Year |
Citation |
Score |
2021 |
Akcora CG, Gel YR, Kantarcioglu M. Blockchain networks: Data structures of Bitcoin, Monero, Zcash, Ethereum, Ripple, and Iota. Wiley Interdisciplinary Reviews. Data Mining and Knowledge Discovery. 12: e1436. PMID 35865106 DOI: 10.1002/widm.1436 |
0.332 |
|
2021 |
Wan Z, Vorobeychik Y, Xia W, Liu Y, Wooders M, Guo J, Yin Z, Clayton EW, Kantarcioglu M, Malin BA. Using game theory to thwart multistage privacy intrusions when sharing data. Science Advances. 7: eabe9986. PMID 34890225 DOI: 10.1126/sciadv.abe9986 |
0.404 |
|
2020 |
Ozdayi MS, Kantarcioglu M, Malin B. Leveraging blockchain for immutable logging and querying across multiple sites. Bmc Medical Genomics. 13: 82. PMID 32693807 DOI: 10.1186/S12920-020-0721-2 |
0.512 |
|
2019 |
Kantarcioglu M, Ferrari E. Research Challenges at the Intersection of Big Data, Security and Privacy. Frontiers in Big Data. 2: 1. PMID 33693324 DOI: 10.3389/fdata.2019.00001 |
0.339 |
|
2017 |
Prasser F, Gaupp J, Wan Z, Xia W, Vorobeychik Y, Kantarcioglu M, Kuhn K, Malin B. An Open Source Tool for Game Theoretic Health Data De-Identification. Amia ... Annual Symposium Proceedings. Amia Symposium. 2017: 1430-1439. PMID 29854212 |
0.403 |
|
2017 |
Xia W, Wan Z, Yin Z, Gaupp J, Liu Y, Clayton EW, Kantarcioglu M, Vorobeychik Y, Malin BA. It's all in the timing: calibrating temporal penalties for biomedical data sharing. Journal of the American Medical Informatics Association : Jamia. PMID 29036325 DOI: 10.1093/Jamia/Ocx101 |
0.43 |
|
2017 |
Wan Z, Vorobeychik Y, Kantarcioglu M, Malin B. Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services. Bmc Medical Genomics. 10: 39. PMID 28786360 DOI: 10.1186/S12920-017-0282-1 |
0.405 |
|
2017 |
Wan Z, Vorobeychik Y, Xia W, Clayton EW, Kantarcioglu M, Malin B. Expanding Access to Large-Scale Genomic Data While Promoting Privacy: A Game Theoretic Approach. American Journal of Human Genetics. PMID 28065469 DOI: 10.1016/J.Ajhg.2016.12.002 |
0.445 |
|
2017 |
Giraldo J, Sarkar E, Cardenas AA, Maniatakos M, Kantarcioglu M. Security and Privacy in Cyber-Physical Systems: A Survey of Surveys Ieee Design & Test of Computers. 34: 7-17. DOI: 10.1109/Mdat.2017.2709310 |
0.379 |
|
2017 |
Jiang J, Xi B, Kantarcioglu M. Spatial counts under differential privacy mechanism on changing spatial scales Computers & Security. 77: 642-652. DOI: 10.1016/J.Cose.2017.11.018 |
0.307 |
|
2016 |
Orencik C, Selcuk A, Savas E, Kantarcioglu M. Multi-Keyword search over encrypted data with scoring and search pattern obfuscation International Journal of Information Security. 15: 251-269. DOI: 10.1007/S10207-015-0294-9 |
0.44 |
|
2016 |
Shaon F, Kantarcioglu M. A practical framework for executing complex queries over encrypted multimedia data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9766: 179-195. DOI: 10.1007/978-3-319-41483-6_14 |
0.397 |
|
2016 |
Roy H, Kantarcioglu M, Sweeney L. Practical differentially private modeling of human movement data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9766: 170-178. DOI: 10.1007/978-3-319-41483-6_13 |
0.437 |
|
2015 |
El Emam K, Farah H, Samet S, Essex A, Jonker E, Kantarcioglu M, Earle CC. A privacy preserving protocol for tracking participants in phase I clinical trials. Journal of Biomedical Informatics. PMID 26146157 DOI: 10.1016/J.Jbi.2015.06.019 |
0.39 |
|
2015 |
Wan Z, Vorobeychik Y, Xia W, Clayton EW, Kantarcioglu M, Ganta R, Heatherly R, Malin BA. A game theoretic framework for analyzing re-identification risk. Plos One. 10: e0120592. PMID 25807380 DOI: 10.1371/Journal.Pone.0120592 |
0.477 |
|
2015 |
