CHRISTOPHER W. CLIFTON

Department of Computer Sciences
Purdue University
Lawson Building, 305 N. University St.
West Lafayette, Indiana 47907-2107
(765)494-6005
Email: clifton_nospam@cs_nojunk.purdue.edu
72 Limberlost Lane
West Lafayette, Indiana 47906-9400
(765)746-3979
United States Citizen
(Also available as postscript and PDF.)

EDUCATION

Princeton University Princeton, NJ
Ph.D. in Computer Science, June 1991; M.A. in Computer Science, February 1988. Awarded IBM Graduate Fellowship for academic years 1988-89, 1989-90; GTE Fellowship for Academic year 1987-88; NCR Fellowship for academic year 1986-87.
Massachusetts Institute of Technology Cambridge, MA
M.S. and B.S. in Computer Science and Engineering, September 1986.

RESEARCH INTERESTS

Data privacy, particularly with respect to analysis of private data. This includes privacy-preserving data mining, data de-identification and anonymization, and limits on identifying individuals from data mining models. Data mining, including fairness issues in data mining, data mining of text and data mining techniques applied to interoperation of heterogeneous information sources. Fundamental data mining challenges posed by these applications include extracting knowledge from noisy data, identifying knowledge in highly skewed data (few examples of interesting behavior), and limits on learning. Database support for widely distributed and autonomously controlled information, particularly issues related to data privacy.

PROFESSIONAL EXPERIENCE

Purdue University August 2001 to Present
Professor in the Department of Computer Sciences (Associate Professor to August 2013), interim head July 2023-June 2024, also in the Department of Statistics (by courtesy) from 2011. Research on Data Mining and Database Management System Security. Taught graduate courses Database Systems, Information Security, Information Retreival, Advanced Topics in Distributed Systems and a graduate seminar on Data Mining and Security. Received 2009 College of Science Graduate Mentoring award, 2010 College of Science Interdisciplinary award, 2011 and 2016 College of Science Team award, 2011-2012 Teaching for Tomorrow Senior Faculty award.
National Science Foundation September 2013 to June 2016
Rotating program director in the Information & Intelligent Systems division of the Directorate for Computer & Information Science & Engineering.
The MITRE Corporation September 1995 to August 2001
Principal Scientist (promoted from Lead Scientist in 1999) in the Component Based Architectures & Data Management department of the Information Technology Center. Research on Database Management Systems for applications with loosely-structured data; in particular data mining for text and image databases. Director's Distinguished Accomplishment Award for Data Mining on Text and Imagery, August 1997; SPOT Recognition award for Knowledge Discovery in Text, September 1998; Program Recognition Award for GeoNODE, June 2000; Senior Vice President/General Manager's Award for Joint Battlespace Infosphere, February 2001.
Northwestern University September 1991 to August 1995
Assistant Professor in the Department of Electrical Engineering and Computer Science. Research on Database Management Systems for applications with loosely-structured data; in particular software database and heterogeneous databases. Developed and taught a two quarter sequence Software Project Management and Development; also taught Introduction to Computer Programming, Fundamentals of Computer System Software, Data Management and Information Processing, Introduction to Database Systems, and a graduate seminar on Heterogeneous Databases.
Matsushita Information Technology Laboratory June through August 1991
Research on data management systems for office information.
Princeton University September 1986 through June 1991
Research on database support for multimedia. Thesis title: HyperFile, a Database Manager for Documents (Advisor: Professor Hector Garcia-Molina.) Teaching Assistant for Introduction to Programming Systems and Database Systems.
Raritan Valley Community College January through May 1989
Adjunct Faculty. Taught Foundations of Computer Science.
Massachusetts Institute of Technology September 1985 through June 1986
Thesis title: Dynamic Load Balancing (Advisors: Professor Nancy Lynch and Dr. Flaviu Cristian (IBM Almaden Research).) Teaching Assistant in the Department of Electrical Engineering and Computer Science: Recitation instructor for Laboratory in Software Engineering; Tutorial instructor for Structure and Interpretation of Computer Programs.
I.B.M. Almaden Research Summers 1983 and 1984, January through August 1985
Co-op student through the MIT VI-A program. Worked with a team of computer scientists studying fault tolerant computer systems using a cluster of processors. Responsible for creation of a system to prevent multiple management of a database given a communication failure, the development of a debugging system for programs spread across multiple processors, and the design and implementation of a dynamic load balancing system.
Tektronix, Inc. September 1979 through August 1981, Summer 1982
Software technician. Worked through a High school work-study program, as well as summers, as part of a team of 10 engineers responsible for development and maintenance of microprocessor cross-compilers on a CDC-175. Personally responsible for implementation and documentation, as well as partial development, of a microprocessor-based controller.

DISSERTATION ABSTRACT

BOOKS AND BOOK CHAPTERS

Chris Clifton, Identity and Anonymity, Chapter 4 in An Introduction to Privacy for Technology Professionals, Travix Breaux, ed., International Association of Privacy Professionals, Inc., 2020 (to be revised 2023), pp. 149-175.

Mehmet Ercan Nergiz, Maurizio Atzori, and Chris Clifton, δ-Presence, chapter Privacy metrics and data protection, Sara Foresti, ed., in Encyclopedia of Cryptography, Security and Privacy, Sushil Jajodia, Pierangela Samarati, and Moti Yung, eds., Springer, 15 August 2021.

Christine Task and Chris Clifton, What should we protect? Defining differential privacy for social network analysis, in State of the Art Applications of Social Network Analysis, 2014, pp. 139-161.

Chris Clifton, Discovering Privacy, in Journeys to Data Mining: Experiences from 15 Renowned Researchers, Mohamed Medhat Gaber, ed., Springer, 2012.

Chris Clifton, Privacy-Preserving Data Mining, in Encyclopedia of Database Systems, Ling Liu and M. Tamer Ozsu, eds., Springer, 2009.

Chris Clifton, Wei Jiang, Mummoorthy Murugesan, and M. Ercan Nergiz, Is Privacy Still an Issue for Data Mining? Chapter 18 in Next Generation of Data Mining, Hillol Kargupta, Jiawei Han, Philip Yu, Rajeev Motwani, and Vipin Kumar (Eds.), CRC Press, 2008.

Christopher W. Clifton, Deirdre K. Mulligan, and Raghu Ramakrishnan, Data Mining and Privacy: An Overview, in Privacy and Technologies of Identity A Cross-Disciplinary Conversation, Katherine Strandburg and Daniela Stan Raicu (Eds.), Springer-Verlag, 2006.

Privacy-Preserving Data Mining, with Jaideep Vaidya and Yu Michael Zhu, Springer, 2006. Also in Japanese, 2010.

Privacy-Preserving Data Mining, with Murat Kantarcioglu and Jaideep Vaidya, in Foundations and Advances in Data Mining, Wesley Chu and T.Y. Lin, eds., Studies in Fuzziness and Soft Computing vol. 180, Springer-Verlag, 2005.

Defining Privacy for Data Mining, with Murat Kantarcioglu and Jaideep Vaidya, in Data Mining: Next Generation Challenges and Future Directions, AAAI Press, 2004, pp. 255-272.

Security and Privacy, Chapter 18 in Handbook of Data Mining, Lawrence Erlbaum Associates, Mahwah, NJ, April 2003.

JOURNAL ARTICLES

Shalini Jangra, Durgi Toshniwal, and Chris Clifton, Statistical Limitations of Sensitive Itemset Hiding Methods, International Journal of Applied Intelligence, Springer Nature, Switzerland, July 2023.

Differentially Private k-Nearest Neighbor Missing Data Imputation, Chris Clifton, Shawn Merrill, Eric Hanson, and Keith Merill, ACM Transactons on Privacy and Security 25(3): 1-23, August 2022.

Support Vector Classification with l-diversity, Koray Mancuhan and Chris Clifton, Computers & Security 77:653-665, Elsevier, August 2018.

Instance-Based Learning with l-diversity, Koray Mancuhan and Chris Clifton, Transactions on Data Privacy, 10(3):203-235, December 2017.

Anonymizing Transactional Datasets, Bechara al Bouna, Chris Clifton, and Qutaibah M. Malluhi, Journal of Computer Security 23(1):89-106, IOS Press, 2015.

Combating Discrimination Using Bayesian Networks, Koray Mancuhan and Chris Clifton, Artificial Intelligence and Law 22(2):211-238 special issue on Computational Methods for Enforcing Privacy and Fairness, Sergio Mascetti, Annarita Ricci, and Salvatore Ruggieri, eds., June 2014.

On Syntactic Anonymity and Differential Privacy, Chris Clifton and Tamir Tassa, Transactions on Data Privacy 6(2):161-183, August 2013.

t-Plausibility: Generalizing words to desensitize text, Balamurugan Anandan, Chris Clifton, Wei Jiang, Mummoorthy Murugesan, Pedro Pastrana-Camacho, and Luo Si, Transactions on Data Privacy 5(3):505-534, December 2012.

Anonymous Search Histories Featuring Personalized Advertisement - Balancing Privacy with Economic Interests, Thorben Burghardt, Klemens Böhm, Achim Guttmann, and Chris Clifton, Transactions on Data Privacy 4(1):31-50, April 2011.

Classifier Evaluation and Attribute Selection against Active Adversaries, Murat Kantarcioglu, Bowei Xi, and Chris Clifton, Data Mining and Knowledge Discovery 22(1-2):291-335, Springer, January 2011.

Efficient Privacy-Preserving Similar Document Detection, Mummoorthy Murugesan, Wei Jiang, Chris Clifton, Luo Si and Jaideep Vaidya, The VLDB Journal, 19(4):457-475, VLDB Endowment, August 2010.

δ-Presence Without Complete World Knowledge, M. Ercan Nergiz and Chris Clifton, Transactions on Knowledge and Data Engineering 22(6):868-883, IEEE Computer Society, Los Alamitos, CA, June 2010.

MultiRelational k-Anonymity, Mehmet Ercan Nergiz, Chris Clifton, and Ahmet Erhan Nergiz, Transactions on Knowledge and Data Engineering 21(8):1104-1117, IEEE Computer Society, Los Alamitos, CA, August 2009.

Privacy-Preserving Kth Element Score over Vertically Partitioned Data, with Jaideep Vaidya, Transactions on Knowledge and Data Engineering 21(2):253-258, IEEE Computer Society, Los Alamitos, CA, February 2009.

Privacy-Preserving Decision Trees over Vertically Partitioned Data, Jaideep Vaidya, Chris Clifton, Murat Kantarcioglu, and A. Scott Patterson, ACM Transactions on Knowledge Discovery in Data 2(3), October 2008.

Privacy Preserving Naive Bayes Classification with Jaideep Vaidya and Murat Kantarcioglu, The VLDB Journal 17(4):879-898, VLDB Endowment, July 2008.

Transforming Semi-Honest Protocols to Ensure Accountability, with Wei Jiang and Murat Kantarcioglu, Data and Knowledge Engineering 65(1):57-74 special section on Privacy Aspects of Data Mining, Elsevier Science, Amsterdam, April 2008. Expanded version of PADM06 paper.

An Approach to Identifying Beneficial Collaboration Securely in Decentralized Logistics Systems, with Ananth Iyer, Richard Cho, Wei Jiang, Murat Kantarcioglu, and Jaideep Vaidya, Manufacturing & Service Operations Management 10(1), INFORMS, Linthicum, Maryland, Winter 2008.

Thoughts on k-Anonymization, with Mehmet Ercan Nergiz, Data and Knowledge Engineering 63(3), Elsevier Science, Amsterdam, December 2007. Invited article, expanded version of PDM06 paper.

A Secure Distributed Framework for Achieving k-Anonymity, with Wei Jiang, The VLDB Journal 15(4): Special Issue on Privacy-Preserving Data Management, VLDB Endowment, November 2006.

Secure Set Intersection Cardinality with Application to Association Rule Mining, with Jaideep Vaidya, Journal of Computer Security 13(4), IOS Press, November 2005.

Privacy Preserving Clustering with Distributed EM Mixture Modeling, with Xiaodong Lin and Michael Zhu, Knowledge and Information Systems 8(1), Springer-Verlag, London, July 2005.

Privacy-Preserving Data Mining: Why, How, and What For?, with Jaideep Vaidya, IEEE Security & Privacy, New York, NY, November/December, 2004.

Privacy Preserving Data Mining of Association Rules on Horizontally Partitioned Data, with Murat Kantarcioglu, Transactions on Knowledge and Data Engineering 16(9), IEEE Computer Society Press, Los Alamitos, CA, September 2004.

TopCat: Data Mining for Topic Identification in a Text Corpus, with Robert Cooley and Jason Rennie, Transactions on Knowledge and Data Engineering 16(8), IEEE Computer Society Press, Los Alamitos, CA, August, 2004.

Change Detection in Overhead Imagery using Neural Networks, International Journal of Applied Intelligence 18(2), Kluwer Academic Publishers, Dordrecht, The Netherlands, March 2003.

Emerging Standards for Data Mining, with Bhavani Thuraisingham, Computer Standards and Interfaces 23 (3), Elsevier Science, Amsterdam, July 2001.

Using Sample Size to Limit Exposure to Data Mining, Journal of Computer Security 8 (4), IOS Press, November 2000. Invited article. Expanded version of Protecting Against Data Mining through Samples.

SEMINT: A Tool for Identifying Attribute Correspondences in Heterogeneous Databases Using Neural Networks, with Wen-Syan Li, Data and Knowledge Engineering 33(1), Elsevier Science, Amsterdam, April 2000.

Database Integration Using Neural Networks: Implementation and Experiences, with Wen-Syan Li and Shu-Yao Liu, Knowledge and Information Systems 2(1), Springer-Verlag, London, February 2000.

Multidatabase Query Processing with Uncertainty in Global Keys and Attribute Values, with Peter Scheuermann and Wen-Syan Li, Journal of the American Society for Information Science 49(3), John Wiley & Sons, Philadelphia, PA, March 1998.

Dynamic Integration in Multidatabase Systems, with Wen-Syan Li, Journal of Database Management, 7(1), IDEA Group Publishing, Harrisburg, PA, Winter 1996.

HyperFile: A Data and Query Model for Documents, with Hector Garcia-Molina and David Bloom, VLDB Journal, 4(1):45-86, The Boxwood Press, Pacific Grove, CA, March 1995.

REFEREED CONFERENCES AND WORKSHOPS

Yan Zhou, Murat Kantarcioglu, and Chris Clifton, On Improving Fairness of AI Models with Synthetic Minority Oversampling Techniques, SIAM International Conference on Data Mining (SDM23) Minneapolis, Minnesota, April 27 - 29, 2023.

Chowdhury Mohammad Rakin Haider, Chris Clifton, and Yan Zhou, Unfair AI: It Isn’t Just Biased Data, 22nd IEEE International Conference on Data Mining, Orlando, Florida, November 28-December 1, 2022.

Farzad Zafarani and Chris Clifton, Differentially Private Naive Bayes Using Smooth Sensitivity, The 21st Privacy Enhancing Technologies Symposium July 12-16, 2021, online.

Chris Clifton, Eric Hanson, Keith Merrill, and Shawn Merrill, A Partitioned Recoding Scheme for Privacy Preserving Data Publishing, Privacy in Statistical Databases, September 23-25, 2020, Tarragona, Catalonia.

Radhika Bhargava and Chris Clifton, When is a Semi-Honest Secure Multiparty Computation Valuable?, GameSec2019: The 10th Conference on Decision and Game Theory for Security, October 30-November 1, 2019, Stockholm, Sweden.

Anomaly Detection under Poisoning Attacks, Radhika Bhargava and Chris Clifton, ODD v5.0: Outlier Detection De-constructed, workshop held in conjunction with the 24th ACM SIGKDD international conference on Knowledge Discovery and Data Mining (KDD2018), London, UK, August 20, 2018.

Differentially Private Feature Selection for Data Mining, Balamurugan Anandan and Chris Clifton, 4th ACM International Workshop on Security and Privacy Analytics (IWSPA 2018), co-located with ACM CODASPY 2018 March 21, 2018, Tempe, Arizona.

Privacy Preserving Distributed Weighted Bipartite Matching, Balamurugan Anandan and Chris Clifton, 2017 IEEE Conference on Dependable and Secure Computing August 7-10, 2017, Taipei, Taiwan.

Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper, Bhavani M. Thuraisingham, Murat Kantarcioglu, Elisa Bertino, and Chris Clifton, IEEE International Congress on Big Data Honolulu, Hawaii, June 25-30, 2017.

Statistical Learning Theory Approach for Data Classification with l-Diversity, Koray Mancuhan and Chris Clifton, 2017 SIAM International Conference on Data Mining (SDM17), Houston, Texas, April 27-29, 2017.

Differentially Private Significance Testing on Paired-Sample Data, Christine Task and Chris Clifton, 2016 SIAM International Conference on Data Mining (SDM16), Miami, Florida, May 5-7, 2016, pp. 153-161.

Laplace noise generation for two-party computational differential privacy, Balamurugan Anandan and Chris Clifton, Thirteen annual conference on Privacy, Security, and Trust (PST), July 21-23, 2015, Izmir, Turkey.

Privacy-Integrated Graph Clustering Through Differential Privacy, Yvonne Mülle, Chris Clifton, and Klemens Böhm, The 8th International Workshop on Privacy and Anonymity in the Information Society (PAIS) collocated with EDBT/ICDT, March 27, 2015, Brussels, Belgium.

Efficient Sanitization of Unsafe Data Correlations, Bechara al Bouna, Chris Clifton, and Qutaibah M. Malluhi, The 8th International Workshop on Privacy and Anonymity in the Information Society (PAIS) collocated with EDBT/ICDT, March 27, 2015, Brussels, Belgium.

Realizable Rational Multiparty Cryptographic Protocols, with John Ross Wallrabenstein, Conference on Decision and Game Theory for Security (GameSec 2014), Los Angeles, CA, November 6-7, 2014.

Association Rule Mining on Fragmented Database, with Amel Hamzaoui, Qutaibah Malluhi, and Riley Ryan, 9th International Workshop on Data Privacy Management (DPM 2014) held in conjunciton with ESORICS 2014, Wroclaw, Poland, September 10, 2014.

Top-k frequent itemsets via differentially private FP-trees, with Jaewoo Lee, Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, New York, August 24-27, 2014.

Decision Tree Classification on Outsourced Data, with Koray Mancuhan, Workshop on Data Ethics at the Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, New York, August 24, 2014.

Privacy Preserving Tatonnement; A Cryptographic Construction of an Incentive Compatible Market, with John Ross Wallrabenstein, Financial Cryptography and Data Security (FC14), Barbados, March 3-7, 2014.

Equilibrium Concepts for Rational Multiparty Computation, with John Ross Wallrabenstein, Conference on Decision and Game Theory for Security (GameSec 2013), Fort Worth, TX, November 11-12, 2013.

Maintaining Database Anonymity in the Presence of Queries, with Ryan Riley and Qutaibah M. Malluhi, 9th International Workshop on Security and Trust Management (STM 2013) held in conjunction with ESORICS 2013, Egham, UK, September 12-13, 2013.

Using Safety Constraint for Transactional Dataset Anonymization, with Bechara Al Bouna and Qutaibah Malluhi, The 27th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC'13), Newark, New Jersey, July 15-17, 2013. Best Research Paper Award.

Privacy through Uncertainty in Location-Based Services, with Shawn Merrill, Nilgün Basalp, Joachim Biskup, Erik Buchmann, Bart Kuijpers, Walied Othman, and Erkay Savas, International Workshop on Privacy and Security for Moving Objects (PriSMO) held in conjunction with MDM 2013, Milan, Italy, June 3, 2013.

On Syntactic Anonymity and Differential Privacy, Chris Clifton and Tamir Tassa, First Workshop on Privacy-Preserving Data Publication and Analysis held at ICDE 2013, Brisbane, Australia, April 8-12, 2013.

Updating Outsourced Anatomized Private Databases, Ahmet Erhan Nergiz, Chris Clifton, and Qutaibah Malluhi, 16th International Conference on Extending Database Technology (EDBT), Genoa, Italy, March 18-22, 2013.

Discriminatory Decision Policy Aware Classification, with Koray Mancuhan, International Workshop on Discrimination and Privacy-Aware Data Mining (DPADM), at ICDM 2012, Brussels, Belgium, December 10, 2012.

A Guide to Differential Privacy Theory in Social Network Analysis, with Christine Task, The IEEE/ACM International Conference on Social Networks Analysis and Mining (ASONAM 2012), Istanbul, Turkey, August 26-29, 2012.

Differential Identifiability, with Jaewoo Lee, The 19th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Beijing, China, August 12-16, 2012. Honorable mention, best video award.

How much is enough? Choosing ε for Differential Privacy, with Jaewoo Lee, The 14th Information Security Conference (ISC 2011), Xi'an, China, October 26-29, 2011.

Significance of Term Relationships on Anonymization, with Balamurugan Anandan, Web Intelligence for Information Security Workshop in conjunction with WI-IAT, Lyon, France, August 22, 2011.

Query Processing in Private Data Outsourcing Using Anonymization, with Ahmet Erhan Nergiz, The 25th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC-11), Richmond, Virginia, July 11-13, 2011.

Search-Log Anonymization and Advertisement: Are They Mutually Exclusive?, with Thorben Burghardt, Klemens Böhm, and Achim Guttmann, The 19th ACM International Conference on Information and Knowledge Management (CIKM 2010), Toronto, Canada, October 26-30, 2010.

Practical and Secure Integer Comparison and Interval Check, with Ahmet Erhan Nergiz, Mehmet Ercan Nergiz, and Thomas Pedersen, the 2010 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT2010), Minneapolis, Minnesota, August 20-22, 2010.

t-Plausibility: Semantic Preserving Text Sanitization, with Wei Jiang, Mummoorthy Murugesan and Luo Si, the 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09), Vancouver, Canada, August 29-31, 2009.

Providing Privacy through Plausibly Deniable Search, with Mummoorthy Murugesan, 2009 SIAM International Conference on Data Mining (SDM09), Sparks, Nevada, April 30-May 2, 2009.

Plausibly Deniable Search, with Mummoorthy Murugesan, Proceedings of the Workshop on Secure Knowledge Management (SKM 2008), Dallas, Texas, November 3-4, 2008.

A Privacy Preserving Credentialing System for Health Care, with Ahmet Erhan Nergiz, Proceedings of the Workshop on Secure Knowledge Management (SKM 2008), Dallas, Texas, November 3-4, 2008.

Similar Document Detection with Limited Information Disclosure, with Wei Jiang, Mummoorthy Murugesan, and Luo Si, Proceedings of the 24th International Conference on Data Engineering (ICDE 2008), Cancun, Mexico, April 7-12, 2008.

Identifying Rare Classes with Sparse Training Data, with Mingwu Zhang, Wei Jiang, and Sunil Prabhakar, Proceedings of the 18th International Conference on Database and Expert Systems Applications, Regensburg, Germany, September 4-7, 2007.

Hiding the Presence of Individuals from Shared Databases, with Mehmet Ercan Nergiz and Maurizio Atzori, 2007 ACM SIGMOD International Conference on Management of Data, Beijing, China, June 11-14, 2007. Implemented in Google Cloud Data Loss Prevention product.

AC-Framework for Privacy-Preserving Collaboration, with Wei Jiang, 2007 SIAM International Conference on Data Mining (SDM07), Minneapolis, Minnesota, April 26-28, 2007.

MultiRelational k-Anonymity with Mehmet Ercan Nergiz and Ahmet Erhan Nergiz, The 23rd IEEE International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey, April 16-20, 2007.

Transforming Semi-Honest Protocols to Ensure Accountability, with Wei Jiang, The ICDM workshop on Privacy Aspects of Data Mining (PADM06), Hong Kong, China, Dec. 18, 2006.

Thoughts on k-Anonymization, with Mehmet Ercan Nergiz, The Second International Workshop on Privacy Data Management held in conjunction with The 22nd International Conference on Data Engineering, Atlanta, USA April 8, 2006.

Privacy-Preserving Distributed k-Anonymity, with Wei Jiang, The 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security August 7-10, 2005, Storrs, Connecticut.

Security Issues in Querying Encrypted Data, with Murat Kantarcioglu, The 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security August 7-10, 2005, Storrs, Connecticut.

Privacy-Preserving Decision Trees over Vertically Partitioned Data, with Jaideep Vaidya, The 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security August 7-10, 2005, Storrs, Connecticut.

Dependable Real-time Data Mining, with Bhavani Thuraisingham, Latifur Khan, John Maurer, and Marion Ceruti, 8th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2005), Seattle, Washington, May 18-20, 2005.

Privacy-Preserving Top-K Queries with Jaideep Vaidya, The 21st International Conference on Data Engineering (ICDE 2005), April 5-8, 2005, Tokyo, Japan.

Knowledge Discovery from Transportation Network Data, with Wei Jiang, Jaideep Vaidya, Zahir Balaporia, and Brett Banich, The 21st International Conference on Data Engineering (ICDE 2005), April 5-8, 2005, Tokyo, Japan. Best paper, Industrial Track.

Privacy-Preserving Outlier Detection with Jaideep Vaidya, The Fourth IEEE International Conference on Data Mining, November 1-4, 2004, Brighton, UK.

Privately Computing a Distributed k-nn Classifier, with Murat Kantarcioglu, 8th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD), September 20-24, 2004, Pisa, Italy.

When do Data Mining Results Violate Privacy?, with Murat Kantarcioglu and Jiashun Jin, The Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 22-25, 2004, Seattle, Washington.

Privacy Preserving Data Integration and Sharing, with AnHai Doan, Ahmed Elmagarmid, Murat Kantarcioglu, Gunther Schadow, Dan Suciu, and Jaideep Vaidya, The 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD'2004) June 13, 2004, Paris, France.

Privacy Preserving Naive Bayes Classifier for Vertically Partitioned Data, with Jaideep Vaidya, 2004 SIAM International Conference on Data Mining, April 22-24, 2004, Lake Buena Vista, Florida, USA.

Derived Access Control Specification for XML, with Siddhartha Goel and Arnon Rosenthal, Workshop on XML Security held in association with the 10th ACM Conference on Computer and Communications Security, October 31, 2003, Fairfax, Virginia.

Leveraging the Multi in Secure Multi-Party Computation, with Jaideep Vaidya, Workshop on Privacy in the Electronic Society held in association with the 10th ACM Conference on Computer and Communications Security October 30, 2003, Washington, DC.

Privacy-Preserving K-Means Clustering over Vertically Partitioned Data, with Jaideep Vaidya, The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 24 - 27, 2003, Washington, D.C. Honorable Mention, Best Paper Competition.

Assuring Privacy when Big Brother is Watching, with Murat Kantarcioglu, The 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD'2003), June 13, 2003, San Diego, California.

Privacy Preserving Association Rule Mining in Vertically Partitioned Data, with Jaideep Vaidya, The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, July 23 - 26, 2002, Edmonton, Alberta, Canada.

Privacy-preserving Distributed Mining of Association Rules on Horizontally Partitioned Data, with Murat Kantarcioglu, The ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD'2002), June 2, 2002, Madison, Wisconsin.

Coordinating Accessibility versus Restrictions in Distributed Object Systems, with Arnon Rosenthal, 3rd International Symposium on Distributed Objects & Applications 17-20 September, 2001 Rome, Italy. Poster paper.

Directions for Web and E-Commerce Applications Security, with Bhavani Thuraisingham, Amar Gupta, Elisa Bertino, and Elena Ferrari, Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2001, Cambridge, Massachusetts, June 20-22, 2001. (Also available in IEEE Digital Library).

Real-Time Data Mining of Multimedia Objects, with Bhavani Thuraisingham, Marion G. Ceruti, and John Maurer, Fourth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2001), Magdeburg, Germany, May 2-4, 2001.

Developing Custom Intrusion Detection Filters Using Data Mining, with Gary Gengo, 2000 Military Communications International Symposium (MILCOM2000), Los Angeles, California, October 22-25, 2000.

TopCat: Data Mining for Topic Identification in a Text Corpus, with Robert Cooley, 3rd European Conference on Principles and Practice of Knowledge Discovery in Databases, Prague, Czech Republic, September 15-18, 1999. Lecture Notes in Artificial Intelligence 1704, Springer-Verlag. (Draft Available.)

Protecting Against Data Mining through Samples, Thirteenth Annual IFIP WG 11.3 Working Conference on Database Security, July 26-28, 1999, Seattle, WA. Expanded version invited for submission to Journal of Computer Security, IOS Press (see above).

GeoNODE: Visualizing News in a Geospatial Context, with Rob Hyland and Rod Holland, Federal Data Mining Symposium and Exposition '99, AFCEA, March 9-10, 1999, Washington, D.C.

Data Mining on Text, with Rick Steinheiser, The Twenty-Second Annual International Computer Software and Applications Conference, Vienna, Austria, August 19-21, 1998. (Also in IEEE Digital Library.)

Query Flocks: A Generalization of Association Rule Mining, with Dick Tsur, Jeffrey D. Ullman, Serge Abiteboul, Rajeev Motwani, Svetlozar Nestorov, and Arnon Rosenthal, in Proceedings of the 1998 ACM SIGMOD International Conference on Management of Data, June 1-4, 1998, Seattle, WA.

Knowledge Discovery in Text, with Arnon Rosenthal, Rick Steinheiser, and Jeffrey D. Ullman, First Federal Data Mining Symposium, AFCEA, December 16-17, 1997, Washington, D.C. Revised version appeared in the European Conference on Machine Learning Workshop on Text Mining, April 24, 1998, Chemnitz, Germany.

Experience with a Combined Approach to Attribute-Matching Across Heterogeneous Databases, with Ed Housman and Arnon Rosenthal, 7th IFIP 2.6 Working Conference on Database Semantics October 7-10, 1997, Leysin, Switzerland.

Dynamic Integration and Query Processing with Ranked Role Sets, with Peter Scheuermann and Wen-Syan Li, Proceedings of the First IFCIS International Conference on Cooperative Information Systems (CoopIS'96), Brussels, Belgium, June 19-21, 1996.

Security and Privacy Implications of Data Mining, with Don Marks, ACM SIGMOD Workshop on Data Mining and Knowledge Discovery, Montreal, Canada, June 2, 1996.

Classifying Software Components Using Design Characteristics, with Wen-Syan Li, Proceedings of The Tenth Knowledge-Based Software Engineering Conference, November 12-15, 1995, Boston, MA.

Experiences with SEMINT: Automated Semantic Integration, with Wen-Syan Li, Proceedings of the International Conference on Advanced Science and Technology, March 25, 1995, Chicago, IL. Student paper presentation award to Wen-Syan Li.

Semantic Integration in Heterogeneous Databases Using Neural Networks, with Wen-Syan Li, Proceedings of the 20th International Conference on Very Large Data Bases, pp. 1-12, Santiago, Chile, September 12-15, 1994.

Compiling Local Test Formulas for Global Constraints in Distributed Databases, with Herts Chen, International Conference on Intelligent Information Management Systems, Washington, D.C., June 1-3 1994.

Information Brokers: Sharing Knowledge in a Heterogeneous Distributed System, with Daniel Barbará, Proceedings of the 4th International Conference on Database and Expert Systems Applications Prague, Czechoslovakia, September 6-8, 1993. Lecture Notes in Computer Science 720, Springer-Verlag.

Using Field Specifications to Determine Attribute Equivalence in Heterogeneous Databases, with Wen-Syan Li, Proceedings of RIDE-IMS'93: Third International Workshop on Research Issues in Data Engineering, Vienna, Austria, April 18-20, 1993.

The Gold Mailer, with Daniel Barbará, Fred Douglis, Hector Garcia-Molina, Ben Kao, Stephen Johnson, Sharad Mehrotra, Jens Tellefsen, and Rosemary Walsh, Proceedings of the Ninth International Conference on Data Engineering, IEEE, Vienna, Austria, April 19-23, 1993.

Distributed Processing of Filtering Queries in HyperFile, with Hector Garcia-Molina, Proceedings of the International Conference on Distributed Computing Systems, IEEE, Arlington, Texas, May 20-24, 1991.

Data Management with Massive Memory: A Summary, with H. Garcia-Molina, R. Abbott, C. Staelin, and K. Salem, in Parallel Database Systems, Pierre America, Editor, PRISMA Workshop Proceedings, Noordwijk, The Netherlands, September 1990. Lecture Notes in Computer Science 503, Springer-Verlag.

Indexing in a Hypertext Database, with Hector Garcia-Molina, in Proceedings of the 1990 conference on Very Large Data Bases, Brisbane, Australia, August 13-16 1990.

The Design of a Document Database, with Hector Garcia-Molina and Robert Hagmann, ACM Conference on Document Processing Systems, Santa Fe, NM, December 5-9, 1988.

Refereed System Demonstration Descriptions

GeoNODE: An End-to-End System from Research Components, with John Griffith and Rod Holland, The 17th International Conference on Data Engineering, Heidelberg, Germany, April 2-6, 2001.

Natural Language Processing for News Analysis, with Tom Bartee, Stanley Boykin, Thad Cooper, Shereif El-Sheikh, Jerry Fitzgerald, Joe Francoeur, John Gibson, John Griffith, Steve Hansen, Lynette Hirschman, Rod Holland, Rob Hyland, Steve Janiak, Mark Maybury, Andy Merlino, Carsten Oertel, Marc Reichman, Marc Richards, Paul Silvey and Shane Steward, Language Technology Joint Conference (ANLP-NAACL2000), April 29-May 40, 2000, Seattle, WA.

Semint: A System Prototype for Semantic Integration in Heterogeneous Databases, with Wen-Syan Li, Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, May 23-25, 1995, San Jose, CA.

Technical Reports, Abstracts and Unrefereed Publications

PATENTS

Christopher Clifton, John Ross Wallrabenstein, and David Stork, Secure search and retrieval, US 8,904,171, December 2, 2014.

PRESENTATIONS

Machine Learning Induced Unfairness keynote at the 2023 International Conference on Data Mining and Knowledge Discovery, Chongqing, China, June 24-26, 2023.

Panelist on Full Stack Artificial Intelligence: The missing piece, 22nd IEEE International Conference on Data Mining, Orlando, Florida, November 30, 2022.

Chris Clifton, Eric Hanson, Keith Merrill, and Shawn Merrill, Issues, and Solutions, to Providing Formal Privacy for ACS, 2021 ACS Data User's Conference, May 19, 2021, online.

Limitations on Malicious Secure Protocols opening keynote at the 7th International Conference on Networking, Systems and Security, December 22, 2020, Dhaka, Bangladesh.

Encrypted Computation: How and When invited talk at Hamad bin Khalifa University, February 6, 2020, Doha, Qatar.

Secure Computing in Informatics, IoT, and Enabling Technologies, keynote at the IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT'20), February 2, 2020, Doha, Qatar.

Real-world Differential Privacy: Issues and Smooth Sensitivity Solutions, keynote at The First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, December 13, 2019. Los Angeles, California.

When is a Semi-Honest Secure Multiparty Computation Valuable?, GameSec 2019: The 10th Conference on Decision and Game Theory for Security, November 1, 2019, Stockholm, Sweden.

Differential Privacy: Challenges on Moving Theory into Practice, keynote at the 17th International Conference on Privacy, Security, and Trust, August 28, 2019, Fredericton, NB, Canada.

Smooth Sensitivity for k-Nearest Neighbor, invited talk at the Simons Institute for the Theory of Computing workshop Data Privacy: From Foundations to Applications, March 4, 2019, Berkeley, California.

Why did it do that? The (im?)possibility of deciphering actions of AI, Dawn or Doom: Emerging Technology - Risks and Rewards, November 6, 2018, West Lafayette, IN.

Don't be a Headline: Fairness and Transparency in Machine Learning, Indy Big Data, September 26, 2018, Indianapolis, IN.

Privacy Technology: What Can (and Can't) be Done, International Conference on Law and the Digital Age, February 19-20, 2018, Doha, Qatar.

Dealing with Discriminatory Data Mining, keynote at the International Conference on Applied Research in Computer Science and Engineering (ICAR'17), Beirut, Lebanon, June 23, 2017. Also presented at the Qatar Computing Research Institute, February 21, 2018.

Anonymization: Myths, Reality, and Alternatives, invited talk at the 37th Great Lakes Biomedical Conference Milwaukee, Wisconsin, April 7, 2017.

Distributed Differential Privacy, Distinguished Lecture, University of Kentucky, Lexington, Kentucky, November 18, 2016.

Distributed Differential Privacy, keynote at the XVI Brazilian Symposium on Information and Computational Systems Security (SBSeg16), Niterói, Brazil, November 8, 2016.

Privacy: Beyond Confidentiality, keynote at the 21st ACM Conference on Computer and Communications Security, Scottsdale, Arizona, November 6, 2014. (Abstract)

Privacy without encrypting - Protect your data and use it too, keynote at the The 28th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC'14), Vienna, Austria, July 14, 2014.

Privacy-Preserving Technologies, 10th Annual Colloquium on ICT R&D: R&D on Big Data and Personal Data Sponsored by the National Institute of Information and Communications Technology (NICT) of Japan, Washington, D.C., January 24th 2014.

Challenges and Opportunities for Security with Differential Privacy, keynote at the Ninth International Conference on Information Systems Security (ICISS 2013), ISI Kolkata, India, 16-20 December 2013.

Panelist on Data Mining with Big Data IEEE International Conference on Data Mining (ICDM 2013), Dallas, Texas, December 7-10, 2013.

Panelist on Security and Privacy: Are they Two Sides of the Same Coin?, Annual Computer Security Applications Conference (ACSAC) 2012, Orlando, Florida, December 6, 2012.

Privacy-Preserving Data Mining at 10: What's Next?, keynote at the Ninth Australasian Data Mining Conference (AusDM 2011), Ballarat, Australia, December 1-2, 2011. Also given as an invited talk at the workshop on Privacy Aspects of Data Mining held at the IEEE International Conference on Data Mining, Vancouver, Canada, December 11, 2011.

Freeing Cloud Databases from Privacy Constraints, Computer Science and Engineering Seminar, Qatar University, Doha, Qatar, October 3, 2011.
Computer Science Seminar, Australian National University, Canberra, Australia, November 28, 2011.

Privacy-Preserving Data Mining, invited talk at The Thomas M. Cooley Law Review Symposium Data Mining: Who's Mining Your Business, Lansing, Michigan, September 22, 2011.

Privacy Issues with Machine Learning: Fears, Facts, and Opportunities Machine Learning Summer School @Purdue, West Lafayette, Indiana, June 13, 2011. (Slides available.)

Privacy-Preserving Data Mining: Shared analysis without shared data, invited presentation at the FDA-sponsored Expert Workshop: Statistical and Epidemiological Issues in Active Medical Product Surveillance, Brookings Institution, February 16, 2011.

Private Computation for Confidential Outsourcing, Ricoh Technology Center, Shin-Yokohama, Japan, January 17, 2011.

Privacy and Anonymity in Text, Computer Science Colloquium at Brigham Young University, Provo, Utah, November 12, 2009.

Plausibly Deniable Search, invited talk at the Symposium `In search of privacy', Radboud University, Nijmegen, The Netherlands, June 25, 2009.

What an Information Technology Vendor Can (and Can't) Do For Your Client, invited presentation at the Indiana Continuing Legal Education Forum on Privacy Law, Indianapolis, IN, May 14, 2009.

Measuring Privacy: A Risk-Based Approach, talk at SAP Research CEC Karlsruhe, Germany, December 8, 2008.

Opportunities for Private and Secure Machine Learning, keynote at the 2008 AISec Workshop held in conjunction with the 15th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 27, 2008. (Abstract) Revised as Saleable Opportunities for Private and Secure Computation for the Informatik-Kolloquium at Universität Karlsruhe, December 1, 2008 and FENS seminars at Sabanci University, December 5, 2008.

Panelist on Technologies for Privacy-Protective Data Mining at the Department of Homeland Security Privacy Office workshop on Implementing Privacy Protections in Government Data Mining, Washington, DC, July 24-25, 2008.

Information metrics for privacy and anonymity in spatiotemporal data, invited talk at the First Interdisciplinary Workshop on Mobility, Data Mining and Privacy: Preserving anonymity in geographically referenced data, Rome, Italy, February 14 2008.

Is Privacy Still an Issue for Data Mining?, invited talk at the National Science Foundation Symposium on Next Generation of Data Mining and Cyber-Enabled Discovery for Innovation, Baltimore, Maryland, October 10-12, 2007.

Privacy and Anonymity in Text, Max-Planck-Institut for Informatik, Saarbrucken, Germany, August 31, 2007.

Will Privacy Kill Ubiquitous Knowledge Discovery?, invited talk at the KDUbiq Working Group on Security and Privacy meeting, Berlin, Germany, September 19, 2006.

Privacy Conflicts Inherent in Data Analysis, Institute for Software Research International Seminar, Carnegie-Mellon University, March 29, 2006.

What is Privacy? Critical Steps for Privacy-Preserving Data Mining, invited talk at the workshop on Privacy and Security Aspects of Data Mining in conjunction with The Fifth IEEE International Conference on Data Mining, November 27, 2005, Houston, Texas.

Knowledge Discovery from Transportation Network Data, The 21st International Conference on Data Engineering (ICDE 2005), April 8, 2005, Tokyo, Japan.

Open Issues in Privacy-Preserving Data Mining, Maebashi Institute of Technology, April 4, 2005.

Privacy-Preserving Outlier Detection, The Fourth IEEE International Conference on Data Mining, November 4, 2004, Brighton, UK.

Panel: Data Mining and Data Aggregation at the Symposium on Privacy and Identity: The Promise and Perils of a Technological Age, DePaul University, October 14-15, 2004.

Panel: Data Aggregation, Mining, and Privacy at the NSF Cybertrust PI Meeting, Pittsburgh, Pennsylvania August 18-20, 2004.

Knowledge Projection for Tele-Maintenance, Crane Naval Surface Warfare Center Distinguished Lecture Series, February 3, 2004.

Turning Data into Knowledge Without Violating Privacy, Joint Biostatistics & Medical Informatics / Statistics / Computer Sciences Seminar, University of Wisconsin, January 29, 2004.

Tutorial: Privacy-Enhanced Data Management for Next-Generation e-Commerce, with Irini Fundulaki, Richard Hull, Bharat Kumar, Daniel Lieuwen, and Arnaud Sahuguet, given at the 29th International Conference on Very Large Data Bases, September 9-12, 2003, Berlin, Germany.

Tutorial: Privacy Preserving Data Mining, given at The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 24-27, 2003, Washington, D.C.

Privacy Preservation to Enable Data Mining Across Enterprises invited talk at the IBM Almaden Institute Symposium on Privacy, April 9-11, 2003, San Jose, California.

Defining Privacy for Data Mining, invited talk at the National Science Foundation Workshop on Next Generation Data Mining, November 1-3, 2002, Baltimore, MD.

Tutorial: Privacy, Security, and Data Mining, given at the combined conference 13th European Conference on Machine Learning (ECML'02) and 6th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD'02), Helsinki, Finland, 19-23 August, 2002.

Developing Custom Intrusion Detection Filters Using Data Mining, 2000 Military Communications International Symposium (MILCOM2000), Los Angeles, California, October 24, 2000.

Developing Custom Intrusion Detection Filters Using Data Mining, Purdue Center for Education and Research in Information Assurance, December 10, 1999.

TopCat: Data Mining for Topic Identification in a Text Corpus, 3rd European Conference on Principles and Practice of Knowledge Discovery in Databases, Prague, Czech Republic, September 16, 1999.

Protecting Against Data Mining through Samples, Thirteenth Annual IFIP WG 11.3 Working Conference on Database Security, July 27, 1999, Seattle, WA. Also served on panel on Intrusion Detection.

Knowledge Discovery in Text, European Conference on Machine Learning Workshop on Text Mining, April 24, 1998, Chemnitz, Germany.

Knowledge Discovery in Text, First Federal Data Mining Symposium, AFCEA December 16-17, 1997, Washington, D.C.

Experience with a Combined Approach to Attribute-Matching Across Heterogeneous Databases, joint presentation/demonstration with Ed Housman, 7th IFIP 2.6 Working Conference on Database Semantics October 7-10, 1997, Leysin, Switzerland.

Data Mining at MITRE, Third Applied Database Technology Conference, The MITRE Corporation, Bedford, MA, June 5, 1997.

Data Mining in Text, Symposium on Advanced Information Processing and Analysis, Tysons Corner, Virginia, March 26, 1997.

Security and Privacy Implications of Data Mining, ACM SIGMOD Workshop on Data Mining and Knowledge Discovery, Montreal, Canada, June 2, 1996.

Data Mining at MITRE, Second Applied Database Technology Conference, The MITRE Corporation, Bedford, MA, December 7, 1995.

Neural Networks for Semantic Integration, Second Applied Database Technology Conference, The MITRE Corporation, Bedford, MA, December 7, 1995.

Classifying Software Components Using Design Characteristics, The Tenth Knowledge-Based Software Engineering Conference, November 12-15, 1995, Boston, MA.

Semantic Integration in Heterogeneous Databases using Neural Networks, 20th International Conference on Very Large Data Bases, Santiago, Chile, September 12-15 1994.

Using Field Specifications to Determine Attribute Equivalence in Heterogeneous Databases, RIDE-IMS'93, Vienna, Austria, April 18-20, 1993.

Distributed Processing of Filtering Queries in HyperFile, 11th International Conference on Distributed Computing Systems, Arlington, TX, May 20-24 1991.

Indexing in a Hypertext Database, 1990 conference on Very Large Data Bases, Brisbane, Australia, August 13-16 1990.

The Design of a Document Database, ACM Conference on Document Processing Systems, Santa Fe, NM, December 5-9, 1988.

RESEARCH FUNDING

Chris Clifton (Lead PI), Dan Lin, Kannappan Palaniappan, Ming Yin, Collaborative Research: SaTC: CORE: Medium: Broad-Spectrum Facial Image Protection with Provable Privacy Guarantees, NSF Secure and Trustworthy Cyberspace, 10/1/21-09/30/24, $1,243,682 ($531,168 Purdue).

Brad Malin (Lead PI), Chris Clifton, Ramesh Raskar, Anna Oganyan, Collaborative Research: Workshop to Develop a Roadmap for Greater Public Use of Privacy-Sensitive Government Data, NSF Secure and Trustworthy Cyberspace, 5/1/21-4/30/22, $91,534 ($31,713 Purdue).

Chris Clifton (PI), Murat Kantarcioglu, Blase Ur, Lindsay Weinberg, Christopher Yeomans, FAI: Identifying, measuring, and mitigating fairness issues in AI, NSF Program on Fairness in Artificial Intelligence in collaboration with Amazon, 1/1/20-12/31/20, $216,908 NSF, $128,092 Amazon.

Chris Clifton, Measuring Adversarial Vulnerability for Anomaly Detection, Northrop Grumman Corporation, 1/1/19-12/31/19, $64,367

Chris Clifton (PI) and Keith Merrill, Tools to Support Anonymization, U. S. Census Bureau, 1/1/17-12/31/19, $572,766.

Chris Clifton, Daniel Kelly, and Kendall Roark, Big Data Ethics: Detecting Bias in Data Collection, Algorithmic Discrimination and `Informed Refusal', Andrew W. Mellon Foundation, 1/1/17-12/31/18, $142,511.

Chris Clifton, Mining Anonymized Data, Northrop Grumman Corporation, 1/1/16-8/31/16, $94,941.

Chris Clifton, Secure Printing from the Cloud, Ricoh Co., 5/1/2011-3/31/2012, $89,585.

Chris Clifton (PI), Qutaibah Maluhi (Qatar University), and Khaled M. Khan (Qatar University), Managing Private Data in the Cloud, Qatar National Research Foundation, 9/15/2010-9/14/2013, $954,095 ($333,840 Purdue).

Chris Clifton (PI), Luo Si, Chyi-Kong (Karen) Chang, Victor Raskin, Raquel L. Hill (PI Indiana U.), Stephanie Sanders, Wei Jiang (PI Missouri S&T), Anonymizing Textual Data and its Impact on Utility, NSF Trustworthy Computing, September 2010-August 2016, $2,480,300 ($1,554,441 Purdue).

Chris Clifton, Secure Multiparty Computation for Outsourcing Image Processing, Ricoh Co., 5/1/2010-3/31/2011, $78,792.

Tim Finin (PI, UMBC) et al. (19 co-PIs, 4 Purdue), A Framework for Managing the Assured Information Sharing Lifecycle, DoD Multidisplicinary University Research Initiative, 5/1/2008-4/30-/2013, $4.35M base + 3M option years ($1.5M Purdue).

Elisa Bertino (PI) and Chris Clifton, Identity Management and Trust Negotiation Services, Department of Homeland Security / Institute for Information Infrastructure Protection, 4/1/2007-3/31/2009, $300,000.

David Ebert (Director), Alok Chaturvedi, William Cleveland, Chris Clifton, Ahmed Elmagarmid, and Marc Overhage, Purdue University Regional Visualization and Analytics Center, Department of Homeland Security, January 2006-December 2008, $517,000.

Ann Hendrich (Ascension Health), Marilyn Chow (Kaiser Permanente), Nelson Lee (Rapid Modeling), William Cleveland, Chris Clifton, Jason Abrevaya, A Multi-Site Study of How Medical Surgical Nurses Spend Their Time: A Baseline Study in Preparation for an Electronic Health Record and an Evidenced-based Nursing Unit Design, Robert Wood Johnson Foundation, April 2005-August 2006. (Purdue CS portion $91,269).

Clement J. McDonald (PI) et al., Chris Clifton (Purdue PI) A Center of Excellence in Medical Informatics to Provide an Advanced Infrastructure for Human Research: A Catalyst for Indiana Research, Indiana 21st Century Fund, August 2004-August 2006, $3,832,196 (Lead: Regenstrief Institute for Healthcare; Purdue portion $50,000.)

Chris Clifton (PI), AnHai Doan, Ahmed Elmagarmid, Gunther Schadow, Dan Suciu, Privacy-Preserving Data Integration and Sharing NSF ITR, September 2004-August 2007, $1,012,000.

Chris Clifton (PI) and Mikhail Atallah, Collaborative Research: Distributed Data Mining to Protect Information Privacy, NSF Small ITR, August 2003 - August 2006, $276,274. (Collaborative with Wenliang (Kevin) Du, Syracuse University - funded under separate award.)

Chris Clifton, Walid Aref, Ahmed Elmagarmid, Arif Ghafoor, and Sunil Prabhakar, Knowledge Projection for TeleMaintenance, Naval Surface Warfare Center, Crane Division / EG&G October 21, 2002 - September 30, 2005, $1,746,813.

Chris Clifton, Ananth Iyer, and Reha Uzsoy, A Prototype Integrated Transaction Data Analysis and Visualization Environment for the Transportation, Distribution and Logistics Sector, e-Enterprise Center at Discovery Park, August 19 2002 - August 31, 2003, $34,278.

Chris Clifton, Pascal Meunier, and Gustavo Rodriguez-Rivera, Secure Programming: Add-on Course Module and Short Course, e-Enterprise Center at Discovery Park, August 19 2002 - June 30, 2003, $19,344.

Privacy Preserving Distributed Data Mining, Purdue Research Foundation, August 2002 through July 2004, $26,403.

Data Mining for Intrusion Detection, June 1999 through September 2001, ~$360,000.

Data Mining in Text, Co-PI with Arnon Rosenthal and Jeffrey Ullman (Stanford University) September 1996 through June 2000, $589,913 (MITRE's portion $442,174).

Data Mining in Text and Images, MITRE Sponsored Research, January 1996 through October 1999, $521,421.

Data Mining Security, October 1995 through September 1997, ~$120,000.

Shared Software Database, NSF Research Initiation Award, September 1992 through August 1995, $90,000.

PhD AND MS STUDENTS SUPERVISED

Shawn Merrill, Privacy in Complex Sample Based Surveys, Ph.D. December 2021.

Radhika Bhargava, Adversarial Anomaly Detection, Ph.D. August 2019.

Koray Mancuhan, Data Classification for l-Diversity, Ph.D. December 2017.

Balamurugan Anandan, Privacy-Preserving Analysis with Applications to Textual Data, Ph.D. May 2017.

Christine Task, Privacy-Preserving Social Network Analysis, Ph.D. May 2015.

John Ross Wallrabenstein, Rational Multiparty Computation, Ph.D. December 2014.

Jaewoo Lee, Achieving Practical Differential Privacy, Ph.D. August 2014.

Ahmet Erhan Nergiz, Private Data Outsourcing using Anonymization, Ph.D. December 2012.

Pedro J. Pastrana-Camacho, Ontology Based Text Sanitization, M.S. with Thesis December 2012.

Mummoorthy Murugesan, Privacy Through Deniable Search, Ph.D. August 2010.

Mehmet Ercan Nergiz, Anonymization-Based Privacy Protection, Ph.D. December 2008.

Wei Jiang, Incentive Driven and Privacy-Preserving Collaborative Computing, Ph.D. August 2008.

Murat Kantarcioglu, Privacy Preserving Data Mining for Horizontally Partitioned Data, Ph.D. August 2005.

Jaideep S. Vaidya, Privacy-Preserving Data Mining over Vertically Partitioned Data, Ph.D. August 2004.

Siddhartha K. Goel, Derived Access Control Specification for XML, M.S. with thesis August 2003.

Wen-Syan Li, Semantic Integration in Heterogeneous Databases, Ph.D. December 1995; Using Field Specifications to Determine Attribute Equivalence in Heterogeneous Databases, M.S. December 1992.

Shu-Yao Liu, Study of Metadata in Heterogeneous Databases, M.S. December 1995.

Herts Chen, Concurrency Control Using Semantic Knowledge: A Proof Theoretic Basis, Ph.D. December 1994.

Robert Haddleton, An Analysis of an Active Database as Applied to a Real-Time Application, M.S. June 1994.

Shashidar Jasthi, Application of Software Quality Models to Individual Evaluation, M.S. December 1993.

Christopher Fernandes, Determining Semantic Equivalence Using a Nucleatide Base Genetic Sequencing Algorithm, M.S. December 1993.

Robert Milfajt, A Comparison of Two Heterogeneous Database Schema Integration Methods, M.S. June 1992.

Stephen Gene Jacobson, Integrating DB Design and CASE Tools, M.S. June 1992.

PROFESSIONAL ACTIVITIES

Editorial Board (2008-present, Review Board 2000-2007), Applied Intelligence: The International Journal of Artificial Intelligence, Neural Networks, and Complex Problem-Solving Technologies, Springer.

Editorial Board, Transactions on Data Privacy.

Vice-Chair, IEEE P7003 Working Group Standard for Algorithmic Bias Considerations.

Area chair, 23rd IEEE International Conference on Data Mining December 1-4, 2023, Shanghai, China.

Program committee, USENIX Conference on Privacy Engineering Practice and Respect September 11-12, 2023, Santa Clara, California.

Senior Program Committee, The 23rd Privacy Enhancing Technologies Symposium (PETS 2023), July 10-15, 2023, Lausanne, Switzerland.

Area chair, 22nd IEEE International Conference on Data Mining Nov. 28 – Dec. 1, 2022, Orlando, FL, USA.

Program Committee, Privacy in Statistical Databases, September 14-16, 2022, Paris, France.

Senior Program Committee, The 22nd Privacy Enhancing Technologies Symposium (PETS 2022), July 18-23, 2022, Sydney, Australia.

Program Committee Co-Chair, 8th International Conference on Mathematics and Computing (ICMC 2022), Jan 6-8, 2022, Vellore, Tamil Nadu, India.

Program committee, Workshop on Privacy in the Electronic Society held in association with the 10th ACM Conference on Computer and Communications Security November 15, 2021, online.

Program Committee, The 21st Privacy Enhancing Technologies Symposium (PETS 2021), July 19-24, 2021, online.

Program Committee, Privacy in Statistical Databases September 23-25, 2020, Tarragona, Catalonia.

Senior Program Committee, SIAM International Conference on Data Mining (SDM19) May 2 - 4, 2019, Calgary, Alberta, Canada.

Program Committee, The 19th Privacy Enhancing Technologies Symposium (PETS 2019), Stockholm, Sweden, 2019.

Program Committee, 33rd AAAI Conference on Artificial Intelligence (AAAI 2019), January 27-February 1, 2019, Honolulu, Hawaii.

Program Committee, IEEE International Conference on Data Mining series (ICDM 2018), November 17-20, 2018, Singapore.

Program Committee, The 18th Privacy Enhancing Technologies Symposium (PETS 2018), Barcelona, Spain, July 24-27, 2018.

Advisory board, Future of Privacy Forum workshop Bridging Industry and Academia to Tackle Responsible Research and Privacy Practices, November 2-3, 2017, New York.

Program Committee, IJCAI 2017 Workshop: Abuse Preventive Data Mining 2017 held in conjunction with The Twenty-sixth International Joint Conference on Artificial Intelligence (IJCAI-17), Melbourne, Australia, August 20, 2017.

Program Committee, The 17th Privacy Enhancing Technologies Symposium (PETS 2017), Minneapolis, MN, July 18-21, 2017.

Editorial Board, Journal of Privacy Technology.

Editorial board, Knowledge and Information Systems, Springer-Verlag, London, 2000-2014.

Editorial Board, IEEE Transactions on Knowledge and Data Engineering, IEEE Computer Society, Los Alamitos, CA, 2003-2007; survey editor 2007-2011.

Senior program committee, The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 11-14, 2013, Chicago, IL.

Program Committee vice-chair, IEEE International Conference on Data Mining series (ICDM 2012), December 10-13, 2012, Brussels, Belgium.

Program Committee, The 38th International Conference on Very Large Data Bases (VLDB 2012), August 2012, Istanbul.

Program Committee, The 2012 ACM SIGMOD International Conference on Management of Data, May 20-25, 2012, Scottsdale, Arizona.

Co-editor, Statistical Analysis and Data Mining: The ASA Data Science Journal 5(1) Special Issue: Best Papers of SDM'11.

Program Committee, The 2011 International Workshop on Privacy Aspects of Data Mining held in conjunction with ICDM'11, December 11, 2011, Vancouver, Canada.

Program Committee, The 37th International Conference on Very Large Data Bases (VLDB 2011), August 2011, Seattle. (Inaugural year of pure journal-style review process.)

Editorial board, Proceedings of the VLDB Endowment (the journal of the VLDB conference), VLDB Endowment, 2008 (Founding) - 2010 (changeover of VLDB conference to journal-style review process.)

Program Committee co-chair, 11th SIAM International Conference on Data Mining (SDM) April 28-30th, 2011, Phoenix, AZ.

Program Committee, European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD 2010), September 20-24, 2010, Barcelona.

Program Committee, ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning (PSDML 2010), September 20-24, 2010, Barcelona.

Program Committee, The 19th ACM International Conference on Information and Knowledge Management (CIKM 2010), October 26 - 30, 2010, Toronto.

Program Committee, The 36th International Conference on Very Large Data Bases, September 13 - 17, 2010, Singapore.

Senior program committee, The 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, July 25 - 28, 2010, Washington, D.C.

Program Committee, The 26th IEEE International Conference on Data Engineering, March 1-6, 2010, Long Beach, California.

Program Committee, IEEE International Conference on Data Mining series (ICDM 2009), December 6-9, 2009, Miami, Florida.

The 2009 International Workshop on Privacy Aspects of Data Mining held in conjunction with ICDM'09, December 6, 2009, Miami, Florida.

Program Committee, The 2009 IEEE International Conference on Information Privacy, Security, Risk and Trust, August 29-13, Vancouver, Canada.

Program Committee, The 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 12-15, 2009, Montreal, Canada.

Senior program committee, The 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, June 28 - July 1, 2009, Paris, France.

Program Committee, International Workshop on Privacy-Preserving Data Analysis (PPDA), April 20, 2009, Brisbane, Australia.

Program Committee, 25th International Conference on Data Engineering, March 29-April 4, 2009, Shanghai, China.

Program Committee, The 2008 IEEE International Conference on Data Mining, December 15-19, 2008, Pisa, Italy.

Program Committee, 3rd Workshop on Secure Knowledge Management, November 3-4, 2008, Dallas, Texas.

Program Committee, European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD 2008), September 15-19, 2008, Antwerp, Belgium.

Program Committee, 34th International Conference on Very Large Databases (VLDB'08), August 25-28, 2008, Auckland, New Zealand.

Program Committee, 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD (PinKDD'08), August 24-27, 2008, Las Vegas, Nevada.

Program Committee, The 27th ACM SIGMOD International Conference on Management of Data, June 9-12, 2008, Vancouver, Canada.

Area chair for Privacy and Social Factors, 8th SIAM International Conference on Data Mining (SDM) April 24-26, 2008, Atlanta, GA.

Editorial Board (2008-present, Review Board 2000-2007), Applied Intelligence: The International Journal of Artificial Intelligence, Neural Networks, and Complex Problem-Solving Technologies, Springer.

General Co-Chair, The Seventh IEEE International Conference on Data Mining, October 28-31, 2007, Omaha, NE.

Program Committee, 18th International Conference on Database and Expert Systems Applications (DEXA '07), September 3-7, 2007, Regensburg, Germany.

Senior program committee, The 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 12-15, 2007, San Jose, CA.

Program Committee Co-Chair, The Sixth IEEE International Conference on Data Mining, December 18 - 22, 2006, Hong Kong.

Program committee, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 31-August 2, 2006, Sophia Antipolis, France.

Program committee, The 25th ACM SIGMOD International Conference on Management of Data, June 26-29, 2006, Chicago, Illinois.

Treasurer, The Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 21-24, 2005, Chicago, Illinois.

Program committee, 2005 SIAM International Conference on Data Mining, April 21-23, 2005, Newport Beach, California, USA.

Program Committee, International Workshop on Privacy Data Management held in conjunction with The 21st International Conference on Data Engineering (ICDE 2005), April 8-9, 2005, Tokyo, Japan.

Program Committee, The Fourth IEEE International Conference on Data Mining, November 1-4, 2004, Brighton, United Kingdom. Also served on program committee of the associated Workshop on Privacy and Security Aspects of Data Mining and Workshop on Data Mining and the Grid.

Program Committee, The 8th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD), September 20-24, 2004, Pisa, Italy. Also served on program committee of the associated workshop International Workshop on Privacy and Security Issues in Data Mining.

Program Committee, The Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 22-25, 2004, Seattle, Washington.

Program Committee, 2004 SIAM International Conference on Data Mining, April 22-24, 2004, Kissimmee, Florida, USA.

Program Committee Vice Chair, The Third IEEE International Conference on Data Mining, November 19 - 22, 2003, Melbourne, Florida, USA. Also co-organized associated workshop on Privacy-Preserving Data Mining.

Program Committee, The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 24-27, 2003, Washington, D.C. Also served on program committee for associated workshop Data Cleaning, Record Linkage, and Object Consolidation and on panel Privacy and Data Mining: Friends or Foes?

Organizer and chair, workshop on Privacy, Security, and Data Mining held in conjunction with The 2002 IEEE International Conference on Data Mining (ICDM '02).

Program committee, Workshop on Mining Data Across Multiple Customer Touchpoints for CRM (in conjunction with PAKDD-02), May 6, 2002.

Tutorials chair and member of program committee, The 2001 IEEE International Conference on Data Mining (ICDM '01).

Program Committee, Workshop on Data Mining for Security Applications to be held as part of the 8th ACM Conference on Computer Security, November 8, 2001.

Program Committee, The 2001 Symposium on Applications and the Internet (SAINT-2001).

Program committee, Fifth IFCIS International Conference on Cooperative Information Systems (CoopIS'2000).

Guest editor, The Edge Data Mining Issue 4(2), The MITRE Corporation, August 2000.

Program committee, 1999 IEEE Knowledge and Data Engineering Exchange Workshop (KDEX-99). Served on panel Convergence of Technologies on the Web: the Case of Distributed Artificial Intelligence, Databases and Information Retrieval, chaired session on Data Mining.

Program committee, Twenty-Third Annual International Computer and Software Application Conference (COMPSAC99).

Program committee, ACM Digital Libraries Conference Workshop on Organizing Web Space (WOWS), August 14, 1999.

Proposal review panel, National Science Foundation Division of Information and Intelligent Systems, 1999, 2003, 2004.

Planning committee, 1999 DARPA-sponsored workshop on novelty detection in documents.

Program committee, 1998 IEEE Knowledge and Data Engineering Exchange Workshop (KDEX-98).

Program Committee, Sixth International Workshop on Research Issues on Data Engineering: Interoperability of Nontraditional Database Systems. Served on plenary panel on future of interoperability.

Program Committee, 1995 International Conference on Distributed Computing Systems. Organized and chaired panel Fee-for-Service in Distributed Systems: Research and Policy Issues. (Panel writeup in IEEE Digital Library.)

Local Arrangements Chair, Fourth International Conference on Foundations of Data Organization and Algorithms, October 13-15, 1993.

Proposal review panel, Texas Higher Education Board, 1993.

Invited attendance, NSF Workshop on Hyperbase Systems, October 15-16, 1992, Washington DC.

Fellow, IEEE; Distinguished member, ACM.
Recipient of the 2020 ACM CODASPY Research Award for lasting and innovative research contributions to the cybersecurity and privacy fields and the 2011 IEEE International Conference on Data Mining Outstanding Service Award.