The material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Peer-Reviewed Journal Articles
Peer-Reviewed Conference Papers
Samson Oni, Kajal Pansare, Sukrit Singh Arneja, Zhiyuan Chen, Adina Crainiceanu, and Don Needham, RDFINT: A Benchmark for Comparing Data Warehouse with Virtual Integration Approaches for Integration of RDF Data, in Fourth IEEE International Workshop on Benchmarking, Performance Tuning and Optimization for Big Data Applications (BPOD 2020) at IEEE Big Data Conference (IEEE BigData 2020), USA, December 10-14, 2020.
Samson Oni, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, Don Needham, A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting, IEEE International Conference on Service Computing (SCC), accepted, 2020 (regular paper).
Fan Yang, Adina Crainiceanu, Zhiyuan Chen, Don Needham, Cluster-Based Join for Geographically Distributed Big RDF Data, IEEE BigData Congress, accepted, 2019. (Acceptance rate 23%).
Samson Oni, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, Don Needham, Situation-Aware Access Control in Federated Data-as-a-Service for Maritime Search and Rescue, IEEE International Conference on Service Computing (SCC), accepted, 2019.
Fan Yang, Zhiyuan Chen, Aryya Gangopadhyay. Using Randomness to Improve Robustness of Tree-based Models Against Evasion Attacks, 5th ACM International Workshop on Security and Privacy Analytics 2019, Dallas, Texas, March 27, 2019.
Pooja Parameshwarappa, Zhiyuan Chen, Gangopadhyay, Analyzing Attack Strategies Against Rule Based Intrusion Detection Systems, International Workshop on Analytics for Security in Cyber Physical Systems, Varanasi, India, January 4, 2018.
Ohud Alqahtani, Zhiyuan Chen, Qiong Huang, Karthik Gottipati, Is Bigger Safer? Analyzing Factors Related to Data Breaches Using Publicly Available Information, in Fourth International Conference on Information Systems Security and Privacy (ICISSP), January 22-24, Funchai, Portugal, 2018.
Ashwinkumar Ganesan, Pooja Parameshwarappa, Akshay Peshave, Zhiyuan Chen, Tim Oates, Extending Signature-based Intrusion Detection Systems With Bayesian Abductive Reasoning. DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security (DYNAMICS) Workshop, December 3-7, San Juan, Puerto Rico, USA, 2018.
Pei Guo, Jianwu Wang, Zhiyuan Chen, A Comparison of Big Data Application Programming Approaches: A Travel Companion Case Study, in First IEEE International Workshop on Benchmarking, Performance Tuning and Optimization for Big Data Applications (BPOD 2017), Boston, USA, December 11-14, 2017.
Ahmed Aleroud, Zhiyuan Chen, George Karabatis, Network traffic Anonymization Using a Prefix- Preserving Condensation-based Technique, in Proc. of Cloud and Trusted Computing 2016, 24-26 Oct 2016, Rhodes, Greece.
Ding, Tao, Arpita Roy, Zhiyuan Chen, Qian Zhu, and Shimei Pan, Analyzing and retrieving illicit drug-related posts from social media. In Bioinformatics and Biomedicine (BIBM), 2016 IEEE International Conference on, pp. 1555-1560. IEEE, 2016.
Li Xue, Yun Xiong, yangyong Zhu, Jianfeng Wu, Zhiyuan Chen. Stock Trend Prediction By Classifying Aggregative Web Topic Opinion, in Proc. of The 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Gold Coast, Australia., 2013. (Acceptance rate: 11.3%)
Xue Bai, Yun Xiong, Yangyong Zhu, Qi Liu, Zhiyuan Chen: Co-anomaly Event Detection in Multiple Temperature Series. Knowledge Science, Engineering and Management - 6th International Conference, KSEM 2013, Dalian, China, August 10-12, 2013: 1-14. Lecture Notes in Computer Science Volume 8041, 2013 (best paper award).
Madhu Ahluwalia, Aryya Gangopadhyay, Zhiyuan Chen, and Yelena Yesha, Target-Based Privacy Preserving Association Rule Mining, in Proc. of ACM Symposium On Applied Computing (SAC), Taiwan, pp. 960-965, 2011.
Madhushri Banerjee, Zhiyuan Chen, and Aryya Gangopadhyay, A Utility-Aware and Holistic Approach for Privacy Preserving Distributed Mining with Worst Case Privacy Guarantee, in Proc. of Secure Knowledge Management Workshop, New Brunswick, NJ, October 21-22, 2010.
Somnath Chakrabarti, Zhiyuan Chen, Aryya Gangopadhyay, and Shibnath Mukherjee. Privacy Preserving Linear Discriminant Analysis from Perturbed Data, in Proc. of ACM Symposium on Applied Computing, Sierre, Switzerland, March 22 - March 26, 2010.
Yu Fu, Zhiyuan Chen, A. Gunes Koru, and Aryya Gangopadhyay. A Privacy Protection Technique for Publishing Data Mining Models and Supporting Data. The Nineteenth Annual Workshop on Information Technologies and Systems (WITS'09), Phoenix, Arizona, USA, 14-15 December 2009.
Yu Fu, A. Gunes Koru, Zhiyuan Chen, and Khaled El Emam, A Tree-Based Approach to Preserve Privacy of Software Engineering Data and Predictive Models. The International Conference on Predictor Models in Software Engineering, 2009, Vancouver, Canada.
Mikael Lindvall, Raimund L. Feldmann, George Karabatis, Zhiyuan Chen, and Vandana P. Janeja, Searching for Relevant Software Change Artifacts using Semantic Networks. ACM Symposium on Applied Computing, 2009, Hawaii.
Shibnath Mukherjee, Zhiyuan Chen, Aryya Gangopadhyay, and Stephen Russell, A Secure Face Recognition System for Mobile-devices without The Need of Decryption. Workshop on Secure Knowledge Management (SKM 2008), 2008, Dallas, Texas.
Shenghuo Zhu, Tao Li, Zhiyuan Chen, Dingding Wang, and Yihong Gong, Dynamic Active Probing of Helpdesk Databases. International Conference on Very Large Data Bases, 2008, Auckland, New Zealand: p. 748-760(Acceptance rate: 16.7%).
Madhu Ahluwalia, Zhiyuan Chen, Aryya Gangopadhyay, and Zhiling Guo, Preserving Privacy in Supply Chain Management: a Challenge for Next Generation Data Mining. NSF Symposium on next generation data mining, 2007.
Zhiyuan Chen and Tao Li, Addressing Diverse User Preferences in SQL-Query-Result Navigation. ACM SIGMOD Conference, 2007, Beijing, China: p. 641-652(Acceptance rate: 14%).
Dongsong Zhang, George Karabatis, Zhiyuan Chen, Boonlit Adipat, Liwei Dai, Tony Zhang, and Yu Wang, Personalization and Visualization on Handheld Devices. ACM Symposium on Applied Computing, 2006, Dijon, France: p. 1008-1012.
Zhiyuan Chen, Johannes Gehrke, Flip Korn, Nick Koudas, Jayavel Shanmugasundaram, and Divesh Srivastava, Index Structures for Matching XML Twigs Using Relational Query Processors. International Workshop on XML Schema and Data Management (XSDM'05), 2005.
Surajit Chaudhuri, Zhiyuan Chen, Kyuseok Shim, and Yuqing Wu, Storing XML (with XSD) in SQL Databases: Interplay of Logical and Physical Designs. International Conference on Data Engineering (ICDE), 2004(Acceptance rate: 20%).
Zhiyuan Chen, Johannes Gehrke, and Flip Korn, Query Optimization in Compressed Database Systems. ACM SIGMOD International Conference on Management of Data, 2001: p. 271-282(Acceptance rate: 15%).
Zhiyuan Chen, H.V. Jagadish, Flip Korn, Nick Koudas, S.Muthukrishnan, Raymond Ng, and Divesh Srivastava, Counting Twig Matches in A Tree. International Conference on Data Engineering (ICDE), 2001: p. 595-604(Acceptance rate: 17%).
Zhiyuan Chen, Flip Korn, Nick Koudas, and S.Muthukrishnan, Selectivity Estimation for Boolean Queries. ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), 2000: p. 216-225(Acceptance rate: 22%).
Zhiyuan Chen and Praveen Seshadri, An Algebraic Compression Framework for Query Results. International Conference on Data Engineering (ICDE), 2000: p. 177-188(Acceptance rate: 14%).
Philippe Bonnet, Kyle Buza, Zhiyuan Chen, Victor Cheng, Randolph Chung, Takako~M. Hickey, Ryan Kennedy, Daniel Mahashin, Tobias Mayr, Ivan Oprencak, Praveen Seshadri, and Hubert Siu., The Cornell Jaguar System: Adding Mobility to Predator. ACM SIGMOD International Conference on Management of Data, 1999: p. 580-581.
None Peer-Reviewed Journal Articles