Ulusoy H, Colombo P, Ferrari E, Kantarcioglu M, Pattuk E. GuardMR: Fine-grained security policy enforcement for MapReduce systems Asiaccs 2015 - Proceedings of the 10th Acm Symposium On Information, Computer and Communications Security. 285-296. DOI: 10.1145/2714576.2714624 |
0.333 |
|
2015 |
Chan W, Cybenko G, Kantarcioglu M, Leiss E, Solorio T, Thuraisingham B, Verma R. Panel: Essential data analytics knowledge for cyber-security professionals and students Iwspa 2015 - Proceedings of the 2015 Acm International Workshop On Security and Privacy Analytics, Co-Located With Codaspy 2015. 55-57. DOI: 10.1145/2713579.2723707 |
0.35 |
|
2015 |
Kuzu M, Islam MS, Kantarcioglu M. Distributed search over encrypted big data Codaspy 2015 - Proceedings of the 5th Acm Conference On Data and Application Security and Privacy. 271-278. DOI: 10.1145/2699026.2699116 |
0.473 |
|
2015 |
Pattuk E, Kantarcioglu M, Ulusoy H. BigGate: Access control framework for outsourced key-value stores Codaspy 2015 - Proceedings of the 5th Acm Conference On Data and Application Security and Privacy. 171-182. DOI: 10.1145/2699026.2699110 |
0.327 |
|
2015 |
Ulusoy H, Kantarcioglu M, Thuraisingham B, Khan L. Honeypot based unauthorized data access detection in MapReduce systems 2015 Ieee International Conference On Intelligence and Security Informatics: Securing the World Through An Alignment of Technology, Intelligence, Humans and Organizations, Isi 2015. 126-131. DOI: 10.1109/ISI.2015.7165951 |
0.427 |
|
2015 |
Thuraisingham B, Cadenhead T, Kantarcioglu M, Khadilkar V. Design and Implementation of a Semantic Web-Based Inference Controller: A Summary Proceedings - 2015 Ieee 16th International Conference On Information Reuse and Integration, Iri 2015. 451-456. DOI: 10.1109/IRI.2015.75 |
0.328 |
|
2015 |
Cao J, Rao FY, Bertino E, Kantarcioglu M. A hybrid private record linkage scheme: Separating differentially private synopses from matching records Proceedings - International Conference On Data Engineering. 2015: 1011-1022. DOI: 10.1109/ICDE.2015.7113352 |
0.317 |
|
2015 |
Pattuk E, Kantarcioglu M, Ulusoy H, Malin B. Privacy-aware dynamic feature selection Proceedings - International Conference On Data Engineering. 2015: 78-88. DOI: 10.1109/ICDE.2015.7113274 |
0.306 |
|
2015 |
Ulusoy H, Kantarcioglu M, Pattuk E, Kagal L. AccountableMR: Toward accountable MapReduce systems Proceedings - 2015 Ieee International Conference On Big Data, Ieee Big Data 2015. 451-460. DOI: 10.1109/BigData.2015.7363786 |
0.358 |
|
2014 |
Durham EA, Kantarcioglu M, Xue Y, Toth C, Kuzu M, Malin B. Composite Bloom Filters for Secure Record Linkage. Ieee Transactions On Knowledge and Data Engineering. 26: 2956-2968. PMID 25530689 DOI: 10.1109/Tkde.2013.91 |
0.389 |
|
2014 |
Xie W, Kantarcioglu M, Bush WS, Crawford D, Denny JC, Heatherly R, Malin BA. SecureMA: protecting participant privacy in genetic association meta-analysis. Bioinformatics (Oxford, England). 30: 3334-41. PMID 25147357 DOI: 10.1093/Bioinformatics/Btu561 |
0.367 |
|
2014 |
Bensoussan A, Kantarcioglu M, Hoe S. A trust-score-based access control in assured information sharing systems: An application of financial credit risk score models Risk and Decision Analysis. 5: 129-138. DOI: 10.3233/Rda-140105 |
0.366 |
|
2014 |
Kuzu M, Islam MS, Kantarcioglu M. Efficient privacy-aware search over encrypted databases Codaspy 2014 - Proceedings of the 4th Acm Conference On Data and Application Security and Privacy. 249-256. DOI: 10.1145/2557547.2557570 |
0.422 |
|
2014 |
Akcora CG, Carminati B, Ferrari E, Kantarcioglu M. Detecting anomalies in social network data consumption Social Network Analysis and Mining. 4: 1-16. DOI: 10.1007/S13278-014-0231-3 |
0.348 |
|
2014 |
