☰

Murat Kantarcioglu, Ph.D. - Publications

Affiliations: 
2005 Purdue University, West Lafayette, IN, United States 
Area:
Computer Science

92 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2021 Akcora CG, Gel YR, Kantarcioglu M. Blockchain networks: Data structures of Bitcoin, Monero, Zcash, Ethereum, Ripple, and Iota. Wiley Interdisciplinary Reviews. Data Mining and Knowledge Discovery. 12: e1436. PMID 35865106 DOI: 10.1002/widm.1436  0.332
2021 Wan Z, Vorobeychik Y, Xia W, Liu Y, Wooders M, Guo J, Yin Z, Clayton EW, Kantarcioglu M, Malin BA. Using game theory to thwart multistage privacy intrusions when sharing data. Science Advances. 7: eabe9986. PMID 34890225 DOI: 10.1126/sciadv.abe9986  0.404
2020 Ozdayi MS, Kantarcioglu M, Malin B. Leveraging blockchain for immutable logging and querying across multiple sites. Bmc Medical Genomics. 13: 82. PMID 32693807 DOI: 10.1186/S12920-020-0721-2  0.512
2019 Kantarcioglu M, Ferrari E. Research Challenges at the Intersection of Big Data, Security and Privacy. Frontiers in Big Data. 2: 1. PMID 33693324 DOI: 10.3389/fdata.2019.00001  0.339
2017 Prasser F, Gaupp J, Wan Z, Xia W, Vorobeychik Y, Kantarcioglu M, Kuhn K, Malin B. An Open Source Tool for Game Theoretic Health Data De-Identification. Amia ... Annual Symposium Proceedings. Amia Symposium. 2017: 1430-1439. PMID 29854212  0.403
2017 Xia W, Wan Z, Yin Z, Gaupp J, Liu Y, Clayton EW, Kantarcioglu M, Vorobeychik Y, Malin BA. It's all in the timing: calibrating temporal penalties for biomedical data sharing. Journal of the American Medical Informatics Association : Jamia. PMID 29036325 DOI: 10.1093/Jamia/Ocx101  0.43
2017 Wan Z, Vorobeychik Y, Kantarcioglu M, Malin B. Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services. Bmc Medical Genomics. 10: 39. PMID 28786360 DOI: 10.1186/S12920-017-0282-1  0.405
2017 Wan Z, Vorobeychik Y, Xia W, Clayton EW, Kantarcioglu M, Malin B. Expanding Access to Large-Scale Genomic Data While Promoting Privacy: A Game Theoretic Approach. American Journal of Human Genetics. PMID 28065469 DOI: 10.1016/J.Ajhg.2016.12.002  0.445
2017 Giraldo J, Sarkar E, Cardenas AA, Maniatakos M, Kantarcioglu M. Security and Privacy in Cyber-Physical Systems: A Survey of Surveys Ieee Design & Test of Computers. 34: 7-17. DOI: 10.1109/Mdat.2017.2709310  0.379
2017 Jiang J, Xi B, Kantarcioglu M. Spatial counts under differential privacy mechanism on changing spatial scales Computers & Security. 77: 642-652. DOI: 10.1016/J.Cose.2017.11.018  0.307
2016 Orencik C, Selcuk A, Savas E, Kantarcioglu M. Multi-Keyword search over encrypted data with scoring and search pattern obfuscation International Journal of Information Security. 15: 251-269. DOI: 10.1007/S10207-015-0294-9  0.44
2016 Shaon F, Kantarcioglu M. A practical framework for executing complex queries over encrypted multimedia data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9766: 179-195. DOI: 10.1007/978-3-319-41483-6_14  0.397
2016 Roy H, Kantarcioglu M, Sweeney L. Practical differentially private modeling of human movement data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9766: 170-178. DOI: 10.1007/978-3-319-41483-6_13  0.437
2015 El Emam K, Farah H, Samet S, Essex A, Jonker E, Kantarcioglu M, Earle CC. A privacy preserving protocol for tracking participants in phase I clinical trials. Journal of Biomedical Informatics. PMID 26146157 DOI: 10.1016/J.Jbi.2015.06.019  0.39
2015 Wan Z, Vorobeychik Y, Xia W, Clayton EW, Kantarcioglu M, Ganta R, Heatherly R, Malin BA. A game theoretic framework for analyzing re-identification risk. Plos One. 10: e0120592. PMID 25807380 DOI: 10.1371/Journal.Pone.0120592  0.477
2015 Ulusoy H, Colombo P, Ferrari E, Kantarcioglu M, Pattuk E. GuardMR: Fine-grained security policy enforcement for MapReduce systems Asiaccs 2015 - Proceedings of the 10th Acm Symposium On Information, Computer and Communications Security. 285-296. DOI: 10.1145/2714576.2714624  0.333
2015 Chan W, Cybenko G, Kantarcioglu M, Leiss E, Solorio T, Thuraisingham B, Verma R. Panel: Essential data analytics knowledge for cyber-security professionals and students Iwspa 2015 - Proceedings of the 2015 Acm International Workshop On Security and Privacy Analytics, Co-Located With Codaspy 2015. 55-57. DOI: 10.1145/2713579.2723707  0.35
2015 Kuzu M, Islam MS, Kantarcioglu M. Distributed search over encrypted big data Codaspy 2015 - Proceedings of the 5th Acm Conference On Data and Application Security and Privacy. 271-278. DOI: 10.1145/2699026.2699116  0.473
2015 Pattuk E, Kantarcioglu M, Ulusoy H. BigGate: Access control framework for outsourced key-value stores Codaspy 2015 - Proceedings of the 5th Acm Conference On Data and Application Security and Privacy. 171-182. DOI: 10.1145/2699026.2699110  0.327
2015 Ulusoy H, Kantarcioglu M, Thuraisingham B, Khan L. Honeypot based unauthorized data access detection in MapReduce systems 2015 Ieee International Conference On Intelligence and Security Informatics: Securing the World Through An Alignment of Technology, Intelligence, Humans and Organizations, Isi 2015. 126-131. DOI: 10.1109/ISI.2015.7165951  0.427
2015 Thuraisingham B, Cadenhead T, Kantarcioglu M, Khadilkar V. Design and Implementation of a Semantic Web-Based Inference Controller: A Summary Proceedings - 2015 Ieee 16th International Conference On Information Reuse and Integration, Iri 2015. 451-456. DOI: 10.1109/IRI.2015.75  0.328
2015 Cao J, Rao FY, Bertino E, Kantarcioglu M. A hybrid private record linkage scheme: Separating differentially private synopses from matching records Proceedings - International Conference On Data Engineering. 2015: 1011-1022. DOI: 10.1109/ICDE.2015.7113352  0.317
2015 Pattuk E, Kantarcioglu M, Ulusoy H, Malin B. Privacy-aware dynamic feature selection Proceedings - International Conference On Data Engineering. 2015: 78-88. DOI: 10.1109/ICDE.2015.7113274  0.306
2015 Ulusoy H, Kantarcioglu M, Pattuk E, Kagal L. AccountableMR: Toward accountable MapReduce systems Proceedings - 2015 Ieee International Conference On Big Data, Ieee Big Data 2015. 451-460. DOI: 10.1109/BigData.2015.7363786  0.358
2014 Durham EA, Kantarcioglu M, Xue Y, Toth C, Kuzu M, Malin B. Composite Bloom Filters for Secure Record Linkage. Ieee Transactions On Knowledge and Data Engineering. 26: 2956-2968. PMID 25530689 DOI: 10.1109/Tkde.2013.91  0.389
2014 Xie W, Kantarcioglu M, Bush WS, Crawford D, Denny JC, Heatherly R, Malin BA. SecureMA: protecting participant privacy in genetic association meta-analysis. Bioinformatics (Oxford, England). 30: 3334-41. PMID 25147357 DOI: 10.1093/Bioinformatics/Btu561  0.367
2014 Bensoussan A, Kantarcioglu M, Hoe S. A trust-score-based access control in assured information sharing systems: An application of financial credit risk score models Risk and Decision Analysis. 5: 129-138. DOI: 10.3233/Rda-140105  0.366
2014 Kuzu M, Islam MS, Kantarcioglu M. Efficient privacy-aware search over encrypted databases Codaspy 2014 - Proceedings of the 4th Acm Conference On Data and Application Security and Privacy. 249-256. DOI: 10.1145/2557547.2557570  0.422
2014 Akcora CG, Carminati B, Ferrari E, Kantarcioglu M. Detecting anomalies in social network data consumption Social Network Analysis and Mining. 4: 1-16. DOI: 10.1007/S13278-014-0231-3  0.348
2014 Bertino E, Ghinita G, Kantarcioglu M, Nguyen D, Park J, Sandhu R, Sultana S, Thuraisingham B, Xu S. A roadmap for privacy-enhanced secure data provenance Journal of Intelligent Information Systems. 43: 481-501. DOI: 10.1007/s10844-014-0322-7  0.41
2014 Ferrari E, Kantarcioglu M. Special issue on secure and privacy-aware data management Distributed and Parallel Databases. 32: 1-3. DOI: 10.1007/S10619-014-7144-Z  0.567
2014 Gkoulalas-Divanis A, Haritsa J, Kantarcioglu M. Privacy issues in association rule mining Frequent Pattern Mining. 369-401. DOI: 10.1007/978-3-319-07821-2_15  0.385
2014 Oktay KY, Gomathisankaran M, Kantarcioglu M, Mehrotra S, Singhal A. Towards data confidentiality and a vulnerability analysis framework for cloud computing Secure Cloud Computing. 2147483647: 213-238. DOI: 10.1007/978-1-4614-9278-8_10  0.308
2013 Kuzu M, Kantarcioglu M, Inan A, Bertino E, Durham E, Malin B. Efficient Privacy-Aware Record Integration. Advances in Database Technology : Proceedings. International Conference On Extending Database Technology. 167-178. PMID 24500681 DOI: 10.1145/2452376.2452398  0.437
2013 El Emam K, Samet S, Arbuckle L, Tamblyn R, Earle C, Kantarcioglu M. A secure distributed logistic regression protocol for the detection of rare adverse drug events. Journal of the American Medical Informatics Association : Jamia. 20: 453-61. PMID 22871397 DOI: 10.1136/Amiajnl-2011-000735  0.488
2013 Kuzu M, Kantarcioglu M, Durham EA, Toth C, Malin B. A practical approach to achieve private medical record linkage in light of public resources. Journal of the American Medical Informatics Association : Jamia. 20: 285-92. PMID 22847304 DOI: 10.1136/Amiajnl-2012-000917  0.309
2013 Ulusoy H, Kantarcioglu M, Thuraisingham B, Cankaya EC, Pattuk E. Analysis of heuristic based access pattern obfuscation Proceedings of the 9th Ieee International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2013. 537-544. DOI: 10.4108/icst.collaboratecom.2013.254199  0.454
2013 Kantarcioglu M, Jiang W. Incentive compatible privacy-preserving data analysis Ieee Transactions On Knowledge and Data Engineering. 25: 1323-1335. DOI: 10.1109/Tkde.2012.61  0.499
2013 Heatherly R, Kantarcioglu M, Thuraisingham B. Preventing private information inference attacks on social networks Ieee Transactions On Knowledge and Data Engineering. 25: 1849-1862. DOI: 10.1109/Tkde.2012.120  0.401
2013 Kantarcioglu M. Incentive-compatible privacy-preserving distributed data mining Proceedings - Ieee 13th International Conference On Data Mining Workshops, Icdmw 2013. 859. DOI: 10.1109/ICDMW.2013.67  0.442
2013 Gkoulalas-Divanis A, Loukides G, Aggarwal C, Bhaskar R, Kifer D, Laxman S, Wu X, Bonchi F, Damiani ML, Domingo-Ferrer J, Fung B, Jiang W, Kantarcioglu M, Karjoth G, Karras P, et al. Preface to the fourth IEEE workshop on privacy aspects of data mining Proceedings - Ieee 13th International Conference On Data Mining Workshops, Icdmw 2013. lvi-lvix. DOI: 10.1109/ICDMW.2013.185  0.423
2013 Pattuk E, Kantarcioglu M, Khadilkar V, Ulusoy H, Mehrotra S. BigSecret: A secure data management framework for key-value stores Ieee International Conference On Cloud Computing, Cloud. 147-154. DOI: 10.1109/CLOUD.2013.37  0.372
2013 Orencik C, Kantarcioglu M, Savas E. A practical and secure multi-keyword search method over encrypted cloud data Ieee International Conference On Cloud Computing, Cloud. 390-397. DOI: 10.1109/CLOUD.2013.18  0.348
2013 Khadilkar V, Cadenhead T, Kantarcioglu M, Thuraisingham B. Assured Information Sharing (AIS) using private clouds High Performance Cloud Auditing and Applications. 215-255. DOI: 10.1007/978-1-4614-3296-8_9  0.318
2013 Rachapalli J, Khadilkar V, Kantarcioglu M, Thuraisingham B. REDACT: A framework for sanitizing RDF data Www 2013 Companion - Proceedings of the 22nd International Conference On World Wide Web. 157-158.  0.428
2012 Durham E, Xue Y, Kantarcioglu M, Malin B. Quantifying the Correctness, Computational Complexity, and Security of Privacy-Preserving String Comparators for Record Linkage. An International Journal On Information Fusion. 13: 245-259. PMID 22904698 DOI: 10.1016/J.Inffus.2011.04.004  0.485
2012 El Emam K, Samet S, Hu J, Peyton L, Earle C, Jayaraman GC, Wong T, Kantarcioglu M, Dankar F, Essex A. A Protocol for the secure linking of registries for HPV surveillance. Plos One. 7: e39915. PMID 22768321 DOI: 10.1371/Journal.Pone.0039915  0.33
2012 Canim M, Kantarcioglu M, Malin B. Secure management of biomedical data with cryptographic hardware. Ieee Transactions On Information Technology in Biomedicine : a Publication of the Ieee Engineering in Medicine and Biology Society. 16: 166-75. PMID 22010157 DOI: 10.1109/TITB.2011.2171701  0.409
2012 Inan A, Kantarcioglu M, Ghinita G, Bertino E. A hybrid approach to private record matching Ieee Transactions On Dependable and Secure Computing. 9: 684-698. DOI: 10.1109/Tdsc.2012.46  0.508
2012 Parikh P, Kantarcioglu M, Khadilkar V, Thuraisingham B, Khan L. Secure information integration with a semantic web-based framework Proceedings of the 2012 Ieee 13th International Conference On Information Reuse and Integration, Iri 2012. 659-663. DOI: 10.1109/IRI.2012.6303072  0.307
2012 Kuzu M, Islam MS, Kantarcioglu M. Efficient similarity search over encrypted data Proceedings - International Conference On Data Engineering. 1156-1167. DOI: 10.1109/ICDE.2012.23  0.425
2012 Oktay KY, Khadilkar V, Hore B, Kantarcioglu M, Mehrotra S, Thuraisingham B. Risk-aware workload distribution in hybrid clouds Proceedings - 2012 Ieee 5th International Conference On Cloud Computing, Cloud 2012. 229-236. DOI: 10.1109/CLOUD.2012.128  0.329
2012 Hore B, Mehrotra S, Canim M, Kantarcioglu M. Secure multidimensional range queries over outsourced data Vldb Journal. 21: 333-358. DOI: 10.1007/s00778-011-0245-7  0.441
2012 Cadenhead T, Kantarcioglu M, Khadilkar V, Thuraisingham B. Design and implementation of a cloud-based assured information sharing system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7531: 36-50. DOI: 10.1007/978-3-642-33704-8-4  0.308
2012 Shastry A, Kantarcioglu M, Zhou Y, Thuraisingham B. Randomizing Smartphone Malware Profiles against Statistical Mining Techniques Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7371: 239-254. DOI: 10.1007/978-3-642-31540-4_18  0.34
2012 Nix R, Kantarcioglu M, Han KJ. Approximate privacy-preserving data mining on vertically partitioned data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7371: 129-144. DOI: 10.1007/978-3-642-31540-4_11  0.463
2012 Khadilkar V, Kantarcioglu M, Thuraisingham B, Castagna P. Jena-HBase: A distributed, scalable and efficient RDF triple store Ceur Workshop Proceedings. 914: 85-88.  0.331
2011 El Emam K, Hu J, Mercer J, Peyton L, Kantarcioglu M, Malin B, Buckeridge D, Samet S, Earle C. A secure protocol for protecting the identity of providers when disclosing data for disease surveillance. Journal of the American Medical Informatics Association : Jamia. 18: 212-7. PMID 21486880 DOI: 10.1136/Amiajnl-2011-000100  0.415
2011 Nabeel M, Bertino E, Kantarcioglu M, Thuraisingham B. Towards privacy preserving access control in the cloud Coliaboratecom 2011 - Proceedings of the 7th International Conference On Collaborative Computing: Networking, Applications and Worksharing. 172-180. DOI: 10.4108/icst.collaboratecom.2011.247061  0.342
2011 Carminati B, Ferrari E, Heatherly R, Kantarcioglu M, Thuraisingham B. Semantic web-based social network access control Computers and Security. 30: 108-115. DOI: 10.1016/J.Cose.2010.08.003  0.356
2011 Ghinita G, Kalnis P, Kantarcioglu M, Bertino E. Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection Geoinformatica. 15: 699-726. DOI: 10.1007/S10707-010-0121-4  0.4
2011 Kantarcioǧlu M, Xi B, Clifton C. Classifier evaluation and attribute selection against active adversaries Data Mining and Knowledge Discovery. 22: 291-335. DOI: 10.1007/S10618-010-0197-3  0.693
2010 Hamlen K, Kantarcioglu M, Khan L, Thuraisingham B. Security issues for cloud computing International Journal of Information Security and Privacy. 4: 36-48. DOI: 10.4018/Jisp.2010040103  0.373
2010 Inan A, Kantarcioglu M, Ghinita G, Bertino E. Private record matching using differential privacy Advances in Database Technology - Edbt 2010 - 13th International Conference On Extending Database Technology, Proceedings. 123-134. DOI: 10.1145/1739041.1739059  0.35
2010 Ramanujam S, Khadilkar V, Khan L, Kantarcioglu M, Thuraisingham BM, Seida S. Update-Enabled Triplification Of Relational Data Into Virtual Rdf Stores International Journal of Semantic Computing. 4: 423-451. DOI: 10.1142/S1793351X10001073  0.449
2010 Kantarcioglu M, Nix R. Incentive compatible distributed data mining Proceedings - Socialcom 2010: 2nd Ieee International Conference On Social Computing, Passat 2010: 2nd Ieee International Conference On Privacy, Security, Risk and Trust. 735-742. DOI: 10.1109/SocialCom.2010.114  0.412
2010 Ramanujam S, Khadilkar V, Khan L, Seida S, Kantarcioglu M, Thuraisingham B. Bi-directional translation of relational data into virtual RDF stores Proceedings - 2010 Ieee 4th International Conference On Semantic Computing, Icsc 2010. 268-276. DOI: 10.1109/ICSC.2010.61  0.369
2010 Cadenhead T, Kantarcioglu M, Thuraisingham B. Scalable and efficient reasoning for enforcing role-based access control Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6166: 209-224. DOI: 10.1007/978-3-642-13739-6_14  0.341
2010 Canim M, Kantarcioglu M, Hore B, Mehrotra S. Building disclosure risk aware query optimizers for relational databases Proceedings of the Vldb Endowment. 3: 13-24.  0.339
2010 Thuraisingham B, Khadilkar V, Gupta A, Kantarcioglu M, Khan L. Secure data storage and retrieval in the cloud Proceedings of the 6th International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2010 0.446
2010 Thuraisingham B, Khan L, Kantarcioglu M. Semantic Web, data mining, and security Ieee Intelligent Systems. 25: 86-88.  0.401
2009 Celikel E, Kantarcioglu M, Thuraisingham B, Bertino E. A risk management approach to RBAC Risk and Decision Analysis. 1: 21-33. DOI: 10.3233/Rda-2008-0002  0.357
2009 Kantarcioglu M, Kardes O. Privacy-preserving data mining in the malicious model International Journal of Information and Computer Security. 2: 353-375. DOI: 10.1504/Ijics.2008.022488  0.453
2009 Inan A, Kantarcioglu M, Bertino E. Using anonymized data for classification Proceedings - International Conference On Data Engineering. 429-440. DOI: 10.1109/ICDE.2009.19  0.439
2009 Liu L, Kantarcioglu M, Thuraisingham B. Privacy preserving decision tree mining from perturbed data Proceedings of the 42nd Annual Hawaii International Conference On System Sciences, Hicss. DOI: 10.1109/HICSS.2009.353  0.451
