Murat Kantarcıoǧlu
#143,136
Most Influential Person Now
Murat Kantarcıoǧlu's AcademicInfluence.com Rankings
Murat Kantarcıoǧlucomputer-science Degrees
Computer Science
#6998
World Rank
#7371
Historical Rank
Data Mining
#164
World Rank
#164
Historical Rank
Database
#4064
World Rank
#4226
Historical Rank

Download Badge
Computer Science
Murat Kantarcıoǧlu's Degrees
- PhD Computer Science Purdue University
- Masters Computer Science Purdue University
- Bachelors Computer Engineering Middle East Technical University
Similar Degrees You Can Earn
Why Is Murat Kantarcıoǧlu Influential?
(Suggest an Edit or Addition)Murat Kantarcıoǧlu's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Privacy-preserving distributed mining of association rules on horizontally partitioned data (2004) (1121)
- Tools for privacy preserving distributed data mining (2002) (1026)
- Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation (2012) (608)
- Efficient Similarity Search over Encrypted Data (2012) (299)
- Privacy-preserving decision trees over vertically partitioned data (2005) (281)
- Inferring private information using social network data (2009) (256)
- Secure multidimensional range queries over outsourced data (2012) (240)
- Privacy-preserving Naïve Bayes classification (2008) (233)
- Privacy-preserving data integration and sharing (2004) (217)
- Security and Privacy in Cyber-Physical Systems: A Survey of Surveys (2017) (213)
- Defining Privacy for Data Mining (2002) (190)
- A semantic web based framework for social network access control (2009) (189)
- Preventing Private Information Inference Attacks on Social Networks (2013) (181)
- Private record matching using differential privacy (2010) (162)
- An Approach to Evaluate Data Trustworthiness Based on Data Provenance (2008) (161)
- When do data mining results violate privacy? (2004) (156)
- Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data (2003) (150)
- Security Issues for Cloud Computing (2010) (135)
- A Cryptographic Approach to Securely Share and Query Genomic Sequences (2008) (135)
- Semantic web-based social network access control (2011) (134)
- Adversarial support vector machine learning (2012) (120)
- The applicability of the perturbation based privacy preserving data mining for real-world data (2008) (114)
- Using Anonymized Data for Classification (2009) (111)
- Security Issues in Querying Encrypted Data (2005) (110)
- A Hybrid Approach to Private Record Linkage (2008) (107)
- Privately Computing a Distributed k-nn Classifier (2004) (107)
- A Constraint Satisfaction Cryptanalysis of Bloom Filters in Private Record Linkage (2011) (107)
- Using Blockchain and smart contracts for secure data provenance management (2017) (105)
- Jena-HBase: A Distributed, Scalable and Effcient RDF Triple Store (2012) (101)
- A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data (2013) (94)
- Data Intensive Query Processing for Large RDF Graphs Using Cloud Computing Tools (2010) (89)
- Composite Bloom Filters for Secure Record Linkage (2014) (86)
- CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects (2018) (82)
- Privacy Preserving Synthetic Data Release Using Deep Learning (2018) (81)
- Classifier evaluation and attribute selection against active adversaries (2010) (79)
- Sovereign Joins (2006) (77)
- Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage (2012) (76)
- Differentiating Code from Data in x86 Binaries (2011) (76)
- BitcoinHeist: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain (2019) (74)
- SmartProvenance: A Distributed, Blockchain Based DataProvenance System (2018) (68)
- Privacy Preserving Decision Tree Mining from Perturbed Data (2009) (68)
- Towards privacy preserving access control in the cloud (2011) (66)
- SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors (2017) (66)
- A language for provenance access control (2011) (65)
- Secure Management of Biomedical Data With Cryptographic Hardware (2012) (64)
- Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection (2010) (64)
- A secure distributed logistic regression protocol for the detection of rare adverse drug events (2012) (64)
- Transforming Semi-Honest Protocols to Ensure Accountability (2006) (64)
