CHRISTOPHER W. CLIFTON |
|
|
Data privacy, particularly with respect to analysis of private data.
This includes privacy-preserving data mining, data de-identification
and anonymization, and limits on identifying individuals from data
mining models. Data mining, including
fairness issues in data mining,
data mining of text and data mining techniques applied to
interoperation of heterogeneous information sources. Fundamental data
mining challenges posed by these applications include extracting
knowledge from noisy data, identifying knowledge in highly skewed data
(few examples of interesting
behavior), and limits on learning.
Database support for widely distributed and autonomously
controlled information, particularly issues related to data privacy.
Chris Clifton,
Identity and Anonymity
,
Chapter 4 in
An Introduction to Privacy for Technology Professionals,
Travix Breaux, ed., International Association of Privacy Professionals,
Inc., 2020 (revised 2024), pp. 149-175.
Mehmet Ercan Nergiz, Maurizio Atzori, and Chris Clifton,
δ-Presence
,
chapter Privacy metrics and data protection, Sara Foresti, ed., in
Encyclopedia of Cryptography, Security and Privacy,
Sushil Jajodia, Pierangela Samarati, and Moti Yung, eds., Springer, 15 August 2021.
Christine Task and Chris Clifton,
What should we protect? Defining differential privacy for social network analysis
,
in
State of the Art Applications of Social Network Analysis,
2014, pp. 139-161.
Chris Clifton,
Discovering Privacy
,
in
Journeys to Data Mining: Experiences from 15 Renowned Researchers,
Mohamed Medhat Gaber, ed., Springer, 2012.
Chris Clifton,
Privacy-Preserving Data Mining
,
in
Encyclopedia of Database Systems,
Ling Liu and M. Tamer Ozsu, eds., Springer, 2009.
Chris Clifton,
Wei Jiang,
Mummoorthy Murugesan,
and M. Ercan Nergiz,
Is Privacy Still an Issue for Data Mining?
Chapter 18 in
Next Generation of Data Mining,
Hillol Kargupta, Jiawei Han, Philip Yu, Rajeev Motwani, and Vipin Kumar (Eds.),
CRC Press, 2008.
Christopher W. Clifton, Deirdre K. Mulligan, and Raghu Ramakrishnan,
Data Mining and Privacy: An Overview
, in
Privacy
and Technologies of Identity A Cross-Disciplinary Conversation,
Katherine Strandburg and Daniela Stan Raicu (Eds.), Springer-Verlag, 2006.
Privacy-Preserving Data Mining, with Jaideep Vaidya and Yu Michael Zhu, Springer, 2006. Also in Japanese, 2010.
Privacy-Preserving Data Mining
,
with
Murat Kantarcioglu and
Jaideep Vaidya,
in
Foundations and Advances in Data Mining,
Wesley Chu and T.Y. Lin, eds.,
Studies in Fuzziness and Soft Computing vol. 180,
Springer-Verlag,
2005.
Defining Privacy for Data Mining
,
with
Murat Kantarcioglu and
Jaideep Vaidya,
in
Data Mining: Next Generation Challenges and Future Directions,
AAAI Press,
2004,
pp. 255-272.
Security and Privacy
, Chapter 18 in
Handbook of Data Mining,
Lawrence Erlbaum Associates,
Mahwah, NJ, April 2003.
Shalini Jangra, Durgi Toshniwal, and Chris Clifton,
Statistical Limitations of Sensitive Itemset Hiding Methods
,
International Journal of Applied Intelligence,
Springer Nature, Switzerland, July 2023.
Differentially Private k-Nearest Neighbor Missing Data Imputation
,
Chris Clifton, Shawn Merrill, Eric Hanson, and Keith Merill,
ACM Transactons on Privacy and Security 25(3): 1-23, August 2022.
Support Vector Classification with l-diversity
,
Koray Mancuhan and Chris Clifton,
Computers & Security 77:653-665,
Elsevier,
August 2018.
Instance-Based Learning with l-diversity
,
Koray Mancuhan and Chris Clifton,
Transactions on Data Privacy,
10(3):203-235, December 2017.
Anonymizing Transactional Datasets
,
Bechara al Bouna, Chris Clifton, and Qutaibah M. Malluhi,
Journal of Computer Security 23(1):89-106,
IOS Press, 2015.
Combating Discrimination Using Bayesian Networks
,
Koray Mancuhan and Chris Clifton,
Artificial Intelligence and Law
22(2):211-238
special issue on
Computational Methods for Enforcing Privacy and Fairness,
Sergio Mascetti, Annarita Ricci, and Salvatore Ruggieri, eds.,
June 2014.
On Syntactic Anonymity and Differential Privacy
,
Chris Clifton and Tamir Tassa,
Transactions on Data Privacy
6(2):161-183, August 2013.
t-Plausibility:
Generalizing words to desensitize text
,
Balamurugan Anandan, Chris Clifton, Wei Jiang,
Mummoorthy Murugesan, Pedro Pastrana-Camacho, and Luo Si,
Transactions on Data Privacy
5(3):505-534, December 2012.
Anonymous
Search Histories Featuring Personalized Advertisement -
Balancing Privacy with Economic Interests
,
Thorben Burghardt,
Klemens Böhm,
Achim Guttmann, and Chris Clifton,
Transactions on Data Privacy
4(1):31-50, April 2011.
