scispace - formally typeset
M

Murat Kantarcioglu

Researcher at University of Texas at Dallas

Publications -  350
Citations -  11347

Murat Kantarcioglu is an academic researcher from University of Texas at Dallas. The author has contributed to research in topics: Information privacy & Cloud computing. The author has an hindex of 47, co-authored 324 publications receiving 9873 citations. Previous affiliations of Murat Kantarcioglu include New York University Abu Dhabi & Harvard University.

Papers
More filters
Journal ArticleDOI

Privacy-preserving distributed mining of association rules on horizontally partitioned data

TL;DR: In this paper, the authors address secure mining of association rules over horizontally partitioned data. And they incorporate cryptographic techniques to minimize the information shared, while adding little overhead to the mining task.
Journal ArticleDOI

Tools for privacy preserving distributed data mining

TL;DR: This paper presents some components of a toolkit of components that can be combined for specific privacy-preserving data mining applications, and shows how they can be used to solve several Privacy preserving data mining problems.
Proceedings Article

Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.

TL;DR: A novel attack that exploits data access pattern leakage to disclose significant amount of sensitive information using a modicum of prior knowledge is introduced and is able to disclose sensitive information with a very high accuracy.
Proceedings ArticleDOI

Efficient Similarity Search over Encrypted Data

TL;DR: This paper proposes an efficient scheme for similarity search over encrypted data and utilizes a state-of-the-art algorithm for fast near neighbor search in high dimensional spaces called locality sensitive hashing to ensure the confidentiality of the sensitive data.
Journal ArticleDOI

Security and Privacy in Cyber-Physical Systems: A Survey of Surveys

TL;DR: The authors have provided a classification in CPS Domains, Attacks, Defenses, Research-trends, Network-security, Security level implementation, and Computational Strategies which makes this survey a unique and I believe very helpful article.