The material is presented to ensure timely dissemination of
scholarly and technical work. Copyright and all rights therein are retained by
authors or by other copyright holders. All persons copying this information are
expected to adhere to the terms and constraints invoked by each author's
copyright. In most cases, these works may not be reposted without the explicit
permission of the copyright holder.
Peer-Reviewed Journal Articles
- Saydeh Karabatis, Vandana Janeja, Zhiyuan Chen, “A
Neuro-symbolic GeoAI Framework for Extraction of
Travel Routes from Unstructured Texts”, Transactions in GIS, accepted,
2025.
- Antonios
Xenakis, Zhiyuan Chen, George Karabatis, “A
Cluster-based Approach for Distributed Anonymization of Vertically
Partitioned Data.” International Journal of Web Engineering and
Technology, 19(4), 397-420, 2024.
- Antonios
Xenakis, Zhiyuan Chen, George Karabatis, “A
Cluster-based Approach for Distributed Anonymization of Vertically
Partitioned Data.” International Journal of Web Engineering and
Technology, accepted, 2024.
- Antonios
Xenakis, Sabrina Mamtaz Nourin, Zhiyuan Chen, George Karabatis, Ahmed
Aleroud, and Jhancy Amarsingh.
"A
Self-Adaptive and Secure Approach to Share Network Trace Data."
Digital Threats: Research and Practice, accepted, 2023
- Fan
Yang, Adina Crainiceanu, Zhiyuan Chen, Don Needham, Cluster-Based Join for
Federated SPAQL Queries, IEEE Transactions on Knowledge and Data
Engineering, 35(4), 3525 - 3539, 2023.
- Fan
Yang, Zhiyuan Chen, Aryya Gangopadhyay, Using
Randomness to Improve Robustness of Tree-based Models Against Evasion
Attacks, IEEE Transactions on Knowledge and Data Engineering, 34(2),
969-982, 2022.
- Fan
Yang, Adina Crainiceanu, Zhiyuan Chen, Don Needham, Cluster-Based Join for
Federated SPAQL Queries, IEEE Transactions on Knowledge and Data
Engineering, accepted in 2021.
- Ohud Saud Alqahtani, Zhiyuan Chen, Statistical
Analysis of Relationships of U.S. Organizations’ Size, Popularity, Age,
and Location to Frequency of Data Breaches, Journal of Data Protection
and Privacy, 4(4), 404-423, 2021.
- Pooja Parameshwarappa, Zhiyuan Chen, Gunes Koru, Anonymization
of Daily Activity Data by Using l-diversity Privacy Model, ACM
Transactions on Management Information Systems,12(3), 1-21, 2021.
- Ahmed
AlEroud, Fan Yang, Sai Chaithanya Pallaprolu,
Zhiyuan Chen, and George Karabatis, Anonymization
of Network Trace Data through Condensation-based Differential Privacy,
ACM Digital Threats: Research and Practice, 2(4), 1-23, 2021.
- Pooja Parameshwarappa, Zhiyuan Chen, Gunes Koru, Efficient
Approach for Anonymizing Large-Scale Physical Activity Data: Multi-level
Clustering Based Anonymization, International Journal of Information
Security and Privacy, 14(3), 72-94, 2020.
- Samson
Oni, Zhiyuan Chen, Susan Hoban, Onimi
Jademi, A
Comparative Study of Data Cleaning Tools, International Journal of Data
Warehousing and Mining, 15(4), 48-65, 2019.
- Madhu
Ahluwalia, Aryya Gangopadhyay, Zhiyuan
Chen, and Yelena Yesha. Target-Based,
Privacy Preserving, and Incremental Association Rule Mining, IEEE
Transactions on Services Computing, 10(4), 2017.
- Shaikha
Al-Duaij, Zhiyuan Chen, and Aryya
Gangopadhyay. Using
Crowd Sourcing to Analyze Consumers’ Response to Privacy Policies of
Online Social Network and Financial Institutions at Micro Level,
International Journal of Information Security and Privacy, 10(2), 2016.