Classifier Evaluation and Attribute Selection against Active Adversaries
,
Murat Kantarcioglu,
Bowei Xi, and Chris Clifton,
Data Mining and Knowledge Discovery
22(1-2):291-335,
Springer,
January 2011.
Efficient Privacy-Preserving Similar Document Detection
,
Mummoorthy Murugesan,
Wei Jiang,
Chris Clifton,
Luo Si and
Jaideep Vaidya,
The VLDB Journal,
19(4):457-475,
VLDB Endowment,
August 2010.
δ-Presence Without Complete World Knowledge
,
M. Ercan Nergiz and Chris Clifton,
Transactions on Knowledge and
Data Engineering 22(6):868-883,
IEEE Computer Society, Los Alamitos, CA,
June 2010.
MultiRelational k-Anonymity
,
Mehmet Ercan Nergiz,
Chris Clifton, and
Ahmet Erhan Nergiz,
Transactions on Knowledge and
Data Engineering 21(8):1104-1117,
IEEE Computer Society, Los Alamitos, CA,
August 2009.
Privacy-Preserving Kth Element Score over Vertically Partitioned Data
,
with Jaideep Vaidya,
Transactions on Knowledge and
Data Engineering 21(2):253-258,
IEEE Computer Society, Los Alamitos, CA, February 2009.
Privacy-Preserving Decision Trees over Vertically Partitioned Data
,
Jaideep Vaidya,
Chris Clifton,
Murat Kantarcioglu,
and A. Scott Patterson,
ACM Transactions on Knowledge Discovery in Data 2(3), October 2008.
Privacy Preserving Naive Bayes Classification
with Jaideep Vaidya and
Murat Kantarcioglu,
The VLDB Journal
17(4):879-898,
VLDB Endowment, July 2008.
Transforming Semi-Honest Protocols to Ensure Accountability
,
with
Wei Jiang and
Murat Kantarcioglu,
Data and Knowledge Engineering
65(1):57-74
special section on Privacy Aspects of Data Mining
,
Elsevier Science, Amsterdam, April 2008.
Expanded version of PADM06 paper.
An Approach to Identifying Beneficial Collaboration Securely in Decentralized Logistics Systems
,
with
Ananth Iyer,
Richard Cho,
Wei Jiang,
Murat Kantarcioglu, and
Jaideep Vaidya,
Manufacturing & Service Operations Management 10(1),
INFORMS,
Linthicum, Maryland,
Winter 2008.
Thoughts on k-Anonymization
,
with Mehmet Ercan Nergiz,
Data and Knowledge Engineering
63(3),
Elsevier Science, Amsterdam, December 2007.
Invited article, expanded version of PDM06 paper.
A Secure Distributed Framework for Achieving k-Anonymity
,
with Wei Jiang,
The VLDB Journal
15(4):
Special Issue on Privacy-Preserving Data Management,
VLDB Endowment,
November 2006.
Secure Set Intersection Cardinality with Application to Association Rule Mining
,
with Jaideep Vaidya,
Journal of Computer Security 13(4),
IOS Press,
November 2005.
Privacy Preserving Clustering with Distributed EM Mixture Modeling
,
with Xiaodong Lin
and Michael Zhu,
Knowledge and Information
Systems 8(1),
Springer-Verlag,
London,
July 2005.
Privacy-Preserving Data Mining: Why, How, and What For?
,
with Jaideep Vaidya,
IEEE Security & Privacy,
New York, NY,
November/December, 2004.
Privacy Preserving Data Mining of Association Rules on Horizontally Partitioned Data
,
with Murat Kantarcioglu,
Transactions on Knowledge and
Data Engineering
16(9),
IEEE Computer Society Press,
Los Alamitos, CA,
September 2004.
TopCat: Data Mining for Topic Identification in a Text Corpus
,
with Robert Cooley
and Jason Rennie,
Transactions on Knowledge and
Data Engineering
16(8),
IEEE Computer Society Press,
Los Alamitos, CA, August, 2004.
Change Detection in Overhead Imagery using Neural Networks
,
International Journal of Applied Intelligence 18(2),
Kluwer Academic Publishers,
Dordrecht, The Netherlands, March 2003.
Emerging Standards for Data Mining
,
with Bhavani Thuraisingham,
Computer Standards and Interfaces
23
(3),
Elsevier Science, Amsterdam,
July 2001.
Using Sample Size to Limit Exposure to Data Mining
,
Journal of Computer Security 8
(4),
IOS Press,
November 2000.
Invited article.
Expanded version of Protecting Against Data Mining
through Samples.
SEMINT:
A Tool for Identifying Attribute Correspondences in Heterogeneous
Databases Using Neural Networks
,
with Wen-Syan Li,
Data and Knowledge Engineering
33(1),
Elsevier Science, Amsterdam,
April 2000.
Database
Integration Using Neural Networks: Implementation and Experiences
,
with
Wen-Syan Li and
Shu-Yao Liu,
Knowledge and Information
Systems
2(1),
Springer-Verlag,
London, February 2000.
Multidatabase
Query Processing with Uncertainty in Global Keys and Attribute Values
,
with Peter Scheuermann
and Wen-Syan Li,
Journal of the American Society for Information Science
49(3),
John Wiley & Sons, Philadelphia, PA,
March 1998.
