The material is presented to ensure timely dissemination of
scholarly and technical work. Copyright and all rights therein are retained by authors
or by other copyright holders. All persons copying
this information are expected to adhere to the terms and constraints invoked by
each author's copyright. In most cases, these works may not be reposted without
the explicit permission of the copyright holder.
Peer-Reviewed Journal Articles
- Saydeh
Karabatis, Vandana Janeja, Zhiyuan Chen, “A Neuro-symbolic GeoAI Framework
for Extraction of Travel Routes from Unstructured Texts”, Transactions in
GIS, accepted, 2025.
- Antonios
Xenakis, Zhiyuan Chen, George Karabatis, “A
Cluster-based Approach for Distributed Anonymization of Vertically
Partitioned Data.” International Journal of Web Engineering and
Technology, 19(4), 397-420, 2024.
- Antonios
Xenakis, Sabrina Mamtaz Nourin, Zhiyuan Chen, George Karabatis, Ahmed
Aleroud, and Jhancy Amarsingh. "A
Self-Adaptive and Secure Approach to Share Network Trace Data."
Digital Threats: Research and Practice, accepted, 2023
- Fan
Yang, Adina Crainiceanu, Zhiyuan Chen, Don Needham, Cluster-Based Join for
Federated SPAQL Queries, IEEE Transactions on Knowledge and Data
Engineering, 35(4), 3525 - 3539, 2023.
- Fan
Yang, Zhiyuan Chen, Aryya Gangopadhyay, Using
Randomness to Improve Robustness of Tree-based Models Against Evasion
Attacks, IEEE Transactions on Knowledge and Data Engineering, 34(2),
969-982, 2022.
- Fan
Yang, Adina Crainiceanu, Zhiyuan Chen, Don Needham, Cluster-Based Join for
Federated SPAQL Queries, IEEE Transactions on Knowledge and Data
Engineering, accepted in 2021.
- Ohud
Saud Alqahtani, Zhiyuan Chen, Statistical
Analysis of Relationships of U.S. Organizations’ Size, Popularity, Age,
and Location to Frequency of Data Breaches, Journal of Data Protection
and Privacy, 4(4), 404-423, 2021.
- Pooja
Parameshwarappa, Zhiyuan Chen, Gunes Koru, Anonymization
of Daily Activity Data by Using l-diversity Privacy Model, ACM
Transactions on Management Information Systems,12(3), 1-21, 2021.
- Ahmed
AlEroud, Fan Yang, Sai Chaithanya Pallaprolu, Zhiyuan Chen, and George
Karabatis, Anonymization
of Network Trace Data through Condensation-based Differential Privacy,
ACM Digital Threats: Research and Practice, 2(4), 1-23, 2021.
- Pooja
Parameshwarappa, Zhiyuan Chen, Gunes Koru, Efficient
Approach for Anonymizing Large-Scale Physical Activity Data: Multi-level
Clustering Based Anonymization, International Journal of Information
Security and Privacy, 14(3), 72-94, 2020.
- Samson
Oni, Zhiyuan Chen, Susan Hoban, Onimi Jademi, A
Comparative Study of Data Cleaning Tools, International Journal of Data
Warehousing and Mining, 15(4), 48-65, 2019.
- Madhu
Ahluwalia, Aryya Gangopadhyay, Zhiyuan Chen, and Yelena
Yesha. Target-Based,
Privacy Preserving, and Incremental Association Rule Mining, IEEE
Transactions on Services Computing, 10(4), 2017.
- Shaikha
Al-Duaij, Zhiyuan Chen, and Aryya Gangopadhyay. Using
Crowd Sourcing to Analyze Consumers’ Response to Privacy Policies of
Online Social Network and Financial Institutions at Micro Level,
International Journal of Information Security and Privacy, 10(2), 2016.
- Tamas
S, Gal, Thomas C. Tucker, Aryya Gangopadhyay, and Zhiyuan Chen. A Data
Recipient Centered De-identification Method to Retain Statistical
Attributes. Journal of biomedical informatics, August 2014, 50: 32-45.
- Madhushri
Banerjee, Zhiyuan Chen, and Aryya Gangopadhyay. "A generic and
distributed privacy preserving classification method with a worst-case
privacy guarantee." Distributed and Parallel Databases, 32(1):
5-35, 2014.
- Liang
Tang, Tao Li, Yexi Jiang, and zhiyuan chen. Dynamic
Query Forms for Database Queries. IEEE Transactions on Knowledge and
Data Engineering, 26(9): 2166 - 2178, 2014.
- Zhiyuan
Chen, Tao Li, and Yanan Sun, A
Learning Approach to SQL Query Results Ranking Using Skyline and Users'
Current Navigational Behavior. IEEE Transactions on Knowledge and Data
Engineering, Volume 25 Issue 12, December 2013, Pages 2683-2693.
- Dongjin
Kim, Zhiyuan Chen and Aryya Gangopadhyay, Optimizing
Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based
Classification, International Journal of Information Security and
Privacy, 2012. 6(2): 16-33.
- Pimwadee
Chaovalit, Aryya Gangopadhyay, George Karabatis, and Zhiyuan Chen, Discrete
Wavelet Transform-based Time Series Analysis and Mining. ACM Computing
Surveys, 2011. 43(2): p. 1-37.
- Yu
Fu, Zhiyuan Chen, A. Gunes Koru, and Aryya Gangopadhyay. A
Privacy Protection Technique for Publishing Data Mining Models and
Research Data, ACM Transactions on Management Information Systems,
2010.1(1): 1-20.
- Shibnath
Mukherjee, Aryya Gangopadhyay, and Zhiyuan Chen. A
Partial Optimization Approach for Privacy Preserving Frequent Itemset
Mining. International Journal of Computational Models and Algorithms
in Medicine, 2010. 1(1): p. 19-33. IGI Global, Hershey, PA.
- Madhu
V. Ahluwalia, Aryya Gangopadhyay, and Zhiyuan Chen. Preserving
Privacy in Mining Quantitative Association rules, International Journal of
Information Security and Privacy, 2009. 3(4): p. 1-17. IGI Global,
Hershey, PA.
- George
Karabatis, Zhiyuan Chen, Vandana Janeja, Tania Lobo, Monish
Advani, Mikael Lindvall, and Raimund L. Feldmann, Using Semantic Networks
and Context in Search for Relevant Software Engineering Artifacts, Journal
on Data Semantics, 2009, 14: p. 74-104. Springer, New York, NY, 2009.
- Tamas
Gal, Zhiyuan Chen, and Aryya Gangopadhyay, A
Privacy Protection Model for Patient Data with Multiple Sensitive
Attributes. International Journal of Information Security and
Privacy, 2008. 2(3): p. 28-44.
- Navin
Kumar, Aryya Gangopadhyay, Sanjay Bapna, George Karabatis, and Zhiyuan
Chen, Measuring
interestingness of discovered skewed patterns in data cubes. Decision
Support Systems, 2008. 46(1): p. 429-439.
- Shibnath
Mukherjee, Madhushri Banerjee, Zhiyuan Chen, and Aryya
Gangopadhyay, A Privacy
Preserving Technique for Distance-based Classification with Worst Case
Privacy Guarantees. Data & Knowledge Engineering,
2008. 66(2): p. 264-288.
- Shibnath
Mukherjee, Zhiyuan Chen, and Aryya Gangopadhyay, A Fuzzy
Programming Approach for Data Reduction and Privacy in Distance Based
Mining. International Journal of Information and Computer
Security, 2008. 2(1): p. 27-47.
- Zhiyuan
Chen, Aryya Gangopadhyay, George Karabatis, Steve Holden, Michael
McGuire, and Cambridge Elsevier, MA., Semantic
Integration of Government Data for Water Quality Management. Journal
of Government Information Quarterly, 2007. 24(4): p. 716-735.
- Zhiyuan
Chen, Aryya Gangopadhyay, George Karabatis, Michael McGuire, and
Claire Welty, Semantic
Integration and Knowledge Discovery for Environmental Research. Journal
of Database Management, 2007. 18(1): p. 43-68.
- Zhiyuan
Chen, Johannes Gehrke, Flip Korn, Nick Koudas, Jayavel
Shanmugasundaram, and Divesh Srivastava, Index
structures for matching XML twigs using relational query processors. Data
& Knowledge Engineering, 2007. 60(2): p. 283-302.
- Navin
Kumar, Aryya Gangopadhyay, George Karabatis, Sanjay Bapna, and Zhiyuan
Chen, Navigation
Rules for Exploring Large Multidimensional Data Cubes. International
Journal of Data Warehousing and Mining, 2006. 2(4): p. 27-48.
- Shibnath
Mukherjee, Zhiyuan Chen, and Aryya Gangopadhyay, A
Privacy Preserving Technique for Euclidean Distance-Based Mining
Algorithms Using Fourier-Related Transforms. VLDB Journal,
2006. 15(4): p. 293–315.
- Surajit
Chaudhuri, Zhiyuan Chen, Kyuseok Shim, and Yuqing Wu, Storing
XML (with XSD) in SQL Databases: Interplay of Logical and Physical Designs. IEEE
Transaction on Knowledge and Data Engineering, 2005. 17(12):
p. 1595-1609.
- Zhiyuan
Chen, Flip Korn, Nick Koudas, and S. Muthukrishnan, Generalized
Substring Selectivity Estimation. Journal of Computer and
System Sciences, 2003. 66(1): p. 98-132.
Peer-Reviewed Conference Papers
- Sai
Rapelli, Zhiyuan Chen, and Wei Lu, A
LSTM with Dual-stage Attention Method to Predict Amine Emissions for
Carbon Dioxide Capture and Storage, Workshop on Big Data Analytics for
Sustainability (BDA4S) at IEEE Big Data Conference (IEEE BigData 2024),
Washington DC, USA, December 15-18, 2024.
- Dodavah
Mowoh and Zhiyuan Chen, A
Beam-Search Based Method to Select Classification and Imputation Methods
for Fair and Accurate Data Analysis, Fourth International Workshop on
Data science for equality, inclusion and well-being challenges (DS4EIW
2024) at IEEE Big Data Conference (IEEE BigData 2024), Washington DC, USA,
December 15-18, 2024.
- Dae-young
Kim, Nujood Alodadi, Zhiyuan Chen, Karuna P. Joshi, Adina Crainiceanu, and
Don Needham. MATS: A
Multi-aspect and Adaptive Trust-based Situation-aware Access Control
Framework for Federated Data-as-a-Service Systems. IEEE International
Conference on Service Computing (SCC), 2022 (regular paper, acceptance
rate 32.8%).
- Laylon
Mokry, Paul Slife, Patrick Bishop, Jose Quiroz, Cooper Guzzi, Zhiyuan
Chen, Adina and Crainiceanu and Don Needham, Efficient
and Privacy-Preserving Collaborative Intrusion Detection Using Additive
Secret Sharing and Differential Privacy, Workshop on Big Data for
Cybersecurity (BigCyber) at IEEE Big Data Conference (IEEE BigData 2020),
USA, December 15-18, 2021.
- Varun
Mandalapu, Lujie Chen, Zhiyuan Chen and Jiaqi Gong, Student-centric
Model of Login Patterns: A Case Study with Learning Management Systems,
Fourteenth International Conference on Educational Data Mining, Paris,
France, June 29-July 2, 2021. (acceptance rate 22%)
- Payton
Schubel, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, and Don
Needham, A
Semantic Framework for Secure and Efficient Contact Tracing of Infectious
Diseases. IEEE International Conference on Bioinformatics and
Biomedicine (BIBM), 2021. (acceptance rate 20%)
- Masnoon
Nafees, Shimei Pan, Zhiyuan Chen and James Foulds, Impostor GAN: Toward
Modeling Social Media User Impersonation with Generative Adversarial
Networks. 2nd International Workshop on Deceptive AI, 2021.
- Zhang,
Wenbin, Mingli Zhang, Ji Zhang, Zhen Liu, Zhiyuan Chen, Jianwu Wang,
Edward Raff, and Enza Messina. Flexible and Adaptive Fairness-aware
Learning in Non-stationary Data Streams. In 2020 IEEE 32nd International
Conference on Tools with Artificial Intelligence (ICTAI), pp. 399-406.
IEEE, 2020.
- Samson
Oni, Kajal Pansare, Sukrit Singh Arneja, Zhiyuan Chen, Adina Crainiceanu,
and Don Needham, RDFINT:
A Benchmark for Comparing Data Warehouse with Virtual Integration
Approaches for Integration of RDF Data, in Fourth IEEE International
Workshop on Benchmarking, Performance Tuning and Optimization for Big Data
Applications (BPOD 2020) at IEEE Big Data Conference (IEEE BigData 2020),
USA, December 10-14, 2020.
- Samson
Oni, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, Don Needham, A
Framework for Situation-Aware Access Control in Federated
Data-as-a-Service Systems Based on Query Rewriting, IEEE International
Conference on Service Computing (SCC), accepted, 2020 (regular paper).
- Fan
Yang, Adina Crainiceanu, Zhiyuan Chen, Don Needham, Cluster-Based
Join for Geographically Distributed Big RDF Data, IEEE BigData
Congress, accepted, 2019. (Acceptance rate 23%).
- .
Samson Oni, Zhiyuan Chen, Adina Crainiceanu, Karuna Joshi, Don
Needham, Situation-Aware
Access Control in Federated Data-as-a-Service for Maritime Search and
Rescue, IEEE International Conference on Service Computing (SCC),
accepted, 2019.
- Fan
Yang, Zhiyuan Chen, Aryya Gangopadhyay. Using
Randomness to Improve Robustness of Tree-based Models Against Evasion
Attacks, 5th ACM International Workshop on Security and Privacy
Analytics 2019, Dallas, Texas, March 27, 2019.
- Pooja
Parameshwarappa, Zhiyuan Chen, Gangopadhyay, Analyzing
Attack Strategies Against Rule Based Intrusion Detection Systems,
International Workshop on Analytics for Security in Cyber Physical Systems,
Varanasi, India, January 4, 2018.
- Ohud
Alqahtani, Zhiyuan Chen, Qiong Huang, Karthik Gottipati, Is Bigger
Safer? Analyzing
Factors Related to Data Breaches Using Publicly Available Information,
in Fourth International Conference on Information Systems Security and
Privacy (ICISSP), January 22-24, Funchai, Portugal, 2018.
- Ashwinkumar
Ganesan, Pooja Parameshwarappa, Akshay Peshave, Zhiyuan Chen, Tim
Oates, Extending
Signature-based Intrusion Detection Systems With Bayesian Abductive
Reasoning. DYnamic and Novel Advances in Machine Learning and
Intelligent Cyber Security (DYNAMICS) Workshop, December 3-7, San Juan,
Puerto Rico, USA, 2018.
- Pei
Guo, Jianwu Wang, Zhiyuan Chen, A
Comparison of Big Data Application Programming Approaches: A Travel
Companion Case Study, in First IEEE International Workshop on
Benchmarking, Performance Tuning and Optimization for Big Data
Applications (BPOD 2017), Boston, USA, December 11-14, 2017.
- Ahmed
Aleroud, Zhiyuan Chen, George Karabatis, Network
traffic Anonymization Using a Prefix- Preserving Condensation-based
Technique, in Proc. of Cloud and Trusted Computing 2016, 24-26 Oct
2016, Rhodes, Greece.
- Castillo,
Saul Ricardo Medrano, and Zhiyuan Chen, Using
Transfer Learning to Identify Privacy Leaks in Tweets. In Collaboration
and Internet Computing (CIC), 2016 IEEE 2nd International Conference on,
pp. 506-513. IEEE, 2016.
- Ding,
Tao, Arpita Roy, Zhiyuan Chen, Qian Zhu, and Shimei Pan, Analyzing
and retrieving illicit drug-related posts from social media. In
Bioinformatics and Biomedicine (BIBM), 2016 IEEE International Conference
on, pp. 1555-1560. IEEE, 2016.
- Li
Xue, Yun Xiong, yangyong Zhu, Jianfeng Wu, Zhiyuan Chen. Stock
Trend Prediction By Classifying Aggregative Web
Topic Opinion, in Proc. of The 17th
Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD),
Gold Coast, Australia., 2013. (Acceptance rate:
11.3%)
- Xue
Bai, Yun Xiong, Yangyong Zhu, Qi Liu, Zhiyuan Chen: Co-anomaly
Event Detection in Multiple Temperature Series. Knowledge Science,
Engineering and Management - 6th International Conference, KSEM 2013,
Dalian, China, August 10-12, 2013: 1-14. Lecture Notes in Computer Science
Volume 8041, 2013 (best paper award).
- Madhu
Ahluwalia, Aryya Gangopadhyay, Zhiyuan Chen, and Yelena
Yesha, Target-Based
Privacy Preserving Association Rule Mining, in Proc. of ACM Symposium
On Applied Computing (SAC), Taiwan, pp. 960-965, 2011.
- Madhushri
Banerjee, Zhiyuan Chen, and Aryya Gangopadhyay, A
Utility-Aware and Holistic Approach for Privacy Preserving Distributed
Mining with Worst Case Privacy Guarantee, in Proc. of Secure Knowledge
Management Workshop, New Brunswick, NJ, October 21-22, 2010.
- Somnath
Chakrabarti, Zhiyuan Chen, Aryya Gangopadhyay, and Shibnath
Mukherjee. Privacy
Preserving Linear Discriminant Analysis from Perturbed Data, in Proc.
of ACM Symposium on Applied Computing, Sierre, Switzerland, March 22 -
March 26, 2010.
- Yu
Fu, Zhiyuan Chen, A. Gunes Koru, and Aryya Gangopadhyay. A
Privacy Protection Technique for Publishing Data Mining Models and
Supporting Data. The Nineteenth Annual Workshop on Information
Technologies and Systems (WITS'09), Phoenix, Arizona, USA, 14-15
December 2009.
- Yu Fu,
A. Gunes Koru, Zhiyuan Chen, and Khaled El Emam, A
Tree-Based Approach to Preserve Privacy of Software Engineering Data and
Predictive Models. The International Conference on Predictor Models in
Software Engineering, 2009, Vancouver, Canada.
- Mikael
Lindvall, Raimund L. Feldmann, George Karabatis, Zhiyuan Chen,
and Vandana P. Janeja, Searching for Relevant Software Change
Artifacts using Semantic Networks. ACM Symposium on Applied Computing,
2009, Hawaii.
- Shibnath
Mukherjee, Zhiyuan Chen, Aryya Gangopadhyay, and Stephen
Russell, A
Secure Face Recognition System for Mobile-devices without The Need of
Decryption. Workshop on Secure Knowledge Management (SKM 2008),
2008, Dallas, Texas.
- Shenghuo
Zhu, Tao Li, Zhiyuan Chen, Dingding Wang, and Yihong
Gong, Dynamic
Active Probing of Helpdesk Databases. International Conference on
Very Large Data Bases, 2008, Auckland, New Zealand: p. 748-760(Acceptance
rate: 16.7%).
- Madhu
Ahluwalia, Zhiyuan Chen, Aryya Gangopadhyay, and Zhiling
Guo, Preserving Privacy in Supply Chain Management: a Challenge for Next Generation Data Mining. NSF
Symposium on next generation data mining, 2007.
- Zhiyuan
Chen and Tao Li, Addressing
Diverse User Preferences in SQL-Query-Result Navigation. ACM
SIGMOD Conference, 2007, Beijing, China: p. 641-652(Acceptance rate: 14%).
- Dongsong
Zhang, George Karabatis, Zhiyuan Chen, Boonlit Adipat, Liwei
Dai, Tony Zhang, and Yu Wang, Personalization
and Visualization on Handheld Devices. ACM Symposium on Applied
Computing, 2006, Dijon, France: p. 1008-1012.
- Zhiyuan
Chen, Johannes Gehrke, Flip Korn, Nick Koudas, Jayavel
Shanmugasundaram, and Divesh Srivastava, Index Structures for
Matching XML Twigs Using Relational Query Processors. International
Workshop on XML Schema and Data Management (XSDM'05), 2005.
- Surajit
Chaudhuri, Zhiyuan Chen, Kyuseok Shim, and Yuqing Wu, Storing
XML (with XSD) in SQL Databases: Interplay of Logical and Physical Designs.
International Conference on Data Engineering (ICDE), 2004(Acceptance rate:
20%).
- Zhiyuan
Chen, Johannes Gehrke, and Flip Korn, Query
Optimization in Compressed Database Systems. ACM SIGMOD
International Conference on Management of Data, 2001: p.
271-282(Acceptance rate: 15%).
- Zhiyuan
Chen, H.V. Jagadish, Flip Korn, Nick Koudas, S.Muthukrishnan, Raymond
Ng, and Divesh Srivastava, Counting
Twig Matches in A Tree. International Conference on Data
Engineering (ICDE), 2001: p. 595-604(Acceptance rate: 17%).
- Zhiyuan
Chen, Flip Korn, Nick Koudas, and S.Muthukrishnan, Selectivity
Estimation for Boolean Queries. ACM SIGMOD-SIGACT-SIGART Symposium
on Principles of Database Systems (PODS), 2000: p. 216-225(Acceptance
rate: 22%).
- Zhiyuan
Chen and Praveen Seshadri, An
Algebraic Compression Framework for Query Results. International
Conference on Data Engineering (ICDE), 2000: p. 177-188(Acceptance rate:
14%).
- Philippe
Bonnet, Kyle Buza, Zhiyuan Chen, Victor Cheng, Randolph Chung,
Takako~M. Hickey, Ryan Kennedy, Daniel Mahashin, Tobias Mayr, Ivan
Oprencak, Praveen Seshadri, and Hubert Siu., The Cornell Jaguar
System: Adding Mobility to Predator. ACM SIGMOD International
Conference on Management of Data, 1999: p. 580-581.
None Peer-Reviewed
Journal Articles
Patents
- Zhiyuan
Chen, Surajit Chaudhuri, Kyuseok Shim, Yuqing Yu:
``Transformation Tool for Mapping XML to Relational Database''.
US Patent 7,228,312.
- Z.
Chen, F. Korn, N. Koudas, S. Muthukrishnan:
``Multidimensional Substring Selectivity Estimation Using Set Hashing Of Cross-Counts''.
US Patent 6,738,762
- Zhiyuan
Chen, Flip Korn, Nick Koudas, Divesh Srivastava, Johannes Gehrke, Jayavel
Shanmugasundaram:
``Method for Matching XML Twigs Using Index Structures and Relational
Query Processors''. US Patent App. 10/937,641
- Zhiyuan
Chen, Flip Korn, Nick Koudas, S. Muthukrishnan:
``Method and Apparatus for Estimating the Selectivity of Boolean Queries''. US patent pending.
- Zhiyuan
Chen, H.V. Jagadish, Flip Korn, Nick Koudas, S., Muthukrishnan, Raymond
Ng, and Divesh Srivastava:
``Counting Twig Matches in a Tree''. US patent
pending.