- Forecasting Bitcoin Price with Graph Chainlets (2018) (63)
- Privacy-preserving data mining in the malicious model (2008) (60)
- A practical approach to achieve private medical record linkage in light of public resources (2013) (57)
- Efficient privacy-aware record integration (2013) (57)
- A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks (2012) (55)
- A Survey of Privacy-Preserving Methods Across Horizontally Partitioned Data (2008) (53)
- An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining (2009) (51)
- GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems (2015) (51)
- Inference attack against encrypted range queries on outsourced databases (2014) (49)
- Impact of security risks on cloud computing adoption (2011) (49)
- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model (2010) (47)
- A Hybrid Technique for Private Location-Based Queries with Database Protection (2009) (47)
- Private medical record linkage with approximate matching. (2010) (46)
- An architecture for privacy-preserving mining of client information (2002) (46)
- Secure data storage and retrieval in the cloud (2010) (45)
- A Game Theoretic Framework for Analyzing Re-Identification Risk (2015) (43)
- Vigiles: Fine-Grained Access Control for MapReduce Systems (2014) (43)
- A secure protocol for protecting the identity of providers when disclosing data for disease surveillance (2011) (43)
- Bitcoin Risk Modeling With Blockchain Graphs (2018) (41)
- Adversarial Machine Learning (2018) (41)
- A risk management approach to RBAC (2009) (40)
- Transforming provenance using redaction (2011) (40)
- SecureMA: protecting participant privacy in genetic association meta-analysis (2014) (40)
- Does Explainable Artificial Intelligence Improve Human Decision-Making? (2020) (38)
- Securing Data Analytics on SGX with Randomization (2017) (37)
- A survey of game theoretic approach for adversarial machine learning (2019) (36)
- An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems (2008) (36)
- Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students (2015) (34)
- Blockchain: A Graph Primer (2017) (34)
- Multi-Keyword search over encrypted data with scoring and search pattern obfuscation (2016) (34)
- A Privacy-Preserving Framework for Integrating Person-Specific Databases (2008) (33)
- Expanding Access to Large-Scale Genomic Data While Promoting Privacy: A Game Theoretic Approach. (2017) (33)
- ChainNet: Learning on Blockchain Graphs with Topological Features (2019) (33)
- SEMROD: Secure and Efficient MapReduce Over HybriD Clouds (2015) (31)
- Defending Against Backdoors in Federated Learning with Robust Learning Rate (2020) (31)
- A roadmap for privacy-enhanced secure data provenance (2014) (31)
- BlockFLA: Accountable Federated Learning via Hybrid Blockchain Architecture (2020) (30)
- Preventing Cryptographic Key Leakage in Cloud Virtual Machines (2014) (29)
- Risk-Aware Workload Distribution in Hybrid Clouds (2012) (27)
- A Protocol for the Secure Linking of Registries for HPV Surveillance (2012) (27)
- BigSecret: A Secure Data Management Framework for Key-Value Stores (2013) (26)
- Incentive Compatible Privacy-Preserving Distributed Classification (2012) (26)
- Blockchain Data Analytics (2018) (25)
- Social network classification incorporating link type values (2009) (25)
- Dissecting Ethereum Blockchain Analytics: What We Learn from Topology and Geometry of Ethereum Graph (2019) (24)
- Formal anonymity models for efficient privacy-preserving joins (2009) (24)
- Incentive Compatible Distributed Data Mining (2010) (24)
- Self-Training with Selection-by-Rejection (2012) (23)
- Incentive Compatible Privacy-Preserving Data Analysis (2013) (23)
- A Data Driven Approach for the Science of Cyber Security: Challenges and Directions (2016) (23)
- Assuring privacy when big brother is watching (2003) (23)
- RETRO: A framework for semantics preserving SQL-to-SPARQL translation (2011) (23)
- Policy Enforcement Framework for Cloud Data Management (2012) (23)
- A Hybrid Approach to Private Record Matching (2012) (22)
- Sociotechnical safeguards for genomic data privacy (2022) (22)
- The Challenge of Assuring Data Trustworthiness (2009) (22)
- A Hybrid Blockchain Architecture for Privacy-Enabled and Accountable Auctions (2019) (21)
- Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services (2017) (21)
- Building disclosure risk aware query optimizers for relational databases (2010) (21)
- Modeling Adversarial Learning as Nested Stackelberg Games (2016) (20)
- Efficient tree pattern queries on encrypted XML documents (2013) (20)
- Secure and Efficient Query Processing over Hybrid Clouds (2017) (19)
- Privacy-Preserving Data Mining Applications in the Malicious Model (2007) (19)
- On the role of local blockchain network features in cryptocurrency price formation (2020) (19)
- Incentive and Trust Issues in Assured Information Sharing (2008) (18)
- Silver Lining: Enforcing Secure Information Flow at the Cloud Edge (2014) (18)
- Shingled Graph Disassembly: Finding the Undecideable Path (2014) (18)
- Mining Cyclically Repeated Patterns (2001) (18)
- TrustMR: Computation integrity assurance system for MapReduce (2015) (17)
- Distributed Search over Encrypted Big Data (2015) (17)
- Adversarial Classification Under Differential Privacy (2020) (17)
- A hybrid private record linkage scheme: Separating differentially private synopses from matching records (2015) (17)
- Trailblazing the Artificial Intelligence for Cybersecurity Discipline (2020) (16)
- Privacy-aware dynamic feature selection (2015) (16)
- Detecting anomalies in social network data consumption (2014) (16)
- Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing (2012) (15)
- Trust Evaluation of Data Provenance (2008) (15)
- SOEMPI: A Secure Open Enterprise Master Patient Index Software Toolkit for Private Record Linkage (2014) (15)
- Towards a Privacy-Aware Quantified Self Data Management Framework (2018) (15)
- Adversarial Data Mining: Big Data Meets Cyber Security (2016) (15)
- Design and Analysis of Querying Encrypted Data in Relational Databases (2007) (15)
- Research Challenges at the Intersection of Big Data, Security and Privacy (2019) (15)
- Leveraging blockchain for immutable logging and querying across multiple sites (2020) (15)
- Security vs. privacy: How integrity attacks can be masked by the noise of differential privacy (2017) (14)
- Privacy-preserving distributed data mining on horizontally partitioned data (2004) (14)
- AccountableMR: Toward accountable MapReduce systems (2015) (13)
- Adjudicating Violations in Data Sharing Agreements Using Smart Contracts (2018) (13)
- Decision and Game Theory for Security (2013) (13)
- Query Processing Techniques for Compliance with Data Confidence Policies (2009) (13)
- Practical Differentially Private Modeling of Human Movement Data (2016) (13)
- A game theoretic framework for adversarial learning (2008) (13)
- An Open Source Tool for Game Theoretic Health Data De-Identification (2017) (13)
- Efficient privacy-aware search over encrypted databases (2014) (13)
- Data Security and Privacy (2016) (12)
- Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks (2021) (12)
- A cloud-based RDF policy engine for assured information sharing (2012) (12)
- Towards fine grained RDF access control (2014) (12)
- Adversarial Learning with Bayesian Hierarchical Mixtures of Experts (2014) (12)
- Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap (2020) (12)
- Identity management for cloud computing: developments and directions (2011) (12)
- Secure Data Processing over Hybrid Clouds (2012) (12)
- Secure Data Provenance and Inference Control with Semantic Web (2014) (12)
- A Framework for Policies over Provenance (2011) (12)
- Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning (2009) (12)
- Enforceable Data Sharing Agreements Using Smart Contracts (2018) (11)
- Blockchain analytics for intraday financial risk modeling (2019) (11)
- Securing Big Data in the Age of AI (2019) (11)
- A Dynamic Approach to Detect Anomalous Queries on Relational Databases (2015) (11)
- Modern Privacy-Preserving Record Linkage Techniques: An Overview (2021) (11)
- Honeypot based unauthorized data access detection in MapReduce systems (2015) (11)
- CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud (2016) (11)
- Sparse Bayesian Adversarial Learning Using Relevance Vector Machine Ensembles (2012) (11)
- Breaking Transferability of Adversarial Samples with Randomness (2018) (11)