Dynamic Integration in Multidatabase Systems
,
with Wen-Syan Li,
Journal of Database Management, 7(1),
IDEA
Group Publishing, Harrisburg, PA, Winter 1996.
HyperFile: A Data and Query Model for Documents
,
with
Hector Garcia-Molina
and David Bloom,
VLDB Journal,
4(1):45-86,
The Boxwood Press, Pacific Grove, CA, March 1995.
Chowdhury Mohammad Rakin Haider, Christopher W. Clifton, and Ming Yin,
Do Crowdsourced Fairness Preferences Correlate with Risk Perceptions?
,
Proceedings of the 29th International Conference on Intelligent User Interfaces (IUI),
Greenville, SC, March 18-21, 2024.
Yan Zhou, Murat Kantarcioglu, and Chris Clifton,
On Improving Fairness of AI Models with Synthetic Minority Oversampling Techniques
,
SIAM International Conference on Data Mining (SDM23)
Minneapolis, Minnesota, April 27 - 29, 2023.
Chowdhury Mohammad Rakin Haider, Chris Clifton, and Yan Zhou,
Unfair AI: It Isn’t Just Biased Data
,
22nd IEEE International Conference on Data Mining,
Orlando, Florida, November 28-December 1, 2022.
Farzad Zafarani and Chris Clifton,
Differentially Private Naive Bayes Using Smooth Sensitivity
,
The 21st Privacy Enhancing Technologies Symposium
July 12-16, 2021, online.
Chris Clifton, Eric Hanson, Keith Merrill, and Shawn Merrill,
A Partitioned Recoding Scheme for Privacy Preserving Data Publishing
,
Privacy in Statistical Databases, September 23-25, 2020, Tarragona, Catalonia.
Radhika Bhargava and Chris Clifton,
When is a Semi-Honest Secure Multiparty Computation Valuable?
,
GameSec2019: The 10th Conference on Decision and Game Theory for Security, October 30-November 1, 2019, Stockholm, Sweden.
Anomaly Detection under Poisoning Attacks
,
Radhika Bhargava and Chris Clifton,
ODD v5.0: Outlier Detection De-constructed,
workshop held in conjunction with the
24th ACM SIGKDD international conference on Knowledge Discovery and Data Mining (KDD2018),
London, UK, August 20, 2018.
Differentially Private Feature Selection for Data Mining
,
Balamurugan Anandan and Chris Clifton,
4th ACM International Workshop on Security and Privacy Analytics (IWSPA 2018),
co-located with ACM CODASPY 2018
March 21, 2018, Tempe, Arizona.
Privacy Preserving Distributed Weighted Bipartite Matching
,
Balamurugan Anandan and Chris Clifton,
2017 IEEE Conference on Dependable and Secure Computing
August 7-10, 2017, Taipei, Taiwan.
Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper
,
Bhavani M. Thuraisingham, Murat Kantarcioglu, Elisa Bertino, and Chris Clifton,
IEEE International Congress on Big Data
Honolulu, Hawaii, June 25-30, 2017.
Statistical Learning Theory Approach for Data Classification with l-Diversity
,
Koray Mancuhan and Chris Clifton,
2017 SIAM International Conference on Data Mining (SDM17),
Houston, Texas, April 27-29, 2017.
Differentially Private Significance Testing on Paired-Sample Data
,
Christine Task and Chris Clifton,
2016 SIAM International Conference on Data Mining (SDM16),
Miami, Florida, May 5-7, 2016, pp. 153-161.
Laplace noise generation for two-party computational differential privacy
,
Balamurugan Anandan and Chris Clifton,
Thirteen annual conference on Privacy, Security, and Trust (PST),
July 21-23, 2015, Izmir, Turkey.
Privacy-Integrated Graph Clustering Through Differential Privacy
,
Yvonne Mülle, Chris Clifton, and
Klemens Böhm,
The 8th International Workshop on
Privacy and Anonymity in the Information Society (PAIS)
collocated with EDBT/ICDT,
March 27, 2015, Brussels, Belgium.
Efficient Sanitization of Unsafe Data Correlations
,
Bechara al Bouna, Chris Clifton, and Qutaibah M. Malluhi,
The 8th International Workshop on
Privacy and Anonymity in the Information Society (PAIS)
collocated with EDBT/ICDT,
March 27, 2015, Brussels, Belgium.
Realizable Rational Multiparty Cryptographic Protocols
,
with John Ross Wallrabenstein,
Conference on Decision and Game Theory for Security (GameSec 2014),
Los Angeles, CA, November 6-7, 2014.
Association Rule Mining on Fragmented Database
,
with Amel Hamzaoui, Qutaibah Malluhi, and Riley Ryan,
9th International Workshop on Data Privacy Management (DPM 2014)
held in conjunciton with
ESORICS 2014,
Wroclaw, Poland, September 10, 2014.
Top-k frequent itemsets via differentially private FP-trees
,
with Jaewoo Lee,
Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining,
New York, August 24-27, 2014.
Decision Tree Classification on Outsourced Data
,
with Koray Mancuhan,
Workshop on Data Ethics
at the
Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining,
New York, August 24, 2014.
Privacy Preserving Tatonnement; A Cryptographic Construction of an Incentive Compatible Market
,
with John Ross Wallrabenstein,
Financial Cryptography and Data Security (FC14),
Barbados, March 3-7, 2014.
