., editor(s), Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pages 496–505, 2008. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icde/InanKBS08,\n  author       = {Ali Inan and\n                  Murat Kantarcioglu and\n                  Elisa Bertino and\n                  Monica Scannapieco},\n  editor       = {Gustavo Alonso and\n                  Jos{\\'{e}} A. Blakeley and\n                  Arbee L. P. Chen},\n  title        = {A Hybrid Approach to Private Record Linkage},\n  booktitle    = {Proceedings of the 24th International Conference on Data Engineering,\n                  {ICDE} 2008, April 7-12, 2008, Canc{\\'{u}}n, Mexico},\n  pages        = {496--505},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2008},\n  url          = {https://doi.org/10.1109/ICDE.2008.4497458},\n  doi          = {10.1109/ICDE.2008.4497458},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icde/InanKBS08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Simulating bioterrorism through epidemiology approximation.\n \n \n \n \n\n\n \n Layfield, R.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pages 82–87, 2008. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SimulatingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/LayfieldKT08,\n  author       = {Ryan Layfield and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  title        = {Simulating bioterrorism through epidemiology approximation},\n  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,\n                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},\n  pages        = {82--87},\n  publisher    = {{IEEE}},\n  year         = {2008},\n  url          = {https://doi.org/10.1109/ISI.2008.4565034},\n  doi          = {10.1109/ISI.2008.4565034},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/isi/LayfieldKT08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Privacy-Preserving Framework for Integrating Person-Specific Databases.\n \n \n \n \n\n\n \n Kantarcioglu, M.; Jiang, W.; and Malin, B. A.\n\n\n \n\n\n\n In Domingo-Ferrer, J.; and Saygin, Y., editor(s), Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, volume 5262, of Lecture Notes in Computer Science, pages 298–314, 2008. Springer\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/psd/KantarciogluJM08,\n  author       = {Murat Kantarcioglu and\n                  Wei Jiang and\n                  Bradley A. Malin},\n  editor       = {Josep Domingo{-}Ferrer and\n                  Y{\\"{u}}cel Saygin},\n  title        = {A Privacy-Preserving Framework for Integrating Person-Specific Databases},\n  booktitle    = {Privacy in Statistical Databases, {UNESCO} Chair in Data Privacy International\n                  Conference, {PSD} 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {5262},\n  pages        = {298--314},\n  publisher    = {Springer},\n  year         = {2008},\n  url          = {https://doi.org/10.1007/978-3-540-87471-3\\_25},\n  doi          = {10.1007/978-3-540-87471-3\\_25},\n  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/psd/KantarciogluJM08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Approach to Evaluate Data Trustworthiness Based on Data Provenance.\n \n \n \n \n\n\n \n Dai, C.; Lin, D.; Bertino, E.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Jonker, W.; and Petkovic, M., editor(s), Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings, volume 5159, of Lecture Notes in Computer Science, pages 82–98, 2008. Springer\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sdmw/DaiLBK08,\n  author       = {Chenyun Dai and\n                  Dan Lin and\n                  Elisa Bertino and\n                  Murat Kantarcioglu},\n  editor       = {Willem Jonker and\n                  Milan Petkovic},\n  title        = {An Approach to Evaluate Data Trustworthiness Based on Data Provenance},\n  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,\n                  New Zealand, August 24, 2008, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {5159},\n  pages        = {82--98},\n  publisher    = {Springer},\n  year         = {2008},\n  url          = {https://doi.org/10.1007/978-3-540-85259-9\\_6},\n  doi          = {10.1007/978-3-540-85259-9\\_6},\n  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},\n  biburl       = {https://dblp.org/rec/conf/sdmw/DaiLBK08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Survey of Privacy-Preserving Methods Across Horizontally Partitioned Data.\n \n \n \n \n\n\n \n Kantarcioglu, M.\n\n\n \n\n\n\n In Aggarwal, C. C.; and Yu, P. S., editor(s), Privacy-Preserving Data Mining - Models and Algorithms, volume 34, of Advances in Database Systems, pages 313–335. Springer, 2008.