Erman Ayday

Assistant Professor, Computer and Data Sciences Department
Privacy enhancing technologies, data security and applied cryptographyy
Office: 402 Olin Email: erman.ayday@case.edu

Publications

Halimi, A., Dervishi, L., Ayday, E., Pyrgelis, A., Troncoso-Pastoriza, J., Hubaux, J., Jiang, X., & Vaidya, J. (2021). Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies. arXiv preprint arXiv:2101.08879.
Yilmaz, E., Ji, T., Ayday, E., & Li, P. (2021). Genomic Data Sharing under Dependent Local Differential Privacy. arXiv preprint arXiv:2102.07357.
Sariyildiz, M., Cinbis, R., & Ayday, E. (2020). Key protected classification for collaborative learning. Pattern Recognition, 104 , 107327.
Demirag, D., & Ayday, E. (2020). Tracking and controlling the spread of a virus in a privacy-preserving way. arXiv preprint arXiv:2003.13073.
Ayoz, K., Ayday, E., & Cicek, A Ercument, E. (2020). Genome reconstruction attacks against genomic data-sharing beacons. arXiv preprint arXiv:2001.08852.
Almadhoun, N., Ayday, E., & Ulusoy, \"Ozg\"ur, E. (2020). Differential privacy under dependent tuples—the case of genomic privacy. Bioinformatics.
\"Oks\"uz, Abdullah \cCa\uglar, Ayday, E., & G\"ud\"ukbay, U\ugur, E. (2020). Privacy-Preserving and Robust Watermarking on Sequential Genome Data using Belief Propagation and Local Differential Privacy. bioRxiv.
Aysen, M., Ayday, E., & Cicek, A Ercument, E. (2020). The Effect of Kinship in Re-identification Attacks Against Genomic Data Sharing Beacons. bioRxiv.
Almadhoun, N., Ayday, E., & Ulusoy, \"Ozg\"ur, E. (2020). Inference attacks against differentially private query results from genomic datasets including dependent tuples. Bioinformatics, 36 (Supplement\_1), i136--i145.
Ayoz, K., Aysen, M., Ayday, E., & Cicek, A Ercument, E. (2020). The effect of kinship in re-identification attacks against genomic data sharing beacons. Bioinformatics, 36 (Supplement\_2), i903--i910.
Yilmaz, E., & Ayday, E. (2020). Collusion-Resilient Probabilistic Fingerprinting Scheme for Correlated Data. arXiv preprint arXiv:2001.09555.
Von Thenen, N., Ayday, E., & Cicek, A Ercument, E. (2019). Re-identification of individuals in genomic data-sharing beacons via allele inference. Bioinformatics, 35 (3), 365--371.
B\"ulent Sar\iy\ild\iz, Mert, G\"okberk Cinbiș, Ramazan, & Ayday, E. (2019). Key Protected Classification for Collaborative Learning. arXiv e-prints.
Zhu, X., Ayday, E., & Vitenberg, R. (2019). A privacy-preserving framework for outsourcing location-based services to the cloud. IEEE Transactions on Dependable and Secure Computing.
Ayday, E., Naveed, M., & Tang, H. (2019). GenoPri'17: International Workshop on Genome Privacy and Security. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16 (4), 1322--1323.
Zhu, X., Ayday, E., & Vitenberg, R. (2019). A privacy-preserving framework for outsourcing location-based services to the cloud. IEEE Transactions on Dependable and Secure Computing.
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E. (2019). Key Protected Classification for Collaborative Learning. arXiv preprint arXiv:1908.10172.
Ailijiang, A., Bayir, M., Altiparmak, N., Peixoto, D., Arora, V., Assent, I., Athanassoulis, M., Ayday, E., Babalou, S., Bahrami, M., & Others, M. (2018). Appreciation to distributed and parallel databases reviewers. Distrib Parallel Databases, 36 , 1--3.
Ozercan, H., Ileri, A., Ayday, E., & Alkan, C. (2018). Realizing the potential of blockchain technologies in genomics. Genome research, 28 (9), 1255--1263.
Ayday, E., Jiang, X., & Malin, B. (2018). GenoPri'16: International Workshop on Genome Privacy and Security. IEEE/ACM Transactions on Computational Biology and Bioinformatics.
Von Thenen, N., Ayday, E., & Cicek, A Ercument, E. (2018). Re-identification of individuals in genomic data-sharing beacons via allele inference. Bioinformatics, 35 (3), 365--371.
Harmanci, A., Tang, H., Ayday, E., & Brenner, S. (2018). When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data. .
Ayday, E., Jiang, X., & Malin, B. (2018). GenoPri'16: International Workshop on Genome Privacy and Security. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 15 (5), 1403--1404.
Harmanci, A., Tang, H., Ayday, E., & Brenner, S. (2018). When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data. .
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E. (2018). Key Protected Classification for GAN Attack Resilient Collaborative Learning. .
Ozercan, H., Ileri, A., Ayday, E., & Alkan, C. (2018). Realizing the potential of blockchain technologies in genomics. Genome research, 28 (9), 1255--1263.
Kale, G., Ayday, E., & Tastan, O. (2018). A utility maximizing and privacy preserving approach for protecting kinship in genomic databases. Bioinformatics, 34 (2), 181--189.
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E. (2018). Key Protected Classification for GAN Attack Resilient Collaborative Learning. .
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E. (2018). An inference attack on genomic data using kinship, complex correlations, and phenotype information. IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), 15 (4), 1333--1343.
Yilmaz, E., Ferhatosmanoglu, H., Ayday, E., & Aksoy, R. (2018). Privacy-preserving aggregate queries for optimal location selection. arXiv preprint arXiv:1801.02069.
G\"ursoy, Gamze, Harmanci, A., Tang, H., Ayday, E., & Brenner, S. (2018). When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data. World Scientific.
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E. (2017). An inference attack on genomic data using kinship, complex correlations, and phenotype information. IEEE/ACM transactions on computational biology and bioinformatics, 15 (4), 1333--1343.
Ayday, E., & Humbert, M. (2017). Inference attacks against kin genomic privacy. IEEE Security \& Privacy, 15 (5), 29--37.
Humbert, M., Ayday, E., Hubaux, J., & Telenti, A. (2017). Quantifying interdependent risks in genomic privacy. ACM Transactions on Privacy and Security (TOPS), 20 (1), 1--31.
Yilmaz, A., & Ayday, E. (2017). Collusion-secure watermarking for sequential data. arXiv preprint arXiv:1708.01023.
Halimi, A., & Ayday, E. (2017). Profile Matching Across Unstructured Online Social Networks: Threats and Countermeasures. arXiv preprint arXiv:1711.01815.
Yilmaz, A., & Ayday, E. (2017). Collusion-Secure Watermarking for Sequential Data. arXiv preprint arXiv:1708.01023.
Yilmaz, E., Ferhatosmanoglu, H., Ayday, E., & Aksoy, R. (2017). Privacy-preserving aggregate queries for optimal location selection. IEEE Transactions on Dependable and Secure Computing, 16 (2), 329--343.
Kale, G., Ayday, E., & Tastan, O. (2017). Supplementary Materials for A Utility Maximizing and Privacy Preserving Approach for Protecting Kinship in Genomic Databases. .
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, C., & Ayday, E. (2017). A survey on information security threats and solutions for Machine to Machine (M2M) communications. Journal of Parallel and Distributed Computing, 109 , 142--154.
Ayday, E., Tang, Q., & Yilmaz, A. (2017). Cryptographic solutions for credibility and liability issues of genomic data. IEEE Transactions on Dependable and Secure Computing.
Humbert, M., Ayday, E., Hubaux, J., & Telenti, A. (2017). Quantifying interdependent risks in genomic privacy. ACM Transactions on Privacy and Security (TOPS), 20 (1), 3.
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, C., & Ayday, E. (2017). A survey on information security threats and solutions for Machine to Machine (M2M) communications. Journal of Parallel and Distributed Computing, 109 , 142--154.
Ayday, E., Tang, Q., & Yilmaz, A. (2017). Cryptographic solutions for credibility and liability issues of genomic data. IEEE Transactions on Dependable and Secure Computing, 16 (1), 33--43.
Halimi, A., & Ayday, E. (2017). Profile matching across unstructured online social networks: threats and countermeasures. arXiv preprint arXiv:1711.01815.
Kale, G., Ayday, E., & Tastan, O. (2017). A utility maximizing and privacy preserving approach for protecting kinship in genomic databases. Bioinformatics, 34 (2), 181--189.
Ayday, E., & Humbert, M. (2017). Inference attacks against kin genomic privacy. IEEE Security \& Privacy, 15 (5), 29--37.
Kale, G., Ayday, E., & Tastan, O. (2017). Supplementary Materials for A Utility Maximizing and Privacy Preserving Approach for Protecting Kinship in Genomic Databases. .
Avllazagaj, E., Ayday, E., & Cicek, A Ercument, E. (2016). Privacy-Related Consequences of Turkish Citizen Database Leak. arXiv preprint arXiv:1605.05847.
McLaren, P., RAISARO, J., Aouri, M., Rotger, M., Ayday, E., Bartha, Istv\'an, E., Delgado, M., Vallet, Y., G\"unthard, Huldrych F, Y., Cavassini, M., & Others, M. (2016). Privacy-preserving genomic testing in the clinic: a model using HIV treatment. Genetics in medicine, 18 (8), 814--822.
Huang, Z., Ayday, E., Lin, H., Aiyar, R., MOLYNEAUX, A., Xu, Z., Fellay, J., Steinmetz, L., & Hubaux, J. (2016). A privacy-preserving solution for compressed storage and selective retrieval of genomic data. Genome research, 26 (12), 1687--1696.
Avllazagaj, E., Ayday, E., & Cicek, A Ercument, E. (2016). Privacy-Related Consequences of Turkish Citizen Database Leak. arXiv preprint arXiv:1605.05847.
McLaren, P., RAISARO, J., Aouri, M., Rotger, M., Ayday, E., Bartha, Istv\'an, E., Delgado, M., Vallet, Y., G\"unthard, Huldrych F, Y., Cavassini, M., & Others, M. (2016). Privacy-preserving genomic testing in the clinic: a model using HIV treatment. Genetics in medicine, 18 (8), 814.
Huang, Z., Ayday, E., Lin, H., Aiyar, R., MOLYNEAUX, A., Xu, Z., Fellay, J., Steinmetz, L., & Hubaux, J. (2016). A privacy-preserving solution for compressed storage and selective retrieval of genomic data. Genome research, 26 (12), 1687--1696.
Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., Malin, B., & Wang, X. (2015). Privacy in the genomic era. ACM Computing Surveys (CSUR), 48 (1), 6.
Humbert, M., Huguenin, K\'evin, M., Hugonot, J., Ayday, E., & Hubaux, J. (2015). De-anonymizing genomic databases using phenotypic traits. Proceedings on Privacy Enhancing Technologies, 2015 (2), 99--114.
Balci, F., Kulan, H., Alkan, C., & Ayday, E. (2015). A New Inference Attack against Kin Genomic Privacy. Proc. Privacy-Aware Computational Genomics.
Ayday, E., De Cristofaro, E., Hubaux, J., & Tsudik, G. (2015). Whole genome sequencing: Revolutionary medicine or privacy nightmare?. Computer, 48 (2), 58--66.
Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., Malin, B., & Wang, X. (2015). Privacy in the genomic era. ACM Computing Surveys (CSUR), 48 (1), 1--44.
Humbert, M., Huguenin, K\'evin, M., Hugonot, J., Ayday, E., & Hubaux, J. (2015). De-anonymizing genomic databases using phenotypic traits. Proceedings on Privacy Enhancing Technologies, 2015 (2), 99--114.
Balci, F., Kulan, H., Alkan, C., & Ayday, E. (2015). A New Inference Attack against Kin Genomic Privacy. Proc. Privacy-Aware Computational Genomics.
Ayday, E., De Cristofaro, E., Hubaux, J., & Tsudik, G. (2015). Whole genome sequencing: Revolutionary medicine or privacy nightmare?. Computer, 48 (2), 58--66.
RAISARO, J., Ayday, E., & Hubaux, J. (2014). Patient privacy in the genomic era. Praxis, 103 (10), 579--86.
Telenti, A., Ayday, E., & Hubaux, J. (2014). On genomics, kin, and privacy. F1000Research, 3
Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., Malin, B., Wang, X., & Others, X. (2014). Privacy and security in the genomic era. .
RAISARO, J., Ayday, E., & Hubaux, J. (2014). Patient privacy in the genomic era. Praxis, 103 (10), 579--86.
Telenti, A., Ayday, E., & Hubaux, J. (2014). On genomics, kin, and privacy. F1000Research, 3
RAISARO, J., Ayday, E., McLaren, P., Hubaux, J., & Telenti, A. (2014). Privacy-Preserving HIV Pharmacogenetics: A Real Use Case of Genomic Data Protection. Workshop on Genome Privacy .
Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., Malin, B., Wang, X., & Others, X. (2014). Privacy and security in the genomic era. .
Ayday, E., De Cristofaro, E., Hubaux, J., & Tsudik, G. (2013). The chills and thrills of whole genome sequencing. Computer.
Ayday, E., & Rajagopal, S. (2013). Secure device authentication mechanisms for the smart grid-enabled home area networks. Tech. Rep..
Ayday, E., Delgosha, F., & Fekri, F. (2012). Data authenticity and availability in multihop wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 8 (2), 10.
Ayday, E., & Fekri, F. (2012). A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks. Ad Hoc Networks, 10 (7), 1278--1290.
Ayday, E., & Fekri, F. (2012). A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks. Ad Hoc Networks, 10 (7), 1278--1290.
Ayday, E., Delgosha, F., & Fekri, F. (2012). Data authenticity and availability in multihop wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 8 (2), 1--26.
Ayday, E., & Fekri, F. (2012). An iterative algorithm for trust management and adversary detection for delay-tolerant networks. IEEE Transactions on Mobile Computing, 11 (9), 1514--1531.
Ayday, E., & Fekri, F. (2011). Iterative trust and reputation management using belief propagation. IEEE Transactions on Dependable and Secure Computing, 9 (3), 375--386.
Ayday, E., & Fekri, F. (2010). A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks, 8 (2), 181--192.
Ayday, E., & Fekri, F. (2010). A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks, 8 (2), 181--192.
Ayday, E., RAISARO, J., McLaren, P., Fellay, J., & Hubaux, J. (2007). Privacy-Enhancing Technologies for Disease Risk Tests Based on Genomic and Non-Genomic Data. .
AYDAY, C., & Ayday, E. (2005). The Use of GIS and Handheld GPS Integration for the Preparation of Quick Plans. GIS Ostrava Symposium.
Ayday, E., ALTAN, M., & AYDAY, C. (2005). Preparation and evaluation of engineering geological maps in 3-dimensional Geographic Information Systems environment. .
Ayday, E., ALTAN, M., & AYDAY, C. (2005). Preparation and Evaluation of Engineering Geological Maps in 3-dimensional Geographic Information Systems Environment. AGILE Conference on GIScience.
Aguirre, M., Ahn, G., Alghamdi, M., Alsaleh, M., Andersson, D., Asplund, M., Atluri, V., Ayday, E., Bakiras, S., Barker, J., & Others, J. (). 2012 Index IEEE Transactions on Dependable and Secure Computing| Vol. 9. .
De Cristofaro, E., Malin, B., Jiang, X., Ayday, E., Bogdanov, D., Burton, P., Bush, W., Clayton, E., Craig, D., Dove, E., & Others, E. (). GenoPri 2015. .
Ayday, E. (). Anonymity of E-Cash Protocols. .
Alser, M., Almadhoun, N., Nouri, A., Alkan, C., & Ayday, E. (). Identifying Anonymous Donors of Genetic Information. .
Ahn, G., Alturi, V., Androulaki, E., Ayday, E., Baldimtsi, F., Barker, K., Basu, A., Boyd, C., Burmester, M., B\"ohme, Rainer, M., & Others, M. (). Stephen Marsh, UOIT Keith Martin, Royal Holloway, University of London Sjouke Mauw, University of Luxembourg Ali Miri, Ryerson University Aikaterini Mitrokotsa, Chalmers University of Technology. .
Ayday, E. (). Anonymity of E-Cash Protocols. .
Alser, M., Almadhoun, N., Nouri, A., Alkan, C., & Ayday, E. (). Identifying Anonymous Donors of Genetic Information. .
Kucuk, V., & Ayday, E. (). Profile Matching Across Unstructured Online Social Networks. .
Ayday, E., Shmatikov, V., Austin, U., & Kantarcioglu, M. (). Data Privacy Hiding Data from the Database User I. .
AYDAY, C., & Ayday, E. (). The Use of GIS and Handheld GPS Integration for the Preparation of Quick Plans. .
Ayday, E., Shmatikov, V., Austin, U., & Kantarcioglu, M. (). Data Privacy Hiding Data from the Database User I. .
Ahn, G., Alturi, V., Androulaki, E., Ayday, E., Baldimtsi, F., Barker, K., Basu, A., Boyd, C., Burmester, M., B\"ohme, Rainer, M., & Others, M. (). Stephen Marsh, UOIT Keith Martin, Royal Holloway, University of London Sjouke Mauw, University of Luxembourg Ali Miri, Ryerson University Aikaterini Mitrokotsa, Chalmers University of Technology. .
De Cristofaro, E., Malin, B., Jiang, X., Ayday, E., Bogdanov, D., Burton, P., Bush, W., Clayton, E., Craig, D., Dove, E., & Others, E. (). GenoPri 2015. .
Kucuk, V., & Ayday, E. (). Profile Matching Across Unstructured Online Social Networks. .