- A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets (2012) (11)
- Security and privacy trade-offs in CPS by leveraging inherent differential privacy (2017) (11)
- AI for Security and Security for AI (2021) (10)
- On demand synchronization and load distribution for database grid-based Web applications (2004) (10)
- Heat Map (2009) (10)
- The Future of Deception: Machine-Generated and Manipulated Images, Video, and Audio? (2018) (10)
- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing (2014) (9)
- Managing Risks in RBAC Employed Distributed Environments (2007) (9)
- CryptoGuard (2019) (9)
- Blockchain networks: Data structures of Bitcoin, Monero, Zcash, Ethereum, Ripple, and Iota (2021) (9)
- Randomizing Smartphone Malware Profiles against Statistical Mining Techniques (2012) (9)
- Extraction of expanded entity phrases (2011) (9)
- Secure Data Processing in a Hybrid Cloud (2011) (9)
- It’s all in the timing: calibrating temporal penalties for biomedical data sharing (2018) (9)
- Bi-directional Translation of Relational Data into Virtual RDF Stores (2010) (8)
- When Do Firms Invest in Privacy-Preserving Technologies? (2010) (8)
- StormRider: harnessing "storm" for social networks (2012) (8)
- Process-Driven Data Privacy (2015) (8)
- Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data (2012) (8)
- Biomedical Research Cohort Membership Disclosure on Social Media (2019) (7)
- Hybrid Private Record Linkage (2019) (7)
- A Framework for Secure Data Collection and Management for Internet of Things (2016) (7)
- Privacy Issues in Association Rule Mining (2014) (7)
- A Comparison of Approaches for Large-Scale Data Mining Utilizing MapReduce in Large-Scale Data Mining (2010) (7)
- Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers (2018) (7)
- Design and Implementation of a Cloud-Based Assured Information Sharing System (2012) (7)
- Secure information integration with a semantic web-based framework (2012) (7)
- Identification of related information of interest across free text documents (2011) (7)
- A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data (2016) (7)
- Scalable and Efficient Reasoning for Enforcing Role-Based Access Control (2010) (7)
- GOAT: GPU Outsourcing of Deep Learning Training With Asynchronous Probabilistic Integrity Verification Inside Trusted Execution Environment (2020) (7)
- Risk-Aware Data Processing in Hybrid Clouds (2011) (6)
- Cloud-Centric Assured Information Sharing (2012) (6)
- REDACT: a framework for sanitizing RDF data (2013) (6)
- Improving Fairness of AI Systems with Lossless De-biasing (2021) (6)
- Design and implementation of a secure social network system (2009) (6)
- Detecting Discrimination in a Black-Box Classifier (2016) (6)
- Mixture of gaussian models and bayes error under differential privacy (2011) (6)
- Privacy-preserving distributed data mining and processing on horizontally partitioned data (2005) (6)
- Assured Information Sharing Life Cycle (2009) (6)
- Using game theory to thwart multistage privacy intrusions when sharing data (2021) (5)
- Adversarial Anomaly Detection Using Centroid-Based Clustering (2018) (5)
- Integrating Cyber Security and Data Science for Social Media: A Position Paper (2018) (5)
- A game theoretic approach for adversarial pipeline monitoring using Wireless Sensor Networks (2012) (5)
- SecureMA: protecting participant privacy in genetic association (2014) (5)
- Secure Real-Time Heterogeneous IoT Data Management System (2019) (5)
- Improving Accuracy of Federated Learning in Non-IID Settings (2020) (5)
- Optimizing secure classification performance with privacy-aware feature selection (2016) (5)
- Poster: inference attacks against searchable encryption protocols (2011) (5)
- Detecting the Presence of an Individual in Phenotypic Summary Data (2018) (5)
- BiFair: Training Fair Models with Bilevel Optimization (2021) (5)
- CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities (2018) (4)
- Building a Dossier on the Cheap: Integrating Distributed Personal Data Resources Under Cost Constraints (2017) (4)
- Service Bus (2009) (4)
- Secure logical schema and decomposition algorithm for proactive context dependent attribute based inference control (2017) (4)