Bertino E, Ghinita G, Kantarcioglu M, Nguyen D, Park J, Sandhu R, Sultana S, Thuraisingham B, Xu S. A roadmap for privacy-enhanced secure data provenance Journal of Intelligent Information Systems. 43: 481-501. DOI: 10.1007/s10844-014-0322-7 |
0.41 |
|
2014 |
Ferrari E, Kantarcioglu M. Special issue on secure and privacy-aware data management Distributed and Parallel Databases. 32: 1-3. DOI: 10.1007/S10619-014-7144-Z |
0.567 |
|
2014 |
Gkoulalas-Divanis A, Haritsa J, Kantarcioglu M. Privacy issues in association rule mining Frequent Pattern Mining. 369-401. DOI: 10.1007/978-3-319-07821-2_15 |
0.385 |
|
2014 |
Oktay KY, Gomathisankaran M, Kantarcioglu M, Mehrotra S, Singhal A. Towards data confidentiality and a vulnerability analysis framework for cloud computing Secure Cloud Computing. 2147483647: 213-238. DOI: 10.1007/978-1-4614-9278-8_10 |
0.308 |
|
2013 |
Kuzu M, Kantarcioglu M, Inan A, Bertino E, Durham E, Malin B. Efficient Privacy-Aware Record Integration. Advances in Database Technology : Proceedings. International Conference On Extending Database Technology. 167-178. PMID 24500681 DOI: 10.1145/2452376.2452398 |
0.437 |
|
2013 |
El Emam K, Samet S, Arbuckle L, Tamblyn R, Earle C, Kantarcioglu M. A secure distributed logistic regression protocol for the detection of rare adverse drug events. Journal of the American Medical Informatics Association : Jamia. 20: 453-61. PMID 22871397 DOI: 10.1136/Amiajnl-2011-000735 |
0.488 |
|
2013 |
Kuzu M, Kantarcioglu M, Durham EA, Toth C, Malin B. A practical approach to achieve private medical record linkage in light of public resources. Journal of the American Medical Informatics Association : Jamia. 20: 285-92. PMID 22847304 DOI: 10.1136/Amiajnl-2012-000917 |
0.309 |
|
2013 |
Ulusoy H, Kantarcioglu M, Thuraisingham B, Cankaya EC, Pattuk E. Analysis of heuristic based access pattern obfuscation Proceedings of the 9th Ieee International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2013. 537-544. DOI: 10.4108/icst.collaboratecom.2013.254199 |
0.454 |
|
2013 |
Kantarcioglu M, Jiang W. Incentive compatible privacy-preserving data analysis Ieee Transactions On Knowledge and Data Engineering. 25: 1323-1335. DOI: 10.1109/Tkde.2012.61 |
0.499 |
|
2013 |
Heatherly R, Kantarcioglu M, Thuraisingham B. Preventing private information inference attacks on social networks Ieee Transactions On Knowledge and Data Engineering. 25: 1849-1862. DOI: 10.1109/Tkde.2012.120 |
0.401 |
|
2013 |
Kantarcioglu M. Incentive-compatible privacy-preserving distributed data mining Proceedings - Ieee 13th International Conference On Data Mining Workshops, Icdmw 2013. 859. DOI: 10.1109/ICDMW.2013.67 |
0.442 |
|
2013 |
Gkoulalas-Divanis A, Loukides G, Aggarwal C, Bhaskar R, Kifer D, Laxman S, Wu X, Bonchi F, Damiani ML, Domingo-Ferrer J, Fung B, Jiang W, Kantarcioglu M, Karjoth G, Karras P, et al. Preface to the fourth IEEE workshop on privacy aspects of data mining Proceedings - Ieee 13th International Conference On Data Mining Workshops, Icdmw 2013. lvi-lvix. DOI: 10.1109/ICDMW.2013.185 |
0.423 |
|
2013 |
Pattuk E, Kantarcioglu M, Khadilkar V, Ulusoy H, Mehrotra S. BigSecret: A secure data management framework for key-value stores Ieee International Conference On Cloud Computing, Cloud. 147-154. DOI: 10.1109/CLOUD.2013.37 |
0.372 |
|
2013 |
Orencik C, Kantarcioglu M, Savas E. A practical and secure multi-keyword search method over encrypted cloud data Ieee International Conference On Cloud Computing, Cloud. 390-397. DOI: 10.1109/CLOUD.2013.18 |
0.348 |
|
2013 |
Khadilkar V, Cadenhead T, Kantarcioglu M, Thuraisingham B. Assured Information Sharing (AIS) using private clouds High Performance Cloud Auditing and Applications. 215-255. DOI: 10.1007/978-1-4614-3296-8_9 |
0.318 |