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:series/ads/Kantarcioglu08,\n  author       = {Murat Kantarcioglu},\n  editor       = {Charu C. Aggarwal and\n                  Philip S. Yu},\n  title        = {A Survey of Privacy-Preserving Methods Across Horizontally Partitioned\n                  Data},\n  booktitle    = {Privacy-Preserving Data Mining - Models and Algorithms},\n  series       = {Advances in Database Systems},\n  volume       = {34},\n  pages        = {313--335},\n  publisher    = {Springer},\n  year         = {2008},\n  url          = {https://doi.org/10.1007/978-0-387-70992-5\\_13},\n  doi          = {10.1007/978-0-387-70992-5\\_13},\n  timestamp    = {Tue, 16 May 2017 14:24:24 +0200},\n  biburl       = {https://dblp.org/rec/series/ads/Kantarcioglu08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Geospatial Semantic Web, Definition.\n \n \n \n \n\n\n \n Thuraisingham, B.; Khan, L.; Subbiah, G.; Alam, A.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Shekhar, S.; and Xiong, H., editor(s), Encyclopedia of GIS, pages 398. Springer, 2008.\n \n\n\n\n
\n\n\n\n \n \n \"GeospatialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:reference/gis/ThuraisinghamKSAK08,\n  author       = {Bhavani Thuraisingham and\n                  Latifur Khan and\n                  Ganesh Subbiah and\n                  Ashraful Alam and\n                  Murat Kantarcioglu},\n  editor       = {Shashi Shekhar and\n                  Hui Xiong},\n  title        = {Geospatial Semantic Web, Definition},\n  booktitle    = {Encyclopedia of {GIS}},\n  pages        = {398},\n  publisher    = {Springer},\n  year         = {2008},\n  url          = {https://doi.org/10.1007/978-0-387-35973-1\\_515},\n  doi          = {10.1007/978-0-387-35973-1\\_515},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/reference/gis/ThuraisinghamKSAK08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy and Security Challenges in GIS.\n \n \n \n \n\n\n \n Thuraisingham, B.; Khan, L.; Subbiah, G.; Alam, A.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Shekhar, S.; and Xiong, H., editor(s), Encyclopedia of GIS, pages 898–902. Springer, 2008.\n \n\n\n\n
\n\n\n\n \n \n \"PrivacyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:reference/gis/ThuraisinghamKSAK08a,\n  author       = {Bhavani Thuraisingham and\n                  Latifur Khan and\n                  Ganesh Subbiah and\n                  Ashraful Alam and\n                  Murat Kantarcioglu},\n  editor       = {Shashi Shekhar and\n                  Hui Xiong},\n  title        = {Privacy and Security Challenges in {GIS}},\n  booktitle    = {Encyclopedia of {GIS}},\n  pages        = {898--902},\n  publisher    = {Springer},\n  year         = {2008},\n  url          = {https://doi.org/10.1007/978-0-387-35973-1\\_1018},\n  doi          = {10.1007/978-0-387-35973-1\\_1018},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/reference/gis/ThuraisinghamKSAK08a.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2007\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Extended RBAC-based design and implementation for a secure data warehouse.\n \n \n \n \n\n\n \n Thuraisingham, B.; Kantarcioglu, M.; and Iyer, S.\n\n\n \n\n\n\n Int. J. Bus. Intell. Data Min., 2(4): 367–382. 2007.\n \n\n\n\n
\n\n\n\n \n \n \"ExtendedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijbidm/ThuraisinghamKI07,\n  author       = {Bhavani Thuraisingham and\n                  Murat Kantarcioglu and\n                  Srinivasan Iyer},\n  title        = {Extended RBAC-based design and implementation for a secure data warehouse},\n  journal      = {Int. J. Bus. Intell. Data Min.},\n  volume       = {2},\n  number       = {4},\n  pages        = {367--382},\n  year         = {2007},\n  url          = {https://doi.org/10.1504/IJBIDM.2007.016379},\n  doi          = {10.1504/IJBIDM.2007.016379},\n  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijbidm/ThuraisinghamKI07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Virtual Active Network for Live Streaming Media Delivery.\n \n \n \n \n\n\n \n Li, W.; Agrawal, D.; Candan, K. S.; Akca, Y.; and Kantarcioglu, M.\n\n\n \n\n\n\n J. Interconnect. Networks, 8(1): 45–74. 2007.\n \n\n\n\n