Equilibrium Concepts for Rational Multiparty Computation
,
with John Ross Wallrabenstein,
Conference
on Decision and Game Theory for Security (GameSec 2013),
Fort Worth, TX, November 11-12, 2013.
Maintaining Database Anonymity in the Presence of Queries
,
with Ryan Riley and Qutaibah M. Malluhi,
9th International Workshop on Security and Trust Management (STM 2013)
held in conjunction with
ESORICS 2013,
Egham, UK, September 12-13, 2013.
Using Safety Constraint for Transactional Dataset Anonymization
,
with Bechara Al Bouna and Qutaibah Malluhi,
The 27th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC'13),
Newark, New Jersey, July 15-17, 2013.
Best Research Paper Award.
Privacy through Uncertainty in Location-Based Services
,
with Shawn Merrill, Nilgün Basalp, Joachim Biskup, Erik Buchmann,
Bart Kuijpers, Walied Othman, and Erkay Savas,
International Workshop on Privacy and Security for Moving Objects (PriSMO)
held in conjunction with
MDM 2013,
Milan, Italy, June 3, 2013.
On Syntactic Anonymity and Differential Privacy
,
Chris Clifton and Tamir Tassa,
First Workshop on Privacy-Preserving Data Publication and Analysis
held at
ICDE 2013,
Brisbane, Australia, April 8-12, 2013.
Updating Outsourced Anatomized Private Databases
,
Ahmet Erhan Nergiz, Chris Clifton, and Qutaibah Malluhi,
16th International Conference on Extending Database Technology (EDBT),
Genoa, Italy, March 18-22, 2013.
Discriminatory Decision Policy Aware Classification
,
with Koray Mancuhan,
International Workshop on Discrimination and Privacy-Aware Data Mining (DPADM),
at
ICDM 2012,
Brussels, Belgium, December 10, 2012.
A Guide to Differential Privacy Theory in Social Network Analysis
,
with Christine Task,
The IEEE/ACM International Conference on Social Networks Analysis and Mining (ASONAM 2012),
Istanbul, Turkey, August 26-29, 2012.
Differential Identifiability
,
with Jaewoo Lee,
The 19th ACM SIGKDD Conference on Knowledge Discovery and Data Mining,
Beijing, China, August 12-16, 2012.
Honorable mention, best video award.
How much is enough? Choosing ε for Differential Privacy
,
with Jaewoo Lee,
The 14th Information Security Conference (ISC 2011),
Xi'an, China, October 26-29, 2011.
Significance of Term Relationships on Anonymization
,
with Balamurugan Anandan,
Web
Intelligence for Information Security Workshop
in conjunction with
WI-IAT,
Lyon, France, August 22, 2011.
Query
Processing in Private Data Outsourcing Using Anonymization
,
with Ahmet Erhan Nergiz,
The 25th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC-11),
Richmond, Virginia, July 11-13, 2011.
Search-Log Anonymization and Advertisement: Are They Mutually Exclusive?
,
with
Thorben Burghardt,
Klemens Böhm,
and Achim Guttmann,
The 19th ACM International Conference on Information and Knowledge Management (CIKM 2010),
Toronto, Canada, October 26-30, 2010.
Practical
and Secure Integer Comparison and Interval Check
,
with Ahmet Erhan Nergiz, Mehmet Ercan Nergiz, and Thomas Pedersen,
the 2010 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT2010),
Minneapolis, Minnesota, August 20-22, 2010.
t-Plausibility: Semantic Preserving Text Sanitization
,
with Wei Jiang, Mummoorthy Murugesan
and Luo Si,
the 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09),
Vancouver, Canada, August 29-31, 2009.
Providing Privacy through Plausibly Deniable Search
,
with Mummoorthy Murugesan,
2009 SIAM International Conference on Data Mining (SDM09),
Sparks, Nevada, April 30-May 2, 2009.
Plausibly Deniable Search
,
with Mummoorthy Murugesan,
Proceedings of the Workshop on Secure Knowledge Management (SKM 2008),
Dallas, Texas, November 3-4, 2008.
A Privacy Preserving Credentialing System for Health Care
,
with Ahmet Erhan Nergiz,
Proceedings of the Workshop on Secure Knowledge Management (SKM 2008),
Dallas, Texas, November 3-4, 2008.
Similar Document Detection with Limited Information Disclosure
,
with Wei Jiang,
Mummoorthy Murugesan,
and Luo Si,
Proceedings of the 24th International Conference on Data Engineering (ICDE 2008),
Cancun, Mexico, April 7-12, 2008.
Identifying Rare Classes with Sparse Training Data
,
with Mingwu Zhang,
Wei Jiang, and
Sunil Prabhakar,
Proceedings of the 18th International Conference on Database and Expert Systems Applications,
Regensburg, Germany, September 4-7, 2007.
Hiding the Presence of Individuals from Shared Databases
,
with Mehmet Ercan Nergiz and
Maurizio Atzori,
2007 ACM SIGMOD
International Conference on Management of Data,
Beijing, China, June 11-14, 2007.
Implemented in Google Cloud Data Loss Prevention product.
AC-Framework for Privacy-Preserving Collaboration
,
with Wei Jiang,
2007 SIAM International Conference on Data Mining (SDM07),
Minneapolis, Minnesota, April 26-28, 2007.