|
2013 |
Rachapalli J, Khadilkar V, Kantarcioglu M, Thuraisingham B. REDACT: A framework for sanitizing RDF data Www 2013 Companion - Proceedings of the 22nd International Conference On World Wide Web. 157-158. |
0.428 |
|
2012 |
Durham E, Xue Y, Kantarcioglu M, Malin B. Quantifying the Correctness, Computational Complexity, and Security of Privacy-Preserving String Comparators for Record Linkage. An International Journal On Information Fusion. 13: 245-259. PMID 22904698 DOI: 10.1016/J.Inffus.2011.04.004 |
0.485 |
|
2012 |
El Emam K, Samet S, Hu J, Peyton L, Earle C, Jayaraman GC, Wong T, Kantarcioglu M, Dankar F, Essex A. A Protocol for the secure linking of registries for HPV surveillance. Plos One. 7: e39915. PMID 22768321 DOI: 10.1371/Journal.Pone.0039915 |
0.33 |
|
2012 |
Canim M, Kantarcioglu M, Malin B. Secure management of biomedical data with cryptographic hardware. Ieee Transactions On Information Technology in Biomedicine : a Publication of the Ieee Engineering in Medicine and Biology Society. 16: 166-75. PMID 22010157 DOI: 10.1109/TITB.2011.2171701 |
0.409 |
|
2012 |
Inan A, Kantarcioglu M, Ghinita G, Bertino E. A hybrid approach to private record matching Ieee Transactions On Dependable and Secure Computing. 9: 684-698. DOI: 10.1109/Tdsc.2012.46 |
0.508 |
|
2012 |
Parikh P, Kantarcioglu M, Khadilkar V, Thuraisingham B, Khan L. Secure information integration with a semantic web-based framework Proceedings of the 2012 Ieee 13th International Conference On Information Reuse and Integration, Iri 2012. 659-663. DOI: 10.1109/IRI.2012.6303072 |
0.307 |
|
2012 |
Kuzu M, Islam MS, Kantarcioglu M. Efficient similarity search over encrypted data Proceedings - International Conference On Data Engineering. 1156-1167. DOI: 10.1109/ICDE.2012.23 |
0.425 |
|
2012 |
Oktay KY, Khadilkar V, Hore B, Kantarcioglu M, Mehrotra S, Thuraisingham B. Risk-aware workload distribution in hybrid clouds Proceedings - 2012 Ieee 5th International Conference On Cloud Computing, Cloud 2012. 229-236. DOI: 10.1109/CLOUD.2012.128 |
0.329 |
|
2012 |
Hore B, Mehrotra S, Canim M, Kantarcioglu M. Secure multidimensional range queries over outsourced data Vldb Journal. 21: 333-358. DOI: 10.1007/s00778-011-0245-7 |
0.441 |
|
2012 |
Cadenhead T, Kantarcioglu M, Khadilkar V, Thuraisingham B. Design and implementation of a cloud-based assured information sharing system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7531: 36-50. DOI: 10.1007/978-3-642-33704-8-4 |
0.308 |
|
2012 |
Shastry A, Kantarcioglu M, Zhou Y, Thuraisingham B. Randomizing Smartphone Malware Profiles against Statistical Mining Techniques Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7371: 239-254. DOI: 10.1007/978-3-642-31540-4_18 |
0.34 |
|
2012 |
Nix R, Kantarcioglu M, Han KJ. Approximate privacy-preserving data mining on vertically partitioned data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7371: 129-144. DOI: 10.1007/978-3-642-31540-4_11 |
0.463 |
|
2012 |
Khadilkar V, Kantarcioglu M, Thuraisingham B, Castagna P. Jena-HBase: A distributed, scalable and efficient RDF triple store Ceur Workshop Proceedings. 914: 85-88. |
0.331 |
|
2011 |
El Emam K, Hu J, Mercer J, Peyton L, Kantarcioglu M, Malin B, Buckeridge D, Samet S, Earle C. A secure protocol for protecting the identity of providers when disclosing data for disease surveillance. Journal of the American Medical Informatics Association : Jamia. 18: 212-7. PMID 21486880 DOI: 10.1136/Amiajnl-2011-000100 |
0.415 |
|
2011 |
Nabeel M, Bertino E, Kantarcioglu M, Thuraisingham B. Towards privacy preserving access control in the cloud Coliaboratecom 2011 - Proceedings of the 7th International Conference On Collaborative Computing: Networking, Applications and Worksharing. 172-180. DOI: 10.4108/icst.collaboratecom.2011.247061 |
