Please visit my Google Scholar page for a more up-to-date list.
JOURNAL / MAGAZINE ARTICLES
- Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
E. Ayday, Q. Tang, and A. Yilmaz
to appear in IEEE Transactions on Dependable and Secure Computing, 2017. - Quantifying Interdependent Risks in Genomic Privacy
E. Ayday and M. Humbert
to appear in IEEE Security and Privacy Magazine, 2017. - An Inference Attack on Genomic Data Using Kinship, Complex Correlations, and Phenotype Information
I. Daznabi, M. Mobayen, N. Jafari, O. Tastan, and E. Ayday
to appear in IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2017. - Privacy-Preserving Aggregate Queries for Optimal Location Selection
E. Yilmaz, H. Ferhatosmanoglu, E. Ayday, and R. C. Aksoy
to appear in IEEE Transactions on Dependable and Secure Computing, 2017. - Quantifying Interdependent Risks in Genomic Privacy
M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti
to appear in ACM Transaction on Privacy and Security (formerly known as TISSEC), 2016. - A Privacy-Preserving Solution for Compressed Storage and Selective Retrieval of Genomic Data
Z. Huang, E. Ayday, H. Lin, et al.
to appear in Genome Research, 2016. - Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
E. Ayday, Q. Tang, and A. Yilmaz
Cryptology ePrint Archive: Report 2016/478, May 2016. PDF - Privacy-preserving genomic testing in the clinic - a model using HIV treatment
2. P.-J. McLaren, J.-L. Raisaro, M. Aouri, M. Rotger, E. Ayday et al.
Journal of Genetics in Medicine, Jan. 2016. PDF - Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?
E. Ayday, E. De Cristofaro, G. Tsudik, and J. P. Hubaux
IEEE Computer Magazine, Feb. 2015. PDF - Privacy and in the Genomic Era
M. Naveed, E. Ayday, E. W. Clayton, J. Fellay, C. A. Gunter, J.-P. Hubaux, B. A. Malin, and X. Wang
ACM Computing Surveys Volume 48, No.1, August 2015, also on arXiv: 1405.1891, 2014. PDF - On genomics, kin, and privacy
A. Telenti, E. Ayday, and J.-P. Hubaux
F1000Research 3:80 (doi: 10.12688/f1000research.4089), 2014. PDF - Patient Privacy in the Genomic Era
J.L. Reisaro, E. Ayday, and J.-P. Hubaux
PRAIX, 7 May 2014. PDF - Iterative Trust and Reputation Management Using Belief Propagation
E. Ayday and F. Fekri
IEEE Transactions on Dependable and Secure Computing, Volume 9, No.3 May/June 2012. PDF - Data Authenticity and Availability in Multi-hop Wireless Sensor Networks
E. Ayday, F. Delgosha and F. Fekri
ACM Transactions on Sensor Networks, Volume 8, Issue 2, March 2012. PDF - An Iterative Algorithm for Trust Management and Adversary Detection for Delay Tolerant Networks
E. Ayday and F. Fekri
IEEE Transactions on Mobile Computing, Volume 11, No.9, September 2012. PDF - A Secure Broadcasting Scheme to Provide Availability, Reliability and Authentication for Wireless Sensor Networks
E. Ayday and F. Fekri
Elsevier Ad Hoc Networks, Volume 10, No.7, September 2012, Pages 1278-1290. PDF - A Protocol for Data Availability in Mobile Ad-Hoc Networks in the Presence of Insider attacks
E. Ayday and F. Fekri
Elsevier Ad Hoc Networks, Volume 8, Issue 2, March 2010, Pages 181-192. PDF
REFEREED CONFERENCE / WORKSHOP PAPERS
- A Privacy-Preserving Solution for the Bipartite Ranking Problem
N. Salek, E. Ayday, and A. Guvenir
In Proceedings of the 15th IEEE International Conference on Machine Learning and Applications (IEEE ICMLA'16), 2016. - Profile Matching Across Unstructured Online Social Networks
V. Kucuk and E. Ayday
In Proceedings of International Workshop on Inference & Privacy in a Hyperconnected World (collocated with SPW 2016), 2016.PDF - Privacy-Related Consequences of Turkish Citizen Database Leak
E. Avllazagaj, E. Ayday, and E. Cicek
In Proceedings of International Workshop on Inference & Privacy in a Hyperconnected World (collocated with SPW 2016), 2016.PDF - Cryptographic Solutions for Genomic Privacy
E. Ayday
In Proceedings of International Conference on Financial Cryptography and Data Security (FC), 2016. - Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies
F. Tramèr, Z. Huang, E. Ayday and J.-P. Hubaux
In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2015.PDF - Can You Really Anonymize the Donors of Genomic Data in Today's Digital World?
M. Alser, N. Almadhoun, A. Nouri, C. Alkan and E. Ayday
In Proceedings of Data Privacy Management (DPM) International Workshop (in conjunction with ESORICS), 2015.PDF - A New Inference Attack against Kin Genomic Privacy
F. Balci, H. Kulan, C. Alkan and E. Ayday
In Privacy-aware computational genomics (PRIVAGEN), Tokyo, Japan, September 2015.PDF - Identifying Anonymous Donors of Genetic Information
M. Alser, N. Almadhoun, A. Nouri, C. Alkan and E. Ayday
In Privacy-aware computational genomics (PRIVAGEN), Tokyo, Japan, September 2015.PDF - On a Novel Privacy-Preserving Framework for Both Personalized Medicine and Genetic Association Studies
J. L. Raisaro, E. Ayday, P. McLaren, A. Telenti, and J. P. Hubaux
In Privacy-aware computational genomics (PRIVAGEN), Tokyo, Japan, September 2015. - De-anonymizing Genomic Databases with Phenotypic Traits
M. Humbert, K. Huguenin, J. Hugonot, E. Ayday, and J. P. Hubaux
In Proceedings on Privacy Enhancing Technologies (PETS), 2015.PDF - GenoGuard: Protecting Genomic Data Against Brute-Force Attacks
Z. Huang, E. Ayday, J. P. Hubaux, J. Fellay, and A. Juels
In Proceedings of IEEE Symposium on Security and Privacy, San Jose, CA, USA, May 2015.PDF - Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations
S. S. Samani, Z. Huang, E. Ayday, M. Elliot, J. Fellay, J.-P. Hubaux and Z. Kutalik
In Workshop on Genome Privacy (in conjunction with IEEE Symposium on Security and Privacy), San Jose, CA, USA, May 2015.PDF - Privacy Threats and Practical Solutions for Genetic Risk Tests
L. Barman, M.-T. Elgraini, J. L. Raisaro, E. Ayday and J.-P. Hubaux
In Workshop on Genome Privacy (in conjunction with IEEE Symposium on Security and Privacy), San Jose, CA, USA, May 2015.PDF - On Non-cooperative Genomic Privacy
M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti
In Proceedings of 19th International Conference on Financial Cryptography and Data Security (FC), Puerto Rico, USA, Jan. 2015.PDF - Controlled Functional Encryption
M. Naveed, S. Agrawal, M. Prabhakaran, X. Wang, E. Ayday, J.-P. Hubaux and C.A. Gunter
In proceedings of 21st ACM Conference on Computer and Communications Security (CCS 2014), Scottsdale, AZ, USA, November 2014.PDF - Reconciling Utility with Privacy in Genomics
M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti
In Proceedings of ACM Workshop on Privacy in the Electronic Society (WPES), Scottsdale, AZ, USA, November 2014.PDF - Privacy-Preserving HIV Pharmacogenetics: A Real Use Case of Genomic Data Protection
J.L. Raisaro, E. Ayday, P.J. McLaren, J-P. Hubaux, and A. Telenti
In Workshop on Genome Privacy (in conjunction with PETS 2014), Amsterdam, Netherlands, July 2014. - Protecting and Evaluating Genomic Privacy in Medical Tests and Personalized Medicine
E. Ayday, J.L. Raisaro, J. Rougemont, and J.P. Hubaux
In Proceedings of ACM Workshop on Privacy in the Electronic Society (WPES), Berlin, Germany, November 2013.PDF - Privacy-Preserving Processing of Raw Genomic Data
E. Ayday, J.L. Raisaro, U. Hengartner, A. Molyneaux, and J.P. Hubaux
In proceedings of 8th Data Privacy Management (DPM 2013) International Workshop (in conjunction with ESORICS 2013), Egham, UK, September 2013.PDF - Addressing the Concerns of the Lacks Family: Quantification of Kin Genomic Privacy
M. Humbert, E. Ayday, J.P. Hubaux, and A. Telenti
In proceedings of 20th ACM Conference on Computer and Communications Security (CCS 2013), Berlin, Germany, November 2013.PDF - Personal Use of the Genomic Data: Privacy vs. Storage Cost
E. Ayday, J.L. Raisaro, and J.P. Hubaux
In proceedings of IEEE Global Communications Conference, Exhibition and Industry Forum – GLOBECOM, Atlanta, GA, December 2013.PDF - Privacy-Preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data
E. Ayday, J.L. Raisaro, P.J. McLaren, J. Fellay, and J.P. Hubaux
In proceedings of USENIX Security Workshop on Health Information Technologies (HealthTech '13), Washington, DC, USA, August 2013.PDF - Privacy-Enhancing Technologies for Medical Tests Using Genomic Data (short paper)
E. Ayday, J.L. Raisaro, and J.P. Hubaux
In 20th Annual Network & Distributed System Security Symposium – NDSS 2013, San Diego, CA, USA, February 2013.PDF - Iterative Similarity Inference via Message Passing in Factor Graphs for Collaborative Filtering
J. Zou, A. Einolghozati, E. Ayday, and F. Fekri
In proceedings of IEEE Information Theory Workshop (ITW), Sevilla, Spain, September 2013.PDF - A Recommender System Based on Belief Propagation over Pairwise Markov Random Fields
E. Ayday, J. Zou, A. Einolghozati, and F. Fekri
In Proceedings of 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton '2012), Monticello, IL, USA, October 2012.PDF - BPRS: Belief Propagation Based Iterative Recommender System
E. Ayday, A. Einolghozati and F. Fekri
In Proceedings of IEEE International Symposium on Information Theory - ISIT 2012, Cambridge, MA, USA, July 2012 PDF - BP-P2P: A Belief Propagation-Based Trust and Reputation Management for P2P Networks
E. Ayday and F. Fekri
In Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks - SECON, 2012, Seoul, Korea, June 2012. PDF - Robust Reputation Management Using Probabilistic Message Passing
E. Ayday and F. Fekri
In Proceedings of IEEE Global Communications Conference, Exhibition and Industry Forum – GLOBECOM, Houston, TX, December 2011. PDF - Application of Belief Propagation to Trust and Reputation Management
E. Ayday and F. Fekri
In Proceedings of IEEE International Symposium on Information Theory – ISIT, Saint Petersburg, Russia, August 2011. PDF - Secure, Intuitive and Low-Cost Device Authentication for Smart Grid Networks
E. Ayday and S. Rajagopal
In Proceedings of IEEE Consumer Communications and Networking Conference - CCNS, Las Vegas, NV, USA, January 2011. PDF - A Belief Propagation Based Recommender System for Online Services
E. Ayday and F. Fekri
In Proceedings of ACM Recommender Systems, Barcelona, Spain, September 2010. PDF - Trust Management and Adversary Detection in Delay Tolerant Networks
E. Ayday, H. Lee and F. Fekri
In Proceedings of IEEE Military Communications Conference - MILCOM, San Jose, CA, USA, November 2010.PDF - An Iterative Algorithm for Trust and Reputation Management
E. Ayday, H. Lee and F. Fekri
In Proceedings of IEEE International Symposium on Information Theory - ISIT, Seoul, Korea, June 2009. PDF - Using Node Accountability in Credential Based Routing for Mobile Ad-Hoc Networks
E. Ayday and F. Fekri
In Proceedings of IEEE International Conference on Mobile Ad-hoc and Sensor Systems - MASS, Atlanta, GA, USA, September 2008. PDF - AuCRB: An Efficient Mechanism to Provide Availability, Reliability and Authentication for Multihop Broadcasting in Wireless Networks
E. Ayday, F. Delgosha and F. Fekri
In Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks - SECON, San Francisco, CA, USA, June 2008. PDF - Efficient Broadcast Authentication for Wireless Sensor Networks
E. Ayday, F. Delgosha and F. Fekri
In Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks - SECON, San Diego, CA, USA, June 2007. PDF - MKPS: A Multivariate Polynomial Scheme for Symmetric Key-Establishment in Distributed Sensor Networks
F. Delgosha, E. Ayday and F. Fekri
In Proceedings of International Wireless Communications and Mobile Computing Conference - IWCMC, Hanolulu, Hawaii, USA, August 2007. PDF - Location-Aware Security Services for Wireless Sensor Networks using Network Coding
E. Ayday, F. Delgosha and F. Fekri
In Proceedings of IEEE Conference on Computer Communications - INFOCOM, Anchorage, AL, USA, May 2007. PDF - Security Services in Wireless Sensor Networks Using Sparse Random Coding
F.Delgosha, E. Ayday, K.Chan and F.Fekri
In Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks - SECON, Reston, VA, USA, September 2006. PDF - Preparation and evaluation of engineering geological maps in 3-dimensional geographic information systems environment
E. Ayday, M. Altan and C. Ayday
In Proceedings of the 8th AGILE Conference on GIScience, Estoril, Portugal, May 2005. PDF - The Use of GIS and GPS Integration for the Preparation of Quick Plans
C.Ayday and E. Ayday
In Proceeding of GIS Ostrava Symposium, Ostrava, Czech Republic, January 2005. PDF - 27 August 2004 Mars Observation and Results Obtained by Anadolu University, Satellite and Space Sciences Research Institute
M.Altan, H.Esenoglu, E. Ayday
In Proceeding of National Astronomy Congress, Kayseri, Turkey, September 2004.
BOOK CHAPTER
- Threats and Solutions for Genomic Data Privacy
E. Ayday and J.-P. Hubaux
in Medical Data Privacy Handbook, Editors: Gkoulalas-Divanis, Aris, Loukides, Grigorios, Springer, 2015.
PATENTS
- Privacy-Preserving Processing of Raw Genomic Data
Provisional patent application has been filed, June 2013. - Methods and Algorithms for Recommender Systems via Belief Propagation on Graphical Models
Provisional patent application has been filed, February 2013. - Genomic Privacy Protection
Provisional patent application has been filed, September 2012. - Systems and Methods for Providing Reputation Management
Provisional patent application has been filed, July 2011.
TECHNICAL REPORTS
- Reconciling Utility with Privacy in Genomics
M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti
EPFL-REPORT-201547, September 2014. - Secure Device Authentication Mechanisms for the Smart Grid-Enabled Home Area Networks
E. Ayday and S. Rajagopal
EPFL-REPORT-188373, September 2013. - Privacy-Preserving Processing of Raw Genomic Data
E. Ayday, J.L. Raisaro, U. Hengartner, A. Molyneaux, and J.P. Hubaux
EPFL-REPORT-187573, July 2013. - The Chills and Thrills of Whole Genome Sequencing
E. Ayday, E. De Cristofaro, J.P. Hubaux, and G. Tsudik
EPFL-REPORT-186866, June 2013. - Privacy-Enhancing Technologies for Medical Tests Using Genomic Data
E. Ayday, J. L. Raisaro, and J. P. Hubaux
EPFL-REPORT-182897, September 2012.
THESIS
- Iterative Algorithms for Trust and Reputation Management and Recommender Systems
E. Ayday
Georgia Institute of Technology, December 2011.PDF