Erman Ayday

Orcid: 0000-0003-3383-1081

Affiliations:
  • Case Western Reserve University, Cleveland, OH, USA
  • Bilkent University, Ankara, Turkey


According to our database1, Erman Ayday authored at least 109 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Robust Fingerprint of Privacy-Preserving Location Trajectories.
Proc. Priv. Enhancing Technol., October, 2023

Privacy-preserving federated genome-wide association studies via dynamic sampling.
Bioinform., October, 2023

A Privacy-Preserving Framework for Conducting Genome-Wide Association Studies Over Outsourced Patient Data.
IEEE Trans. Dependable Secur. Comput., 2023

Towards Robust Fingerprinting of Relational Databases by Mitigating Correlation Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

Protecting Sensitive Data through Federated Co-Training.
CoRR, 2023

AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks against Decision Tree Models.
CoRR, 2023

Privacy preserving identification of population stratification for collaborative genomic research.
Bioinform., 2023

Ensuring Trust in Genomics Research.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Privacy-Preserving Database Fingerprinting.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Probabilistic Fingerprinting Scheme for Correlated Data.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

2022
Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies.
Proc. Priv. Enhancing Technol., 2022

zkFaith: Soonami's Zero-Knowledge Identity Protocol.
CoRR, 2022

Differentially Private Genomic Data Release For GWAS Reproducibility.
CoRR, 2022

Differentially Private Fingerprinting for Location Trajectories.
CoRR, 2022

Robust Fingerprinting of Genomic Databases.
CoRR, 2022

ShareTrace: Contact Tracing with Asynchronous, Parallel Message Passing on a Temporal Graph.
CoRR, 2022

Back-Propagating System Dependency Impact for Attack Investigation.
Proceedings of the 31st USENIX Security Symposium, 2022

ShareTrace: Contact Tracing with the Actor Model.
Proceedings of the IEEE International Conference on E-health Networking, 2022

Privacy-Preserving Link Prediction.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

Genomic Data Sharing under Dependent Local Differential Privacy.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

How to Achieve Privacy in Large Diverse Health Systems.
Proceedings of the AMIA 2022, 2022

Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring Privacy.
Proceedings of the AMIA 2022, 2022

2021
A Privacy-Preserving Framework for Outsourcing Location-Based Services to the Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

Differentially Private Binary- and Matrix-Valued Data Query: An XOR Mechanism.
Proc. VLDB Endow., 2021

Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons.
Proc. Priv. Enhancing Technol., 2021

GenShare: Sharing Accurate Differentially-Private Statistics for Genomic Datasets with Dependent Tuples.
CoRR, 2021

Differentially-Private Fingerprinting of Relational Databases.
CoRR, 2021

Privacy-Preserving Identification of Target Patients from Outsourced Patient Data.
CoRR, 2021

Near-Optimal Privacy-Utility Tradeoff in Genomic Studies Using Selective SNP Hiding.
CoRR, 2021

Privacy-preserving and robust watermarking on sequential genome data using belief propagation and local differential privacy.
Bioinform., 2021

The Curse of Correlations for Robust Fingerprinting of Relational Databases.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Entering Watch Dogs<sup>*</sup>: Evaluating Privacy Risks Against Large-Scale Facial Search and Data Collection.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

ShareTrace: an iterative message passing algorithm for efficient and effective disease risk assessment on an interaction graph.
Proceedings of the BCB '21: 12th ACM International Conference on Bioinformatics, 2021

Real-time privacy risk quantification in online social networks.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

2020
Key protected classification for collaborative learning.
Pattern Recognit., 2020

Efficient Quantification of Profile Matching Risk in Social Networks.
CoRR, 2020

Tracking and Controlling the Spread of a Virus in a Privacy-Preserving Way.
CoRR, 2020

Collusion-Resilient Probabilistic Fingerprinting Scheme for Correlated Data.
CoRR, 2020

Inference attacks against differentially private query results from genomic datasets including dependent tuples.
Bioinform., 2020

Differential privacy under dependent tuples - the case of genomic privacy.
Bioinform., 2020

Preserving Genomic Privacy via Selective Sharing.
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020

Profile Matching Across Online Social Networks.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Efficient Quantification of Profile Matching Risk in Social Networks Using Belief Propagation.
Proceedings of the Computer Security - ESORICS 2020, 2020

Tracking the Invisible: Privacy-Preserving Contact Tracing to Control the Spread of a Virus.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

2019
Privacy-Preserving Aggregate Queries for Optimal Location Selection.
IEEE Trans. Dependable Secur. Comput., 2019

GenoPri'17: International Workshop on Genome Privacy and Security.
IEEE ACM Trans. Comput. Biol. Bioinform., 2019

Re-identification of individuals in genomic data-sharing beacons via allele inference.
Bioinform., 2019

Dynamic attribute-based privacy-preserving genomic susceptibility testing.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Robust Optimization-Based Watermarking Scheme for Sequential Data.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Session Introduction.
Proceedings of the Biocomputing 2019: Proceedings of the Pacific Symposium, 2019

One-Time Programs Made Practical.
Proceedings of the Financial Cryptography and Data Security, 2019

2018
An Inference Attack on Genomic Data Using Kinship, Complex Correlations, and Phenotype Information.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018

GenoPri'16: International Workshop on Genome Privacy and Security.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018

A utility maximizing and privacy preserving approach for protecting kinship in genomic databases.
Bioinform., 2018

A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

2017
Quantifying Interdependent Risks in Genomic Privacy.
ACM Trans. Priv. Secur., 2017

A survey on information security threats and solutions for Machine to Machine (M2M) communications.
J. Parallel Distributed Comput., 2017

Inference Attacks against Kin Genomic Privacy.
IEEE Secur. Priv., 2017

Profile Matching Across Unstructured Online Social Networks: Threats and Countermeasures.
CoRR, 2017

Collusion-Secure Watermarking for Sequential Data.
CoRR, 2017

Privacy-preserving fog computing paradigm.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data.
IACR Cryptol. ePrint Arch., 2016

Privacy-Related Consequences of Turkish Citizen Database Leak.
CoRR, 2016

A Privacy-Preserving Solution for the Bipartite Ranking Problem.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

Cryptographic Solutions for Genomic Privacy.
Proceedings of the Financial Cryptography and Data Security, 2016

Privacy and Security in the Genomic Era.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
De-anonymizing Genomic Databases Using Phenotypic Traits.
Proc. Priv. Enhancing Technol., 2015

Privacy in the Genomic Era.
ACM Comput. Surv., 2015

Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?
Computer, 2015

Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

GenoGuard: Protecting Genomic Data against Brute-Force Attacks.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Privacy Threats and Practical Solutions for Genetic Risk Tests.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

On Non-cooperative Genomic Privacy.
Proceedings of the Financial Cryptography and Data Security, 2015

Can you Really Anonymize the Donors of Genomic Data in Today's Digital World?
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Threats and Solutions for Genomic Data Privacy.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
On genomics, kin, and privacy.
F1000Research, 2014

Privacy and Security in the Genomic Era.
CoRR, 2014

Reconciling Utility with Privacy in Genomics.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Controlled Functional Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
The Chills and Thrills of Whole Genome Sequencing.
CoRR, 2013

Protecting and evaluating genomic privacy in medical tests and personalized medicine.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Privacy-Preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013

Privacy-Enhancing Technologies for Medical Tests Using Genomic Data.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Iterative similarity inference via message passing in factor graphs for Collaborative Filtering.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

Personal use of the genomic data: Privacy vs. storage cost.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Privacy-Preserving Processing of Raw Genomic Data.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Addressing the concerns of the lacks family: quantification of kin genomic privacy.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Data authenticity and availability in multihop wireless sensor networks.
ACM Trans. Sens. Networks, 2012

An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks.
IEEE Trans. Mob. Comput., 2012

Iterative Trust and Reputation Management Using Belief Propagation.
IEEE Trans. Dependable Secur. Comput., 2012

A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks.
Ad Hoc Networks, 2012

BP-P2P: Belief propagation-based trust and reputation management for P2P networks.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

BPRS: Belief Propagation based iterative recommender system.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

A recommender system based on Belief Propagation over Pairwise Markov Random Fields.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Iterative algorithms for trust and reputation management and recommender systems ()
PhD thesis, 2011

Application of belief propagation to trust and reputation management.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Robust Reputation Management Using Probabilistic Message Passing.
Proceedings of the Global Communications Conference, 2011

Secure, intuitive and low-cost device authentication for Smart Grid networks.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks.
Ad Hoc Networks, 2010

A belief propagation based recommender system for online services.
Proceedings of the 2010 ACM Conference on Recommender Systems, 2010

2009
An iterative algorithm for trust and reputation management.
Proceedings of the IEEE International Symposium on Information Theory, 2009

2008
AuCRB: An Efficient Mechanism to Provide Availability, Reliability and Authentication for Multihop Broadcasting in Wireless Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Using node accountability in credential based routing for mobile ad-hoc networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

2007
Efficient Broadcast Authentication for Wireless Sensor Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

MKPS: a multivariate polynomial scheme for symmetric key-establishment in distributed sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

Location-Aware Security Services for Wireless Sensor Networks Using Network Coding.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Security Services in Wireless Sensor Networks Using Sparse Random Coding.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006


  Loading...