2009 Kantarcioglu M, Inan A, Jiang W, Malin B. Formal anonymity models for efficient privacy-preserving joins Data and Knowledge Engineering. 68: 1206-1223. DOI: 10.1016/j.datak.2009.06.011  0.386
2009 Dai C, Lin D, Kantarcioglu M, Bertino E, Celikel E, Thuraisingham B. Query processing techniques for compliance with data confidence policies Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5776: 49-67. DOI: 10.1007/978-3-642-04219-5_4  0.358
2009 Canim M, Kantarcioglu M, Inan A. Query optimization in encrypted relational databases by vertical schema partitioning Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5776: 1-16. DOI: 10.1007/978-3-642-04219-5_1  0.353
2009 Bertino E, Dai C, Kantarcioglu M. The challenge of assuring data trustworthiness Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5463: 22-33. DOI: 10.1007/978-3-642-00887-0_2  0.383
2008 Clifton C, Iyer A, Cho R, Jiang W, Kantarcioglu M, Vaidya J. An approach to securely identifying beneficial collaboration in decentralized logistics systems Manufacturing and Service Operations Management. 10: 108-125. DOI: 10.1287/Msom.1070.0167  0.69
2008 Inan A, Kantarcioglu M, Bertino E, Scannapieco M. A hybrid approach to private record linkage Proceedings - International Conference On Data Engineering. 496-505. DOI: 10.1109/ICDE.2008.4497458  0.406
2008 Liu L, Kantarcioglu M, Thuraisingham B. The applicability of the perturbation based privacy preserving data mining for real-world data Data and Knowledge Engineering. 65: 5-21. DOI: 10.1016/j.datak.2007.06.011  0.443
2008 Kantarcioglu M, Jiang W, Malin B. A privacy-preserving framework for integrating person-specific databases Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5262: 298-314. DOI: 10.1007/978-3-540-87471-3-25  0.433
2008 Dai C, Lin D, Bertino E, Kantarcioglu M. An approach to evaluate data trustworthiness based on data provenance Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5159: 82-98. DOI: 10.1007/978-3-540-85259-9_6  0.435
2007 Thuraisingham B, Kantarcioglu M, Iyer S. Extended RBAC-based design and implementation for a secure data warehouse International Journal of Business Intelligence and Data Mining. 2: 367-382. DOI: 10.1504/Ijbidm.2007.016379  0.466
2007 Li W, Agrawal D, Candan KS, Akca Y, Kantarcioglu M. Virtual Active Network For Live Streaming Media Delivery Journal of Interconnection Networks. 8: 45-74. DOI: 10.1142/S0219265907001904  0.385
2007 Kantarcioglu M, Kardes O. Privacy-preserving data mining applications in the malicious model Proceedings - Ieee International Conference On Data Mining, Icdm. 717-722. DOI: 10.1109/ICDMW.2007.86  0.337
2007 Canim M, Kantarcioglu M. Design and analysis of querying encrypted data in relational databases Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4602: 177-194.  0.386
2006 Agrawal R, Asonov D, Kantarcioglu M, Li Y. Sovereign joins Proceedings - International Conference On Data Engineering. 2006: 26. DOI: 10.1109/ICDE.2006.144  0.338
2006 Liu L, Kantarcioglu M, Thuraisingham B. The applicability of the perturbation model-based privacy preserving data mining for real-world data Proceedings - Ieee International Conference On Data Mining, Icdm. 507-512.  0.419
2004 Kantarcioglu M, Clifton C. Privacy-preserving distributed mining of association rules on horizontally partitioned data Ieee Transactions On Knowledge and Data Engineering. 16: 1026-1037. DOI: 10.1109/Tkde.2004.45  0.713
2002 Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu MY. Tools for privacy preserving distributed data mining Sigkdd Explorations. 4: 28-34. DOI: 10.1145/772862.772867  0.704
Show low-probability matches.