MultiRelational k-Anonymity
with Mehmet Ercan Nergiz and
Ahmet Erhan Nergiz,
The 23rd IEEE International Conference on Data Engineering (ICDE 2007),
Istanbul, Turkey, April 16-20, 2007.
Transforming Semi-Honest Protocols to Ensure Accountability
,
with Wei Jiang,
The ICDM workshop on
Privacy Aspects of Data Mining (PADM06),
Hong Kong, China, Dec. 18, 2006.
Thoughts on k-Anonymization
,
with Mehmet Ercan Nergiz,
The Second International Workshop on Privacy Data Management
held in conjunction with
The 22nd International Conference on Data Engineering,
Atlanta, USA April 8, 2006.
Privacy-Preserving Distributed k-Anonymity
,
with Wei Jiang,
The 19th Annual IFIP WG 11.3 Working Conference
on Data and Applications Security
August 7-10, 2005, Storrs, Connecticut.
Security Issues in Querying Encrypted Data
,
with Murat Kantarcioglu,
The 19th Annual IFIP WG 11.3 Working Conference
on Data and Applications Security
August 7-10, 2005, Storrs, Connecticut.
Privacy-Preserving Decision Trees over Vertically Partitioned Data
,
with Jaideep Vaidya,
The 19th Annual IFIP WG 11.3 Working Conference
on Data and Applications Security
August 7-10, 2005, Storrs, Connecticut.
Dependable Real-time Data Mining
,
with Bhavani Thuraisingham, Latifur Khan, John Maurer, and Marion Ceruti,
8th IEEE
International Symposium on Object-Oriented Real-Time Distributed
Computing (ISORC 2005), Seattle, Washington, May 18-20, 2005.
Privacy-Preserving Top-K Queries
with Jaideep Vaidya,
The 21st International Conference on Data Engineering (ICDE 2005),
April 5-8, 2005, Tokyo, Japan.
Knowledge Discovery from Transportation Network Data
,
with Wei Jiang,
Jaideep Vaidya,
Zahir Balaporia, and Brett Banich,
The 21st International Conference on Data Engineering (ICDE 2005),
April 5-8, 2005, Tokyo, Japan. Best paper, Industrial Track.
Privacy-Preserving Outlier Detection
with Jaideep Vaidya,
The Fourth IEEE International Conference on Data Mining,
November 1-4, 2004, Brighton, UK.
Privately Computing a Distributed k-nn Classifier
,
with Murat Kantarcioglu,
8th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD),
September 20-24, 2004, Pisa, Italy.
When
do Data Mining Results Violate Privacy?
,
with Murat Kantarcioglu
and Jiashun Jin,
The Tenth ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining,
August 22-25, 2004, Seattle, Washington.
Privacy Preserving Data Integration and Sharing
,
with AnHai Doan,
Ahmed Elmagarmid,
Murat Kantarcioglu,
Gunther Schadow,
Dan Suciu, and
Jaideep Vaidya,
The 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD'2004)
June 13, 2004, Paris, France.
Privacy Preserving Naive Bayes Classifier for Vertically Partitioned Data
,
with Jaideep Vaidya,
2004 SIAM International Conference on Data Mining,
April 22-24, 2004,
Lake Buena Vista, Florida, USA.
Derived Access Control Specification for XML
,
with Siddhartha Goel
and Arnon Rosenthal,
Workshop on XML Security
held in association with the
10th ACM Conference on Computer and Communications Security,
October 31, 2003, Fairfax, Virginia.
Leveraging the
,
with Jaideep Vaidya,
Workshop on Privacy in the Electronic Society
held in association with the
10th ACM Conference on Computer and Communications Security
October 30, 2003, Washington, DC.
Multi
in Secure Multi-Party Computation
Privacy-Preserving K-Means Clustering over Vertically Partitioned Data
,
with Jaideep Vaidya,
The Ninth ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining,
August 24 - 27, 2003,
Washington, D.C.
Honorable Mention, Best Paper Competition.
Assuring Privacy when Big Brother is Watching
,
with Murat Kantarcioglu,
The 8th ACM SIGMOD
Workshop on Research Issues in Data Mining and Knowledge Discovery
(DMKD'2003),
June 13, 2003, San Diego, California.
Privacy Preserving
Association Rule Mining in Vertically Partitioned Data
,
with Jaideep Vaidya,
The Eighth ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining,
July 23 - 26, 2002,
Edmonton, Alberta, Canada.
Privacy-preserving Distributed Mining
of Association Rules on Horizontally Partitioned Data
,
with Murat Kantarcioglu,
The ACM SIGMOD
Workshop on Research Issues in Data Mining and Knowledge Discovery
(DMKD'2002),
June 2, 2002, Madison, Wisconsin.
Coordinating Accessibility versus Restrictions in Distributed Object Systems
,
with Arnon Rosenthal,
3rd International Symposium on Distributed Objects & Applications
17-20 September, 2001
Rome, Italy.
Poster paper.
Directions for Web and E-Commerce Applications Security
,
with Bhavani Thuraisingham, Amar Gupta, Elisa Bertino, and Elena Ferrari,
Enabling Technologies: Infrastructure for Collaborative Enterprises,
WET ICE 2001, Cambridge, Massachusetts, June 20-22, 2001.