- Investment in Privacy-Preserving Technologies under Uncertainty (2011) (4)
- Secure IoT Data Analytics in Cloud via Intel SGX (2020) (4)
- Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms (2017) (4)
- A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted Execution Environments (2020) (4)
- Big Data – Security with Privacy Response to RFI for National Privacy Research Strategy (2014) (4)
- GINN: Fast GPU-TEE Based Integrity for Neural Network Training (2022) (4)
- De-identifying Socioeconomic Data at the Census Tract Level for Medical Research Through Constraint-based Clustering (2021) (4)
- Secure Data Provenance (2014) (4)
- RIGORITYJ: Deployment-quality Detection of Java Cryptographic Vulnerabilities (2018) (3)
- Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential Privacy (2017) (3)
- Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies (2012) (3)
- Extending the classification of nodes in social networks (2011) (3)
- Privacy-preserving mining of horizontally partitioned data (2003) (3)
- Towards the Design and Implementation of a Cloud-centric Assured Information Sharing System (2011) (3)
- How to Not Get Caught When You Launder Money on Blockchain? (2020) (3)
- Determining the Impact of Missing Values on Blocking in Record Linkage (2019) (3)
- Adversarial Clustering: A Grid Based Clustering Algorithm Against Active Adversaries (2018) (3)
- Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis (2009) (3)
- Update-Enabled Triplification of Relational Data into Virtual RDF Stores (2010) (3)
- Secure Multiparty Computation Methods (2009) (3)
- 4th International Conference on Decision and Game Theory for Security - Volume 8252 (2013) (3)
- Measuring expertise and bias in cyber security using cognitive and neuroscience approaches (2013) (3)
- MultiModal Deception Detection: Accuracy, Applicability and Generalizability* (2020) (3)
- Exploring the Effect of Randomness on Transferability of Adversarial Samples Against Deep Neural Networks (2023) (3)
- Hacking social network data mining (2017) (3)
- Experiments in Information Sharing (2013) (2)
- WORKSHOP REPORT BIG DATA SECURITY AND PRIVACY Sponsored by the National Science Foundation (2014) (2)
- Human Centered 38 H Human-Computer Interaction Computing (2009) (2)
- BlockFLA (2)
- GraphBoot: Quantifying Uncertainty in Node Feature Learning on Large Networks (2021) (2)
- A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics (2021) (2)
- HOLMES: A Platform for Detecting Malicious Inputs in Secure Collaborative Computation (2021) (2)
- Efficacy of defending deep neural networks against adversarial attacks with randomization (2020) (2)
- Incentive-Compatible Privacy-Preserving Distributed Data Mining (2013) (2)
- Perturbation based privacy preserving data mining techniques for real-world data (2008) (2)
- Minors (2019) (2)
- Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper (2017) (2)
- From Myths to Norms: Demystifying Data Mining Models with Instance-Based Transparency (2017) (2)
- Alphacore: Data Depth based Core Decomposition (2021) (2)
- Robust Transparency Against Model Inversion Attacks (2021) (2)
- Privacy Protection of Personal Data in Social Networks (2010) (2)
- Data Science on Blockchains (2021) (2)
- A trust-score-based access control in assured information sharing systems: An application of financial credit risk score models (2014) (2)
- CheapSMC: A Framework to Minimize SMC Cost in Cloud (2016) (2)
- Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper (2016) (2)
- Efficient Query Verification on Outsourced Data: A Game-Theoretic Approach (2012) (2)
- Semantic Web, Data Mining, and Security (2010) (2)
- SGX-IR: Secure Information Retrieval with Trusted Processors (2020) (2)
- Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI) (2022) (2)
- A privacy preserving protocol for tracking participants in phase I clinical trials (2015) (2)
- Risk Aware Approach to Data Confidentiality in Cloud Computing (2013) (2)
- Studying dynamic equilibrium of cloud computing adoption with application of Mean Field Games (2012) (2)
- Analyzing and Securing Social Networks (2016) (1)
- Semantic Web-Based Social Network Integration (2016) (1)
