The material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Peer-Reviewed Journal Articles
Peer-Reviewed Conference Papers
Dae-young Kim, Nujood Alodadi, Zhiyuan Chen, Karuna P. Joshi, Adina Crainiceanu, and Don Needham. MATS: A Multi-aspect and Adaptive Trust-based Situation-aware Access Control Framework for Federated Data-as-a-Service Systems. IEEE International Conference on Service Computing (SCC), 2022 (regular paper, acceptance rate 32.8%).
Laylon Mokry, Paul Slife, Patrick Bishop, Jose Quiroz, Cooper Guzzi, Zhiyuan Chen, Adina and Crainiceanu and Don Needham, Efficient and Privacy-Preserving Collaborative Intrusion Detection Using Additive Secret Sharing and Differential Privacy, Workshop on Big Data for Cybersecurity (BigCyber) at IEEE Big Data Conference (IEEE BigData 2020), USA, December 15-18, 2021.
Varun Mandalapu, Lujie Chen, Zhiyuan Chen and Jiaqi Gong, Student-centric Model of Login Patterns: A Case Study with Learning Management Systems, Fourteenth International Conference on Educational Data Mining, Paris, France, June 29-July 2, 2021. (acceptance rate 22%)
Payton Schubel, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, and Don Needham, A Semantic Framework for Secure and Efficient Contact Tracing of Infectious Diseases. IEEE International Conference on Bioinformatics and Biomedicine (BIBM), 2021. (acceptance rate 20%)
Masnoon Nafees, Shimei Pan, Zhiyuan Chen and James Foulds, Impostor GAN: Toward Modeling Social Media User Impersonation with Generative Adversarial Networks. 2nd International Workshop on Deceptive AI, 2021.
Zhang, Wenbin, Mingli Zhang, Ji Zhang, Zhen Liu, Zhiyuan Chen, Jianwu Wang, Edward Raff, and Enza Messina. Flexible and Adaptive Fairness-aware Learning in Non-stationary Data Streams. In 2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI), pp. 399-406. IEEE, 2020.
Samson Oni, Kajal Pansare, Sukrit Singh Arneja, Zhiyuan Chen, Adina Crainiceanu, and Don Needham, RDFINT: A Benchmark for Comparing Data Warehouse with Virtual Integration Approaches for Integration of RDF Data, in Fourth IEEE International Workshop on Benchmarking, Performance Tuning and Optimization for Big Data Applications (BPOD 2020) at IEEE Big Data Conference (IEEE BigData 2020), USA, December 10-14, 2020.
Samson Oni, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, Don Needham, A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting, IEEE International Conference on Service Computing (SCC), accepted, 2020 (regular paper).
Fan Yang, Adina Crainiceanu, Zhiyuan Chen, Don Needham, Cluster-Based Join for Geographically Distributed Big RDF Data, IEEE BigData Congress, accepted, 2019. (Acceptance rate 23%).
. Samson Oni, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, Don Needham, Situation-Aware Access Control in Federated Data-as-a-Service for Maritime Search and Rescue, IEEE International Conference on Service Computing (SCC), accepted, 2019.
Fan Yang, Zhiyuan Chen, Aryya Gangopadhyay. Using Randomness to Improve Robustness of Tree-based Models Against Evasion Attacks, 5th ACM International Workshop on Security and Privacy Analytics 2019, Dallas, Texas, March 27, 2019.
Pooja Parameshwarappa, Zhiyuan Chen, Gangopadhyay, Analyzing Attack Strategies Against Rule Based Intrusion Detection Systems, International Workshop on Analytics for Security in Cyber Physical Systems, Varanasi, India, January 4, 2018.
Ohud Alqahtani, Zhiyuan Chen, Qiong Huang, Karthik Gottipati, Is Bigger Safer? Analyzing Factors Related to Data Breaches Using Publicly Available Information, in Fourth International Conference on Information Systems Security and Privacy (ICISSP), January 22-24, Funchai, Portugal, 2018.
Ashwinkumar Ganesan, Pooja Parameshwarappa, Akshay Peshave, Zhiyuan Chen, Tim Oates, Extending Signature-based Intrusion Detection Systems With Bayesian Abductive Reasoning. DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security (DYNAMICS) Workshop, December 3-7, San Juan, Puerto Rico, USA, 2018.
Pei Guo, Jianwu Wang, Zhiyuan Chen, A Comparison of Big Data Application Programming Approaches: A Travel Companion Case Study, in First IEEE International Workshop on Benchmarking, Performance Tuning and Optimization for Big Data Applications (BPOD 2017), Boston, USA, December 11-14, 2017.
Ahmed Aleroud, Zhiyuan Chen, George Karabatis, Network traffic Anonymization Using a Prefix- Preserving Condensation-based Technique, in Proc. of Cloud and Trusted Computing 2016, 24-26 Oct 2016, Rhodes, Greece.
Ding, Tao, Arpita Roy, Zhiyuan Chen, Qian Zhu, and Shimei Pan, Analyzing and retrieving illicit drug-related posts from social media. In Bioinformatics and Biomedicine (BIBM), 2016 IEEE International Conference on, pp. 1555-1560. IEEE, 2016.
Li Xue, Yun Xiong, yangyong Zhu, Jianfeng Wu, Zhiyuan Chen. Stock Trend Prediction By Classifying Aggregative Web Topic Opinion, in Proc. of The 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Gold Coast, Australia., 2013. (Acceptance rate: 11.3%)
Xue Bai, Yun Xiong, Yangyong Zhu, Qi Liu, Zhiyuan Chen: Co-anomaly Event Detection in Multiple Temperature Series. Knowledge Science, Engineering and Management - 6th International Conference, KSEM 2013, Dalian, China, August 10-12, 2013: 1-14. Lecture Notes in Computer Science Volume 8041, 2013 (best paper award).
Madhu Ahluwalia, Aryya Gangopadhyay,
Zhiyuan Chen, and Yelena Yesha,
Target-Based Privacy Preserving Association
Rule Mining, in Proc. of ACM Symposium On Applied Computing (SAC), Taiwan, pp.
960-965, 2011.
Madhushri Banerjee, Zhiyuan Chen,
and Aryya Gangopadhyay, A Utility-Aware and Holistic Approach for Privacy Preserving
Distributed Mining with Worst Case Privacy Guarantee, in Proc. of
Secure Knowledge Management Workshop, New Brunswick, NJ, October 21-22, 2010.
Somnath Chakrabarti, Zhiyuan Chen, Aryya Gangopadhyay, and Shibnath Mukherjee. Privacy Preserving Linear Discriminant Analysis from Perturbed Data, in Proc. of ACM Symposium on Applied Computing, Sierre, Switzerland, March 22 - March 26, 2010.
Yu Fu, Zhiyuan Chen, A. Gunes
Koru, and Aryya Gangopadhyay. A Privacy Protection Technique for Publishing
Data Mining Models and Supporting Data. The Nineteenth Annual Workshop on
Information Technologies and Systems (WITS'09), Phoenix, Arizona, USA,
14-15 December 2009.
Yu Fu, A. Gunes Koru, Zhiyuan
Chen, and Khaled El Emam, A Tree-Based Approach to Preserve Privacy of
Software Engineering Data and Predictive Models. The International
Conference on Predictor Models in Software Engineering, 2009, Vancouver,
Canada.
Mikael Lindvall, Raimund L.
Feldmann, George Karabatis, Zhiyuan Chen, and Vandana P. Janeja, Searching
for Relevant Software Change Artifacts using Semantic Networks. ACM
Symposium on Applied Computing, 2009, Hawaii.
Shibnath Mukherjee, Zhiyuan Chen,
Aryya Gangopadhyay, and Stephen Russell, A Secure Face Recognition System for Mobile-devices without
The Need of Decryption. Workshop on Secure Knowledge Management
(SKM 2008), 2008, Dallas, Texas.
Shenghuo Zhu, Tao Li, Zhiyuan
Chen, Dingding Wang, and Yihong Gong, Dynamic Active Probing of Helpdesk Databases.
International Conference on Very Large Data Bases, 2008, Auckland, New Zealand:
p. 748-760(Acceptance rate: 16.7%).
Madhu Ahluwalia, Zhiyuan Chen,
Aryya Gangopadhyay, and Zhiling Guo, Preserving Privacy in Supply Chain
Management: a Challenge for Next Generation Data Mining. NSF Symposium on
next generation data mining, 2007.
Zhiyuan Chen
and Tao Li, Addressing Diverse User Preferences in SQL-Query-Result
Navigation. ACM SIGMOD Conference, 2007, Beijing, China: p.
641-652(Acceptance rate: 14%).
Dongsong Zhang, George Karabatis, Zhiyuan Chen,
Boonlit Adipat, Liwei Dai, Tony Zhang, and Yu Wang, Personalization and Visualization on Handheld Devices.
ACM Symposium on Applied Computing, 2006, Dijon, France: p. 1008-1012.
Zhiyuan Chen,
Johannes Gehrke, Flip Korn, Nick Koudas, Jayavel Shanmugasundaram, and Divesh
Srivastava, Index Structures for Matching XML Twigs Using Relational Query
Processors. International Workshop on XML Schema and Data Management
(XSDM'05), 2005.
Surajit Chaudhuri, Zhiyuan Chen, Kyuseok Shim, and
Yuqing Wu, Storing XML (with XSD) in SQL Databases: Interplay of Logical and
Physical Designs. International Conference on Data Engineering (ICDE),
2004(Acceptance rate: 20%).
Zhiyuan Chen,
Johannes Gehrke, and Flip Korn, Query Optimization in Compressed Database Systems.
ACM SIGMOD International Conference on Management of Data, 2001: p.
271-282(Acceptance rate: 15%).
Zhiyuan Chen,
H.V. Jagadish, Flip Korn, Nick Koudas, S.Muthukrishnan, Raymond Ng, and Divesh
Srivastava, Counting Twig Matches in A Tree.
International Conference on Data Engineering (ICDE), 2001: p.
595-604(Acceptance rate: 17%).
Zhiyuan Chen,
Flip Korn, Nick Koudas, and S.Muthukrishnan, Selectivity
Estimation for Boolean Queries. ACM SIGMOD-SIGACT-SIGART
Symposium on Principles of Database Systems (PODS), 2000: p. 216-225(Acceptance
rate: 22%).
Zhiyuan Chen
and Praveen Seshadri, An Algebraic Compression Framework for Query Results.
International Conference on Data Engineering (ICDE), 2000: p.
177-188(Acceptance rate: 14%).
Philippe Bonnet, Kyle Buza, Zhiyuan Chen, Victor
Cheng, Randolph Chung, Takako~M. Hickey, Ryan Kennedy, Daniel Mahashin, Tobias
Mayr, Ivan Oprencak, Praveen Seshadri, and Hubert Siu., The Cornell Jaguar
System: Adding Mobility to Predator. ACM SIGMOD International Conference on
Management of Data, 1999: p. 580-581.
None Peer-Reviewed Journal Articles
Patents
¡¡