Profile Photo

Erman Ayday

Assistant Professor, Computer and Data Sciences Department
Privacy enhancing technologies, data security and applied cryptographyy
Office: 402 Olin

Publications

Yilmaz, E., Ji, T., Ayday, E., & Li, P. (2021). Genomic Data Sharing under Dependent Local Differential Privacy. arXiv preprint arXiv:2102.07357, ().
Halimi, A., Dervishi, L., Ayday, E., Pyrgelis, A., Troncoso-Pastoriza, J., Hubaux, J., ... Vaidya, J. (2021). Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies. arXiv preprint arXiv:2101.08879, ().
Ayoz, K., Ayday, E., & Cicek, A Ercument (2020). Genome reconstruction attacks against genomic data-sharing beacons. arXiv preprint arXiv:2001.08852, ().
Aysen, M., Ayday, E., & Cicek, A Ercument (2020). The Effect of Kinship in Re-identification Attacks Against Genomic Data Sharing Beacons. bioRxiv, ().
Almadhoun, N., Ayday, E., & Ulusoy, \"Ozg\"ur (2020). Differential privacy under dependent tuples—the case of genomic privacy. Bioinformatics, ().
Almadhoun, N., Ayday, E., & Ulusoy, \"Ozg\"ur (2020). Inference attacks against differentially private query results from genomic datasets including dependent tuples. Bioinformatics, 36 (Supplement\_1), i136--i145.
Sariyildiz, M., Cinbis, R., & Ayday, E. (2020). Key protected classification for collaborative learning. Pattern Recognition, 104 (), 107327.
\"Oks\"uz, Abdullah \cCa\uglar, Ayday, E., & G\"ud\"ukbay, U\ugur (2020). Privacy-Preserving and Robust Watermarking on Sequential Genome Data using Belief Propagation and Local Differential Privacy. bioRxiv, ().
Ayoz, K., Aysen, M., Ayday, E., & Cicek, A Ercument (2020). The effect of kinship in re-identification attacks against genomic data sharing beacons. Bioinformatics, 36 (Supplement\_2), i903--i910.
Demirag, D., & Ayday, E. (2020). Tracking and controlling the spread of a virus in a privacy-preserving way. arXiv preprint arXiv:2003.13073, ().
Yilmaz, E., & Ayday, E. (2020). Collusion-Resilient Probabilistic Fingerprinting Scheme for Correlated Data. arXiv preprint arXiv:2001.09555, ().
Zhu, X., Ayday, E., & Vitenberg, R. (2019). A privacy-preserving framework for outsourcing location-based services to the cloud. IEEE Transactions on Dependable and Secure Computing, ().
Ayday, E., Naveed, M., & Tang, H. (2019). GenoPri'17: International Workshop on Genome Privacy and Security. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16 (4), 1322--1323.
Zhu, X., Ayday, E., & Vitenberg, R. (2019). A privacy-preserving framework for outsourcing location-based services to the cloud. IEEE Transactions on Dependable and Secure Computing, ().
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E. (2019). Key Protected Classification for Collaborative Learning. arXiv preprint arXiv:1908.10172, ().
Von Thenen, N., Ayday, E., & Cicek, A Ercument (2019). Re-identification of individuals in genomic data-sharing beacons via allele inference. Bioinformatics, 35 (3), 365--371.
B\"ulent Sar\iy\ild\iz, Mert, G\"okberk Cinbiș, Ramazan, & Ayday, E. (2019). Key Protected Classification for Collaborative Learning. arXiv e-prints, (), arXiv--1908.
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E. (2018). An inference attack on genomic data using kinship, complex correlations, and phenotype information. IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), 15 (4), 1333--1343.
Ayday, E., Jiang, X., & Malin, B. (2018). GenoPri'16: International Workshop on Genome Privacy and Security. IEEE/ACM Transactions on Computational Biology and Bioinformatics, (5), 1403--1404.
Kale, G., Ayday, E., & Tastan, O. (2018). A utility maximizing and privacy preserving approach for protecting kinship in genomic databases. Bioinformatics, 34 (2), 181--189.
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E. (2018). Key Protected Classification for GAN Attack Resilient Collaborative Learning. , ().
Ailijiang, A., Bayir, M., Altiparmak, N., Peixoto, D., Arora, V., Assent, I., ... Others (2018). Appreciation to distributed and parallel databases reviewers. Distrib Parallel Databases, 36 (), 1--3.
Yilmaz, E., Ferhatosmanoglu, H., Ayday, E., & Aksoy, R. (2018). Privacy-preserving aggregate queries for optimal location selection. arXiv preprint arXiv:1801.02069, ().
Ayday, E., Jiang, X., & Malin, B. (2018). GenoPri'16: International Workshop on Genome Privacy and Security. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 15 (5), 1403--1404.
Von Thenen, N., Ayday, E., & Cicek, A Ercument (2018). Re-identification of individuals in genomic data-sharing beacons via allele inference. Bioinformatics, 35 (3), 365--371.
Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E. (2018). Key Protected Classification for GAN Attack Resilient Collaborative Learning. , ().
Ozercan, H., Ileri, A., Ayday, E., & Alkan, C. (2018). Realizing the potential of blockchain technologies in genomics. Genome research, 28 (9), 1255--1263.
Ozercan, H., Ileri, A., Ayday, E., & Alkan, C. (2018). Realizing the potential of blockchain technologies in genomics. Genome research, 28 (9), 1255--1263.
G\"ursoy, Gamze, Harmanci, A., Tang, H., Ayday, E., & Brenner, S. (2018). When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data. World Scientific, ().
Harmanci, A., Tang, H., Ayday, E., & Brenner, S. (2018). When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data. , ().
Harmanci, A., Tang, H., Ayday, E., & Brenner, S. (2018). When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data. , ().
Yilmaz, A., & Ayday, E. (2017). Collusion-secure watermarking for sequential data. arXiv preprint arXiv:1708.01023, ().
Ayday, E., Tang, Q., & Yilmaz, A. (2017). Cryptographic solutions for credibility and liability issues of genomic data. IEEE Transactions on Dependable and Secure Computing, 16 (1), 33--43.
Ayday, E., Tang, Q., & Yilmaz, A. (2017). Cryptographic solutions for credibility and liability issues of genomic data. IEEE Transactions on Dependable and Secure Computing, ().
Ayday, E., & Humbert, M. (2017). Inference attacks against kin genomic privacy. IEEE Security \& Privacy, 15 (5), 29--37.
Ayday, E., & Humbert, M. (2017). Inference attacks against kin genomic privacy. IEEE Security \& Privacy, 15 (5), 29--37.
Yilmaz, E., Ferhatosmanoglu, H., Ayday, E., & Aksoy, R. (2017). Privacy-preserving aggregate queries for optimal location selection. IEEE Transactions on Dependable and Secure Computing, 16 (2), 329--343.
Halimi, A., & Ayday, E. (2017). Profile Matching Across Unstructured Online Social Networks: Threats and Countermeasures. arXiv preprint arXiv:1711.01815, ().
Halimi, A., & Ayday, E. (2017). Profile matching across unstructured online social networks: threats and countermeasures. arXiv preprint arXiv:1711.01815, ().
Humbert, M., Ayday, E., Hubaux, J., & Telenti, A. (2017). Quantifying interdependent risks in genomic privacy. ACM Transactions on Privacy and Security (TOPS), 20 (1), 3.
Humbert, M., Ayday, E., Hubaux, J., & Telenti, A. (2017). Quantifying interdependent risks in genomic privacy. ACM Transactions on Privacy and Security (TOPS), 20 (1), 1--31.
Kale, G., Ayday, E., & Tastan, O. (2017). Supplementary Materials for A Utility Maximizing and Privacy Preserving Approach for Protecting Kinship in Genomic Databases. , ().
Kale, G., Ayday, E., & Tastan, O. (2017). Supplementary Materials for A Utility Maximizing and Privacy Preserving Approach for Protecting Kinship in Genomic Databases. , ().
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, & Ayday, E. (2017). A survey on information security threats and solutions for Machine to Machine (M2M) communications. Journal of Parallel and Distributed Computing, 109 (), 142--154.
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, & Ayday, E. (2017). A survey on information security threats and solutions for Machine to Machine (M2M) communications. Journal of Parallel and Distributed Computing, 109 (), 142--154.
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E. (2017). An inference attack on genomic data using kinship, complex correlations, and phenotype information. IEEE/ACM transactions on computational biology and bioinformatics, 15 (4), 1333--1343.
Kale, G., Ayday, E., & Tastan, O. (2017). A utility maximizing and privacy preserving approach for protecting kinship in genomic databases. Bioinformatics, 34 (2), 181--189.
Yilmaz, A., & Ayday, E. (2017). Collusion-Secure Watermarking for Sequential Data. arXiv preprint arXiv:1708.01023, ().
Huang, Z., Ayday, E., Lin, H., Aiyar, R., MOLYNEAUX, A., Xu, Z., ... Hubaux, J. (2016). A privacy-preserving solution for compressed storage and selective retrieval of genomic data. Genome research, 26 (12), 1687--1696.
Huang, Z., Ayday, E., Lin, H., Aiyar, R., MOLYNEAUX, A., Xu, Z., ... Hubaux, J. (2016). A privacy-preserving solution for compressed storage and selective retrieval of genomic data. Genome research, 26 (12), 1687--1696.
McLaren, P., RAISARO, J., Aouri, M., Rotger, M., Ayday, E., Bartha, Istv\'an, ... Others (2016). Privacy-preserving genomic testing in the clinic: a model using HIV treatment. Genetics in medicine, 18 (8), 814.
McLaren, P., RAISARO, J., Aouri, M., Rotger, M., Ayday, E., Bartha, Istv\'an, ... Others (2016). Privacy-preserving genomic testing in the clinic: a model using HIV treatment. Genetics in medicine, 18 (8), 814--822.
Avllazagaj, E., Ayday, E., & Cicek, A Ercument (2016). Privacy-Related Consequences of Turkish Citizen Database Leak. arXiv preprint arXiv:1605.05847, ().
Avllazagaj, E., Ayday, E., & Cicek, A Ercument (2016). Privacy-Related Consequences of Turkish Citizen Database Leak. arXiv preprint arXiv:1605.05847, ().
Balci, F., Kulan, H., Alkan, C., & Ayday, E. (2015). A New Inference Attack against Kin Genomic Privacy. Proc. Privacy-Aware Computational Genomics, ().
Balci, F., Kulan, H., Alkan, C., & Ayday, E. (2015). A New Inference Attack against Kin Genomic Privacy. Proc. Privacy-Aware Computational Genomics, ().
Humbert, M., Huguenin, K\'evin, Hugonot, J., Ayday, E., & Hubaux, J. (2015). De-anonymizing genomic databases using phenotypic traits. Proceedings on Privacy Enhancing Technologies, 2015 (2), 99--114.
Humbert, M., Huguenin, K\'evin, Hugonot, J., Ayday, E., & Hubaux, J. (2015). De-anonymizing genomic databases using phenotypic traits. Proceedings on Privacy Enhancing Technologies, 2015 (2), 99--114.
Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., ... Wang, X. (2015). Privacy in the genomic era. ACM Computing Surveys (CSUR), 48 (1), 6.
Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., ... Wang, X. (2015). Privacy in the genomic era. ACM Computing Surveys (CSUR), 48 (1), 1--44.
Ayday, E., De Cristofaro, E., Hubaux, J., & Tsudik, G. (2015). Whole genome sequencing: Revolutionary medicine or privacy nightmare?. Computer, 48 (2), 58--66.
Ayday, E., De Cristofaro, E., Hubaux, J., & Tsudik, G. (2015). Whole genome sequencing: Revolutionary medicine or privacy nightmare?. Computer, 48 (2), 58--66.
Telenti, A., Ayday, E., & Hubaux, J. (2014). On genomics, kin, and privacy. F1000Research, 3 ().
Telenti, A., Ayday, E., & Hubaux, J. (2014). On genomics, kin, and privacy. F1000Research, 3 ().
RAISARO, J., Ayday, E., McLaren, P., Hubaux, J., & Telenti, A. (2014). Privacy-Preserving HIV Pharmacogenetics: A Real Use Case of Genomic Data Protection. Workshop on Genome Privacy , ().
RAISARO, J., Ayday, E., & Hubaux, J. (2014). Patient privacy in the genomic era. Praxis, 103 (10), 579--86.
RAISARO, J., Ayday, E., & Hubaux, J. (2014). Patient privacy in the genomic era. Praxis, 103 (10), 579--86.
Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., ... Others (2014). Privacy and security in the genomic era. , ().
Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., ... Others (2014). Privacy and security in the genomic era. , ().
Ayday, E., & Rajagopal, S. (2013). Secure device authentication mechanisms for the smart grid-enabled home area networks. Tech. Rep., ().
Ayday, E., De Cristofaro, E., Hubaux, J., & Tsudik, G. (2013). The chills and thrills of whole genome sequencing. Computer, ().
Ayday, E., & Fekri, F. (2012). A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks. Ad Hoc Networks, 10 (7), 1278--1290.
Ayday, E., Delgosha, F., & Fekri, F. (2012). Data authenticity and availability in multihop wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 8 (2), 1--26.
Ayday, E., & Fekri, F. (2012). A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks. Ad Hoc Networks, 10 (7), 1278--1290.
Ayday, E., & Fekri, F. (2012). An iterative algorithm for trust management and adversary detection for delay-tolerant networks. IEEE Transactions on Mobile Computing, 11 (9), 1514--1531.
Ayday, E., Delgosha, F., & Fekri, F. (2012). Data authenticity and availability in multihop wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 8 (2), 10.
Ayday, E., & Fekri, F. (2011). Iterative trust and reputation management using belief propagation. IEEE Transactions on Dependable and Secure Computing, 9 (3), 375--386.
Ayday, E., & Fekri, F. (2010). A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks, 8 (2), 181--192.
Ayday, E., & Fekri, F. (2010). A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks, 8 (2), 181--192.
Ayday, E., RAISARO, J., McLaren, P., Fellay, J., & Hubaux, J. (2007). Privacy-Enhancing Technologies for Disease Risk Tests Based on Genomic and Non-Genomic Data. , ().
Ayday, E., ALTAN, M., & AYDAY, C. (2005). Preparation and Evaluation of Engineering Geological Maps in 3-dimensional Geographic Information Systems Environment. AGILE Conference on GIScience, ().
AYDAY, C., & Ayday, E. (2005). The Use of GIS and Handheld GPS Integration for the Preparation of Quick Plans. GIS Ostrava Symposium, ().
Ayday, E., ALTAN, M., & AYDAY, C. (2005). Preparation and evaluation of engineering geological maps in 3-dimensional Geographic Information Systems environment. , ().
Ayday, E. (). . , ().
Kucuk, V., & Ayday, E. (). . , ().
Ahn, G., Alturi, V., Androulaki, E., Ayday, E., Baldimtsi, F., Barker, K., ... Others (). . , ().
Ayday, E. (). . , ().
Ayday, E., Shmatikov, V., Austin, U., & Kantarcioglu, M. (). . , ().
De Cristofaro, E., Malin, B., Jiang, X., Ayday, E., Bogdanov, D., Burton, P., ... Others (). . , ().
Alser, M., Almadhoun, N., Nouri, A., Alkan, C., & Ayday, E. (). . , ().
Aguirre, M., Ahn, G., Alghamdi, M., Alsaleh, M., Andersson, D., Asplund, M., ... Others (). . , ().
Ayday, E. (). . , ().
Ayday, E. (). . , ().
Kucuk, V., & Ayday, E. (). . , ().
Ayday, E., Shmatikov, V., Austin, U., & Kantarcioglu, M. (). . , ().
Ahn, G., Alturi, V., Androulaki, E., Ayday, E., Baldimtsi, F., Barker, K., ... Others (). . , ().
De Cristofaro, E., Malin, B., Jiang, X., Ayday, E., Bogdanov, D., Burton, P., ... Others (). . , ().
AYDAY, C., & Ayday, E. (). . , ().
Alser, M., Almadhoun, N., Nouri, A., Alkan, C., & Ayday, E. (). . , ().