About
146
Publications
14,679
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,290
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (146)
Privacy protection has become a crucial issue in the information era. In recent years, many protocols have been developed to accomplish computational tasks collaboratively without revealing the participants’ private data. However, developing protocols for each individual application would not be practical. The more natural and efficient approach wo...
Iron-carbon (Fe-C) composite microspheres prepared through a facile aerosol-based process are effective remediation agents for the simultaneous adsorption and reduction of chlorinated hydrocarbons. Complete dechlorination was achieved for the class of chlorinated ethenes that include tetrachloroethylene (PCE), trichloroethylene (TCE), cis- and tran...
This paper reports the first LC voltage-controlled oscillator (LC-VCO) in CMOS utilizing a novel nontraditional compact inductor with integrated vertical nano particles magnetic core (Ni–Zn–Cu) to improve the figure-of-merit (FOM) of the VCO circuit. The new magnetic-enhanced inductor, fabricated in an integrated-circuit back-end using a CMOS-compa...
To enhance the security of mobile devices, enterprises are developing and adopting mobile device management systems. However, if a mobile device management system is exploited, mobile devices and the data they contain will be compromised. Therefore, ...
The increasing ease of data collection experience and the increasing availability of large data storage space lead to the existence of very large datasets that are commonly referred as "Big Data". Such data not only take over large amount of database storage, but also increase the difficulties for data analysis due to data diversity, which, also ma...
A new concept of stacked-spiral inductor with vertical near-closed-circuit nanoparticles-magnetic-core in CMOS is reported. Nanoparticle-embedded magnetic medium is designed, modeled, prepared and characterized, which achieves significantly increased operation frequency to multiple-GHz for RF inductor applications. New inductor prototypes with vert...
We report results of a search for Weakly Interacting Massive Particles
(WIMPs) with the Si detectors of the CDMS II experiment. This report describes
a blind analysis of the first data taken with CDMS II's full complement of
detectors in 2006-2007; results from this exposure using the Ge detectors have
already been presented. We observed no candida...
Ischemia/reperfusion injury (IRI) is the most common cause of early mortality following lung transplantation (LTx). We hypothesized that nitrite, an endogenous source of nitric oxide (NO), may protect lung grafts from IRI. Rat lung grafts were stored in preservation solution at 4°C for 6 hours. Both grafts and recipients were treated with nitrite....
There are currently many active movements towards computerizing patient healthcare information. As Electronic Medical Record (EMR) systems are being increasingly adopted in healthcare facilities, however, there is a big challenge in effectively utilizing ...
Summary The articular disc plays an important role as a stress absorber in joint movement, resulting in stress reduction and redistribution in the temporomandibular joint (TMJ). The flow of synovial fluid in the TMJ may follow a regular pattern during movement of the jaw. We hypothesised that the regular pattern is disrupted when the TMJ disc is p...
A new concept of stacked-spiral inductor with vertical near-closed-circuit nano-particle-magnetic-core in CMOS is reported. Prototypes, fabricated in a 6-Al-metal CMOS backend process using ferrite nano-particles, show a high inductance-density of 825nH/mm2 in multi-GHz, which is promising for making super compact inductors in RF SoC.
Initial defects and water have a significant influence on the fatigue behavior of RC bridge slab. Specially, since the RC bridge slab has a relatively high surface-to-volume ratio, initial cracks tend to be generated on the surface with respect to dry shrinkage during curing stage, and therefore the durability and the long-time serviceability of th...
This paper reports a novel concept of vertically stacked-spiral RF inductor with integrated nano-powder-magnetic-core in standard CMOS. Prototype inductors in a foundry 0.18µm 6-metal CMOS and a post-CMOS backend process module (i.e., CMOS+) are fabricated and measured. Result shows the proof-of-concept designs greatly increase the inductance, L, b...
Anomaly detection has been intensively studied in a variety of research fields, including system and network intrusion detections, fraud detections, etc. Current anomaly detection techniques vastly focus on the detection of the anomalous data. This type of approach could be efficient for the sake of system and network intrusion detection. However,...
Trust is a phenomenon that is exclusively possessed by human beings. Due to its human-related properties, trust is difficult to be uniformly defined or even be precisely described. As a research field, trust has been intensively focused on exploring propagations and usefulness in social networks. Little research work has been found on simulating tr...
The world wide web and its continuous growth remains among the trending topics in daily conversations. Social networks are a convenient way for people to share information and communicate with one another whether it is for the purpose of exchanging information or seeking social interaction from colleagues or coworkers. It seems that many online use...
In general, public services have a severe desire to secure sensitive data from potential access and misuse. For instance, an individual could unwittingly reveal a patient's full name, date of birth, or social security number, resulting in identity theft or misuse of medical records, etc. What we exhibit in this paper through numerous schemes is pro...
Anomaly detection involves identifying observations that deviate from the normal behavior of a system. One of the ways to achieve this is by identifying the phenomena that characterize “normal” observations. Subsequently, based on the characteristics of data learned from the “normal” observations, new observations are classified as being either “no...
Online shopping has been introduced to Internet users for decades. However, many people are still susceptible to the risks of online shopping. Multiple risk-mitigating solutions have been adopted by most online shopping sites. One such solution, the reputation system, is capable of providing an up-to-date reputation score for every online seller. N...
Anomaly detection involves identifying observations that deviate from the normal behavior of a system. One of the ways to achieve this is by identifying the phenomena that characterize “normal” observations. Subsequently, based on the characteristics of data learned from the “normal” observations, new observations are classified as being either “no...
Location information is considered as private in many scenarios.
Protecting location information on mobile ad-hoc networks has attracted
much research in past years. However, location information protection on
social networks has not been paid much attention. In this paper, we
present a novel location privacy protection approach on the basis of
use...
Ratings are the prominent factors to decide the fate of any product in the present Internet Market and many people follow the ratings in a genuine sense. Unfortunately, the Sibyl attacks can affect the credibility of the genuine product. Influence limiter algorithms in recommender systems have been used extensively to overcome the Sibyl attacks but...
Phishing attack has been a serious concern to online banking and e-commerce websites. This paper proposes a method to detect and filter phishing emails in dynamic environment by applying a family of weak estimators. Anomaly detection identifies observations that deviate from the normal behavior of a system and is achieved by identifying the phenome...
Trust is a human-related phenomenon in social networks. Trust research on social networks has gained much attention on its
usefulness, and on modeling propagations. There is little focus on finding maximum trust in social networks which is particularly
important when a social network is oriented by certain tasks. In this paper, we propose a trust m...
Authentication is an important way to protect security. Many web applications such as mobile banking, emails, online shopping
require users to provide their credentials to authenticate themselves before they can use the services. Four factors, including
password, token, biometrics, social networks, have been proposed for authentication. However, th...
In this paper we examine a method for identifying privacy requirements within the context of a security requirements engineering method. We briefly describe the security quality requirements engineering (SQUARE) methodology. Next we discuss our definition of privacy and the associated privacy concerns. We discuss the challenges of privacy requireme...
A social network is the mapping and measuring of relationships and flows between individuals, groups, organizations, computers, websites, and other information/knowledge processing entities. The nodes in the network are the people and groups, while the links show relationships or flows between the nodes. Social networks provide both a visual and a...
In order to slow down the formidable shearing stress which is caused by the heavy traffic conditions of the heavy load, the heavy tire pressure, the high velocity and so on under the wheel load, especially to solve the wheel rut problems of bituminous concrete pavement under the channel traffic, this article will analyze and research the maximum sh...
In this paper we introduce a framework for privacy-preserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy (P4P) and features a novel heterogeneous architecture and a number of efficient tools for performing private computation and ensuring security at large scale. It maintain...
The k-means clustering algorithm is a widely used scheme to solve the clustering problem which classifies a given set of n data points in m-dimensional space into k clusters, whose centers are obtained by the centroids of the points in the same cluster. The problem with privacy consideration has been studied, when the data is distributed among diff...
Social computing is the backbone of the increasing socialized web applications, which more and more people are tending to intensively rely on. Trust is a critical element for social computing that has been involved into many computational systems. It is a topic intriguing numerous studies. In this paper, we present a novel Computational Trust Frame...
Dakota State University has a unique computing environment. Every undergraduate student and professor has a school assigned tablet PC. In addition, it is the State of South Dakota's premier four year technology university. The university also hosts email, website, and website services for the state's K-12 program in addition to its own. The high us...
Collaborative recommender systems use various types of information to help customers find products of personalized interest. To increase the usefulness of collaborative recommender systems in certain circumstances, it could be desirable to merge recommender system databases between companies, thus expanding the data pool. This can lead to privacy d...
Online banking authentication plays an important role in the field of online banking security. In past years, a number of methods, including password token, short message password, and USB token, have been developed for online banking authentication. In this paper, we introduce a new authentication protocol for online banking. Our approach enhances...
A billing system consists of many components that allow an end user to be able to add, view, print, or perform normal billing operations. These components can be in the form of servers, desktops, laptops, routers, firewalls, printers, and other appliances. All of these components connect together in some form to make up the complete billing system....
Phishing is continually shown to be a problem in network security. Phishing is trickery towards the user believing that he or she is communicating with a trusted source. Most phishing attacks are focused on the financial infrastructure such as financial institutions like banks and services like Paypal. We proposed a different interface than the tra...
Spherical silica particles containing nanoscale zero valent iron were synthesized through an aerosol assisted process. These particles are effective for groundwater remediation, with the environmentally benign silica particles serving as effective carriers for nanoiron transport. Incorporation of iron into porous submicron silica particles protects...
Fraud and abuse have led to significant additional expense in the banking and financial system of the United States. This paper aims to provide a comprehensive survey of the statistical methods applied to banking and financial fraud detection, with focuses on classifying fraudulent behaviors, identifying the major sources and characteristics of the...
Information Security Professionals must be flexible and adapt to an ever changing environment. The financial industry in particular offers many unique challenges for information security as technology is often quickly adopted and governments regulations fluctuate and change. These challenges can be especially complicated during financial crises. In...
The manner in which financial institutions offer payment processing to their customers and business partners has been ever evolving hand in hand with various evolving technologies. Remote Deposit Capture, one such payment process system, offers itself as one of the most popular systems in the financial sector today. The appeal to allow merchants to...
The enhancement of environmental quality and sustainability through pollution prevention, treatment, and remediation can be provided by the usage of nanoscale materials. These benefits are derived from the enhanced reactivity, surface area, and subsurface transport characteristics of nanomaterials. Among this material family, nanoparticles have gre...
With the rapid development of renewable energy technique, Wind/PV hybrid power system is more economical and reliable than a single PV or wind turbine for their complementary both in time and geography. Therefore, Wind/PV hybrid power system is widely used in many area in recent years. However, with the increase of installation capacity of the Wind...
The aim of this paper is to introduce the concepts of (∈, ∈, ∨q)-fuzzy Boolean filters and (∈, ∈, ∨q)-fuzzy MV-filters in MTL-algebras. Some characterizations of these kinds of generalized fuzzy filters are derived. Finally, the concept of (∈, ∈, ∨q)-fuzzy G-filters in MTL-algebras is introduced. It is proved that an (∈, ∈, ∨q)-fuzzy filter of MTL-...
Whether or not consumers realistically value their private information, why should businesses? This article examines the preconceived notions of the importance of collecting and using consumers' private information with regard to price discrimination and targeted advertising to determine that modern efforts to harness private information in achievi...
Anomaly detection involves identifying observations that deviate from the normal behavior of a system. One of the ways to achieve this is by identifying the phenomena that characterize "normal" observations. Subsequently, based on the characteristics of data learned from the "normal" observations, new observations are classified as being either "no...
Systematic investigation of novel CMOS-compatible on-chip ferrite-integrated RF inductors is reported. New ferrite-fully-filled solenoid inductor is achieved, using low-temperature ferrite nano-powder-mixed-photoresist ink jetting/spin-coating technique we developed, which shows significant improvement of +160% in L and +220% in Q, to multi-GHz. An...
There is a fair amount of research about privacy, but few empirical studies about its cost have been conducted. In the area of secure multiparty computation, the scalar product has long been reckoned as one of the most promising alternatives to classic logic gates. The reason for this is that the scalar product is not only complete, which is as goo...
An investigation was carried out on the potential features of 7075-T76 aluminum alloy under various constant stresses in 3.5% NaCl solutions. The applied stress accelerated the formation of electric double-layer at aluminum alloy/solution interface, and the formation time became shorter with the stress increasing. As the stress was applied, the flu...
Privacy-preserving k-means clustering assumes that there are at least two parties in the secure interactive computation. However, the existing
schemes do not consider the data standardization which is an important task before executing the clustering among the different
database. In this paper, we point out without data standardization, some proble...
Effective in situ remediation of groundwater requires the successful delivery of reactive iron particles through soil. In this paper we report the transport characteristics of nanoscale zerovalent iron entrapped in porous silica particles and prepared through an aerosol-assisted process. The entrapment of iron nanoparticles into the silica matrix p...
The legislative penalties and economic penalties for privacy violations are more serious for a service provider these days. In spite of demonstrating that it is willing and able to protect the privacy of information, a service provider developing a privacy-compliant system faces two challenges; technical complexities and legal complexities. In this...
Social Network is being a popular word in WEB 2.0 era. Various social network websites connect us and our friends together.
A buzzword which describes the idea is “communicate with anyone anywhere”. By using social network websites like Facebook or blog, we can find out the communities which share the same interests with us. In the academic area, p...
As NETWORK attackers become more and more sophisticated and wireless communications make the potential risks in data protection more serious, we come to need much stronger authentication and access control systems. In this paper, we propose a combined authentication method including biometric and access control system based on attribute-wise encryp...
Secure multiparty computation is a very important research topic in cryptography. The sub-problem of secure multiparty computation that has received special attention by researchers because of its close relation to many cryptographic tasks is secure two-party computation. This area of research is concerned with the question: ldquoCan two party comp...
Hiding data values in privacy-preserving data mining (PPDM) protects information against unauthorized attacks while maintaining analytical data properties. The most popular models are designed for constant data environments. They are usually computationally expensive for large data sizes and have poor real-time performance on frequent data growth....
With the emergence of grid technologies, the problem of scheduling tasks in heterogeneous systems has been arousing attention. In this paper, we present two optimization schemes, Makespan Optimization Rescheduling (MOR) and Resource Optimization Rescheduling (ROR), which are based on the QoS Min-Min scheduling technique, for reducing the makespan o...
In this paper,1 we address the following problem: multiple parties are cooperating on a data-rich task. Each of the parties owns data pertinent
to the aspect of the task addressed by this party. More specifically, the data consists of instances, each party owns her
instances but all parties have the same attributes. The overall performance, or even...
Recent advances1 in computer networking and database technologies have resulted in creation of large quantities of data which are located
in different sites. Data mining is a useful tool to extract valuable knowledge from this data. Well known data mining algorithms
include association rule mining, classification, clustering, outlier detection, etc...
Recommender systems use various types of information to help customers find products of personalized interest. To increase the usefulness of recommender systems in certain circumstances, it could be desirable to merge recommender system databases between companies, thus expanding the data pool. This can lead to privacy disclosure hazards that this...
In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To ou...
Although modern scientific and technological advances derive computational power primarily from the classical evidence-based bottom-up cognition as founded by Greek philosopher Aristotle in his philosophy of science with a bivalent logic, the classical cognition, however, has met stiff challenges during the last few decades because of uncertainty f...
As users are participating in various social contexts, some projects such as MobiLife and MyLifeBits are developing a facility
to commence daily life service. This enables users to store all their daily events which can be collected using their mobile
device. These data can be shared with other people or some service providers only if the user agre...
We propose a cooperative multi-party system where unrelated entities can both both vote and change their vote with continual
accurate tabulation results while retaining vote privacy. The voting protocol presented uses homomorphic encryption, digital
envelopes, Hamming weights, multiple parties to fulfill the needs of an e-voting system. The protoco...
A social network is the mapping and measuring of relationships and flows between individuals, groups, organizations, computers,
web sites, and other information/knowledge processing entities. The nodes in the network are the people and groups, while
the links show relationships or flows between the nodes. Social networks provide both a visual and a...
Data collection is a necessary step in data mining process. Due to privacy reasons, collecting data from different parties becomes difficult. Privacy concerns may prevent the parties from directly sharing the data and some types of information about the data. How multiple parties collaboratively conduct data mining without breaching data privacy pr...
A social network is the mapping and measuring of relationships and flows between individuals, groups, organizations, computers, web sites, and other information/knowledge processing entities. The nodes in the network are the people and groups, while the links show relationships or flows between the nodes. Social networks provide both a visual and a...
One of the most substantial ways to protect sensitive information is encryption of data. However, the cryptographic method brings in some problems such as inefficiency and malfunctioning, especially impossibility of arithmetic. The previous works in this area have been proved insecure or can provide only a few or several SQL queries. Actually, ther...
Network intrusion detection system serves as a second line of defense to intrusion prevention. Anomaly detection approach is important in order to detect new attacks. Outlier detection scheme is one of the most successful anomaly detection approaches. In this paper, we propose a novel outlier detection scheme based on cost-distribution to detect an...
This paper provides a roadmap for developing security-critical projects using rational unified process as a framework for development. The security quality requirements engineering (SQUARE) methodology provides a way to address security issues early in the development lifecycle. SQUARE can be more effective when it fits into an organization's exist...
Privacy is ultimately important, and there is a fair amount of research about it. However, few empirical studies about the cost of privacy are conducted. In the area of secure multiparty computation, the scalar product has long been reckoned as one of the most promising building blocks in place of the classic logic gates. The reason is not only the...
Privacy of personal information is an area of growing concern and importance in the digital age. Privacy as an issue rises when there is a conflict of interest between its commercial value and respect for an individual's right to privacy. This lends itself to the fact this trade off is of economic value and the issue of privacy is an economic probl...
In the E-commerce era, recommender system is introduced to share customer experience and comments. At the same time, there is a need for E-commerce entities to join their recommender system databases to enhance the reliability toward prospective customers and also to maximize the precision of target marketing. However, there will be a privacy discl...
In this paper, we present a dynamic evolution system and build up a model to trace the transition of the system state. This new model differs from the previous methods, such as Bayesian network, artificial neural network, in two aspects: it can adapt the changes of the environment automatically, and it does not need a special training phase to buil...
This paper is concerned with modeling and identification of wireless channels using noisy measurements. The models employed are governed by stochastic differential equations (SDEs) in state space form, while the identification method is based on the expectation-maximization (EM) algorithm and Kalman filtering. The algorithm is tested against real c...
This paper gives an overview of various standard lifecycle development processes. It then provides a roadmap for developing security-critical projects using Rational Unified Process as a framework for development. The Security Quality Requirements Engineering (SQUARE) methodology provides a way to address security issues early in the development li...
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008.
The 55 revised full papers presented were carefully reviewed and selected from t...
One of the most substantial ways to protect users' sensitive information is encryption. This paper is about the keyword index search system on encrypted documents. It has been thought that the search with errors over encrypted data is impossible because 1 bit difference over plaintexts may reduce to enormous bits difference over cyphertexts. We pro...
To conduct data mining, we often need to collect data from various data owners. Privacy concerns may prevent the parties from directly sharing the data and some types of information about the data. To conduct data mining with- out compromising data privacy, we propose a verification scheme to ensure that the collected data follow the require- ments...
2600 years ago, YinYang was born in the ancient China with the theme "Taiji (one matter) produces YinYang; YinYang produces four forms; the four forms lead to eight diagrams; and the eight diagrams can have 64 direct combinations." This theme can be called YinYang1-2-4-8-64. An equilibrium-based scientific decoding of YinYang1-2-4-8-64 is presented...
To conduct data mining, we often need to collect data from various parties. Privacy concerns may prevent the parties from directly sharing the data. A challenging problem is how multiple parties collaboratively conduct data mining without breaching data privacy. The goal of this paper is to provide solutions for privacy-preserving sequential patter...
Companies tend to collect more and more data about their customers. This data is seen as useful for the company, but often customers do not wish to share it. Methods such as P3P for verifying a company's privacy policy are available, however these do not provide much choice for the customer and they provide an all-or-nothing approach. In this paper...
While privacy preservation of data mining approaches has been an important topic for a number of years, privacy of social network data is a relatively new area of interest. Previous research has shown that anonymization alone may not be sufficient for hiding identity information on certain real world data sets. In this paper, we focus on understand...
Privacy is an important issue in the collaborative data mining since privacy concerns may prevent the parties from directly sharing the data and some types of information about the data. How multiple parties collaboratively conduct data mining without breaching data privacy presents a challenge. This paper seeks to investigate solutions for privacy...
The usage of K-anonymity to protect static data sets is well known, but when applied to real time data personal privacy may be breached. For example, a hospital that releases information on all current patients may begin to involuntarily disclose private information due to the presence of a long-term patient records which, when identified through t...
Increasingly, companies hold more and more data about their customers. This data is seen as useful for the company, although often customers do not wish to share their personal data. Methods such as P3P for verifying a company's privacy policy are available, however, they do not provide much choice to the customer, and they provide an all-or-nothin...
A secure multiparty number-product protocol is an important building block in the area of secure multiparty computation. With proper composition of the building block, most applications, such as circuit evaluation, data mining, and private information retrieval, can be executed securely and collaboratively by potentially dishonest parties. In this...
The current laws addressing privacy in the United States (US) vary greatly both in number and in level of government to which they are applied and enforced. As new technologies are created existing laws are modified to address these technologies, and when a law cannot be modified new laws are created. This modification of older laws and creation of...
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among parties involved in a data mining task. We study how to share private or confidential data in the following scenario: multiple parties, each having a private data set, want to col...