\n \n \n
\n
\n\n \n \n \n \n \n \n Policy Enforcement Framework for Cloud Data Management.\n \n \n \n \n\n\n \n Hamlen, K. W.; Kagal, L.; and Kantarcioglu, M.\n\n\n \n\n\n\n
IEEE Data Eng. Bull., 35(4): 39–45. 2012.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/debu/HamlenKK12,\n author = {Kevin W. Hamlen and\n Lalana Kagal and\n Murat Kantarcioglu},\n title = {Policy Enforcement Framework for Cloud Data Management},\n journal = {{IEEE} Data Eng. Bull.},\n volume = {35},\n number = {4},\n pages = {39--45},\n year = {2012},\n url = {http://sites.computer.org/debull/A12dec/policy.pdf},\n timestamp = {Tue, 10 Mar 2020 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/debu/HamlenKK12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Secure Data Processing over Hybrid Clouds.\n \n \n \n \n\n\n \n Khadilkar, V.; Oktay, K. Y.; Kantarcioglu, M.; and Mehrotra, S.\n\n\n \n\n\n\n
IEEE Data Eng. Bull., 35(4): 46–54. 2012.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/debu/KhadilkarOKM12,\n author = {Vaibhav Khadilkar and\n Kerim Yasin Oktay and\n Murat Kantarcioglu and\n Sharad Mehrotra},\n title = {Secure Data Processing over Hybrid Clouds},\n journal = {{IEEE} Data Eng. Bull.},\n volume = {35},\n number = {4},\n pages = {46--54},\n year = {2012},\n url = {http://sites.computer.org/debull/A12dec/hybrid.pdf},\n timestamp = {Tue, 10 Mar 2020 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/debu/KhadilkarOKM12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage.\n \n \n \n \n\n\n \n Durham, E.; Xue, Y.; Kantarcioglu, M.; and Malin, B. A.\n\n\n \n\n\n\n
Inf. Fusion, 13(4): 245–259. 2012.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/inffus/DurhamXKM12,\n author = {Elizabeth Durham and\n Yuan Xue and\n Murat Kantarcioglu and\n Bradley A. Malin},\n title = {Quantifying the correctness, computational complexity, and security\n of privacy-preserving string comparators for record linkage},\n journal = {Inf. Fusion},\n volume = {13},\n number = {4},\n pages = {245--259},\n year = {2012},\n url = {https://doi.org/10.1016/j.inffus.2011.04.004},\n doi = {10.1016/J.INFFUS.2011.04.004},\n timestamp = {Thu, 11 Nov 2021 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/inffus/DurhamXKM12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Incentive Compatible Privacy-Preserving Distributed Classification.\n \n \n \n \n\n\n \n Nix, R.; and Kantarcioglu, M.\n\n\n \n\n\n\n
IEEE Trans. Dependable Secur. Comput., 9(4): 451–462. 2012.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/tdsc/NixK12,\n author = {Robert Nix and\n Murat Kantarcioglu},\n title = {Incentive Compatible Privacy-Preserving Distributed Classification},\n journal = {{IEEE} Trans. Dependable Secur. Comput.},\n volume = {9},\n number = {4},\n pages = {451--462},\n year = {2012},\n url = {https://doi.org/10.1109/TDSC.2011.52},\n doi = {10.1109/TDSC.2011.52},\n timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/tdsc/NixK12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Hybrid Approach to Private Record Matching.\n \n \n \n \n\n\n \n Inan, A.; Kantarcioglu, M.; Ghinita, G.; and Bertino, E.\n\n\n \n\n\n\n
IEEE Trans. Dependable Secur. Comput., 9(5): 684–698. 2012.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/tdsc/InanKGB12,\n author = {Ali Inan and\n Murat Kantarcioglu and\n Gabriel Ghinita and\n Elisa Bertino},\n title = {A Hybrid Approach to Private Record Matching},\n journal = {{IEEE} Trans. Dependable Secur. Comput.},\n volume = {9},\n number = {5},\n pages = {684--698},\n year = {2012},\n url = {https://doi.org/10.1109/TDSC.2012.46},\n doi = {10.1109/TDSC.2012.46},\n timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/tdsc/InanKGB12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Secure Management of Biomedical Data With Cryptographic Hardware.\n \n \n \n \n\n\n \n Canim, M.; Kantarcioglu, M.; and Malin, B. A.\n\n\n \n\n\n\n
