The material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.


Peer-Reviewed Journal Articles

  1. Antonios Xenakis, Zhiyuan Chen, George Karabatis, ¡°A Cluster-based Approach for Distributed Anonymization of Vertically Partitioned Data.¡± International Journal of Web Engineering and Technology, accepted, 2024.
  2. Antonios Xenakis, Sabrina Mamtaz Nourin, Zhiyuan Chen, George Karabatis, Ahmed Aleroud, and Jhancy Amarsingh. "A Self-Adaptive and Secure Approach to Share Network Trace Data." Digital Threats: Research and Practice, accepted, 2023
  3. Fan Yang, Adina Crainiceanu, Zhiyuan Chen, Don Needham, Cluster-Based Join for Federated SPAQL Queries, IEEE Transactions on Knowledge and Data Engineering, 35(4), 3525 - 3539, 2023.
  4. Fan Yang, Zhiyuan Chen, Aryya Gangopadhyay, Using Randomness to Improve Robustness of Tree-based Models Against Evasion Attacks, IEEE Transactions on Knowledge and Data Engineering, 34(2), 969-982, 2022.
  5. Fan Yang, Adina Crainiceanu, Zhiyuan Chen, Don Needham, Cluster-Based Join for Federated SPAQL Queries, IEEE Transactions on Knowledge and Data Engineering, accepted in 2021.
  6. Ohud Saud Alqahtani, Zhiyuan Chen, Statistical Analysis of Relationships of U.S. Organizations¡¯ Size, Popularity, Age, and Location to Frequency of Data Breaches, Journal of Data Protection and Privacy, 4(4), 404-423, 2021.
  7. Pooja Parameshwarappa, Zhiyuan Chen, Gunes Koru, Anonymization of Daily Activity Data by Using l-diversity Privacy Model, ACM Transactions on Management Information Systems,12(3), 1-21, 2021.
  8. Ahmed AlEroud, Fan Yang, Sai Chaithanya Pallaprolu, Zhiyuan Chen, and George Karabatis, Anonymization of Network Trace Data through Condensation-based Differential Privacy, ACM Digital Threats: Research and Practice, 2(4), 1-23, 2021.
  9. Pooja Parameshwarappa, Zhiyuan Chen, Gunes Koru, Efficient Approach for Anonymizing Large-Scale Physical Activity Data: Multi-level Clustering Based Anonymization, International Journal of Information Security and Privacy, 14(3), 72-94, 2020.
  10. Samson Oni, Zhiyuan Chen, Susan Hoban, Onimi Jademi, A Comparative Study of Data Cleaning Tools, International Journal of Data Warehousing and Mining, 15(4), 48-65, 2019.
  11. Madhu Ahluwalia, Aryya Gangopadhyay, Zhiyuan Chen, and Yelena Yesha. Target-Based, Privacy Preserving, and Incremental Association Rule Mining, IEEE Transactions on Services Computing, 10(4), 2017.
  12. Shaikha Al-Duaij, Zhiyuan Chen, and Aryya Gangopadhyay. Using Crowd Sourcing to Analyze Consumers¡¯ Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level, International Journal of Information Security and Privacy, 10(2), 2016.
  13. Tamas S, Gal, Thomas C. Tucker, Aryya Gangopadhyay, and Zhiyuan Chen. A Data Recipient Centered De-identification Method to Retain Statistical Attributes. Journal of biomedical informatics, August 2014, 50: 32-45.
  14. Madhushri Banerjee, Zhiyuan Chen, and Aryya Gangopadhyay. "A generic and distributed privacy preserving classification method with a worst-case privacy guarantee." Distributed and Parallel Databases, 32(1): 5-35, 2014.
  15. Liang Tang, Tao Li, Yexi Jiang, and zhiyuan chen. Dynamic Query Forms for Database Queries. IEEE Transactions on Knowledge and Data Engineering, 26(9): 2166 - 2178, 2014.
  16. Zhiyuan Chen, Tao Li, and Yanan Sun, A Learning Approach to SQL Query Results Ranking Using Skyline and Users' Current Navigational Behavior. IEEE Transactions on Knowledge and Data Engineering, Volume 25 Issue 12, December 2013, Pages 2683-2693.
  17. Dongjin Kim, Zhiyuan Chen and Aryya Gangopadhyay, Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification, International Journal of Information Security and Privacy, 2012. 6(2): 16-33.
  18. Pimwadee Chaovalit, Aryya Gangopadhyay, George Karabatis, and Zhiyuan Chen, Discrete Wavelet Transform-based Time Series Analysis and Mining. ACM Computing Surveys, 2011. 43(2): p. 1-37.
  19. Yu Fu, Zhiyuan Chen, A. Gunes Koru, and Aryya Gangopadhyay. A Privacy Protection Technique for Publishing Data Mining Models and Research Data, ACM Transactions on Management Information Systems, 2010.1(1): 1-20.
  20. Shibnath Mukherjee, Aryya Gangopadhyay, and Zhiyuan Chen. A Partial Optimization Approach for Privacy Preserving Frequent Itemset Mining. International Journal of Computational Models and Algorithms in Medicine, 2010. 1(1): p. 19-33. IGI Global, Hershey, PA.
  21. Madhu V. Ahluwalia, Aryya Gangopadhyay, and Zhiyuan Chen. Preserving Privacy in Mining Quantitative Association rules, International Journal of Information Security and Privacy, 2009. 3(4): p. 1-17. IGI Global, Hershey, PA.
  22. George Karabatis, Zhiyuan Chen, Vandana Janeja, Tania Lobo, Monish Advani, Mikael Lindvall, and Raimund L. Feldmann, Using Semantic Networks and Context in Search for Relevant Software Engineering Artifacts, Journal on Data Semantics, 2009, 14: p. 74-104. Springer, New York, NY, 2009.
  23. Tamas Gal, Zhiyuan Chen, and Aryya Gangopadhyay, A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes. International Journal of Information Security and Privacy, 2008. 2(3): p. 28-44.
  24. Navin Kumar, Aryya Gangopadhyay, Sanjay Bapna, George Karabatis, and Zhiyuan Chen, Measuring interestingness of discovered skewed patterns in data cubes. Decision Support Systems, 2008. 46(1): p. 429-439.
  25. Shibnath Mukherjee, Madhushri Banerjee, Zhiyuan Chen, and Aryya Gangopadhyay, A Privacy Preserving Technique for Distance-based Classification with Worst Case Privacy Guarantees. Data & Knowledge Engineering, 2008. 66(2): p. 264-288.
  26. Shibnath Mukherjee, Zhiyuan Chen, and Aryya Gangopadhyay, A Fuzzy Programming Approach for Data Reduction and Privacy in Distance Based Mining. International Journal of Information and Computer Security, 2008. 2(1): p. 27-47.
  27. Zhiyuan Chen, Aryya Gangopadhyay, George Karabatis, Steve Holden, Michael McGuire, and Cambridge Elsevier, MA., Semantic Integration of Government Data for Water Quality Management. Journal of Government Information Quarterly, 2007. 24(4): p. 716-735.
  28. Zhiyuan Chen, Aryya Gangopadhyay, George Karabatis, Michael McGuire, and Claire Welty, Semantic Integration and Knowledge Discovery for Environmental Research. Journal of Database Management, 2007. 18(1): p. 43-68.
  29. Zhiyuan Chen, Johannes Gehrke, Flip Korn, Nick Koudas, Jayavel Shanmugasundaram, and Divesh Srivastava, Index structures for matching XML twigs using relational query processors. Data & Knowledge Engineering, 2007. 60(2): p. 283-302.
  30. Navin Kumar, Aryya Gangopadhyay, George Karabatis, Sanjay Bapna, and Zhiyuan Chen, Navigation Rules for Exploring Large Multidimensional Data Cubes. International Journal of Data Warehousing and Mining, 2006. 2(4): p. 27-48.
  31. Shibnath Mukherjee, Zhiyuan Chen, and Aryya Gangopadhyay, A Privacy Preserving Technique for Euclidean Distance-Based Mining Algorithms Using Fourier-Related Transforms. VLDB Journal, 2006. 15(4): p. 293¨C315.
  32. Surajit Chaudhuri, Zhiyuan Chen, Kyuseok Shim, and Yuqing Wu, Storing XML (with XSD) in SQL Databases: Interplay of Logical and Physical Designs. IEEE Transaction on Knowledge and Data Engineering, 2005. 17(12): p. 1595-1609.
  33. Zhiyuan Chen, Flip Korn, Nick Koudas, and S. Muthukrishnan, Generalized Substring Selectivity Estimation. Journal of Computer and System Sciences, 2003. 66(1): p. 98-132.

Peer-Reviewed Conference Papers

  1. Dae-young Kim, Nujood Alodadi, Zhiyuan Chen, Karuna P. Joshi, Adina Crainiceanu, and Don Needham. MATS: A Multi-aspect and Adaptive Trust-based Situation-aware Access Control Framework for Federated Data-as-a-Service Systems. IEEE International Conference on Service Computing (SCC), 2022 (regular paper, acceptance rate 32.8%).

  2.  Laylon Mokry, Paul Slife, Patrick Bishop, Jose Quiroz, Cooper Guzzi, Zhiyuan Chen, Adina and Crainiceanu and Don Needham, Efficient and Privacy-Preserving Collaborative Intrusion Detection Using Additive Secret Sharing and Differential Privacy, Workshop on Big Data for Cybersecurity (BigCyber) at IEEE Big Data Conference (IEEE BigData 2020), USA, December 15-18, 2021.

  3. Varun Mandalapu, Lujie Chen, Zhiyuan Chen and Jiaqi Gong, Student-centric Model of Login Patterns: A Case Study with Learning Management Systems, Fourteenth International Conference on Educational Data Mining, Paris, France, June 29-July 2, 2021. (acceptance rate 22%)

  4. Payton Schubel, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, and Don Needham, A Semantic Framework for Secure and Efficient Contact Tracing of Infectious Diseases. IEEE International Conference on Bioinformatics and Biomedicine (BIBM), 2021. (acceptance rate 20%)

  5. Masnoon Nafees, Shimei Pan, Zhiyuan Chen and James Foulds, Impostor GAN: Toward Modeling Social Media User Impersonation with Generative Adversarial Networks. 2nd International Workshop on Deceptive AI, 2021.

  6. Zhang, Wenbin, Mingli Zhang, Ji Zhang, Zhen Liu, Zhiyuan Chen, Jianwu Wang, Edward Raff, and Enza Messina. Flexible and Adaptive Fairness-aware Learning in Non-stationary Data Streams. In 2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI), pp. 399-406. IEEE, 2020.

  7. Samson Oni, Kajal Pansare, Sukrit Singh Arneja, Zhiyuan Chen, Adina Crainiceanu, and Don Needham, RDFINT: A Benchmark for Comparing Data Warehouse with Virtual Integration Approaches for Integration of RDF Data, in Fourth IEEE International Workshop on Benchmarking, Performance Tuning and Optimization for Big Data Applications (BPOD 2020) at IEEE Big Data Conference (IEEE BigData 2020), USA, December 10-14, 2020.

  8. Samson Oni, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, Don Needham, A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting, IEEE International Conference on Service Computing (SCC), accepted, 2020 (regular paper).

  9. Fan Yang, Adina Crainiceanu, Zhiyuan Chen, Don Needham, Cluster-Based Join for Geographically Distributed Big RDF Data, IEEE BigData Congress, accepted, 2019. (Acceptance rate 23%).

  10. . Samson Oni, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, Don Needham, Situation-Aware Access Control in Federated Data-as-a-Service for Maritime Search and Rescue, IEEE International Conference on Service Computing (SCC), accepted, 2019.

  11.  Fan Yang, Zhiyuan Chen, Aryya Gangopadhyay. Using Randomness to Improve Robustness of Tree-based Models Against Evasion Attacks, 5th ACM International Workshop on Security and Privacy Analytics 2019, Dallas, Texas, March 27, 2019.

  12. Pooja Parameshwarappa, Zhiyuan Chen, Gangopadhyay, Analyzing Attack Strategies Against Rule Based Intrusion Detection Systems, International Workshop on Analytics for Security in Cyber Physical Systems, Varanasi, India, January 4, 2018.

  13. Ohud Alqahtani, Zhiyuan Chen, Qiong Huang, Karthik Gottipati, Is Bigger Safer? Analyzing Factors Related to Data Breaches Using Publicly Available Information, in Fourth International Conference on Information Systems Security and Privacy (ICISSP), January 22-24, Funchai, Portugal, 2018.

  14. Ashwinkumar Ganesan, Pooja Parameshwarappa, Akshay Peshave, Zhiyuan Chen, Tim Oates, Extending Signature-based Intrusion Detection Systems With Bayesian Abductive Reasoning. DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security (DYNAMICS) Workshop, December 3-7, San Juan, Puerto Rico, USA, 2018.

  15. Pei Guo, Jianwu Wang, Zhiyuan Chen, A Comparison of Big Data Application Programming Approaches: A Travel Companion Case Study, in First IEEE International Workshop on Benchmarking, Performance Tuning and Optimization for Big Data Applications (BPOD 2017), Boston, USA, December 11-14, 2017.

  16. Ahmed Aleroud, Zhiyuan Chen, George Karabatis, Network traffic Anonymization Using a Prefix- Preserving Condensation-based Technique, in Proc. of Cloud and Trusted Computing 2016, 24-26 Oct 2016, Rhodes, Greece.

  17. Castillo, Saul Ricardo Medrano, and Zhiyuan Chen, Using Transfer Learning to Identify Privacy Leaks in Tweets. In Collaboration and Internet Computing (CIC), 2016 IEEE 2nd International Conference on, pp. 506-513. IEEE, 2016.
  18. Ding, Tao, Arpita Roy, Zhiyuan Chen, Qian Zhu, and Shimei Pan, Analyzing and retrieving illicit drug-related posts from social media. In Bioinformatics and Biomedicine (BIBM), 2016 IEEE International Conference on, pp. 1555-1560. IEEE, 2016.

  19. Li Xue, Yun Xiong, yangyong Zhu, Jianfeng Wu, Zhiyuan Chen. Stock Trend Prediction By Classifying Aggregative Web Topic Opinion, in Proc. of The 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Gold Coast, Australia., 2013. (Acceptance rate: 11.3%)    

  20. Xue Bai, Yun Xiong, Yangyong Zhu, Qi Liu, Zhiyuan Chen: Co-anomaly Event Detection in Multiple Temperature Series. Knowledge Science, Engineering and Management - 6th International Conference, KSEM 2013, Dalian, China, August 10-12, 2013: 1-14. Lecture Notes in Computer Science Volume 8041, 2013 (best paper award).

  21. Madhu Ahluwalia, Aryya Gangopadhyay, Zhiyuan Chen, and Yelena Yesha, Target-Based Privacy Preserving Association Rule Mining, in Proc. of ACM Symposium On Applied Computing (SAC), Taiwan, pp. 960-965, 2011.   

  22. Madhushri Banerjee, Zhiyuan Chen, and Aryya Gangopadhyay, A Utility-Aware and Holistic Approach for Privacy Preserving Distributed Mining with Worst Case Privacy Guarantee, in Proc. of Secure Knowledge Management Workshop, New Brunswick, NJ, October 21-22, 2010.

  23. Somnath Chakrabarti, Zhiyuan Chen, Aryya Gangopadhyay, and Shibnath Mukherjee. Privacy Preserving Linear Discriminant Analysis from Perturbed Data, in Proc. of ACM Symposium on Applied Computing, Sierre, Switzerland, March 22 - March 26, 2010.

  24. Yu Fu, Zhiyuan Chen, A. Gunes Koru, and Aryya Gangopadhyay. A Privacy Protection Technique for Publishing Data Mining Models and Supporting Data. The Nineteenth Annual Workshop on Information Technologies and Systems (WITS'09), Phoenix, Arizona, USA, 14-15 December 2009.

  25. Yu Fu, A. Gunes Koru, Zhiyuan Chen, and Khaled El Emam, A Tree-Based Approach to Preserve Privacy of Software Engineering Data and Predictive Models. The International Conference on Predictor Models in Software Engineering, 2009, Vancouver, Canada.

  26. Mikael Lindvall, Raimund L. Feldmann, George Karabatis, Zhiyuan Chen, and Vandana P. Janeja, Searching for Relevant Software Change Artifacts using Semantic Networks. ACM Symposium on Applied Computing, 2009, Hawaii.

  27.   Shibnath Mukherjee, Zhiyuan Chen, Aryya Gangopadhyay, and Stephen Russell, A Secure Face Recognition System for Mobile-devices without The Need of Decryption. Workshop on Secure Knowledge Management (SKM 2008), 2008, Dallas, Texas.

  28. Shenghuo Zhu, Tao Li, Zhiyuan Chen, Dingding Wang, and Yihong Gong, Dynamic Active Probing of Helpdesk Databases. International Conference on Very Large Data Bases, 2008, Auckland, New Zealand: p. 748-760(Acceptance rate: 16.7%).

  29. Madhu Ahluwalia, Zhiyuan Chen, Aryya Gangopadhyay, and Zhiling Guo, Preserving Privacy in Supply Chain Management: a Challenge for Next Generation Data Mining. NSF Symposium on next generation data mining, 2007.

  30. Zhiyuan Chen and Tao Li, Addressing Diverse User Preferences in SQL-Query-Result Navigation. ACM SIGMOD Conference, 2007, Beijing, China: p. 641-652(Acceptance rate: 14%).

  31.   Dongsong Zhang, George Karabatis, Zhiyuan Chen, Boonlit Adipat, Liwei Dai, Tony Zhang, and Yu Wang, Personalization and Visualization on Handheld Devices. ACM Symposium on Applied Computing, 2006, Dijon, France: p. 1008-1012.

  32. Zhiyuan Chen, Johannes Gehrke, Flip Korn, Nick Koudas, Jayavel Shanmugasundaram, and Divesh Srivastava, Index Structures for Matching XML Twigs Using Relational Query Processors. International Workshop on XML Schema and Data Management (XSDM'05), 2005.

  33.   Surajit Chaudhuri, Zhiyuan Chen, Kyuseok Shim, and Yuqing Wu, Storing XML (with XSD) in SQL Databases: Interplay of Logical and Physical Designs. International Conference on Data Engineering (ICDE), 2004(Acceptance rate: 20%).

  34. Zhiyuan Chen, Johannes Gehrke, and Flip Korn, Query Optimization in Compressed Database Systems. ACM SIGMOD International Conference on Management of Data, 2001: p. 271-282(Acceptance rate: 15%).

  35. Zhiyuan Chen, H.V. Jagadish, Flip Korn, Nick Koudas, S.Muthukrishnan, Raymond Ng, and Divesh Srivastava, Counting Twig Matches in A Tree. International Conference on Data Engineering (ICDE), 2001: p. 595-604(Acceptance rate: 17%).

  36.  Zhiyuan Chen, Flip Korn, Nick Koudas, and S.Muthukrishnan, Selectivity Estimation for Boolean Queries. ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), 2000: p. 216-225(Acceptance rate: 22%).

  37. Zhiyuan Chen and Praveen Seshadri, An Algebraic Compression Framework for Query Results. International Conference on Data Engineering (ICDE), 2000: p. 177-188(Acceptance rate: 14%).

  38. Philippe Bonnet, Kyle Buza, Zhiyuan Chen, Victor Cheng, Randolph Chung, Takako~M. Hickey, Ryan Kennedy, Daniel Mahashin, Tobias Mayr, Ivan Oprencak, Praveen Seshadri, and Hubert Siu., The Cornell Jaguar System: Adding Mobility to Predator. ACM SIGMOD International Conference on Management of Data, 1999: p. 580-581.

None Peer-Reviewed Journal Articles

Patents
¡¡