0.342 |
|
2011 |
Carminati B, Ferrari E, Heatherly R, Kantarcioglu M, Thuraisingham B. Semantic web-based social network access control Computers and Security. 30: 108-115. DOI: 10.1016/J.Cose.2010.08.003 |
0.356 |
|
2011 |
Ghinita G, Kalnis P, Kantarcioglu M, Bertino E. Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection Geoinformatica. 15: 699-726. DOI: 10.1007/S10707-010-0121-4 |
0.4 |
|
2011 |
Kantarcioǧlu M, Xi B, Clifton C. Classifier evaluation and attribute selection against active adversaries Data Mining and Knowledge Discovery. 22: 291-335. DOI: 10.1007/S10618-010-0197-3 |
0.693 |
|
2010 |
Hamlen K, Kantarcioglu M, Khan L, Thuraisingham B. Security issues for cloud computing International Journal of Information Security and Privacy. 4: 36-48. DOI: 10.4018/Jisp.2010040103 |
0.373 |
|
2010 |
Inan A, Kantarcioglu M, Ghinita G, Bertino E. Private record matching using differential privacy Advances in Database Technology - Edbt 2010 - 13th International Conference On Extending Database Technology, Proceedings. 123-134. DOI: 10.1145/1739041.1739059 |
0.35 |
|
2010 |
Ramanujam S, Khadilkar V, Khan L, Kantarcioglu M, Thuraisingham BM, Seida S. Update-Enabled Triplification Of Relational Data Into Virtual Rdf Stores International Journal of Semantic Computing. 4: 423-451. DOI: 10.1142/S1793351X10001073 |
0.449 |
|
2010 |
Kantarcioglu M, Nix R. Incentive compatible distributed data mining Proceedings - Socialcom 2010: 2nd Ieee International Conference On Social Computing, Passat 2010: 2nd Ieee International Conference On Privacy, Security, Risk and Trust. 735-742. DOI: 10.1109/SocialCom.2010.114 |
0.412 |
|
2010 |
Ramanujam S, Khadilkar V, Khan L, Seida S, Kantarcioglu M, Thuraisingham B. Bi-directional translation of relational data into virtual RDF stores Proceedings - 2010 Ieee 4th International Conference On Semantic Computing, Icsc 2010. 268-276. DOI: 10.1109/ICSC.2010.61 |
0.369 |
|
2010 |
Cadenhead T, Kantarcioglu M, Thuraisingham B. Scalable and efficient reasoning for enforcing role-based access control Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6166: 209-224. DOI: 10.1007/978-3-642-13739-6_14 |
0.341 |
|
2010 |
Canim M, Kantarcioglu M, Hore B, Mehrotra S. Building disclosure risk aware query optimizers for relational databases Proceedings of the Vldb Endowment. 3: 13-24. |
0.339 |
|
2010 |
Thuraisingham B, Khadilkar V, Gupta A, Kantarcioglu M, Khan L. Secure data storage and retrieval in the cloud Proceedings of the 6th International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2010. |
0.446 |
|
2010 |
Thuraisingham B, Khan L, Kantarcioglu M. Semantic Web, data mining, and security Ieee Intelligent Systems. 25: 86-88. |
0.401 |
|
2009 |
Celikel E, Kantarcioglu M, Thuraisingham B, Bertino E. A risk management approach to RBAC Risk and Decision Analysis. 1: 21-33. DOI: 10.3233/Rda-2008-0002 |
0.357 |
|
2009 |
Kantarcioglu M, Kardes O. Privacy-preserving data mining in the malicious model International Journal of Information and Computer Security. 2: 353-375. DOI: 10.1504/Ijics.2008.022488 |
0.453 |
|
2009 |
Inan A, Kantarcioglu M, Bertino E. Using anonymized data for classification Proceedings - International Conference On Data Engineering. 429-440. DOI: 10.1109/ICDE.2009.19 |
0.439 |
|
2009 |
Liu L, Kantarcioglu M, Thuraisingham B. Privacy preserving decision tree mining from perturbed data Proceedings of the 42nd Annual Hawaii International Conference On System Sciences, Hicss. DOI: 10.1109/HICSS.2009.353 |
0.451 |
|
2009 |
Kantarcioglu M, Inan A, Jiang W, Malin B. Formal anonymity models for efficient privacy-preserving joins Data and Knowledge Engineering. 68: 1206-1223. DOI: 10.1016/j.datak.2009.06.011 |
0.386 |
|
2009 |
Dai C, Lin D, Kantarcioglu M, Bertino E, Celikel E, Thuraisingham B. Query processing techniques for compliance with data confidence policies Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5776: 49-67. DOI: 10.1007/978-3-642-04219-5_4 |
0.358 |
|
2009 |
Canim M, Kantarcioglu M, Inan A. Query optimization in encrypted relational databases by vertical schema partitioning Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5776: 1-16. DOI: 10.1007/978-3-642-04219-5_1 |
0.353 |
|
2009 |
Bertino E, Dai C, Kantarcioglu M. The challenge of assuring data trustworthiness Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5463: 22-33. DOI: 10.1007/978-3-642-00887-0_2 |
0.383 |
|
2008 |
Clifton C, Iyer A, Cho R, Jiang W, Kantarcioglu M, Vaidya J. An approach to securely identifying beneficial collaboration in decentralized logistics systems Manufacturing and Service Operations Management. 10: 108-125. DOI: 10.1287/Msom.1070.0167 |
0.69 |
|
2008 |
Inan A, Kantarcioglu M, Bertino E, Scannapieco M. A hybrid approach to private record linkage Proceedings - International Conference On Data Engineering. 496-505. DOI: 10.1109/ICDE.2008.4497458 |
0.406 |
|
2008 |
Liu L, Kantarcioglu M, Thuraisingham B. The applicability of the perturbation based privacy preserving data mining for real-world data Data and Knowledge Engineering. 65: 5-21. DOI: 10.1016/j.datak.2007.06.011 |
0.443 |
|
2008 |
Kantarcioglu M, Jiang W, Malin B. A privacy-preserving framework for integrating person-specific databases Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5262: 298-314. DOI: 10.1007/978-3-540-87471-3-25 |
0.433 |
|
2008 |
Dai C, Lin D, Bertino E, Kantarcioglu M. An approach to evaluate data trustworthiness based on data provenance Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5159: 82-98. DOI: 10.1007/978-3-540-85259-9_6 |
0.435 |
|
2007 |
Thuraisingham B, Kantarcioglu M, Iyer S. Extended RBAC-based design and implementation for a secure data warehouse International Journal of Business Intelligence and Data Mining. 2: 367-382. DOI: 10.1504/Ijbidm.2007.016379 |
0.466 |
|
2007 |
Li W, Agrawal D, Candan KS, Akca Y, Kantarcioglu M. Virtual Active Network For Live Streaming Media Delivery Journal of Interconnection Networks. 8: 45-74. DOI: 10.1142/S0219265907001904 |
0.385 |
|
2007 |
Kantarcioglu M, Kardes O. Privacy-preserving data mining applications in the malicious model Proceedings - Ieee International Conference On Data Mining, Icdm. 717-722. DOI: 10.1109/ICDMW.2007.86 |
0.337 |
|
2007 |
Canim M, Kantarcioglu M. Design and analysis of querying encrypted data in relational databases Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4602: 177-194. |
0.386 |
|
2006 |
Agrawal R, Asonov D, Kantarcioglu M, Li Y. Sovereign joins Proceedings - International Conference On Data Engineering. 2006: 26. DOI: 10.1109/ICDE.2006.144 |
0.338 |
|
2006 |
Liu L, Kantarcioglu M, Thuraisingham B. The applicability of the perturbation model-based privacy preserving data mining for real-world data Proceedings - Ieee International Conference On Data Mining, Icdm. 507-512. |
0.419 |
|
2004 |
Kantarcioglu M, Clifton C. Privacy-preserving distributed mining of association rules on horizontally partitioned data Ieee Transactions On Knowledge and Data Engineering. 16: 1026-1037. DOI: 10.1109/Tkde.2004.45 |
0.713 |
|
2002 |
Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu MY. Tools for privacy preserving distributed data mining Sigkdd Explorations. 4: 28-34. DOI: 10.1145/772862.772867 |
0.704 |
|
Show low-probability matches. |