IEEE Trans. Inf. Technol. Biomed., 16(1): 166–175. 2012.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/titb/CanimKM12,\n author = {Mustafa Canim and\n Murat Kantarcioglu and\n Bradley A. Malin},\n title = {Secure Management of Biomedical Data With Cryptographic Hardware},\n journal = {{IEEE} Trans. Inf. Technol. Biomed.},\n volume = {16},\n number = {1},\n pages = {166--175},\n year = {2012},\n url = {https://doi.org/10.1109/TITB.2011.2171701},\n doi = {10.1109/TITB.2011.2171701},\n timestamp = {Wed, 13 May 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/titb/CanimKM12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Secure multidimensional range queries over outsourced data.\n \n \n \n \n\n\n \n Hore, B.; Mehrotra, S.; Canim, M.; and Kantarcioglu, M.\n\n\n \n\n\n\n
VLDB J., 21(3): 333–358. 2012.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/vldb/HoreMCK12,\n author = {Bijit Hore and\n Sharad Mehrotra and\n Mustafa Canim and\n Murat Kantarcioglu},\n title = {Secure multidimensional range queries over outsourced data},\n journal = {{VLDB} J.},\n volume = {21},\n number = {3},\n pages = {333--358},\n year = {2012},\n url = {https://doi.org/10.1007/s00778-011-0245-7},\n doi = {10.1007/S00778-011-0245-7},\n timestamp = {Sun, 28 May 2017 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/vldb/HoreMCK12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Risk-Aware Workload Distribution in Hybrid Clouds.\n \n \n \n \n\n\n \n Oktay, K. Y.; Khadilkar, V.; Hore, B.; Kantarcioglu, M.; Mehrotra, S.; and Thuraisingham, B.\n\n\n \n\n\n\n In Chang, R., editor(s),
2012 IEEE Fifth International Conference on Cloud Computing, Honolulu, HI, USA, June 24-29, 2012, pages 229–236, 2012. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/IEEEcloud/OktayKHKMT12,\n author = {Kerim Yasin Oktay and\n Vaibhav Khadilkar and\n Bijit Hore and\n Murat Kantarcioglu and\n Sharad Mehrotra and\n Bhavani Thuraisingham},\n editor = {Rong Chang},\n title = {Risk-Aware Workload Distribution in Hybrid Clouds},\n booktitle = {2012 {IEEE} Fifth International Conference on Cloud Computing, Honolulu,\n HI, USA, June 24-29, 2012},\n pages = {229--236},\n publisher = {{IEEE} Computer Society},\n year = {2012},\n url = {https://doi.org/10.1109/CLOUD.2012.128},\n doi = {10.1109/CLOUD.2012.128},\n timestamp = {Wed, 09 Aug 2023 12:14:21 +0200},\n biburl = {https://dblp.org/rec/conf/IEEEcloud/OktayKHKMT12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Studying dynamic equilibrium of cloud computing adoption with application of Mean Field Games.\n \n \n \n \n\n\n \n Hoe, S. C.; Kantarcioglu, M.; and Bensoussan, A.\n\n\n \n\n\n\n In
50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012, Allerton Park & Retreat Center, Monticello, IL, USA, October 1-5, 2012, pages 220–224, 2012. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/allerton/HoeKB12,\n author = {SingRu Celine Hoe and\n Murat Kantarcioglu and\n Alain Bensoussan},\n title = {Studying dynamic equilibrium of cloud computing adoption with application\n of Mean Field Games},\n booktitle = {50th Annual Allerton Conference on Communication, Control, and Computing,\n Allerton 2012, Allerton Park {\\&} Retreat Center, Monticello, IL,\n USA, October 1-5, 2012},\n pages = {220--224},\n publisher = {{IEEE}},\n year = {2012},\n url = {https://doi.org/10.1109/Allerton.2012.6483221},\n doi = {10.1109/ALLERTON.2012.6483221},\n timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},\n biburl = {https://dblp.org/rec/conf/allerton/HoeKB12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data.\n \n \n \n \n\n\n \n Nix, R.; Kantarcioglu, M.; and Han, K. J.\n\n\n \n\n\n\n In Cuppens-Boulahia, N.; Cuppens, F.; and García-Alfaro, J., editor(s),
Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings, volume 7371, of
Lecture Notes in Computer Science, pages 129–144, 2012. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dbsec/NixKH12,\n author = {Robert Nix and\n Murat Kantarcioglu and\n Keesook J. Han},\n editor = {Nora Cuppens{-}Boulahia and\n Fr{\\'{e}}d{\\'{e}}ric Cuppens and\n Joaqu{\\'{\\i}}n Garc{\\'{\\i}}a{-}Alfaro},\n title = {Approximate Privacy-Preserving Data Mining on Vertically Partitioned\n Data},\n booktitle = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP}\n {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012.\n Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {7371},\n pages = {129--144},\n publisher = {Springer},\n year = {2012},\n url = {https://doi.org/10.1007/978-3-642-31540-4\\_11},\n doi = {10.1007/978-3-642-31540-4\\_11},\n timestamp = {Fri, 27 Dec 2019 21:29:17 +0100},\n biburl = {https://dblp.org/rec/conf/dbsec/NixKH12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Randomizing Smartphone Malware Profiles against Statistical Mining Techniques.\n \n \n \n \n\n\n \n Shastry, A.; Kantarcioglu, M.; Zhou, Y.; and Thuraisingham, B.\n\n\n \n\n\n\n In Cuppens-Boulahia, N.; Cuppens, F.; and García-Alfaro, J., editor(s),
Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings, volume 7371, of
Lecture Notes in Computer Science, pages 239–254, 2012. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dbsec/ShastryKZT12,\n author = {Abhijith Shastry and\n Murat Kantarcioglu and\n Yan Zhou and\n Bhavani Thuraisingham},\n editor = {Nora Cuppens{-}Boulahia and\n Fr{\\'{e}}d{\\'{e}}ric Cuppens and\n Joaqu{\\'{\\i}}n Garc{\\'{\\i}}a{-}Alfaro},\n title = {Randomizing Smartphone Malware Profiles against Statistical Mining\n Techniques},\n booktitle = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP}\n {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012.\n Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {7371},\n pages = {239--254},\n publisher = {Springer},\n year = {2012},\n url = {https://doi.org/10.1007/978-3-642-31540-4\\_18},\n doi = {10.1007/978-3-642-31540-4\\_18},\n timestamp = {Wed, 29 Jun 2022 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/dbsec/ShastryKZT12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets.\n \n \n \n \n\n\n \n Hoe, S. C.; Kantarcioglu, M.; and Bensoussan, A.\n\n\n \n\n\n\n In Grossklags, J.; and Walrand, J. C., editor(s),
Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings, volume 7638, of
Lecture Notes in Computer Science, pages 60–77, 2012. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/gamesec/HoeKB12,\n author = {SingRu Celine Hoe and\n Murat Kantarcioglu and\n Alain Bensoussan},\n editor = {Jens Grossklags and\n Jean C. Walrand},\n title = {A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets},\n booktitle = {Decision and Game Theory for Security - Third International Conference,\n GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {7638},\n pages = {60--77},\n publisher = {Springer},\n year = {2012},\n url = {https://doi.org/10.1007/978-3-642-34266-0\\_4},\n doi = {10.1007/978-3-642-34266-0\\_4},\n timestamp = {Tue, 14 May 2019 10:00:49 +0200},\n biburl = {https://dblp.org/rec/conf/gamesec/HoeKB12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing.\n \n \n \n \n\n\n \n Nix, R.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Grossklags, J.; and Walrand, J. C., editor(s),
Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings, volume 7638, of