- Prioritizing Attention over Privacy: Reddit Users are Implicitly Incentivized to Reveal Their Face When Discussing Their Direct-to-Consumer Genetic Test Results (Preprint) (2021) (1)
- Horizontally Partitioned Data (2009) (1)
- Secured data provenance using semantic web technologies (2011) (1)
- BigGate: Access Control Framework for Outsourced Key-Value Stores (2015) (1)
- Geospatial Semantic Web, Definition (2008) (1)
- RDF-X: a language for sanitizing RDF graphs (2014) (1)
- Adversarial Active Learning in the Presence of Weak and Malicious Oracles (2019) (1)
- Tag-based Information Flow Analysis for Document Classification in Provenance (2012) (1)
- Compression for Anti-Adversarial Learning (2011) (1)
- Special issue on secure and privacy-aware data management (2014) (1)
- Smart Vectorizations for Single and Multiparameter Persistence (2021) (1)
- Chartalist: Labeled Graph Datasets for UTXO and Account-based Blockchains (2022) (1)
- A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive Applications (2017) (1)
- Exploiting modern hardware for secure data management (2011) (1)
- Secret-Key Encryption (2009) (1)
- Virtual Active Network for Live Streaming Media Delivery (2007) (1)
- Enforcing Honesty in Assured Information Sharing Within a Distributed System (2007) (1)
- Data Search In Cloud Using The Encrypted Keywords (2017) (1)
- Assured Information Sharing (AIS)Using Private Clouds (2014) (1)
- Secure multidimensional range queries over outsourced data (2011) (1)
- The Inference Problem (2014) (1)
- Deployment-quality and Accessible Solutions for Cryptography Code Development (2020) (1)
- Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development (2019) (1)
- Privacy and Security Challenges in GIS (2008) (1)
- Supporting COVID-19 Disparity Investigations with Dynamically Adjusting Case Reporting Policies (2022) (1)
- Game theory for privacy-preserving sharing of genomic data (2020) (1)
- Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students (2015) (1)
- Design of a temporal geosocial semantic web for military stabilization and reconstruction operations (2009) (1)
- Redaction based RDF access control language (2014) (1)
- Publisher Correction: Sociotechnical safeguards for genomic data privacy (2022) (1)
- Statistical Decision Techniques (2009) (1)
- Automatic sanitization of social network data to prevent inference attacks (2011) (1)
- Simulating bioterrorism through epidemiology approximation (2008) (1)
- Attacklets: Modeling High Dimensionality in Real World Cyberattacks (2018) (1)
- Securing Big Data: New Access Control Challenges and Approaches (2019) (1)
- Access Control and Semantic Web (2014) (1)
- A Distributed Framework for Scalable Search over Encrypted Documents (2014) (1)
- Spatial counts under differential privacy mechanism on changing spatial scales (2018) (1)
- Graph Based Proactive Secure Decomposition Algorithm for Context Dependent Attribute Based Inference Control Problem (2018) (1)
- Being the Developers’ Friend: Our Experience Developing a High-Precision Tool for Secure Coding (2022) (1)
- Secure Cloud Query Processing for Semantic Web-Based Social Media (2016) (0)
- Dynamically Adjusting Case-Reporting Policy to Maximize Privacy and Utility in the Face of a Pandemic (2021) (0)
- SECAUCTEE: Securing Auction Smart Contracts using Trusted Execution Environments (2021) (0)
- Session details: Session 6: System Security (2020) (0)
- Spatial Analysis (2018) (0)
- Access Control and Inference for Social Networks (2016) (0)
- Stream Data Analytics for Multipurpose Social Media Applications (2016) (0)
- Unified Framework for Analyzing and Securing Social Media (2016) (0)
- Publisher Correction: Sociotechnical safeguards for genomic data privacy (2022) (0)
- Social Networking in the Cloud (2016) (0)
- Multi-concept adversarial attacks (2021) (0)
- A Game Theoretic Framework for Adversarial Classification (2017) (0)
- A Hybrid Approach for Privacy-preserving Record Linkage (2014) (0)
- Attacking Machine Learning Models for Social Good (2020) (0)
- Social Media Application Systems (2016) (0)
- How Adversarial Assumptions Influence Re-identification Risk Measures: A COVID-19 Case Study (2022) (0)
- Analysis of heuristic based access pattern obfuscation (2013) (0)