(Also available in IEEE Digital Library).
Real-Time Data Mining of Multimedia Objects
,
with Bhavani Thuraisingham, Marion G. Ceruti, and John Maurer,
Fourth IEEE
International Symposium on Object-Oriented Real-Time Distributed
Computing (ISORC 2001), Magdeburg, Germany, May 2-4, 2001.
Developing Custom Intrusion Detection Filters Using Data Mining
,
with Gary Gengo,
2000 Military Communications
International Symposium (MILCOM2000), Los Angeles, California,
October 22-25, 2000.
TopCat: Data Mining for Topic Identification in a Text Corpus
,
with Robert Cooley,
3rd European Conference
on Principles and Practice of Knowledge Discovery in Databases,
Prague, Czech Republic, September 15-18, 1999.
Lecture Notes in Artificial Intelligence
1704,
Springer-Verlag.
(Draft Available.)
Protecting Against Data Mining through Samples
,
Thirteenth
Annual IFIP WG 11.3 Working Conference on Database Security,
July 26-28, 1999, Seattle, WA.
Expanded version invited for submission to
Journal of Computer Security,
IOS Press
(see above).
GeoNODE: Visualizing News in a Geospatial Context
,
with
Rob Hyland
and Rod Holland,
Federal Data Mining Symposium and Exposition '99,
AFCEA,
March 9-10, 1999, Washington, D.C.
Data
Mining on Text
, with Rick Steinheiser,
The Twenty-Second Annual International Computer Software and Applications Conference,
Vienna, Austria, August 19-21, 1998.
(Also in IEEE Digital Library.)
Query
Flocks: A Generalization of Association Rule Mining
,
with
Dick Tsur,
Jeffrey D. Ullman,
Serge Abiteboul, Rajeev Motwani, Svetlozar Nestorov, and
Arnon Rosenthal,
in Proceedings of the
1998
ACM SIGMOD International Conference on Management of Data,
June 1-4, 1998, Seattle, WA.
Knowledge Discovery in Text
,
with
Arnon Rosenthal,
Rick Steinheiser, and
Jeffrey D. Ullman,
First Federal Data Mining Symposium,
AFCEA,
December 16-17, 1997, Washington, D.C.
Revised version appeared in the
European
Conference on Machine Learning
Workshop
on Text Mining, April 24, 1998, Chemnitz, Germany.
Experience with a Combined Approach to Attribute-Matching Across Heterogeneous Databases
,
with
Ed Housman
and
Arnon Rosenthal,
7th IFIP 2.6 Working Conference on Database Semantics
October 7-10, 1997, Leysin, Switzerland.
Dynamic Integration and Query Processing with Ranked Role Sets
,
with Peter Scheuermann
and Wen-Syan Li,
Proceedings of the
First
IFCIS International Conference on Cooperative Information Systems
(CoopIS'96), Brussels, Belgium, June 19-21, 1996.
Security and Privacy Implications of Data Mining
,
with
Don Marks,
ACM
SIGMOD
Workshop
on Data Mining and Knowledge Discovery,
Montreal, Canada, June 2, 1996.
Classifying
Software Components Using Design Characteristics
,
with Wen-Syan Li,
Proceedings of
The Tenth
Knowledge-Based Software Engineering Conference,
November 12-15, 1995, Boston, MA.
Experiences with SEMINT: Automated Semantic Integration
,
with Wen-Syan Li,
Proceedings of the International Conference on Advanced Science and Technology,
March 25, 1995, Chicago, IL.
Student paper presentation award to Wen-Syan Li.
Semantic
Integration in Heterogeneous Databases Using Neural Networks
,
with Wen-Syan Li,
Proceedings of the
20th
International Conference on Very Large Data Bases,
pp. 1-12, Santiago, Chile, September 12-15, 1994.
Compiling Local Test Formulas for Global Constraints in Distributed Databases
,
with Herts Chen,
International Conference on Intelligent Information Management Systems,
Washington, D.C., June 1-3 1994.
Information Brokers: Sharing Knowledge in a Heterogeneous Distributed System
,
with
Daniel Barbará,
Proceedings of the
4th International Conference on Database and Expert Systems Applications
Prague, Czechoslovakia, September 6-8, 1993.
Lecture Notes in Computer Science
720,
Springer-Verlag.
Using Field Specifications to Determine Attribute Equivalence in Heterogeneous Databases
,
with Wen-Syan Li,
Proceedings of
RIDE-IMS'93:
Third International Workshop on Research Issues in Data Engineering,
Vienna, Austria, April 18-20, 1993.
The Gold Mailer
,
with
Daniel Barbará,
Fred Douglis,
Hector Garcia-Molina,
Ben Kao,
Stephen Johnson,
Sharad Mehrotra,
Jens Tellefsen, and Rosemary Walsh,
Proceedings of the
Ninth International Conference on Data Engineering,
IEEE,
Vienna, Austria, April 19-23, 1993.
Distributed Processing of Filtering Queries in HyperFile
,
with
Hector Garcia-Molina,
Proceedings of the International Conference on Distributed Computing Systems,
IEEE,
Arlington, Texas, May 20-24, 1991.
Data Management with Massive Memory: A Summary
,
with
H. Garcia-Molina,
R. Abbott, C. Staelin, and K. Salem,
in
Parallel Database Systems,
Pierre America, Editor, PRISMA Workshop Proceedings, Noordwijk, The
Netherlands, September 1990.
Lecture Notes in Computer Science
503,
Springer-Verlag.
Indexing in a Hypertext Database
,
with
Hector Garcia-Molina, in
Proceedings of the
1990 conference on Very Large Data Bases,
Brisbane, Australia, August 13-16 1990.
The
Design of a Document Database
,
with
Hector Garcia-Molina and
Robert Hagmann,
ACM
Conference on Document Processing Systems,
Santa Fe, NM, December 5-9, 1988.
GeoNODE: An End-to-End System from Research Components
,
with John Griffith and Rod Holland,
The 17th
International Conference on Data Engineering,
Heidelberg, Germany, April 2-6, 2001.
Natural Language Processing for News Analysis
,
with
Tom Bartee, Stanley Boykin, Thad Cooper, Shereif El-Sheikh, Jerry
Fitzgerald, Joe Francoeur, John Gibson, John Griffith, Steve Hansen,
Lynette Hirschman, Rod Holland, Rob Hyland, Steve Janiak, Mark
Maybury, Andy Merlino, Carsten Oertel, Marc Reichman, Marc Richards,
Paul Silvey and Shane Steward,
Language
Technology Joint Conference (ANLP-NAACL2000),
April 29-May 40, 2000, Seattle, WA.
Semint:
A System Prototype for Semantic Integration in Heterogeneous Databases
,
with Wen-Syan Li,
Proceedings of the
1995
ACM SIGMOD International Conference on Management of Data,
May 23-25, 1995, San Jose, CA.
Christopher Clifton, John Ross Wallrabenstein, and David Stork, Secure search and retrieval, US 8,904,171, December 2, 2014.
Machine Learning Induced Unfairness
keynote at the
2023 International Conference on Data Mining and Knowledge Discovery,
Chongqing, China, June 24-26, 2023.
Panelist on
Full Stack Artificial Intelligence: The missing piece
,
22nd IEEE International Conference on Data Mining,
Orlando, Florida, November 30, 2022.
Chris Clifton, Eric Hanson, Keith Merrill, and Shawn Merrill,
Issues, and Solutions, to Providing Formal Privacy for ACS
,
2021 ACS Data User's Conference,
May 19, 2021, online.
Limitations on Malicious Secure Protocols
opening keynote at the
7th International Conference on Networking, Systems and Security,
December 22, 2020, Dhaka, Bangladesh.
Encrypted Computation: How and When
invited talk at
Hamad bin Khalifa University,
February 6, 2020, Doha, Qatar.
Secure Computing in Informatics, IoT, and Enabling Technologies, keynote at the IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT'20), February 2, 2020, Doha, Qatar.
Real-world Differential Privacy: Issues and Smooth Sensitivity Solutions
,
keynote at
The First IEEE
International Conference on Trust, Privacy and Security in Intelligent
Systems, and Applications,
December 13, 2019. Los Angeles, California.
When is a Semi-Honest Secure Multiparty Computation Valuable?
,
GameSec 2019: The 10th Conference on Decision and Game Theory for Security, November 1, 2019, Stockholm, Sweden.
Differential Privacy: Challenges on Moving Theory into Practice
,
keynote at the
17th International Conference on Privacy,
Security, and Trust,
August 28, 2019, Fredericton, NB, Canada.
Smooth Sensitivity for k-Nearest Neighbor
,
invited talk at the
Simons Institute for the Theory of Computing workshop
Data Privacy: From Foundations to Applications,
March 4, 2019, Berkeley, California.
Why did it do that? The (im?)possibility of deciphering actions of AI
,
Dawn or Doom: Emerging Technology - Risks and Rewards,
November 6, 2018, West Lafayette, IN.
Don't be a Headline: Fairness and Transparency in Machine Learning
,
Indy Big Data,
September 26, 2018, Indianapolis, IN.
Privacy Technology: What Can (and Can't) be Done
,
International Conference on Law and the Digital Age,
February 19-20, 2018, Doha, Qatar.
Dealing with Discriminatory Data Mining
,
keynote at the
International Conference on Applied Research in Computer
Science and Engineering (ICAR'17),
Beirut, Lebanon, June 23, 2017.
Also presented at the
Qatar Computing Research Institute,
February 21, 2018.
Anonymization: Myths, Reality, and Alternatives
,
invited talk at the
37th Great Lakes Biomedical Conference
Milwaukee, Wisconsin, April 7, 2017.
Distributed Differential Privacy
,
Distinguished Lecture,
University of Kentucky, Lexington, Kentucky,
November 18, 2016.
Distributed Differential Privacy
,
keynote at the
XVI Brazilian Symposium on Information and Computational
Systems Security (SBSeg16),
Niterói, Brazil,
November 8, 2016.
Privacy: Beyond Confidentiality
,
keynote at the
21st ACM Conference on Computer and Communications Security,
Scottsdale, Arizona, November 6, 2014.
(Abstract)
Privacy without encrypting - Protect your data and use it too
,
keynote at the
The 28th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC'14),
Vienna, Austria, July 14, 2014.