Lecture Notes in Computer Science, pages 296–308, 2012. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/gamesec/NixK12,\n author = {Robert Nix and\n Murat Kantarcioglu},\n editor = {Jens Grossklags and\n Jean C. Walrand},\n title = {Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing},\n booktitle = {Decision and Game Theory for Security - Third International Conference,\n GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {7638},\n pages = {296--308},\n publisher = {Springer},\n year = {2012},\n url = {https://doi.org/10.1007/978-3-642-34266-0\\_18},\n doi = {10.1007/978-3-642-34266-0\\_18},\n timestamp = {Tue, 23 May 2017 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/gamesec/NixK12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Efficient Similarity Search over Encrypted Data.\n \n \n \n \n\n\n \n Kuzu, M.; Islam, M. S.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Kementsietsidis, A.; and Salles, M. A. V., editor(s),
IEEE 28th International Conference on Data Engineering (ICDE 2012), Washington, DC, USA (Arlington, Virginia), 1-5 April, 2012, pages 1156–1167, 2012. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icde/KuzuIK12,\n author = {Mehmet Kuzu and\n Mohammad Saiful Islam and\n Murat Kantarcioglu},\n editor = {Anastasios Kementsietsidis and\n Marcos Antonio Vaz Salles},\n title = {Efficient Similarity Search over Encrypted Data},\n booktitle = {{IEEE} 28th International Conference on Data Engineering {(ICDE} 2012),\n Washington, DC, {USA} (Arlington, Virginia), 1-5 April, 2012},\n pages = {1156--1167},\n publisher = {{IEEE} Computer Society},\n year = {2012},\n url = {https://doi.org/10.1109/ICDE.2012.23},\n doi = {10.1109/ICDE.2012.23},\n timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/icde/KuzuIK12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks.\n \n \n \n \n\n\n \n Lim, H.; Ghinita, G.; Bertino, E.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Kementsietsidis, A.; and Salles, M. A. V., editor(s),
IEEE 28th International Conference on Data Engineering (ICDE 2012), Washington, DC, USA (Arlington, Virginia), 1-5 April, 2012, pages 1192–1203, 2012. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icde/LimGBK12,\n author = {Hyo{-}Sang Lim and\n Gabriel Ghinita and\n Elisa Bertino and\n Murat Kantarcioglu},\n editor = {Anastasios Kementsietsidis and\n Marcos Antonio Vaz Salles},\n title = {A Game-Theoretic Approach for High-Assurance of Data Trustworthiness\n in Sensor Networks},\n booktitle = {{IEEE} 28th International Conference on Data Engineering {(ICDE} 2012),\n Washington, DC, {USA} (Arlington, Virginia), 1-5 April, 2012},\n pages = {1192--1203},\n publisher = {{IEEE} Computer Society},\n year = {2012},\n url = {https://doi.org/10.1109/ICDE.2012.78},\n doi = {10.1109/ICDE.2012.78},\n timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/icde/LimGBK12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Self-Training with Selection-by-Rejection.\n \n \n \n \n\n\n \n Zhou, Y.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Zaki, M. J.; Siebes, A.; Yu, J. X.; Goethals, B.; Webb, G. I.; and Wu, X., editor(s),
12th IEEE International Conference on Data Mining, ICDM 2012, Brussels, Belgium, December 10-13, 2012, pages 795–803, 2012. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdm/ZhouKT12,\n author = {Yan Zhou and\n Murat Kantarcioglu and\n Bhavani Thuraisingham},\n editor = {Mohammed Javeed Zaki and\n Arno Siebes and\n Jeffrey Xu Yu and\n Bart Goethals and\n Geoffrey I. Webb and\n Xindong Wu},\n title = {Self-Training with Selection-by-Rejection},\n booktitle = {12th {IEEE} International Conference on Data Mining, {ICDM} 2012,\n Brussels, Belgium, December 10-13, 2012},\n pages = {795--803},\n publisher = {{IEEE} Computer Society},\n year = {2012},\n url = {https://doi.org/10.1109/ICDM.2012.56},\n doi = {10.1109/ICDM.2012.56},\n timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/icdm/ZhouKT12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Sparse Bayesian Adversarial Learning Using Relevance Vector Machine Ensembles.\n \n \n \n \n\n\n \n Zhou, Y.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Zaki, M. J.; Siebes, A.; Yu, J. X.; Goethals, B.; Webb, G. I.; and Wu, X., editor(s),
12th IEEE International Conference on Data Mining, ICDM 2012, Brussels, Belgium, December 10-13, 2012, pages 1206–1211, 2012. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdm/ZhouKT12a,\n author = {Yan Zhou and\n Murat Kantarcioglu and\n Bhavani Thuraisingham},\n editor = {Mohammed Javeed Zaki and\n Arno Siebes and\n Jeffrey Xu Yu and\n Bart Goethals and\n Geoffrey I. Webb and\n Xindong Wu},\n title = {Sparse Bayesian Adversarial Learning Using Relevance Vector Machine\n Ensembles},\n booktitle = {12th {IEEE} International Conference on Data Mining, {ICDM} 2012,\n Brussels, Belgium, December 10-13, 2012},\n pages = {1206--1211},\n publisher = {{IEEE} Computer Society},\n year = {2012},\n url = {https://doi.org/10.1109/ICDM.2012.58},\n doi = {10.1109/ICDM.2012.58},\n timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/icdm/ZhouKT12a.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A game theoretic approach for adversarial pipeline monitoring using Wireless Sensor Networks.\n \n \n \n \n\n\n \n Islam, M. S.; Nix, R.; and Kantarcioglu, M.\n\n\n \n\n\n\n In Zhang, C.; Joshi, J.; Bertino, E.; and Thuraisingham, B., editor(s),
IEEE 13th International Conference on Information Reuse & Integration, IRI 2012, Las Vegas, NV, USA, August 8-10, 2012, pages 37–44, 2012. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iri/IslamNK12,\n author = {Mohammad Saiful Islam and\n Robert Nix and\n Murat Kantarcioglu},\n editor = {Chengcui Zhang and\n James Joshi and\n Elisa Bertino and\n Bhavani Thuraisingham},\n title = {A game theoretic approach for adversarial pipeline monitoring using\n Wireless Sensor Networks},\n booktitle = {{IEEE} 13th International Conference on Information Reuse {\\&} Integration,\n {IRI} 2012, Las Vegas, NV, USA, August 8-10, 2012},\n pages = {37--44},\n publisher = {{IEEE}},\n year = {2012},\n url = {https://doi.org/10.1109/IRI.2012.6302988},\n doi = {10.1109/IRI.2012.6302988},\n timestamp = {Wed, 29 Jun 2022 15:37:42 +0200},\n biburl = {https://dblp.org/rec/conf/iri/IslamNK12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Adversarial support vector machine learning.\n \n \n \n \n\n\n \n Zhou, Y.; Kantarcioglu, M.; Thuraisingham, B.; and Xi, B.\n\n\n \n\n\n\n In Yang, Q.; Agarwal, D.; and Pei, J., editor(s),
The 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '12, Beijing, China, August 12-16, 2012, pages 1059–1067, 2012. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/kdd/ZhouKTX12,\n author = {Yan Zhou and\n Murat Kantarcioglu and\n Bhavani Thuraisingham and\n Bowei Xi},\n editor = {Qiang Yang and\n Deepak Agarwal and\n Jian Pei},\n title = {Adversarial support vector machine learning},\n booktitle = {The 18th {ACM} {SIGKDD} International Conference on Knowledge Discovery\n and Data Mining, {KDD} '12, Beijing, China, August 12-16, 2012},\n pages = {1059--1067},\n publisher = {{ACM}},\n year = {2012},\n url = {https://doi.org/10.1145/2339530.2339697},\n doi = {10.1145/2339530.2339697},\n timestamp = {Wed, 29 Jun 2022 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/kdd/ZhouKTX12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.\n \n \n \n \n\n\n \n Islam, M. S.; Kuzu, M.; and Kantarcioglu, M.\n\n\n \n\n\n\n In
19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012, 2012. The Internet Society\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ndss/IslamKK12,\n author = {Mohammad Saiful Islam and\n Mehmet Kuzu and\n Murat Kantarcioglu},\n title = {Access Pattern disclosure on Searchable Encryption: Ramification,\n Attack and Mitigation},\n booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS}\n 2012, San Diego, California, USA, February 5-8, 2012},\n publisher = {The Internet Society},\n year = {2012},\n url = {https://www.ndss-symposium.org/ndss2012/access-pattern-disclosure-searchable-encryption-ramification-attack-and-mitigation},\n timestamp = {Mon, 01 Feb 2021 08:42:14 +0100},\n biburl = {https://dblp.org/rec/conf/ndss/IslamKK12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Jena-HBase: A Distributed, Scalable and Effcient RDF Triple Store.\n \n \n \n \n\n\n \n Khadilkar, V.; Kantarcioglu, M.; Thuraisingham, B.; and Castagna, P.\n\n\n \n\n\n\n In Glimm, B.; and Huynh, D., editor(s),
Proceedings of the ISWC 2012 Posters & Demonstrations Track, Boston, USA, November 11-15, 2012, volume 914, of
CEUR Workshop Proceedings, 2012. CEUR-WS.org\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/semweb/KhadilkarKTC12,\n author = {Vaibhav Khadilkar and\n Murat Kantarcioglu and\n Bhavani Thuraisingham and\n Paolo Castagna},\n editor = {Birte Glimm and\n David Huynh},\n title = {Jena-HBase: {A} Distributed, Scalable and Effcient {RDF} Triple Store},\n booktitle = {Proceedings of the {ISWC} 2012 Posters {\\&} Demonstrations Track,\n Boston, USA, November 11-15, 2012},\n series = {{CEUR} Workshop Proceedings},\n volume = {914},\n publisher = {CEUR-WS.org},\n year = {2012},\n url = {https://ceur-ws.org/Vol-914/paper\\_14.pdf},\n timestamp = {Fri, 10 Mar 2023 16:23:05 +0100},\n biburl = {https://dblp.org/rec/conf/semweb/KhadilkarKTC12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n StormRider: harnessing \"storm\" for social networks.\n \n \n \n \n\n\n \n Khadilkar, V.; Kantarcioglu, M.; and Thuraisingham, B.\n\n\n \n\n\n\n In Mille, A.; Gandon, F.; Misselis, J.; Rabinovich, M.; and Staab, S., editor(s),
Proceedings of the 21st World Wide Web Conference, WWW 2012, Lyon, France, April 16-20, 2012 (Companion Volume), pages 543–544, 2012. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/www/KhadilkarKT12,\n author = {Vaibhav Khadilkar and\n Murat Kantarcioglu and\n Bhavani Thuraisingham},\n editor = {Alain Mille and\n Fabien Gandon and\n Jacques Misselis and\n Michael Rabinovich and\n Steffen Staab},\n title = {StormRider: harnessing "storm" for social networks},\n booktitle = {Proceedings of the 21st World Wide Web Conference, {WWW} 2012, Lyon,\n France, April 16-20, 2012 (Companion Volume)},\n pages = {543--544},\n publisher = {{ACM}},\n year = {2012},\n url = {https://doi.org/10.1145/2187980.2188118},\n doi = {10.1145/2187980.2188118},\n timestamp = {Wed, 29 Jun 2022 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/www/KhadilkarKT12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n 17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012.\n \n \n \n \n\n\n \n Atluri, V.; Vaidya, J.; Kern, A.; and Kantarcioglu, M.,\n editors.\n \n\n\n \n\n\n\n ACM. 2012.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@proceedings{DBLP:conf/sacmat/2012,\n editor = {Vijay Atluri and\n Jaideep Vaidya and\n Axel Kern and\n Murat Kantarcioglu},\n title = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}\n '12, Newark, NJ, {USA} - June 20 - 22, 2012},\n publisher = {{ACM}},\n year = {2012},\n url = {https://doi.org/10.1145/2295136},\n doi = {10.1145/2295136},\n isbn = {978-1-4503-1295-0},\n timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/sacmat/2012.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Efficient Query Verification on Outsourced Data: A Game-Theoretic Approach.\n \n \n \n \n\n\n \n Nix, R.; and Kantarcioglu, M.\n\n\n \n\n\n\n
CoRR, abs/1202.1567. 2012.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1202-1567,\n author = {Robert Nix and\n Murat Kantarcioglu},\n title = {Efficient Query Verification on Outsourced Data: {A} Game-Theoretic\n Approach},\n journal = {CoRR},\n volume = {abs/1202.1567},\n year = {2012},\n url = {http://arxiv.org/abs/1202.1567},\n eprinttype = {arXiv},\n eprint = {1202.1567},\n timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/corr/abs-1202-1567.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n