- Tamas
S, Gal, Thomas C. Tucker, Aryya Gangopadhyay,
and Zhiyuan Chen. A Data
Recipient Centered De-identification Method to Retain Statistical
Attributes. Journal of biomedical informatics, August 2014, 50: 32-45.
- Madhushri
Banerjee, Zhiyuan Chen, and Aryya
Gangopadhyay. "A generic and
distributed privacy preserving classification method with a worst-case
privacy guarantee." Distributed and Parallel Databases, 32(1):
5-35, 2014.
- Liang
Tang, Tao Li, Yexi Jiang, and zhiyuan
chen. Dynamic
Query Forms for Database Queries. IEEE Transactions on Knowledge and
Data Engineering, 26(9): 2166 - 2178, 2014.
- Zhiyuan
Chen, Tao Li, and Yanan Sun, A
Learning Approach to SQL Query Results Ranking Using Skyline and Users'
Current Navigational Behavior. IEEE Transactions on Knowledge and Data
Engineering, Volume 25 Issue 12, December 2013, Pages 2683-2693.
- Dongjin
Kim, Zhiyuan Chen and Aryya
Gangopadhyay, Optimizing
Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based
Classification, International Journal of Information Security and
Privacy, 2012. 6(2): 16-33.
- Pimwadee Chaovalit, Aryya
Gangopadhyay, George Karabatis, and Zhiyuan Chen, Discrete
Wavelet Transform-based Time Series Analysis and Mining. ACM Computing
Surveys, 2011. 43(2): p. 1-37.
- Yu
Fu, Zhiyuan Chen, A. Gunes Koru, and Aryya
Gangopadhyay. A
Privacy Protection Technique for Publishing Data Mining Models and
Research Data, ACM Transactions on Management Information Systems,
2010.1(1): 1-20.
- Shibnath Mukherjee, Aryya
Gangopadhyay, and Zhiyuan Chen. A
Partial Optimization Approach for Privacy Preserving Frequent Itemset
Mining. International Journal of Computational Models and Algorithms
in Medicine, 2010. 1(1): p. 19-33. IGI Global, Hershey, PA.
- Madhu
V. Ahluwalia, Aryya Gangopadhyay, and Zhiyuan
Chen. Preserving Privacy in Mining Quantitative Association rules,
International Journal of Information Security and Privacy, 2009. 3(4): p.
1-17. IGI Global, Hershey, PA.
- George
Karabatis, Zhiyuan Chen, Vandana Janeja, Tania Lobo, Monish
Advani, Mikael Lindvall, and Raimund L. Feldmann, Using Semantic Networks
and Context in Search for Relevant Software Engineering Artifacts, Journal
on Data Semantics, 2009, 14: p. 74-104. Springer, New York, NY, 2009.
- Tamas
Gal, Zhiyuan Chen, and Aryya
Gangopadhyay, A
Privacy Protection Model for Patient Data with Multiple Sensitive
Attributes. International Journal of Information Security and
Privacy, 2008. 2(3): p. 28-44.
- Navin
Kumar, Aryya Gangopadhyay, Sanjay Bapna, George
Karabatis, and Zhiyuan Chen, Measuring
interestingness of discovered skewed patterns in data cubes. Decision
Support Systems, 2008. 46(1): p. 429-439.
- Shibnath Mukherjee, Madhushri Banerjee, Zhiyuan
Chen, and Aryya Gangopadhyay, A Privacy
Preserving Technique for Distance-based Classification with Worst Case
Privacy Guarantees. Data & Knowledge Engineering,
2008. 66(2): p. 264-288.
- Shibnath Mukherjee, Zhiyuan Chen, and Aryya Gangopadhyay, A Fuzzy
Programming Approach for Data Reduction and Privacy in Distance Based
Mining. International Journal of Information and Computer
Security, 2008. 2(1): p. 27-47.