\n\n\n\n \n \n \"VirtualPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/join/LiACAK07,\n  author       = {Wen{-}Syan Li and\n                  Divyakant Agrawal and\n                  K. Sel{\\c{c}}uk Candan and\n                  Yusuf Akca and\n                  Murat Kantarcioglu},\n  title        = {Virtual Active Network for Live Streaming Media Delivery},\n  journal      = {J. Interconnect. Networks},\n  volume       = {8},\n  number       = {1},\n  pages        = {45--74},\n  year         = {2007},\n  url          = {https://doi.org/10.1142/S0219265907001904},\n  doi          = {10.1142/S0219265907001904},\n  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/join/LiACAK07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Enforcing Honesty in Assured Information Sharing Within a Distributed System.\n \n \n \n \n\n\n \n Layfield, R.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Barker, S.; and Ahn, G., editor(s), Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, volume 4602, of Lecture Notes in Computer Science, pages 113–128, 2007. Springer\n \n\n\n\n
\n\n\n\n \n \n \"EnforcingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dbsec/LayfieldKT07,\n  author       = {Ryan Layfield and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham},\n  editor       = {Steve Barker and\n                  Gail{-}Joon Ahn},\n  title        = {Enforcing Honesty in Assured Information Sharing Within a Distributed\n                  System},\n  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working\n                  Conference on Data and Applications Security, Redondo Beach, CA, USA,\n                  July 8-11, 2007, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {4602},\n  pages        = {113--128},\n  publisher    = {Springer},\n  year         = {2007},\n  url          = {https://doi.org/10.1007/978-3-540-73538-0\\_10},\n  doi          = {10.1007/978-3-540-73538-0\\_10},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/dbsec/LayfieldKT07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Design and Analysis of Querying Encrypted Data in Relational Databases.\n \n \n \n \n\n\n \n Canim, M.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Barker, S.; and Ahn, G., editor(s), Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, volume 4602, of Lecture Notes in Computer Science, pages 177–194, 2007. Springer\n \n\n\n\n
\n\n\n\n \n \n \"DesignPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dbsec/CanimK07,\n  author       = {Mustafa Canim and\n                  Murat Kantarcioglu},\n  editor       = {Steve Barker and\n                  Gail{-}Joon Ahn},\n  title        = {Design and Analysis of Querying Encrypted Data in Relational Databases},\n  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working\n                  Conference on Data and Applications Security, Redondo Beach, CA, USA,\n                  July 8-11, 2007, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {4602},\n  pages        = {177--194},\n  publisher    = {Springer},\n  year         = {2007},\n  url          = {https://doi.org/10.1007/978-3-540-73538-0\\_14},\n  doi          = {10.1007/978-3-540-73538-0\\_14},\n  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/dbsec/CanimK07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy-Preserving Data Mining Applications in the Malicious Model.\n \n \n \n \n\n\n \n Kantarcioglu, M.; and Kardes, O.\n\n\n \n\n\n\n In Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), October 28-31, 2007, Omaha, Nebraska, USA, pages 717–722, 2007. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Privacy-PreservingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdm/KantarciogluK07,\n  author       = {Murat Kantarcioglu and\n                  Onur Kardes},\n  title        = {Privacy-Preserving Data Mining Applications in the Malicious Model},\n  booktitle    = {Workshops Proceedings of the 7th {IEEE} International Conference on\n                  Data Mining {(ICDM} 2007), October 28-31, 2007, Omaha, Nebraska, {USA}},\n  pages        = {717--722},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2007},\n  url          = {https://doi.org/10.1109/ICDMW.2007.86},\n  doi          = {10.1109/ICDMW.2007.86},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icdm/KantarciogluK07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Managing Risks in RBAC Employed Distributed Environments.\n \n \n \n \n\n\n \n Celikel, E.; Kantarcioglu, M.; Thuraisingham, B.; and Bertino, E.\n\n\n \n\n\n\n In Meersman, R.; and Tari, Z., editor(s), On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, volume 4804, of Lecture Notes in Computer Science, pages 1548–1566, 2007. Springer\n \n\n\n\n
