Erman Ayday

Assistant Professor, Computer and Data Sciences Department
Privacy enhancing technologies, data security and applied cryptographyy
Office: 402 Olin Email: erman.ayday@case.edu

Publications

Yilmaz, E., Ji, T., Ayday, E., & Li, P. (2021). Genomic Data Sharing under Dependent Local Differential Privacy. arXiv preprint arXiv:2102.07357.
Halimi, A., Dervishi, L., Ayday, E., Pyrgelis, A., Troncoso-Pastoriza, J., Hubaux, J., Jiang, X., & Vaidya, J. (2021). Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies. arXiv preprint arXiv:2101.08879.
Yilmaz, E., & Ayday, E. (2020). Collusion-Resilient Probabilistic Fingerprinting Scheme for Correlated Data. arXiv preprint arXiv:2001.09555.
Sariyildiz, M., Cinbis, R., & Ayday, E. (2020). Key protected classification for collaborative learning. Pattern Recognition, 104 , 107327.
Demirag, D., & Ayday, E. (2020). Tracking and controlling the spread of a virus in a privacy-preserving way. arXiv preprint arXiv:2003.13073.
Ayoz, K., Ayday, E., & Cicek, A Ercument, E. (2020). Genome reconstruction attacks against genomic data-sharing beacons. arXiv preprint arXiv:2001.08852.
Almadhoun, N., Ayday, E., & Ulusoy, \"Ozg\"ur, E. (2020). Differential privacy under dependent tuples—the case of genomic privacy. Bioinformatics.
\"Oks\"uz, Abdullah \cCa\uglar, Ayday, E., & G\"ud\"ukbay, U\ugur, E. (2020). Privacy-Preserving and Robust Watermarking on Sequential Genome Data using Belief Propagation and Local Differential Privacy. bioRxiv.
Aysen, M., Ayday, E., & Cicek, A Ercument, E. (2020). The Effect of Kinship in Re-identification Attacks Against Genomic Data Sharing Beacons. bioRxiv.
Almadhoun, N., Ayday, E., & Ulusoy, \"Ozg\"ur, E. (2020). Inference attacks against differentially private query results from genomic datasets including dependent tuples. Bioinformatics, 36 (Supplement\_1), i136--i145.
Ayoz, K., Aysen, M., Ayday, E., & Cicek, A Ercument, E. (2020). The effect of kinship in re-identification attacks against genomic data sharing beacons. Bioinformatics, 36 (Supplement\_2), i903--i910.
Zhu, X., Ayday, E., & Vitenberg, R. (2019). A privacy-preserving framework for outsourcing location-based services to the cloud. IEEE Transactions on Dependable and Secure Computing.
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E. (2019). Key Protected Classification for Collaborative Learning. arXiv preprint arXiv:1908.10172.
Von Thenen, N., Ayday, E., & Cicek, A Ercument, E. (2019). Re-identification of individuals in genomic data-sharing beacons via allele inference. Bioinformatics, 35 (3), 365--371.
B\"ulent Sar\iy\ild\iz, Mert, G\"okberk Cinbiș, Ramazan, & Ayday, E. (2019). Key Protected Classification for Collaborative Learning. arXiv e-prints.
Zhu, X., Ayday, E., & Vitenberg, R. (2019). A privacy-preserving framework for outsourcing location-based services to the cloud. IEEE Transactions on Dependable and Secure Computing.
Ayday, E., Naveed, M., & Tang, H. (2019). GenoPri'17: International Workshop on Genome Privacy and Security. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16 (4), 1322--1323.
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E. (2018). An inference attack on genomic data using kinship, complex correlations, and phenotype information. IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), 15 (4), 1333--1343.
Yilmaz, E., Ferhatosmanoglu, H., Ayday, E., & Aksoy, R. (2018). Privacy-preserving aggregate queries for optimal location selection. arXiv preprint arXiv:1801.02069.
G\"ursoy, Gamze, Harmanci, A., Tang, H., Ayday, E., & Brenner, S. (2018). When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data. World Scientific.
Ailijiang, A., Bayir, M., Altiparmak, N., Peixoto, D., Arora, V., Assent, I., Athanassoulis, M., Ayday, E., Babalou, S., Bahrami, M., & Others, M. (2018). Appreciation to distributed and parallel databases reviewers. Distrib Parallel Databases, 36 , 1--3.
Ozercan, H., Ileri, A., Ayday, E., & Alkan, C. (2018). Realizing the potential of blockchain technologies in genomics. Genome research, 28 (9), 1255--1263.
Ayday, E., Jiang, X., & Malin, B. (2018). GenoPri'16: International Workshop on Genome Privacy and Security. IEEE/ACM Transactions on Computational Biology and Bioinformatics.
Von Thenen, N., Ayday, E., & Cicek, A Ercument, E. (2018). Re-identification of individuals in genomic data-sharing beacons via allele inference. Bioinformatics, 35 (3), 365--371.
Harmanci, A., Tang, H., Ayday, E., & Brenner, S. (2018). When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data. .
Ayday, E., Jiang, X., & Malin, B. (2018). GenoPri'16: International Workshop on Genome Privacy and Security. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 15 (5), 1403--1404.
Harmanci, A., Tang, H., Ayday, E., & Brenner, S. (2018). When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data. .
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E. (2018). Key Protected Classification for GAN Attack Resilient Collaborative Learning. .
Ozercan, H., Ileri, A., Ayday, E., & Alkan, C. (2018). Realizing the potential of blockchain technologies in genomics. Genome research, 28 (9), 1255--1263.
Kale, G., Ayday, E., & Tastan, O. (2018). A utility maximizing and privacy preserving approach for protecting kinship in genomic databases. Bioinformatics, 34 (2), 181--189.
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E. (2018). Key Protected Classification for GAN Attack Resilient Collaborative Learning. .
Kale, G., Ayday, E., & Tastan, O. (2017). A utility maximizing and privacy preserving approach for protecting kinship in genomic databases. Bioinformatics, 34 (2), 181--189.
Ayday, E., & Humbert, M. (2017). Inference attacks against kin genomic privacy. IEEE Security \& Privacy, 15 (5), 29--37.
Kale, G., Ayday, E., & Tastan, O. (2017). Supplementary Materials for A Utility Maximizing and Privacy Preserving Approach for Protecting Kinship in Genomic Databases. .
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E. (2017). An inference attack on genomic data using kinship, complex correlations, and phenotype information. IEEE/ACM transactions on computational biology and bioinformatics, 15 (4), 1333--1343.
Ayday, E., & Humbert, M. (2017). Inference attacks against kin genomic privacy. IEEE Security \& Privacy, 15 (5), 29--37.
Humbert, M., Ayday, E., Hubaux, J., & Telenti, A. (2017). Quantifying interdependent risks in genomic privacy. ACM Transactions on Privacy and Security (TOPS), 20 (1), 1--31.
Yilmaz, A., & Ayday, E. (2017). Collusion-secure watermarking for sequential data. arXiv preprint arXiv:1708.01023.
Halimi, A., & Ayday, E. (2017). Profile Matching Across Unstructured Online Social Networks: Threats and Countermeasures. arXiv preprint arXiv:1711.01815.
Yilmaz, A., & Ayday, E. (2017). Collusion-Secure Watermarking for Sequential Data. arXiv preprint arXiv:1708.01023.
Yilmaz, E., Ferhatosmanoglu, H., Ayday, E., & Aksoy, R. (2017). Privacy-preserving aggregate queries for optimal location selection. IEEE Transactions on Dependable and Secure Computing, 16 (2), 329--343.
Kale, G., Ayday, E., & Tastan, O. (2017). Supplementary Materials for A Utility Maximizing and Privacy Preserving Approach for Protecting Kinship in Genomic Databases. .
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, C., & Ayday, E. (2017). A survey on information security threats and solutions for Machine to Machine (M2M) communications. Journal of Parallel and Distributed Computing, 109 , 142--154.
Ayday, E., Tang, Q., & Yilmaz, A. (2017). Cryptographic solutions for credibility and liability issues of genomic data. IEEE Transactions on Dependable and Secure Computing.
Humbert, M., Ayday, E., Hubaux, J., & Telenti, A. (2017). Quantifying interdependent risks in genomic privacy. ACM Transactions on Privacy and Security (TOPS), 20 (1), 3.
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, C., & Ayday, E. (2017). A survey on information security threats and solutions for Machine to Machine (M2M) communications. Journal of Parallel and Distributed Computing, 109 , 142--154.
Ayday, E., Tang, Q., & Yilmaz, A. (2017). Cryptographic solutions for credibility and liability issues of genomic data. IEEE Transactions on Dependable and Secure Computing, 16 (1), 33--43.
Halimi, A., & Ayday, E. (2017). Profile matching across unstructured online social networks: threats and countermeasures. arXiv preprint arXiv:1711.01815.
Huang, Z., Ayday, E., Lin, H., Aiyar, R., MOLYNEAUX, A., Xu, Z., Fellay, J., Steinmetz, L., & Hubaux, J. (2016). A privacy-preserving solution for compressed storage and selective retrieval of genomic data. Genome research, 26 (12), 1687--1696.
Avllazagaj, E., Ayday, E., & Cicek, A Ercument, E. (2016). Privacy-Related Consequences of Turkish Citizen Database Leak. arXiv preprint arXiv:1605.05847.
McLaren, P., RAISARO, J., Aouri, M., Rotger, M., Ayday, E., Bartha, Istv\'an, E., Delgado, M., Vallet, Y., G\"unthard, Huldrych F, Y., Cavassini, M., & Others, M. (2016). Privacy-preserving genomic testing in the clinic: a model using HIV treatment. Genetics in medicine, 18 (8), 814--822.
Huang, Z., Ayday, E., Lin, H., Aiyar, R., MOLYNEAUX, A., Xu, Z., Fellay, J., Steinmetz, L., & Hubaux, J. (2016). A privacy-preserving solution for compressed storage and selective retrieval of genomic data. Genome research, 26 (12), 1687--1696.
Avllazagaj, E., Ayday, E., & Cicek, A Ercument, E. (2016). Privacy-Related Consequences of Turkish Citizen Database Leak. arXiv preprint arXiv:1605.05847.
McLaren, P., RAISARO, J., Aouri, M., Rotger, M., Ayday, E., Bartha, Istv\'an, E., Delgado, M., Vallet, Y., G\"unthard, Huldrych F, Y., Cavassini, M., & Others, M. (2016). Privacy-preserving genomic testing in the clinic: a model using HIV treatment. Genetics in medicine, 18 (8), 814.
Balci, F., Kulan, H., Alkan, C., & Ayday, E. (2015). A New Inference Attack against Kin Genomic Privacy. Proc. Privacy-Aware Computational Genomics.
Ayday, E., De Cristofaro, E., Hubaux, J., & Tsudik, G. (2015). Whole genome sequencing: Revolutionary medicine or privacy nightmare?. Computer, 48 (2), 58--66.
Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., Malin, B., & Wang, X. (2015). Privacy in the genomic era. ACM Computing Surveys (CSUR), 48 (1), 6.
Humbert, M., Huguenin, K\'evin, M., Hugonot, J., Ayday, E., & Hubaux, J. (2015). De-anonymizing genomic databases using phenotypic traits. Proceedings on Privacy Enhancing Technologies, 2015 (2), 99--114.
Balci, F., Kulan, H., Alkan, C., & Ayday, E. (2015). A New Inference Attack against Kin Genomic Privacy. Proc. Privacy-Aware Computational Genomics.
Ayday, E., De Cristofaro, E., Hubaux, J., & Tsudik, G. (2015). Whole genome sequencing: Revolutionary medicine or privacy nightmare?. Computer, 48 (2), 58--66.
Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., Malin, B., & Wang, X. (2015). Privacy in the genomic era. ACM Computing Surveys (CSUR), 48 (1), 1--44.
Humbert, M., Huguenin, K\'evin, M., Hugonot, J., Ayday, E., & Hubaux, J. (2015). De-anonymizing genomic databases using phenotypic traits. Proceedings on Privacy Enhancing Technologies, 2015 (2), 99--114.
Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., Malin, B., Wang, X., & Others, X. (2014). Privacy and security in the genomic era. .
RAISARO, J., Ayday, E., & Hubaux, J. (2014). Patient privacy in the genomic era. Praxis, 103 (10), 579--86.
Telenti, A., Ayday, E., & Hubaux, J. (2014). On genomics, kin, and privacy. F1000Research, 3
Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., Malin, B., Wang, X., & Others, X. (2014). Privacy and security in the genomic era. .
RAISARO, J., Ayday, E., & Hubaux, J. (2014). Patient privacy in the genomic era. Praxis, 103 (10), 579--86.
Telenti, A., Ayday, E., & Hubaux, J. (2014). On genomics, kin, and privacy. F1000Research, 3
RAISARO, J., Ayday, E., McLaren, P., Hubaux, J., & Telenti, A. (2014). Privacy-Preserving HIV Pharmacogenetics: A Real Use Case of Genomic Data Protection. Workshop on Genome Privacy .
Ayday, E., De Cristofaro, E., Hubaux, J., & Tsudik, G. (2013). The chills and thrills of whole genome sequencing. Computer.
Ayday, E., & Rajagopal, S. (2013). Secure device authentication mechanisms for the smart grid-enabled home area networks. Tech. Rep..
Ayday, E., Delgosha, F., & Fekri, F. (2012). Data authenticity and availability in multihop wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 8 (2), 10.
Ayday, E., & Fekri, F. (2012). A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks. Ad Hoc Networks, 10 (7), 1278--1290.
Ayday, E., & Fekri, F. (2012). A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks. Ad Hoc Networks, 10 (7), 1278--1290.
Ayday, E., Delgosha, F., & Fekri, F. (2012). Data authenticity and availability in multihop wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 8 (2), 1--26.
Ayday, E., & Fekri, F. (2012). An iterative algorithm for trust management and adversary detection for delay-tolerant networks. IEEE Transactions on Mobile Computing, 11 (9), 1514--1531.
Ayday, E., & Fekri, F. (2011). Iterative trust and reputation management using belief propagation. IEEE Transactions on Dependable and Secure Computing, 9 (3), 375--386.
Ayday, E., & Fekri, F. (2010). A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks, 8 (2), 181--192.
Ayday, E., & Fekri, F. (2010). A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks, 8 (2), 181--192.
Ayday, E., RAISARO, J., McLaren, P., Fellay, J., & Hubaux, J. (2007). Privacy-Enhancing Technologies for Disease Risk Tests Based on Genomic and Non-Genomic Data. .
AYDAY, C., & Ayday, E. (2005). The Use of GIS and Handheld GPS Integration for the Preparation of Quick Plans. GIS Ostrava Symposium.
Ayday, E., ALTAN, M., & AYDAY, C. (2005). Preparation and evaluation of engineering geological maps in 3-dimensional Geographic Information Systems environment. .
Ayday, E., ALTAN, M., & AYDAY, C. (2005). Preparation and Evaluation of Engineering Geological Maps in 3-dimensional Geographic Information Systems Environment. AGILE Conference on GIScience.
De Cristofaro, E., Malin, B., Jiang, X., Ayday, E., Bogdanov, D., Burton, P., Bush, W., Clayton, E., Craig, D., Dove, E., & Others, E. (). GenoPri 2015. .
Kucuk, V., & Ayday, E. (). Profile Matching Across Unstructured Online Social Networks. .
Aguirre, M., Ahn, G., Alghamdi, M., Alsaleh, M., Andersson, D., Asplund, M., Atluri, V., Ayday, E., Bakiras, S., Barker, J., & Others, J. (). 2012 Index IEEE Transactions on Dependable and Secure Computing| Vol. 9. .
De Cristofaro, E., Malin, B., Jiang, X., Ayday, E., Bogdanov, D., Burton, P., Bush, W., Clayton, E., Craig, D., Dove, E., & Others, E. (). GenoPri 2015. .
Ayday, E. (). Anonymity of E-Cash Protocols. .
Alser, M., Almadhoun, N., Nouri, A., Alkan, C., & Ayday, E. (). Identifying Anonymous Donors of Genetic Information. .
Ahn, G., Alturi, V., Androulaki, E., Ayday, E., Baldimtsi, F., Barker, K., Basu, A., Boyd, C., Burmester, M., B\"ohme, Rainer, M., & Others, M. (). Stephen Marsh, UOIT Keith Martin, Royal Holloway, University of London Sjouke Mauw, University of Luxembourg Ali Miri, Ryerson University Aikaterini Mitrokotsa, Chalmers University of Technology. .
Ayday, E. (). Anonymity of E-Cash Protocols. .
Alser, M., Almadhoun, N., Nouri, A., Alkan, C., & Ayday, E. (). Identifying Anonymous Donors of Genetic Information. .
Kucuk, V., & Ayday, E. (). Profile Matching Across Unstructured Online Social Networks. .
Ayday, E., Shmatikov, V., Austin, U., & Kantarcioglu, M. (). Data Privacy Hiding Data from the Database User I. .
AYDAY, C., & Ayday, E. (). The Use of GIS and Handheld GPS Integration for the Preparation of Quick Plans. .
Ayday, E., Shmatikov, V., Austin, U., & Kantarcioglu, M. (). Data Privacy Hiding Data from the Database User I. .
Ahn, G., Alturi, V., Androulaki, E., Ayday, E., Baldimtsi, F., Barker, K., Basu, A., Boyd, C., Burmester, M., B\"ohme, Rainer, M., & Others, M. (). Stephen Marsh, UOIT Keith Martin, Royal Holloway, University of London Sjouke Mauw, University of Luxembourg Ali Miri, Ryerson University Aikaterini Mitrokotsa, Chalmers University of Technology. .