- Zhiyuan
Chen, Aryya Gangopadhyay, George Karabatis,
Steve Holden, Michael McGuire, and Cambridge Elsevier, MA., Semantic
Integration of Government Data for Water Quality Management. Journal
of Government Information Quarterly, 2007. 24(4): p. 716-735.
- Zhiyuan
Chen, Aryya Gangopadhyay, George Karabatis,
Michael McGuire, and Claire Welty, Semantic
Integration and Knowledge Discovery for Environmental Research. Journal
of Database Management, 2007. 18(1): p. 43-68.
- Zhiyuan
Chen, Johannes Gehrke, Flip Korn, Nick Koudas, Jayavel
Shanmugasundaram, and Divesh Srivastava, Index
structures for matching XML twigs using relational query processors. Data
& Knowledge Engineering, 2007. 60(2): p. 283-302.
- Navin
Kumar, Aryya Gangopadhyay, George Karabatis,
Sanjay Bapna, and Zhiyuan Chen, Navigation
Rules for Exploring Large Multidimensional Data Cubes. International
Journal of Data Warehousing and Mining, 2006. 2(4): p. 27-48.
- Shibnath Mukherjee, Zhiyuan Chen, and Aryya Gangopadhyay, A
Privacy Preserving Technique for Euclidean Distance-Based Mining
Algorithms Using Fourier-Related Transforms. VLDB Journal,
2006. 15(4): p. 293–315.
- Surajit
Chaudhuri, Zhiyuan Chen, Kyuseok
Shim, and Yuqing Wu, Storing
XML (with XSD) in SQL Databases: Interplay of Logical and Physical Designs. IEEE
Transaction on Knowledge and Data Engineering, 2005. 17(12):
p. 1595-1609.
- Zhiyuan
Chen, Flip Korn, Nick Koudas, and S. Muthukrishnan, Generalized
Substring Selectivity Estimation. Journal of Computer and
System Sciences, 2003. 66(1): p. 98-132.
Peer-Reviewed Conference Papers
- Sai Rapelli, Zhiyuan Chen, and Wei Lu, A
LSTM with Dual-stage Attention Method to Predict Amine Emissions for
Carbon Dioxide Capture and Storage, Workshop on Big Data Analytics for
Sustainability (BDA4S) at IEEE Big Data Conference (IEEE BigData 2024), Washington DC, USA, December 15-18,
2024.
- Dodavah
Mowoh and Zhiyuan Chen, A
Beam-Search Based Method to Select Classification and Imputation Methods
for Fair and Accurate Data Analysis, Fourth International Workshop on
Data science for equality, inclusion and well-being challenges (DS4EIW
2024) at IEEE Big Data Conference (IEEE BigData
2024), Washington DC, USA, December 15-18, 2024.
- Dae-young
Kim, Nujood Alodadi,
Zhiyuan Chen, Karuna P. Joshi, Adina Crainiceanu, and Don Needham. MATS: A
Multi-aspect and Adaptive Trust-based Situation-aware Access Control
Framework for Federated Data-as-a-Service Systems. IEEE International
Conference on Service Computing (SCC), 2022 (regular paper, acceptance
rate 32.8%).
- Laylon
Mokry, Paul Slife, Patrick Bishop, Jose Quiroz, Cooper Guzzi, Zhiyuan
Chen, Adina and Crainiceanu and Don
Needham, Efficient
and Privacy-Preserving Collaborative Intrusion Detection Using Additive
Secret Sharing and Differential Privacy, Workshop on Big Data for
Cybersecurity (BigCyber) at IEEE Big Data Conference (IEEE BigData 2020), USA, December 15-18, 2021.
- Varun
Mandalapu, Lujie Chen, Zhiyuan Chen and Jiaqi
Gong, Student-centric
Model of Login Patterns: A Case Study with Learning Management Systems,
Fourteenth International Conference on Educational Data Mining, Paris,
France, June 29-July 2, 2021. (acceptance rate 22%)
- Payton
Schubel, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, and Don
Needham, A
Semantic Framework for Secure and Efficient Contact Tracing of Infectious
Diseases. IEEE International Conference on Bioinformatics and
Biomedicine (BIBM), 2021. (acceptance rate 20%)
- Masnoon Nafees, Shimei Pan, Zhiyuan Chen and James
Foulds, Impostor GAN: Toward
Modeling Social Media User Impersonation with Generative Adversarial
Networks. 2nd International Workshop on Deceptive AI, 2021.
- Zhang,
Wenbin, Mingli Zhang, Ji Zhang, Zhen Liu, Zhiyuan Chen, Jianwu Wang, Edward Raff, and Enza Messina. Flexible
and Adaptive Fairness-aware Learning in Non-stationary Data Streams. In
2020 IEEE 32nd International Conference on Tools with Artificial
Intelligence (ICTAI), pp. 399-406. IEEE, 2020.
- Samson
Oni, Kajal Pansare, Sukrit Singh Arneja, Zhiyuan Chen, Adina Crainiceanu,
and Don Needham, RDFINT:
A Benchmark for Comparing Data Warehouse with Virtual Integration
Approaches for Integration of RDF Data, in Fourth IEEE International
Workshop on Benchmarking, Performance Tuning and Optimization for Big Data
Applications (BPOD 2020) at IEEE Big Data Conference (IEEE BigData 2020), USA, December 10-14, 2020.
- Samson
Oni, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, Don Needham, A
Framework for Situation-Aware Access Control in Federated
Data-as-a-Service Systems Based on Query Rewriting, IEEE International
Conference on Service Computing (SCC), accepted, 2020 (regular paper).
- Fan
Yang, Adina Crainiceanu, Zhiyuan Chen, Don Needham, Cluster-Based
Join for Geographically Distributed Big RDF Data, IEEE BigData Congress, accepted, 2019. (Acceptance rate
23%).
- .
Samson Oni, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, Don
Needham, Situation-Aware
Access Control in Federated Data-as-a-Service for Maritime Search and
Rescue, IEEE International Conference on Service Computing (SCC),
accepted, 2019.
- Fan
Yang, Zhiyuan Chen, Aryya Gangopadhyay. Using
Randomness to Improve Robustness of Tree-based Models Against Evasion
Attacks, 5th ACM International Workshop on Security and Privacy
Analytics 2019, Dallas, Texas, March 27, 2019.
- Pooja Parameshwarappa, Zhiyuan Chen, Gangopadhyay, Analyzing
Attack Strategies Against Rule Based Intrusion Detection Systems,
International Workshop on Analytics for Security in Cyber Physical Systems,
Varanasi, India, January 4, 2018.
- Ohud Alqahtani, Zhiyuan Chen, Qiong Huang, Karthik
Gottipati, Is Bigger Safer? Analyzing
Factors Related to Data Breaches Using Publicly Available Information,
in Fourth International Conference on Information Systems Security and
Privacy (ICISSP), January 22-24, Funchai,
Portugal, 2018.
- Ashwinkumar
Ganesan, Pooja Parameshwarappa, Akshay Peshave,
Zhiyuan Chen, Tim Oates, Extending
Signature-based Intrusion Detection Systems With Bayesian Abductive
Reasoning. DYnamic and Novel Advances in
Machine Learning and Intelligent Cyber Security (DYNAMICS) Workshop,
December 3-7, San Juan, Puerto Rico, USA, 2018.
- Pei
Guo, Jianwu Wang, Zhiyuan Chen, A
Comparison of Big Data Application Programming Approaches: A Travel
Companion Case Study, in First IEEE International Workshop on
Benchmarking, Performance Tuning and Optimization for Big Data
Applications (BPOD 2017), Boston, USA, December 11-14, 2017.
- Ahmed
Aleroud, Zhiyuan Chen, George Karabatis, Network
traffic Anonymization Using a Prefix- Preserving Condensation-based
Technique, in Proc. of Cloud and Trusted Computing 2016, 24-26 Oct
2016, Rhodes, Greece.
- Castillo,
Saul Ricardo Medrano, and Zhiyuan Chen, Using
Transfer Learning to Identify Privacy Leaks in Tweets. In Collaboration
and Internet Computing (CIC), 2016 IEEE 2nd International Conference on,
pp. 506-513. IEEE, 2016.
- Ding,
Tao, Arpita Roy, Zhiyuan Chen, Qian Zhu, and Shimei Pan, Analyzing
and retrieving illicit drug-related posts from social media. In
Bioinformatics and Biomedicine (BIBM), 2016 IEEE International Conference
on, pp. 1555-1560. IEEE, 2016.
- Li
Xue, Yun Xiong, yangyong Zhu, Jianfeng Wu,
Zhiyuan Chen. Stock
Trend Prediction By Classifying Aggregative Web Topic Opinion, in
Proc. of The 17th Pacific-Asia Conference on Knowledge Discovery and Data
Mining (PAKDD), Gold Coast, Australia., 2013. (Acceptance rate:
11.3%)
- Xue
Bai, Yun Xiong, Yangyong Zhu, Qi Liu, Zhiyuan
Chen: Co-anomaly
Event Detection in Multiple Temperature Series. Knowledge Science,
Engineering and Management - 6th International Conference, KSEM 2013,
Dalian, China, August 10-12, 2013: 1-14. Lecture Notes in Computer Science
Volume 8041, 2013 (best paper award).
- Madhu
Ahluwalia, Aryya Gangopadhyay, Zhiyuan
Chen, and Yelena Yesha, Target-Based
Privacy Preserving Association Rule Mining, in Proc. of ACM Symposium
On Applied Computing (SAC), Taiwan, pp. 960-965, 2011.
- Madhushri
Banerjee, Zhiyuan Chen, and Aryya Gangopadhyay, A
Utility-Aware and Holistic Approach for Privacy Preserving Distributed
Mining with Worst Case Privacy Guarantee, in Proc. of Secure Knowledge
Management Workshop, New Brunswick, NJ, October 21-22, 2010.
- Somnath
Chakrabarti, Zhiyuan Chen, Aryya Gangopadhyay, and Shibnath Mukherjee. Privacy
Preserving Linear Discriminant Analysis from Perturbed Data, in Proc.
of ACM Symposium on Applied Computing, Sierre, Switzerland, March 22 -
March 26, 2010.
- Yu
Fu, Zhiyuan Chen, A. Gunes Koru, and Aryya
Gangopadhyay. A Privacy Protection Technique for Publishing Data Mining
Models and Supporting Data. The Nineteenth Annual Workshop on
Information Technologies and Systems (WITS'09), Phoenix, Arizona, USA,
14-15 December 2009.
- Yu Fu,
A. Gunes Koru, Zhiyuan Chen, and Khaled El Emam, A
Tree-Based Approach to Preserve Privacy of Software Engineering Data and
Predictive Models. The International Conference on Predictor Models in
Software Engineering, 2009, Vancouver, Canada.
- Mikael
Lindvall, Raimund L. Feldmann, George Karabatis, Zhiyuan Chen,
and Vandana P. Janeja, Searching for Relevant Software Change
Artifacts using Semantic Networks. ACM Symposium on Applied Computing,
2009, Hawaii.
- Shibnath Mukherjee, Zhiyuan Chen, Aryya Gangopadhyay, and Stephen Russell, A
Secure Face Recognition System for Mobile-devices without The Need of
Decryption. Workshop on Secure Knowledge Management (SKM 2008),
2008, Dallas, Texas.
- Shenghuo Zhu, Tao Li, Zhiyuan Chen, Dingding Wang, and Yihong Gong, Dynamic
Active Probing of Helpdesk Databases. International Conference on
Very Large Data Bases, 2008, Auckland, New Zealand: p. 748-760(Acceptance
rate: 16.7%).
- Madhu
Ahluwalia, Zhiyuan Chen, Aryya
Gangopadhyay, and Zhiling Guo, Preserving
Privacy in Supply Chain Management: a Challenge for Next Generation Data
Mining. NSF Symposium on next generation data mining, 2007.
- Zhiyuan
Chen and Tao Li, Addressing
Diverse User Preferences in SQL-Query-Result Navigation. ACM
SIGMOD Conference, 2007, Beijing, China: p. 641-652(Acceptance rate: 14%).
- Dongsong Zhang, George Karabatis, Zhiyuan Chen,
Boonlit Adipat, Liwei Dai, Tony Zhang, and Yu
Wang, Personalization
and Visualization on Handheld Devices. ACM Symposium on Applied
Computing, 2006, Dijon, France: p. 1008-1012.
- Zhiyuan
Chen, Johannes Gehrke, Flip Korn, Nick Koudas, Jayavel
Shanmugasundaram, and Divesh Srivastava, Index Structures for
Matching XML Twigs Using Relational Query Processors. International
Workshop on XML Schema and Data Management (XSDM'05), 2005.
- Surajit
Chaudhuri, Zhiyuan Chen, Kyuseok
Shim, and Yuqing Wu, Storing XML (with XSD) in SQL Databases:
Interplay of Logical and Physical Designs. International Conference on
Data Engineering (ICDE), 2004(Acceptance rate: 20%).
- Zhiyuan
Chen, Johannes Gehrke, and Flip Korn, Query
Optimization in Compressed Database Systems. ACM SIGMOD
International Conference on Management of Data, 2001: p.
271-282(Acceptance rate: 15%).
- Zhiyuan
Chen, H.V. Jagadish, Flip Korn, Nick Koudas, S.Muthukrishnan,
Raymond Ng, and Divesh Srivastava, Counting
Twig Matches in A Tree. International Conference on Data
Engineering (ICDE), 2001: p. 595-604(Acceptance rate: 17%).
- Zhiyuan
Chen, Flip Korn, Nick Koudas, and S.Muthukrishnan, Selectivity
Estimation for Boolean Queries. ACM SIGMOD-SIGACT-SIGART Symposium
on Principles of Database Systems (PODS), 2000: p. 216-225(Acceptance
rate: 22%).
- Zhiyuan
Chen and Praveen Seshadri, An
Algebraic Compression Framework for Query Results. International
Conference on Data Engineering (ICDE), 2000: p. 177-188(Acceptance rate:
14%).
- Philippe
Bonnet, Kyle Buza, Zhiyuan Chen, Victor Cheng, Randolph Chung,
Takako~M. Hickey, Ryan Kennedy, Daniel Mahashin,
Tobias Mayr, Ivan Oprencak, Praveen Seshadri, and Hubert Siu., The
Cornell Jaguar System: Adding Mobility to Predator. ACM SIGMOD
International Conference on Management of Data, 1999: p. 580-581.
None Peer-Reviewed Journal Articles
Patents
- Zhiyuan
Chen, Surajit Chaudhuri, Kyuseok Shim, Yuqing
Yu:
``Transformation Tool for Mapping XML to Relational Database''. US Patent
7,228,312.
- Z.
Chen, F. Korn, N. Koudas, S. Muthukrishnan:
``Multidimensional Substring Selectivity Estimation Using Set Hashing Of
Cross-Counts''.
US Patent 6,738,762
- Zhiyuan
Chen, Flip Korn, Nick Koudas, Divesh Srivastava, Johannes Gehrke, Jayavel
Shanmugasundaram:
``Method for Matching XML Twigs Using Index Structures and Relational
Query Processors''. US Patent App. 10/937,641
- Zhiyuan
Chen, Flip Korn, Nick Koudas, S. Muthukrishnan:
``Method and Apparatus for Estimating the Selectivity of Boolean
Queries''. US patent pending.
- Zhiyuan
Chen, H.V. Jagadish, Flip Korn, Nick Koudas, S., Muthukrishnan, Raymond
Ng, and Divesh Srivastava:
``Counting Twig Matches in a Tree''. US patent pending.