- Functional Dependency (2020) (0)
- Inference and Provenance (2014) (0)
- Enforcement of Laws and Privacy Preferences in Modern Computing Systems (2022) (0)
- Assured information sharing (ais) using the cloud (2013) (0)
- Novel Approaches to Handle the Inference Problem (2014) (0)
- Reduction Algorithms for Persistence Diagrams of Networks: CoralTDA and PrunIT (2022) (0)
- Session details: Security and privacy techniques for social networks (2011) (0)
- The dynamics of costly information sharing, falsifi cation and accuracy (2013) (0)
- A roadmap for privacy-enhanced secure data provenance (2014) (0)
- Secure Social Media Systems (2016) (0)
- The Impact of Data Distribution on Fairness and Robustness in Federated Learning (2021) (0)
- Session details: Software Security (2015) (0)
- Appendix B: Database Management and Security (2014) (0)
- Classification of Social Networks Incorporating Link Types (2016) (0)
- Prioritizing Attention over Privacy: Analysis of Face Image Posting Behavior in Online Direct-to-Consumer Genetic Testing Forum (Preprint) (2021) (0)
- Provenance Data Representation for Inference Control (2014) (0)
- Big Data Analytics and Inference Control (2014) (0)
- Efficient Processing of Large RDF Streams Using Memory Management Algorithms (2010) (0)
- Statistical Disclosure Control (SDC) (2009) (0)
- Special issue on secure and privacy-aware data management (2014) (0)
- Developments and Challenges in Location Mining (2016) (0)
- Implicit Incentives Among Reddit Users to Prioritize Attention Over Privacy and Reveal Their Faces When Discussing Direct-to-Consumer Genetic Test Results: Topic and Attention Analysis (2022) (0)
- Understanding News Queries with Geo-Content Using Twitter (2016) (0)
- Toward a Real-Time Cloud Auditing Paradigm (2013) (0)
- Storage Array (2009) (0)
- Semantic Web-Based Social Network Representation and Analysis (2016) (0)
- Investigation of a differential cryptanalysis inspired approach for Trojan AI detection (2021) (0)
- Secure Social Media Directions (2016) (0)
- CTSC Webinar Series: SMARTDATA Blockchain with Murat Kantarcioglu (2018) (0)
- Integrity Management and Data Provenance for Social Media (2016) (0)
- Welcome Message from the General Chairs (2014) (0)
- Inference Control for Social Media (2016) (0)
- Session details: Privacy (2012) (0)
- Implementing the Inference Controller (2014) (0)
- Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing (2017) (0)
- Multi-Keyword search over encrypted data with scoring and search pattern obfuscation (2015) (0)
- Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations (2009) (0)
- Private Anomaly Detection in Linear Controllers: Garbled Circuits vs. Homomorphic Encryption (2022) (0)
- Design and Implementation of a Semantic Web-Based Inference Controller: A Summary (2015) (0)
- Developing an Educational Infrastructure for Analyzing and Securing Social Media (2016) (0)
- Security for Encrypted Data in Cloud Server Search (2018) (0)
- Dynamically adjusting case reporting policy to maximize privacy and public health utility in the face of a pandemic (2021) (0)
- Information Systems Security (2013) (0)
- Cloud Computing and Semantic Web Technologies (2016) (0)
- Social Network Analytics and Privacy Considerations (2016) (0)
- Session details: Session 2A: ML and Information Leakage (2020) (0)
- Analysis of Cyberactivism : A Case Study of Online Free Tibet Activities (2007) (0)
- Architecture for an Inference Controller (2014) (0)
- Implementation of an Access Control System for Social Networks (2016) (0)
- Data Mining with Algorithmic Transparency (2018) (0)
- Graph Mining for Insider Threat Detection (2011) (0)
- Multilevel Secure Online Social Networks (2016) (0)
- Security and Privacy with Respect to Inference (2014) (0)
- Session details: Privacy preserving techniques (2014) (0)
- Using game theory to mitigate the effects of a bioterrist attack (2008) (0)
- Scalable and Efficient RBAC for Provenance (2014) (0)
- Implementing an Inference Controller for Social Media Data (2016) (0)
- A Scalable Tool for Realistic Health Data Re-identification Risk Assessment (2022) (0)
- Social Network Classification through Data Partitioning (2016) (0)
