default search action
Erman Ayday
Person information
- affiliation: Case Western Reserve University, Cleveland, OH, USA
- affiliation: Bilkent University, Ankara, Turkey
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Tianxi Ji, Erman Ayday, Emre Yilmaz, Pan Li:
Privacy-Preserving Fingerprinting Against Collusion and Correlation Threats in Genomic Data. Proc. Priv. Enhancing Technol. 2024(3): 659-673 (2024) - [j33]Abdullah Çaglar Öksüz, Anisa Halimi, Erman Ayday:
AUTOLYCUS: Exploiting Explainable Artificial Intelligence (XAI) for Model Extraction Attacks against Interpretable Models. Proc. Priv. Enhancing Technol. 2024(4): 684-699 (2024) - [c56]Lynette Hammond Gerido, Erman Ayday:
An Ethical Approach to Genomic Privacy Preserving Technology Development. ICHI 2024: 638-641 - [i38]Alexander Nemecek, Yuzhou Jiang, Erman Ayday:
Topic-based Watermarks for LLM-Generated Text. CoRR abs/2404.02138 (2024) - [i37]Maryam Ghasemian, Erman Ayday:
Privacy-Preserving Optimal Parameter Selection for Collaborative Clustering. CoRR abs/2406.05545 (2024) - [i36]Zahra Rahmani, Nahal Shahini, Nadav Gat, Zebin Yun, Yuzhou Jiang, Ofir Farchy, Yaniv Harel, Vipin Chaudhary, Mahmood Sharif, Erman Ayday:
Privacy-Preserving Collaborative Genomic Research: A Real-Life Deployment and Vision. CoRR abs/2407.09004 (2024) - [i35]Osama Zafar, Rosemarie Santa González, Gabriel Wilkins, Alfonso Morales, Erman Ayday:
Privacy-Preserving Data Linkage Across Private and Public Datasets for Collaborative Agriculture Research. CoRR abs/2409.06069 (2024) - 2023
- [j32]Xinyue Wang, Leonard Dervishi, Wen Tao Li, Erman Ayday, Xiaoqian Jiang, Jaideep Vaidya:
Privacy-preserving federated genome-wide association studies via dynamic sampling. Bioinform. 39(10) (2023) - [j31]Leonard Dervishi, Wenbiao Li, Anisa Halimi, Xiaoqian Jiang, Jaideep Vaidya, Erman Ayday:
Privacy preserving identification of population stratification for collaborative genomic research. Bioinform. 39(Supplement-1): 168-176 (2023) - [j30]Yuzhou Jiang, Emre Yilmaz, Erman Ayday:
Robust Fingerprint of Privacy-Preserving Location Trajectories. Proc. Priv. Enhancing Technol. 2023(4): 5-20 (2023) - [j29]Xiaojie Zhu, Erman Ayday, Roman Vitenberg:
A Privacy-Preserving Framework for Conducting Genome-Wide Association Studies Over Outsourced Patient Data. IEEE Trans. Dependable Secur. Comput. 20(3): 2390-2405 (2023) - [j28]Tianxi Ji, Erman Ayday, Emre Yilmaz, Pan Li:
Towards Robust Fingerprinting of Relational Databases by Mitigating Correlation Attacks. IEEE Trans. Dependable Secur. Comput. 20(4): 2939-2953 (2023) - [c55]Emre Yilmaz, Erman Ayday:
Probabilistic Fingerprinting Scheme for Correlated Data. DBSec 2023: 69-90 - [c54]Tianxi Ji, Erman Ayday, Emre Yilmaz, Ming Li, Pan Li:
Privacy-Preserving Database Fingerprinting. NDSS 2023 - [c53]Erman Ayday, Jaideep Vaidya, Xiaoqian Jiang, Amalio Telenti:
Ensuring Trust in Genomics Research. TPS-ISA 2023: 1-12 - [i34]Abdullah Çaglar Öksüz, Anisa Halimi, Erman Ayday:
AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks against Decision Tree Models. CoRR abs/2302.02162 (2023) - [i33]Amr Abourayya, Jens Kleesiek, Kanishka Rao, Erman Ayday, Bharat Rao, Geoffrey I. Webb, Michael Kamp:
Protecting Sensitive Data through Federated Co-Training. CoRR abs/2310.05696 (2023) - 2022
- [j27]Anisa Halimi, Leonard Dervishi, Erman Ayday, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux, Xiaoqian Jiang, Jaideep Vaidya:
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies. Proc. Priv. Enhancing Technol. 2022(3): 732-753 (2022) - [j26]Xiaojie Zhu, Erman Ayday, Roman Vitenberg, Narasimha Raghavan Veeraragavan:
Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud. IEEE Trans. Dependable Secur. Comput. 19(4): 2771-2788 (2022) - [c52]Leonard Dervishi, Xinyue Wang, Wentao Li, Anisa Halimi, Jaideep Vaidya, Xiaoqian Jiang, Erman Ayday:
Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring Privacy. AMIA 2022 - [c51]Gamze Gürsoy, Bradley A. Malin, Erman Ayday, Ellen Wright Clayton:
How to Achieve Privacy in Large Diverse Health Systems. AMIA 2022 - [c50]Emre Yilmaz, Tianxi Ji, Erman Ayday, Pan Li:
Genomic Data Sharing under Dependent Local Differential Privacy. CODASPY 2022: 77-88 - [c49]Didem Demirag, Mina Namazi, Erman Ayday, Jeremy Clark:
Privacy-Preserving Link Prediction. DPM/CBT@ESORICS 2022: 35-50 - [c48]Ryan Tatton, Erman Ayday, Youngjin Yoo, Anisa Halimi:
ShareTrace: Contact Tracing with the Actor Model. HealthCom 2022: 13-18 - [c47]Pengcheng Fang, Peng Gao, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang (Fanny) Ye, Zhuotao Liu, Xusheng Xiao:
Back-Propagating System Dependency Impact for Attack Investigation. USENIX Security Symposium 2022: 2461-2478 - [i32]Leonard Dervishi, Xinyue Wang, Wentao Li, Anisa Halimi, Jaideep Vaidya, Xiaoqian Jiang, Erman Ayday:
Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring Privacy. CoRR abs/2203.05664 (2022) - [i31]Ryan Tatton, Erman Ayday, Youngjin Yoo, Anisa Halimi:
ShareTrace: Contact Tracing with Asynchronous, Parallel Message Passing on a Temporal Graph. CoRR abs/2203.12445 (2022) - [i30]Tianxi Ji, Erman Ayday, Emre Yilmaz, Pan Li:
Robust Fingerprinting of Genomic Databases. CoRR abs/2204.01801 (2022) - [i29]Yuzhou Jiang, Emre Yilmaz, Erman Ayday:
Differentially Private Fingerprinting for Location Trajectories. CoRR abs/2204.04792 (2022) - [i28]Yuzhou Jiang, Tianxi Ji, Erman Ayday:
Differentially Private Genomic Data Release For GWAS Reproducibility. CoRR abs/2209.06327 (2022) - [i27]Didem Demirag, Mina Namazi, Erman Ayday, Jeremy Clark:
Privacy-Preserving Link Prediction. CoRR abs/2210.01297 (2022) - [i26]Mina Namazi, Duncan Ross, Xiaojie Zhu, Erman Ayday:
zkFaith: Soonami's Zero-Knowledge Identity Protocol. CoRR abs/2212.12785 (2022) - 2021
- [j25]Abdullah Çaglar Öksüz, Erman Ayday, Ugur Güdükbay:
Privacy-preserving and robust watermarking on sequential genome data using belief propagation and local differential privacy. Bioinform. 37(17): 2668-2674 (2021) - [j24]Kerem Ayoz, Erman Ayday, A. Ercüment Çiçek:
Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons. Proc. Priv. Enhancing Technol. 2021(3): 28-48 (2021) - [j23]Tianxi Ji, Pan Li, Emre Yilmaz, Erman Ayday, Yanfang Ye, Jinyuan Sun:
Differentially Private Binary- and Matrix-Valued Data Query: An XOR Mechanism. Proc. VLDB Endow. 14(5): 849-862 (2021) - [j22]Xiaojie Zhu, Erman Ayday, Roman Vitenberg:
A Privacy-Preserving Framework for Outsourcing Location-Based Services to the Cloud. IEEE Trans. Dependable Secur. Comput. 18(1): 384-399 (2021) - [c46]Anisa Halimi, Erman Ayday:
Real-time privacy risk quantification in online social networks. ASONAM 2021: 74-81 - [c45]Erman Ayday, Youngjin Yoo, Anisa Halimi:
ShareTrace: an iterative message passing algorithm for efficient and effective disease risk assessment on an interaction graph. BCB 2021: 39:1-39:6 - [c44]Bahadir Durmaz, Erman Ayday:
Entering Watch Dogs*: Evaluating Privacy Risks Against Large-Scale Facial Search and Data Collection. INFOCOM Workshops 2021: 1-6 - [c43]Tianxi Ji, Emre Yilmaz, Erman Ayday, Pan Li:
The Curse of Correlations for Robust Fingerprinting of Relational Databases. RAID 2021: 412-427 - [i25]Anisa Halimi, Leonard Dervishi, Erman Ayday, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux, Xiaoqian Jiang, Jaideep Vaidya:
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies. CoRR abs/2101.08879 (2021) - [i24]Emre Yilmaz, Tianxi Ji, Erman Ayday, Pan Li:
Genomic Data Sharing under Dependent Local Differential Privacy. CoRR abs/2102.07357 (2021) - [i23]Tianxi Ji, Emre Yilmaz, Erman Ayday, Pan Li:
The Curse of Correlations for Robust Fingerprinting of Relational Databases. CoRR abs/2103.06438 (2021) - [i22]Nour Almadhoun Alserr, Gulce Kale, Onur Mutlu, Öznur Tastan, Erman Ayday:
Near-Optimal Privacy-Utility Tradeoff in Genomic Studies Using Selective SNP Hiding. CoRR abs/2106.05211 (2021) - [i21]Xiaojie Zhu, Erman Ayday, Roman Vitenberg:
Privacy-Preserving Identification of Target Patients from Outsourced Patient Data. CoRR abs/2108.06505 (2021) - [i20]Tianxi Ji, Erman Ayday, Emre Yilmaz, Pan Li:
Differentially-Private Fingerprinting of Relational Databases. CoRR abs/2109.02768 (2021) - [i19]Nour Almadhoun Alserr, Özgür Ulusoy, Erman Ayday, Onur Mutlu:
GenShare: Sharing Accurate Differentially-Private Statistics for Genomic Datasets with Dependent Tuples. CoRR abs/2112.15109 (2021) - 2020
- [j21]Nour Almadhoun, Erman Ayday, Özgür Ulusoy:
Differential privacy under dependent tuples - the case of genomic privacy. Bioinform. 36(6): 1696-1703 (2020) - [j20]Nour Almadhoun, Erman Ayday, Özgür Ulusoy:
Inference attacks against differentially private query results from genomic datasets including dependent tuples. Bioinform. 36(Supplement-1): i136-i145 (2020) - [j19]Mert Bülent Sariyildiz, Ramazan Gokberk Cinbis, Erman Ayday:
Key protected classification for collaborative learning. Pattern Recognit. 104: 107327 (2020) - [c42]Anisa Halimi, Erman Ayday:
Efficient Quantification of Profile Matching Risk in Social Networks Using Belief Propagation. ESORICS (1) 2020: 110-130 - [c41]Didem Demirag, Erman Ayday:
Tracking the Invisible: Privacy-Preserving Contact Tracing to Control the Spread of a Virus. DPM/CBT@ESORICS 2020: 240-249 - [c40]Anisa Halimi, Erman Ayday:
Profile Matching Across Online Social Networks. ICICS 2020: 54-70 - [c39]Emre Yilmaz, Erman Ayday, Tianxi Ji, Pan Li:
Preserving Genomic Privacy via Selective Sharing. WPES@CCS 2020: 163-179 - [i18]Kerem Ayoz, Erman Ayday, A. Ercüment Çiçek:
Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons. CoRR abs/2001.08852 (2020) - [i17]Emre Yilmaz, Erman Ayday:
Collusion-Resilient Probabilistic Fingerprinting Scheme for Correlated Data. CoRR abs/2001.09555 (2020) - [i16]Didem Demirag, Erman Ayday:
Tracking and Controlling the Spread of a Virus in a Privacy-Preserving Way. CoRR abs/2003.13073 (2020) - [i15]Anisa Halimi, Erman Ayday:
Profile Matching Across Online Social Networks. CoRR abs/2008.09608 (2020) - [i14]Anisa Halimi, Erman Ayday:
Efficient Quantification of Profile Matching Risk in Social Networks. CoRR abs/2009.03698 (2020)
2010 – 2019
- 2019
- [j18]Nora von Thenen, Erman Ayday, A. Ercüment Çiçek:
Re-identification of individuals in genomic data-sharing beacons via allele inference. Bioinform. 35(3): 365-371 (2019) - [j17]Erman Ayday, Muhammad Naveed, Haixu Tang:
GenoPri'17: International Workshop on Genome Privacy and Security. IEEE ACM Trans. Comput. Biol. Bioinform. 16(4): 1322-1323 (2019) - [j16]Erman Ayday, Qiang Tang, Arif Yilmaz:
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data. IEEE Trans. Dependable Secur. Comput. 16(1): 33-43 (2019) - [j15]Emre Yilmaz, Hakan Ferhatosmanoglu, Erman Ayday, Remzi Can Aksoy:
Privacy-Preserving Aggregate Queries for Optimal Location Selection. IEEE Trans. Dependable Secur. Comput. 16(2): 329-343 (2019) - [c38]Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark:
One-Time Programs Made Practical. Financial Cryptography 2019: 646-666 - [c37]Gamze Gürsoy, Arif Ozgun Harmanci, Haixu Tang, Erman Ayday, Steven E. Brenner:
Session Introduction. PSB 2019: 386-390 - [c36]Erman Ayday, Emre Yilmaz, Arif Yilmaz:
Robust Optimization-Based Watermarking Scheme for Sequential Data. RAID 2019: 323-336 - [c35]Mina Namazi, Cihan Eryonucu, Erman Ayday, Fernando Pérez-González:
Dynamic attribute-based privacy-preserving genomic susceptibility testing. SAC 2019: 1467-1474 - [i13]Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark:
One-Time Programs made Practical. CoRR abs/1907.00935 (2019) - [i12]Mert Bülent Sariyildiz, Ramazan Gökberk Cinbis, Erman Ayday:
Key Protected Classification for Collaborative Learning. CoRR abs/1908.10172 (2019) - [i11]Xiaojie Zhu, Erman Ayday, Roman Vitenberg, Narasimha Raghavan Veeraragavan:
Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud. CoRR abs/1912.02045 (2019) - 2018
- [j14]Gulce Kale, Erman Ayday, Öznur Tastan:
A utility maximizing and privacy preserving approach for protecting kinship in genomic databases. Bioinform. 34(2): 181-189 (2018) - [j13]Iman Deznabi, Mohammad Mobayen, Nazanin Jafari, Öznur Tastan, Erman Ayday:
An Inference Attack on Genomic Data Using Kinship, Complex Correlations, and Phenotype Information. IEEE ACM Trans. Comput. Biol. Bioinform. 15(4): 1333-1343 (2018) - [j12]Erman Ayday, Xiaoqian Jiang, Bradley A. Malin:
GenoPri'16: International Workshop on Genome Privacy and Security. IEEE ACM Trans. Comput. Biol. Bioinform. 15(5): 1403-1404 (2018) - [c34]Cihan Eryonucu, Erman Ayday, Engin Zeydan:
A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection. WOWMOM 2018: 1-3 - [i10]Emre Yilmaz, Hakan Ferhatosmanoglu, Erman Ayday, Remzi Can Aksoy:
Privacy-Preserving Aggregate Queries for Optimal Location Selection. CoRR abs/1801.02069 (2018) - 2017
- [j11]Erman Ayday, Mathias Humbert:
Inference Attacks against Kin Genomic Privacy. IEEE Secur. Priv. 15(5): 29-37 (2017) - [j10]Gurkan Tuna, Dimitrios G. Kogias, Vehbi Cagri Gungor, Cengiz Gezer, Erhan Taskin, Erman Ayday:
A survey on information security threats and solutions for Machine to Machine (M2M) communications. J. Parallel Distributed Comput. 109: 142-154 (2017) - [j9]Mathias Humbert, Erman Ayday, Jean-Pierre Hubaux, Amalio Telenti:
Quantifying Interdependent Risks in Genomic Privacy. ACM Trans. Priv. Secur. 20(1): 3:1-3:31 (2017) - [c33]Nabil Abubaker, Leonard Dervishi, Erman Ayday:
Privacy-preserving fog computing paradigm. CNS 2017: 502-509 - [i9]Arif Yilmaz, Erman Ayday:
Collusion-Secure Watermarking for Sequential Data. CoRR abs/1708.01023 (2017) - [i8]Anisa Halimi, Erman Ayday:
Profile Matching Across Unstructured Online Social Networks: Threats and Countermeasures. CoRR abs/1711.01815 (2017) - 2016
- [c32]Erman Ayday, Jean-Pierre Hubaux:
Privacy and Security in the Genomic Era. CCS 2016: 1863-1865 - [c31]Erman Ayday:
Cryptographic Solutions for Genomic Privacy. Financial Cryptography Workshops 2016: 328-341 - [c30]Noushin Salek Faramarzi, Erman Ayday, H. Altay Güvenir:
A Privacy-Preserving Solution for the Bipartite Ranking Problem. ICMLA 2016: 375-380 - [i7]Erin Avllazagaj, Erman Ayday, A. Ercüment Çiçek:
Privacy-Related Consequences of Turkish Citizen Database Leak. CoRR abs/1605.05847 (2016) - [i6]Erman Ayday, Qiang Tang, Arif Yilmaz:
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data. IACR Cryptol. ePrint Arch. 2016: 478 (2016) - 2015
- [j8]Erman Ayday, Emiliano De Cristofaro, Jean-Pierre Hubaux, Gene Tsudik:
Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare? Computer 48(2): 58-66 (2015) - [j7]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. ACM Comput. Surv. 48(1): 6:1-6:44 (2015) - [j6]Mathias Humbert, Kévin Huguenin, Joachim Hugonot, Erman Ayday, Jean-Pierre Hubaux:
De-anonymizing Genomic Databases Using Phenotypic Traits. Proc. Priv. Enhancing Technol. 2015(2): 99-114 (2015) - [c29]Florian Tramèr, Zhicong Huang, Jean-Pierre Hubaux, Erman Ayday:
Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies. CCS 2015: 1286-1297 - [c28]Mohammed Alser, Nour Almadhoun, Azita Nouri, Can Alkan, Erman Ayday:
Can you Really Anonymize the Donors of Genomic Data in Today's Digital World? DPM/QASA@ESORICS 2015: 237-244 - [c27]Mathias Humbert, Erman Ayday, Jean-Pierre Hubaux, Amalio Telenti:
On Non-cooperative Genomic Privacy. Financial Cryptography 2015: 407-426 - [c26]Ludovic Barman, Mohammed Taha Elgraini, Jean Louis Raisaro, Jean-Pierre Hubaux, Erman Ayday:
Privacy Threats and Practical Solutions for Genetic Risk Tests. IEEE Symposium on Security and Privacy Workshops 2015: 27-31 - [c25]Sahel Shariati Samani, Zhicong Huang, Erman Ayday, Mark J. Elliot, Jacques Fellay, Jean-Pierre Hubaux, Zoltán Kutalik:
Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations. IEEE Symposium on Security and Privacy Workshops 2015: 32-40 - [c24]Zhicong Huang, Erman Ayday, Jacques Fellay, Jean-Pierre Hubaux, Ari Juels:
GenoGuard: Protecting Genomic Data against Brute-Force Attacks. IEEE Symposium on Security and Privacy 2015: 447-462 - [p1]Erman Ayday, Jean-Pierre Hubaux:
Threats and Solutions for Genomic Data Privacy. Medical Data Privacy Handbook 2015: 463-492 - [i5]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. IACR Cryptol. ePrint Arch. 2015: 563 (2015) - 2014
- [c23]Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter:
Controlled Functional Encryption. CCS 2014: 1280-1291 - [c22]Mathias Humbert, Erman Ayday, Jean-Pierre Hubaux, Amalio Telenti:
Reconciling Utility with Privacy in Genomics. WPES 2014: 11-20 - [i4]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy and Security in the Genomic Era. CoRR abs/1405.1891 (2014) - [i3]Amalio Telenti, Erman Ayday, Jean-Pierre Hubaux:
On genomics, kin, and privacy. F1000Research 3: 80 (2014) - 2013
- [c21]Mathias Humbert, Erman Ayday, Jean-Pierre Hubaux, Amalio Telenti:
Addressing the concerns of the lacks family: quantification of kin genomic privacy. CCS 2013: 1141-1152 - [c20]Erman Ayday, Jean Louis Raisaro, Urs Hengartner, Adam Molyneaux, Jean-Pierre Hubaux:
Privacy-Preserving Processing of Raw Genomic Data. DPM/SETOP 2013: 133-147 - [c19]Erman Ayday, Jean Louis Raisaro, Jean-Pierre Hubaux:
Personal use of the genomic data: Privacy vs. storage cost. GLOBECOM 2013: 2723-2729 - [c18]Jun Zou, Arash Einolghozati, Erman Ayday, Faramarz Fekri:
Iterative similarity inference via message passing in factor graphs for Collaborative Filtering. ITW 2013: 1-5 - [c17]Erman Ayday, Jean Louis Raisaro, Jean-Pierre Hubaux:
Privacy-Enhancing Technologies for Medical Tests Using Genomic Data. NDSS 2013 - [c16]Erman Ayday, Jean Louis Raisaro, Paul J. McLaren, Jacques Fellay, Jean-Pierre Hubaux:
Privacy-Preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data. HealthTech 2013 - [c15]Erman Ayday, Jean Louis Raisaro, Jean-Pierre Hubaux, Jacques Rougemont:
Protecting and evaluating genomic privacy in medical tests and personalized medicine. WPES 2013: 95-106 - [i2]Erman Ayday, Emiliano De Cristofaro, Jean-Pierre Hubaux, Gene Tsudik:
The Chills and Thrills of Whole Genome Sequencing. CoRR abs/1306.1264 (2013) - 2012
- [j5]Erman Ayday, Faramarz Fekri:
A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks. Ad Hoc Networks 10(7): 1278-1290 (2012) - [j4]Erman Ayday, Faramarz Fekri:
Iterative Trust and Reputation Management Using Belief Propagation. IEEE Trans. Dependable Secur. Comput. 9(3): 375-386 (2012) - [j3]Erman Ayday, Faramarz Fekri:
An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks. IEEE Trans. Mob. Comput. 11(9): 1514-1531 (2012) - [j2]Erman Ayday, Farshid Delgosha, Faramarz Fekri:
Data authenticity and availability in multihop wireless sensor networks. ACM Trans. Sens. Networks 8(2): 10:1-10:26 (2012) - [c14]Erman Ayday, Jun Zou, Arash Einolghozati, Faramarz Fekri:
A recommender system based on Belief Propagation over Pairwise Markov Random Fields. Allerton Conference 2012: 703-707 - [c13]Erman Ayday, Arash Einolghozati, Faramarz Fekri:
BPRS: Belief Propagation based iterative recommender system. ISIT 2012: 1992-1996 - [c12]Erman Ayday, Faramarz Fekri:
BP-P2P: Belief propagation-based trust and reputation management for P2P networks. SECON 2012: 578-586 - [i1]Erman Ayday, Arash Einolghozati, Faramarz Fekri:
BPRS: Belief Propagation Based Iterative Recommender System. CoRR abs/1209.5335 (2012) - 2011
- [b1]Erman Ayday:
Iterative algorithms for trust and reputation management and recommender systems (). Georgia Institute of Technology, Turkey, 2011 - [c11]Erman Ayday, Sridhar Rajagopal:
Secure, intuitive and low-cost device authentication for Smart Grid networks. CCNC 2011: 1161-1165 - [c10]Erman Ayday, Faramarz Fekri:
Robust Reputation Management Using Probabilistic Message Passing. GLOBECOM 2011: 1-5 - [c9]Erman Ayday, Faramarz Fekri:
Application of belief propagation to trust and reputation management. ISIT 2011: 2173-2177 - 2010
- [j1]Erman Ayday, Faramarz Fekri:
A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks 8(2): 181-192 (2010) - [c8]Erman Ayday, Faramarz Fekri:
A belief propagation based recommender system for online services. RecSys 2010: 217-220
2000 – 2009
- 2009
- [c7]Erman Ayday, Hanseung Lee, Faramarz Fekri:
An iterative algorithm for trust and reputation management. ISIT 2009: 2051-2055 - 2008
- [c6]Erman Ayday, Faramarz Fekri:
Using node accountability in credential based routing for mobile ad-hoc networks. MASS 2008: 503-504 - [c5]Erman Ayday, Farshid Delgosha, Faramarz Fekri:
AuCRB: An Efficient Mechanism to Provide Availability, Reliability and Authentication for Multihop Broadcasting in Wireless Networks. SECON 2008: 460-468 - 2007
- [c4]Erman Ayday, Farshid Delgosha, Faramarz Fekri:
Location-Aware Security Services for Wireless Sensor Networks Using Network Coding. INFOCOM 2007: 1226-1234 - [c3]Farshid Delgosha, Erman Ayday, Faramarz Fekri:
MKPS: a multivariate polynomial scheme for symmetric key-establishment in distributed sensor networks. IWCMC 2007: 236-241 - [c2]Erman Ayday, Farshid Delgosha, Faramarz Fekri:
Efficient Broadcast Authentication for Wireless Sensor Networks. SECON 2007: 691-692 - 2006
- [c1]Farshid Delgosha, Erman Ayday, Kevin Sean Chan, Faramarz Fekri:
Security Services in Wireless Sensor Networks Using Sparse Random Coding. SECON 2006: 40-49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 22:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint