Ansgar Koene, Chris Clifton, Yohko Hatada, Helena Webb, Menisha Patel, Caio Machado, Jack LaViolette, Rashida Richardson, and Dillon Reisman, A governance framework for algorithmic accountability and transparency, study for the European Parliament Panel for the Future of Science and Technology (STOA), 4 April 2019.
Privacy: Beyond Confidentiality
,
abstract for keynote at the
21st ACM Conference on Computer and Communications Security,
Scottsdale, Arizona, November 6, 2014.
Chris Clifton and Balamurugan Anandan,
Challenges and Opportunities for Security with Differential Privacy
,
Ninth International Conference on Information Systems Security (ICISS 2013),
ISI Kolkata, India, 16-20 December 2013 (invited full paper.)
Christine Körner,
Interview with Josep Domingo-Ferrer and Chris Clifton on Privacy in Spatiotemporal Data Analysis
,
Küntsliche Intelligenz, Springer, 2012.
Christopher W. Clifton, Bart Kuijpers, Katharina Morik, and Yucel Saygin (Eds.), Mobility Data Mining and Privacy (Dagstuhl Seminar 12331), Dagstuhl Reports, Volume 2, Issue 8, pp.16-53.
Chris Clifton and Takashi Washio, Introduction to the Special Issue on the Best Papers of SDM'11 Statistical Analysis and Data Mining 5(1):1-2, February 2012.
Ahmet Erhan Nergiz and Chris Clifton, Query Processing in Private Data Outsourcing Using Anonymization, Purdue University Department of Computer Science Technical Report CSD TR #11-004, March 2011
Chris Clifton, Privacy-Preserving Data Mining, in Encyclopedia of Database Systems, Ling Liu and M. Tamer Ozsu, eds., Springer, 2009.
Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs,
Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford,
Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan,
Jiawei Han, ChengXiang Zhai,
Ravi Sandhu, Shouhuai Xu, Jim Massaro, and
Lada Adamic,
Assured Information Sharing Life Cycle
,
IEEE International Conference on Intelligence and
Security Informatics (ISI '09),
Dallas, TX, June 8-11, 2009, pp. 307-309.
Chris Clifton, Mummoorthy Murugesan,
Luo Si,
Ryan Adams, and
Wei Jiang,
Discovering and Sharing Sensitive Text
,
NSF Workshop on Data and Application Security,
Arlington, VA, February 19-20, 2009 (invited article.)
Murat Kantarcioglu,
Bowei Xi, and Chris Clifton,
Classifier Evaluation and Attribute Selection against Active Adversaries
,
Purdue University
Department of Statistics
Technical Report 09-01, February 2009.
Thorben Burghardt,
Erik Buchmann,
Klemens Böhm,
and Chris Clifton,
Collaborative Search and User Privacy -- How Can They Be Reconciled?
,
invited full paper at
The 4th International Conference on Collaborative Computing:
Networking, Applications and Worksharing (CollaborateCom 2008),
Orlando, Florida, November 13-16, 2008.
Opportunities for Private and Secure Machine Learning
,
abstract for keynote at the
2008 AISec Workshop
held in conjunction with the
15th ACM Conference on Computer and Communications Security (CCS),
Alexandria, VA, October 27, 2008.
Wei Jiang, Mummoorthy Murugesan, Chris Clifton, and Luo Si, t-Plausibility: Semantic Preserving Text Sanitization, Purdue University Department of Computer Science Technical Report TR-08-024, September 2008.
Christopher Clifton, Xindong Wu, and Christos Faloutsos,
TKDE Guidelines for Survey Papers
Transactions on Knowledge and
Data Engineering
19(11):1449,
IEEE Computer Society Press,
Los Alamitos, CA,
November 2007.
Steven M. Witz,
The Regenstrief Center for Healthcare Engineering:
designing, implementing, and sustaining interdisciplinary
solutions to transform healthcare delivery systems
,
International Journal of Healthcare Technology and Management
8(3-4):399-416, 2007.
Contributing authors:
Joseph Pekny, Leroy B. Schwarz, Barrett S. Caldwell, Suresh Chand,
William S. Cleveland, Christopher
W. Clifton, Christine L. Corum, Pat Coyle-Rogers, Avinash Kak,
Mark Lawley, Erin Lukesh, James D. McGlothlin, David McKinnis, Herbert
Moskowitz, Kenneth J. Musselman, Julie C. Novak, William J. Peine,
Joseph Pekny, Ranga Ramanujam, Ronald Radin, Reha Uzsoy, Barbra
M. Wall, Jian Wang, Pamela Whitten, Richard Widdows, Yuehwern Yih.
Paula Hawthorn, Barbara Simons, Chris Clifton, David Wagner, Steven M. Bellovin, Rebecca N. Wright, Arnon Rosenthal, Ralph Spencer Poore, Lillie Coney, Robert Gellman, and Harry Hochheiser, Statewide Databases of Registered Voters: Study Of Accuracy, Privacy, Usability, Security, and Reliability Issues commissioned by the U.S. Public Policy Committee of the Association for Computing Machinery, February 2006.
Chris Clifton,
What is Privacy?
Critical Steps for Privacy-Preserving Data Mining
,
invited article at the workshop on
Privacy
and Security Aspects of Data Mining
in conjunction with
The
Fifth IEEE International Conference on Data Mining,
Houston, Texas, November 27, 2005.
Ramakrishnan, Raghu ; Agrawal, Rakesh ; Freytag, Johann-Christoph ; Bollinger, Toni ; Clifton, Christopher W. ; Dzeroski, Saso ; Hipp, Jochen ; Keim, Daniel ; Kramer, Stefan ; Kriegel, Hans-Peter ; Leser, Ulf ; Liu, Bing ; Mannila, Heikki ; Meo, Rosa ; Morishita, Shinichi ; Ng, Raymond ; Pei, Jian ; Raghavan, Prabhakar ; Spiliopoulou, Myra ; Srivastava, Jaideep ; Torra, Vicenc Data Mining: The Next Generation, Dagstuhl workshop report, September 2005.
Mourad Ouzzani, Walid G. Aref, Elisa Bertino, Ann Christine Catlin,
Christopher W. Clifton, Wing-Kai Hon, Ahmed K. Elmagarmid, Arif Ghafoor,
Susanne E. Hambrusch, Sunil Prabhakar, Jeffrey S. Vitter, Xiang Zhang,
The Indiana Center for Database Systems at Purdue University
,
SIGMOD Record
34(2):53-58,
June 2005.
Murat Kantarcioglu,
Jaideep Vaidya,
and Chris Clifton,
Using Secure-coprocessor for Creating Efficient Privacy-Preserving Distributed Data Mining Toolbox
,
invited paper at the
International Workshop on Privacy and Security Issues in Data Mining
in conjunction with the
8th European Conference
on Principles and Practice of Knowledge Discovery in Databases (PKDD),
Pisa, Italy, September 20, 2004.
Murat Kantarcioglu and
Chris Clifton,
Security Issues in Querying Encrypted Data
,
Purdue University Department of Computer Sciences Technical Report
CSD TR# 04-013, March 2004.
Irini Fundulaki,
Richard Hull,
Bharat Kumar,
Daniel Lieuwen,
Arnaud Sahuguet, and Chris Clifton,
Privacy-Enhanced Data Management for Next-Generation e-Commerce
,
in
Proceedings of the
29th International Conference on Very Large Data Bases,
September 9-12, 2003, Berlin, Germany.
Chris Clifton,
Murat Kantarcioglu,
Jaideep Vaidya,
Xiaodong Lin, and
Michael Zhu,
Tools for Privacy Preserving Distributed Data Mining
,
ACM
SIGKDD
Explorations
4(2),
Johannes Gehrke, editor,
December 2002. Invited paper.
Chris Clifton,
Murat Kantarcioglu, and
Jaideep Vaidya,
Defining Privacy for Data Mining
,
Proceedings of the
National Science
Foundation Workshop on Next Generation Data Mining,
November 1-3, 2002, Baltimore, MD. Invited paper.
Extended version published as book chapter.
Using Unknowns to Prevent Discovery of Association Rules
,
with Yücel Saygin and
Vassilios S. Verykios,
ACM
SIGMOD
Record
30(4):
Special Section
on Data Mining for Intrusion Detection and Threat Analysis,
Daniel Barbará, editor,
December 2001. Invited paper.
A Database Perspective on Data Mining with Neural Networks
,
with Bhavani Thuraisingham,
AFCEA Federal Database Colloquium,
Mission Bay, California, August 28-31, 2001.
Data Mining for Change Detection in Overhead Imagery
,
The Edge
Data Mining Issue 4(2),
The MITRE Corporation, August 2000.
Text Mining by Filter Composition
,
with Inderjeet Mani, Linda Van Guilder, and Kristian Concepcion,
The Edge
Data Mining Issue 4(2),
The MITRE Corporation, August 2000.
Reprinted by invitation in DSstar,
Article #102370, November 7, 2000.
Panel on Intrusion Detection
,
with T. C. Ting, Ming-Yuh Huang, D. Shayne Pitcock, and T. Y. Lin,
Thirteenth
Annual IFIP WG 11.3 Working Conference on Database Security,
July 26-28, 1999, Seattle, WA.
GEONode: A News on Demand Interactive Atlas
,
with Rod Holland et al.,
MITRE Workshop on Exploitation of Structured and Unstructured
Information,
The MITRE Corporation,
Reston, Virginia, April 28, 1998.
Knowledge
Discovery in Text
,
with Rick Steinheiser, Arnon Rosenthal, and
Jeffrey Ullman,
Symposium on
Advanced Information Processing & Analysis (AIPA98),
Tysons Corner, Virginia
March 17-18, 1998,
Abstract.
Security Issues in Data Warehousing and Data Mining: Panel Discussion
with Bhavani Thuraisingham, Linda Schlipper, Pierangela Samarati,
T. Y. Lin, and Sushil Jajodia,
in
Proceedings of the IFIP
WG 11.3 11th Working Conference on Database Security,
Lake Tahoe, CA, August 11-13, 1997.
Data Mining in Text
,
with Jeffrey Ullman, Arnie Rosenthal, Daryl Morey,
Bhavani Thuraisingham, and Mark Maybury,
Symposium on Advanced Information Processing & Analysis
(AIPA97),
Tysons Corner, Virginia
March 25-27, 1997, p. 79.
Abstract.
Data Mining Support for Intelligence: Technology Survey, with Daryl Morey, The MITRE Corporation Report MP 96B 0000135, December 1996.
Massive Digital Data Systems Laboratory Document for the Office of Research and Development, with Bhavani Thuraisingham and Alfred Paradise, The MITRE Corporation Report MP 95B 0000369, October 1995.
Fee-for-Service in Distributed Systems: Research and Policy Issues
,
panel description,
with Peter Gemmel, Ed Means, Matt Merges, and Doug Tygar,
1995
International Conference on Distributed Computing Systems,
Vancouver, Canada, May 30 - June 2, 1995.
HyperFile: A Database Manager for Documents, PhD Dissertation, Princeton University, June 1991. (UMI Press)
SpeedBrowsing
,
Princeton SystemsFest Proceedings,
Princeton University Department
of Computer Science
Technical Report CS-TR-224-89, February 1989. Abstract.
Storage Management in Object Oriented Databases
,
Object-Oriented
Database Workshop: Implementation Aspects,
Orlando, FL,
October 5, 1987.
Extended Abstract.
Dynamic Load Balancing, Masters thesis, Massachusetts Institute of Technology, Cambridge, MA, June 1986.
This page last modified