- A Representativeness-informed Model for Research Record Selection from Electronic Medical Record Systems (2022) (0)
- Techniques and Tools for Social Network Analytics (2016) (0)
- Security and Provenance (2014) (0)
- Attacks on Social Media and Data Analytics Solutions (2016) (0)
- 2015 IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Baltimore, MD, USA, May 27-29, 2015 (2015) (0)
- Preface to the fourth IEEE workshop on privacy aspects of data mining (2013) (0)
- Social Graph Extraction, Integration, and Analysis (2016) (0)
- Cloud-Centric Assured Information Sharing for Social Networks (2016) (0)
- TweetHood: A Social Media Analytics Tool (2016) (0)
- Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services (2017) (0)
- Service Choreography (2009) (0)
- Social Network Integration and Analysis with Privacy Preservation (2016) (0)
- Tweecalization: Location Mining Using Semisupervised Learning (2016) (0)
- On the mitigation of bioterrorism through game theory (2009) (0)
- Extending Classification of Social Networks through Indirect Friendships (2016) (0)
- Sociotechnical safeguards for genomic data privacy (2022) (0)
- Cloud Computing Tools and Frameworks (2014) (0)
- Session details: Applications (2006) (0)
- Efficient incentive compatible secure data sharing (2012) (0)
- 1 Information Operations Across Infospheres (0)
- Recent notable HIPAA breach violation cases as reported by the U.S. Department of Health and Human Services. (2015) (0)
- Risk and Inference Control (2014) (0)
- A game theoretic approach to balance privacy risks and familial benefits (2023) (0)
- Service Item (2020) (0)
- Privacy and Security Aspects of Data Mining Proceedings of a Workshop held in Conjunction with 2005 (2005) (0)
- Number 12 (2017) (0)
- Temporal Geosocial Mobile Semantic Web (2016) (0)
- Social Media and Bioterrorism (2016) (0)
- Tweeque: Identifying Social Cliques for Location Mining (2016) (0)
- BIG DATA SECURITY AND PRIVACY Sponsored by the National Science Foundation September 16-17 , 2014 The University of Texas at Dallas (2015) (0)
- Detecting anomalies in social network data consumption (2014) (0)
- Secure Data Science (2022) (0)
- A Game Theoretic Perspective on Adversarial Machine Learning and Related Cybersecurity Applications (2021) (0)
- Our Approach to Studying Privacy in Social Networks (2016) (0)
- Access Control for Social Networks (2016) (0)
- A Risk Management Framework for Health Care Data Anonymization (2010) (0)
- Chapter 3 Defining Privacy for Data Mining (0)
- Session details: Distributed processing and access control (2011) (0)
- Inference Controller Design (2014) (0)
- Social Media Integration and Analytics Systems (2016) (0)
- Adversarial Data Mining : A Game Theoretic Approach 1 CLASSIFICATION (2014) (0)
- IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception (2023) (0)
- A Cloud-Based Policy Manager for Assured Information Sharing (2014) (0)
- Fair Machine Learning under Limited Demographically Labeled Data (2021) (0)
- Social Networks: A Survey (2016) (0)
- Modeling Implementation of TBDSA-Token based Data Security Algorithm in Cloud Computing (2020) (0)
- SecureDL: Securing Code Execution and Access Control for Distributed Data Analytics Platforms (2021) (0)
- Inference Control through Query Modification (2014) (0)
- Aspects of Analyzing and Securing Social Networks (2016) (0)
- Secure Cloud Query Processing with Relational Data for Social Media (2016) (0)
- Appendix C: A Perspective of the Inference Problem (2014) (0)
- Appendix A: Data Management Systems, Developments, and Trends (2014) (0)
- Confidentiality, Privacy, and Trust for Social Media Data (2016) (0)
- Transactional data analysis and visualization lab (2004) (0)
- Learning Generative Deception Strategies in Combinatorial Masking Games (2021) (0)
- Message from the SocialSec 2016 program chairs (2017) (0)
- Queries with Regular Path Expressions (2014) (0)
- Sanitization of Social Network Data for Release to Semitrusted Third Parties (2016) (0)
- Experimental Cloud Query Processing System for Social Networks (2016) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Murat Kantarcıoǧlu?
Murat Kantarcıoǧlu is affiliated with the following schools: