M
Murat Kantarcioglu
Researcher at University of Texas at Dallas
Publications - 350
Citations - 11347
Murat Kantarcioglu is an academic researcher from University of Texas at Dallas. The author has contributed to research in topics: Information privacy & Cloud computing. The author has an hindex of 47, co-authored 324 publications receiving 9873 citations. Previous affiliations of Murat Kantarcioglu include New York University Abu Dhabi & Harvard University.
Papers
More filters
Journal ArticleDOI
Privacy-preserving distributed mining of association rules on horizontally partitioned data
Murat Kantarcioglu,Chris Clifton +1 more
TL;DR: In this paper, the authors address secure mining of association rules over horizontally partitioned data. And they incorporate cryptographic techniques to minimize the information shared, while adding little overhead to the mining task.
Journal ArticleDOI
Tools for privacy preserving distributed data mining
TL;DR: This paper presents some components of a toolkit of components that can be combined for specific privacy-preserving data mining applications, and shows how they can be used to solve several Privacy preserving data mining problems.
Proceedings Article
Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.
TL;DR: A novel attack that exploits data access pattern leakage to disclose significant amount of sensitive information using a modicum of prior knowledge is introduced and is able to disclose sensitive information with a very high accuracy.
Proceedings ArticleDOI
Efficient Similarity Search over Encrypted Data
TL;DR: This paper proposes an efficient scheme for similarity search over encrypted data and utilizes a state-of-the-art algorithm for fast near neighbor search in high dimensional spaces called locality sensitive hashing to ensure the confidentiality of the sensitive data.
Journal ArticleDOI
Security and Privacy in Cyber-Physical Systems: A Survey of Surveys
TL;DR: The authors have provided a classification in CPS Domains, Attacks, Defenses, Research-trends, Network-security, Security level implementation, and Computational Strategies which makes this survey a unique and I believe very helpful article.