Research Sponsors (Acknowledgement of Support)

Research Interests (Selected/Recent Publications)

1. Data Privacy: Secure Multiparty Computation, Differential Privacy, Anonymity

AAMAS A Privacy Preserving Multiagent System for Load Balancing in the Smart Grid, in Proceedings of 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS '19), Montreal, Canada, May 13-17, 2019.

CCS Preserving Both Privacy and Utility in Network Trace Anonymization, in Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS '18), Toronto, Canada, Oct 15-19, 2018.

TDSC Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy, IEEE Transactions on Dependable and Secure Computing (TDSC), To Appear.

ICASSP Privacy Preserving and Collusion Resistant Energy Sharing, in Proceedings of the 2018 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '18), Calgary, Canada, April 22-27, 2018.

TIFS Privacy Preserving Smart Meter Streaming against Information Leakage of Appliance Status, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 12(9), pp. 2227-2241, 2017.

TDSC Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 12(5), pp. 504-518, 2015.

JCS Secure and Efficient Distributed Linear Programming, Journal of Computer Security (JCS), Vol. 20(5), pp. 583-634, 2012.

EDBT Differentially Private Search Log Sanitization with Optimal Output Utility, in Proceedings of the 15th International Conference on Extending Database Technology (EDBT '12), March 26-30, 2012, Berlin, Germany.

CIKM Effective Anonymization of Query Logs, in Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM '09), November 2-6, 2009, Hong Kong, China.

2. Security

TIFS LiveForen: Ensuring Live Forensic Integrity in the Cloud, IEEE Transactions on Information Forensics and Security (TIFS), To Appear.

ESA Fault-Tolerant Tile Mining, Expert Systems with Applications, Vol 101, pp 25-42, 2018.

Book Smart Grid Security, Springer, London, ISBN 978-1-4471-6662-7, 129 pages, 2015.

JCS Towards User-Oriented RBAC Model,, Journal of Computer Security (JCS), Vol. 23(1), pp. 107-129, 2015.

TDSC Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 9(5), pp. 655-669, 2012, IEEE.

ICDM Extended Boolean Matrix Decomposition, in Proceedings of the 2009 International Conference on Data Mining (ICDM '09), December 6-9,2009, Miami, Florida, USA.

3. Optimization

A Distance Matrix Based Algorithm for Solving the Traveling Salesman Problem, Operational Research, 2018.

Integrated Post-Disaster Medical Assistance Team Scheduling and Relief Supply Distribution, International Journal of Logistics Management, 2018.

On the Robust and Stable Flowshop Scheduling under Stochastic and Dynamic Disruptions, IEEE Transactions on Engineering Management (TEM), Vol. 64(4), pp. 539-553, 2017.

Discovering Energy Communities for Microgrids on the Power Grid, in Proceedings of the IEEE International Conference on Smart Grid Communications (SmartGridComm '17), Dresden, Germany, Oct 23-26, 2017.

Efficient Energy Consumption Scheduling: Towards Effective Load Leveling, Energies Journal, Vol. 10(1), 2017.

An Inference-proof Approach to Privacy-preserving Horizontally Partitioned Linear Programs, Optimization Letters, Vol. 8(1), pp. 267-277, 2014, Springer.