\n\n\n\n \n \n \"ManagingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/otm/CelikelKTB07,\n  author       = {Ebru Celikel and\n                  Murat Kantarcioglu and\n                  Bhavani Thuraisingham and\n                  Elisa Bertino},\n  editor       = {Robert Meersman and\n                  Zahir Tari},\n  title        = {Managing Risks in {RBAC} Employed Distributed Environments},\n  booktitle    = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE,\n                  GADA, and IS, {OTM} Confederated International Conferences CoopIS,\n                  DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30,\n                  2007, Proceedings, Part {II}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {4804},\n  pages        = {1548--1566},\n  publisher    = {Springer},\n  year         = {2007},\n  url          = {https://doi.org/10.1007/978-3-540-76843-2\\_31},\n  doi          = {10.1007/978-3-540-76843-2\\_31},\n  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/otm/CelikelKTB07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2006\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Sovereign Joins.\n \n \n \n \n\n\n \n Agrawal, R.; Asonov, D.; Kantarcioglu, M.; and Li, Y.\n\n\n \n\n\n\n In Liu, L.; Reuter, A.; Whang, K.; and Zhang, J., editor(s), Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, 3-8 April 2006, Atlanta, GA, USA, pages 26, 2006. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"SovereignPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icde/AgrawalAKL06,\n  author       = {Rakesh Agrawal and\n                  Dmitri Asonov and\n                  Murat Kantarcioglu and\n                  Yaping Li},\n  editor       = {Ling Liu and\n                  Andreas Reuter and\n                  Kyu{-}Young Whang and\n                  Jianjun Zhang},\n  title        = {Sovereign Joins},\n  booktitle    = {Proceedings of the 22nd International Conference on Data Engineering,\n                  {ICDE} 2006, 3-8 April 2006, Atlanta, GA, {USA}},\n  pages        = {26},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2006},\n  url          = {https://doi.org/10.1109/ICDE.2006.144},\n  doi          = {10.1109/ICDE.2006.144},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icde/AgrawalAKL06.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2005\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Security Issues in Querying Encrypted Data.\n \n \n \n \n\n\n \n Kantarcioglu, M.; and Clifton, C.\n\n\n \n\n\n\n In Jajodia, S.; and Wijesekera, D., editor(s), Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, volume 3654, of Lecture Notes in Computer Science, pages 325–337, 2005. Springer\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dbsec/KantarciogluC05,\n  author       = {Murat Kantarcioglu and\n                  Chris Clifton},\n  editor       = {Sushil Jajodia and\n                  Duminda Wijesekera},\n  title        = {Security Issues in Querying Encrypted Data},\n  booktitle    = {Data and Applications Security XIX, 19th Annual {IFIP} {WG} 11.3 Working\n                  Conference on Data and Applications Security, Storrs, CT, USA, August\n                  7-10, 2005, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {3654},\n  pages        = {325--337},\n  publisher    = {Springer},\n  year         = {2005},\n  url          = {https://doi.org/10.1007/11535706\\_24},\n  doi          = {10.1007/11535706\\_24},\n  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},\n  biburl       = {https://dblp.org/rec/conf/dbsec/KantarciogluC05.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2004\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n On demand synchronization and load distribution for database grid-based Web applications.\n \n \n \n \n\n\n \n Li, W.; Altintas, K.; and Kantarcioglu, M.\n\n\n \n\n\n\n Data Knowl. Eng., 51(3): 295–323. 2004.\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/dke/LiAK04,\n  author       = {Wen{-}Syan Li and\n                  Kemal Altintas and\n                  Murat Kantarcioglu},\n  title        = {On demand synchronization and load distribution for database grid-based\n                  Web applications},\n  journal      = {Data Knowl. Eng.},\n  volume       = {51},\n  number       = {3},\n  pages        = {295--323},\n  year         = {2004},\n  url          = {https://doi.org/10.1016/j.datak.2004.05.003},\n  doi          = {10.1016/J.DATAK.2004.05.003},\n  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/dke/LiAK04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data.\n \n \n \n \n\n\n \n Kantarcioglu, M.; and Clifton, C.\n\n\n \n\n\n\n IEEE Trans. Knowl. Data Eng., 16(9): 1026–1037. 2004.\n \n\n\n\n
\n\n\n\n \n \n \"Privacy-PreservingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tkde/KantarciogluC04,\n  author       = {Murat Kantarcioglu and\n                  Chris Clifton},\n  title        = {Privacy-Preserving Distributed Mining of Association Rules on Horizontally\n                  Partitioned Data},\n  journal      = {{IEEE} Trans. Knowl. Data Eng.},\n  volume       = {16},\n  number       = {9},\n  pages        = {1026--1037},\n  year         = {2004},\n  url          = {https://doi.org/10.1109/TKDE.2004.45},\n  doi          = {10.1109/TKDE.2004.45},\n  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tkde/KantarciogluC04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy-preserving data integration and sharing.\n \n \n \n \n\n\n \n Clifton, C.; Kantarcioglu, M.; Doan, A.; Schadow, G.; Vaidya, J.; Elmagarmid, A. K.; and Suciu, D.\n\n\n \n\n\n\n In Das, G.; Liu, B.; and Yu, P. S., editor(s), Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, DMKD 2004, Paris, France, June 13, 2004, pages 19–26, 2004. ACM\n \n\n\n\n
\n\n\n\n \n \n \"Privacy-preservingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dmkd/CliftonKDSVES04,\n  author       = {Chris Clifton and\n                  Murat Kantarcioglu and\n                  AnHai Doan and\n                  Gunther Schadow and\n                  Jaideep Vaidya and\n                  Ahmed K. Elmagarmid and\n                  Dan Suciu},\n  editor       = {Gautam Das and\n                  Bing Liu and\n                  Philip S. Yu},\n  title        = {Privacy-preserving data integration and sharing},\n  booktitle    = {Proceedings of the 9th {ACM} {SIGMOD} Workshop on Research Issues\n                  in Data Mining and Knowledge Discovery, {DMKD} 2004, Paris, France,\n                  June 13, 2004},\n  pages        = {19--26},\n  publisher    = {{ACM}},\n  year         = {2004},\n  url          = {https://doi.org/10.1145/1008694.1008698},\n  doi          = {10.1145/1008694.1008698},\n  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/dmkd/CliftonKDSVES04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n When do data mining results violate privacy?.\n \n \n \n \n\n\n \n Kantarcioglu, M.; Jin, J.; and Clifton, C.\n\n\n \n\n\n\n In Kim, W.; Kohavi, R.; Gehrke, J.; and DuMouchel, W., editor(s), Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004, pages 599–604, 2004. ACM\n \n\n\n\n
\n\n\n\n \n \n \"WhenPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/kdd/KantarciogluJC04,\n  author       = {Murat Kantarcioglu and\n                  Jiashun Jin and\n                  Chris Clifton},\n  editor       = {Won Kim and\n                  Ron Kohavi and\n                  Johannes Gehrke and\n                  William DuMouchel},\n  title        = {When do data mining results violate privacy?},\n  booktitle    = {Proceedings of the Tenth {ACM} {SIGKDD} International Conference on\n                  Knowledge Discovery and Data Mining, Seattle, Washington, USA, August\n                  22-25, 2004},\n  pages        = {599--604},\n  publisher    = {{ACM}},\n  year         = {2004},\n  url          = {https://doi.org/10.1145/1014052.1014126},\n  doi          = {10.1145/1014052.1014126},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/kdd/KantarciogluJC04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privately Computing a Distributed k-nn Classifier.\n \n \n \n \n\n\n \n Kantarcioglu, M.; and Clifton, C.\n\n\n \n\n\n\n In Boulicaut, J.; Esposito, F.; Giannotti, F.; and Pedreschi, D., editor(s), Knowledge Discovery in Databases: PKDD 2004, 8th European Conference on Principles and Practice of Knowledge Discovery in Databases, Pisa, Italy, September 20-24, 2004, Proceedings, volume 3202, of Lecture Notes in Computer Science, pages 279–290, 2004. Springer\n \n\n\n\n
\n\n\n\n \n \n \"PrivatelyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pkdd/KantarcioogluC04,\n  author       = {Murat Kantarcioglu and\n                  Chris Clifton},\n  editor       = {Jean{-}Fran{\\c{c}}ois Boulicaut and\n                  Floriana Esposito and\n                  Fosca Giannotti and\n                  Dino Pedreschi},\n  title        = {Privately Computing a Distributed k-nn Classifier},\n  booktitle    = {Knowledge Discovery in Databases: {PKDD} 2004, 8th European Conference\n                  on Principles and Practice of Knowledge Discovery in Databases, Pisa,\n                  Italy, September 20-24, 2004, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {3202},\n  pages        = {279--290},\n  publisher    = {Springer},\n  year         = {2004},\n  url          = {https://doi.org/10.1007/978-3-540-30116-5\\_27},\n  doi          = {10.1007/978-3-540-30116-5\\_27},\n  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},\n  biburl       = {https://dblp.org/rec/conf/pkdd/KantarcioogluC04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2003\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Assuring privacy when big brother is watching.\n \n \n \n \n\n\n \n Kantarcioglu, M.; and Clifton, C.\n\n\n \n\n\n\n In Zaki, M. J.; and Aggarwal, C. C., editor(s), Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, DMKD 2003, San Diego, California, USA, June 13, 2003, pages 88–93, 2003. ACM\n \n\n\n\n
\n\n\n\n \n \n \"AssuringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dmkd/KantarciogluC03,\n  author       = {Murat Kantarcioglu and\n                  Chris Clifton},\n  editor       = {Mohammed Javeed Zaki and\n                  Charu C. Aggarwal},\n  title        = {Assuring privacy when big brother is watching},\n  booktitle    = {Proceedings of the 8th {ACM} {SIGMOD} workshop on Research issues\n                  in data mining and knowledge discovery, {DMKD} 2003, San Diego, California,\n                  USA, June 13, 2003},\n  pages        = {88--93},\n  publisher    = {{ACM}},\n  year         = {2003},\n  url          = {https://doi.org/10.1145/882082.882102},\n  doi          = {10.1145/882082.882102},\n  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},\n  biburl       = {https://dblp.org/rec/conf/dmkd/KantarciogluC03.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2002\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Tools for Privacy Preserving Data Mining.\n \n \n \n \n\n\n \n Clifton, C.; Kantarcioglu, M.; Vaidya, J.; Lin, X.; and Zhu, M. Y.\n\n\n \n\n\n\n SIGKDD Explor., 4(2): 28–34. 2002.\n \n\n\n\n
\n\n\n\n \n \n \"ToolsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sigkdd/CliftonKVLZ02,\n  author       = {Chris Clifton and\n                  Murat Kantarcioglu and\n                  Jaideep Vaidya and\n                  Xiaodong Lin and\n                  Michael Y. Zhu},\n  title        = {Tools for Privacy Preserving Data Mining},\n  journal      = {{SIGKDD} Explor.},\n  volume       = {4},\n  number       = {2},\n  pages        = {28--34},\n  year         = {2002},\n  url          = {https://doi.org/10.1145/772862.772867},\n  doi          = {10.1145/772862.772867},\n  timestamp    = {Thu, 23 Dec 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sigkdd/CliftonKVLZ02.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data.\n \n \n \n \n\n\n \n Kantarcioglu, M.; and Clifton, C.\n\n\n \n\n\n\n In 2002 ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, Madison, Wisconsin, USA, June 2, 2002, 2002. \n \n\n\n\n
\n\n\n\n \n \n \"Privacy-PreservingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dmkd/KantarciogluC02,\n  author       = {Murat Kantarcioglu and\n                  Chris Clifton},\n  title        = {Privacy-Preserving Distributed Mining of Association Rules on Horizontally\n                  Partitioned Data},\n  booktitle    = {2002 {ACM} {SIGMOD} Workshop on Research Issues in Data Mining and\n                  Knowledge Discovery, Madison, Wisconsin, USA, June 2, 2002},\n  year         = {2002},\n  url          = {http://www.bell-labs.com/user/minos/DMKD02/Papers/kantarcioglu.pdf},\n  timestamp    = {Wed, 08 Feb 2017 16:15:30 +0100},\n  biburl       = {https://dblp.org/rec/conf/dmkd/KantarciogluC02.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2001\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Mining Cyclically Repeated Patterns.\n \n \n \n \n\n\n \n Toroslu, I. H.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Kambayashi, Y.; Winiwarter, W.; and Arikawa, M., editor(s), Data Warehousing and Knowledge Discovery, Third International Conference, DaWaK 2001, Munich, Germany, September 5-7, 2001, Proceedings, volume 2114, of Lecture Notes in Computer Science, pages 83–92, 2001. Springer\n \n\n\n\n
\n\n\n\n \n \n \"MiningPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dawak/TorosluK01,\n  author       = {Ismail H. Toroslu and\n                  Murat Kantarcioglu},\n  editor       = {Yahiko Kambayashi and\n                  Werner Winiwarter and\n                  Masatoshi Arikawa},\n  title        = {Mining Cyclically Repeated Patterns},\n  booktitle    = {Data Warehousing and Knowledge Discovery, Third International Conference,\n                  DaWaK 2001, Munich, Germany, September 5-7, 2001, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {2114},\n  pages        = {83--92},\n  publisher    = {Springer},\n  year         = {2001},\n  url          = {https://doi.org/10.1007/3-540-44801-2\\_9},\n  doi          = {10.1007/3-540-44801-2\\_9},\n  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/dawak/TorosluK01.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);