Privacy-Preserving Technologies
,
10th Annual Colloquium on ICT R&D:
R&D on Big Data and Personal Data
Sponsored by the
National Institute of Information and Communications Technology
(NICT) of Japan,
Washington, D.C., January 24th 2014.
Challenges
and Opportunities for Security with Differential Privacy
,
keynote at the
Ninth International Conference on Information Systems Security (ICISS 2013),
ISI Kolkata, India, 16-20 December 2013.
Panelist on
Data Mining with Big Data
IEEE International
Conference on Data Mining (ICDM 2013),
Dallas, Texas, December 7-10, 2013.
Panelist on
Security
and Privacy: Are they Two Sides of the Same Coin?
,
Annual Computer Security Applications Conference (ACSAC) 2012,
Orlando, Florida, December 6, 2012.
Privacy-Preserving Data Mining at 10: What's Next?
,
keynote at the
Ninth Australasian Data Mining Conference (AusDM 2011),
Ballarat, Australia, December 1-2, 2011. Also given as an invited talk at the workshop on
Privacy Aspects of Data Mining
held at the
IEEE International Conference on Data Mining, Vancouver, Canada, December 11, 2011.
Freeing Cloud Databases from Privacy Constraints
,
Computer Science and Engineering Seminar, Qatar University, Doha, Qatar, October 3, 2011.
Computer Science Seminar,
Australian National University, Canberra, Australia, November 28, 2011.
Privacy-Preserving Data Mining
,
invited talk at
The Thomas M. Cooley Law Review
Symposium
Data Mining: Who's Mining Your Business,
Lansing, Michigan, September 22, 2011.
Privacy Issues with Machine Learning: Fears, Facts, and Opportunities
Machine Learning Summer School @Purdue,
West Lafayette, Indiana, June 13, 2011.
(Slides available.)
Privacy-Preserving Data Mining: Shared analysis without shared data
,
invited presentation at the FDA-sponsored
Expert Workshop: Statistical and Epidemiological Issues in Active Medical Product Surveillance,
Brookings Institution, February 16, 2011.
Private Computation for Confidential Outsourcing
,
Ricoh Technology Center, Shin-Yokohama, Japan, January 17, 2011.
Privacy and Anonymity in Text
,
Computer Science Colloquium at
Brigham Young University,
Provo, Utah, November 12, 2009.
Plausibly Deniable Search
,
invited talk at the
Symposium `In search of privacy',
Radboud University, Nijmegen, The Netherlands,
June 25, 2009.
What an Information Technology Vendor Can (and Can't) Do For Your Client
,
invited presentation at the
Indiana Continuing Legal Education Forum
on Privacy Law,
Indianapolis, IN, May 14, 2009.
Measuring Privacy: A Risk-Based Approach
,
talk at SAP Research CEC Karlsruhe, Germany, December 8, 2008.
Opportunities for Private and Secure Machine Learning
,
keynote at the
2008 AISec Workshop
held in conjunction with the
15th ACM Conference on Computer and Communications Security (CCS),
Alexandria, VA, October 27, 2008. (Abstract)
Revised as
Saleable Opportunities for Private and Secure Computation
for the
Informatik-Kolloquium at Universität Karlsruhe, December 1, 2008
and FENS seminars at Sabanci University, December 5, 2008.
Panelist on Technologies for Privacy-Protective Data Mining
at the Department of Homeland Security
Privacy Office workshop
on Implementing Privacy Protections in Government Data Mining,
Washington, DC, July 24-25, 2008.
Information metrics for privacy and anonymity in spatiotemporal data
,
invited talk at the
First Interdisciplinary Workshop on Mobility, Data Mining and Privacy: Preserving anonymity in geographically referenced data,
Rome, Italy, February 14 2008.
Is Privacy Still an Issue for Data Mining?
,
invited talk at the
National Science
Foundation Symposium on Next Generation of Data Mining and
Cyber-Enabled Discovery for Innovation,
Baltimore, Maryland, October 10-12, 2007.
Privacy and Anonymity in Text
,
Max-Planck-Institut for Informatik, Saarbrucken, Germany,
August 31, 2007.
Will Privacy Kill Ubiquitous Knowledge Discovery?
,
invited talk at the
KDUbiq
Working Group on Security and Privacy meeting,
Berlin, Germany, September 19, 2006.
Privacy Conflicts
Inherent in Data Analysis
,
Institute for Software Research International Seminar,
Carnegie-Mellon University, March 29, 2006.
What is Privacy?
Critical Steps for Privacy-Preserving Data Mining
,
invited talk at the workshop on
Privacy
and Security Aspects of Data Mining
in conjunction with
The
Fifth IEEE International Conference on Data Mining,
November 27, 2005, Houston, Texas.
Knowledge Discovery from Transportation Network Data
,
The 21st International Conference on Data Engineering (ICDE 2005),
April 8, 2005, Tokyo, Japan.
Open Issues in Privacy-Preserving Data Mining
,
Maebashi Institute of Technology,
April 4, 2005.
Privacy-Preserving Outlier Detection
,
The Fourth IEEE International Conference on Data Mining,
November 4, 2004, Brighton, UK.
Panel:
Data Mining and Data Aggregation
at the
Symposium on
Privacy and Identity: The Promise and Perils of a Technological Age,
DePaul University,
October 14-15, 2004.
Panel:
Data Aggregation, Mining, and Privacy
at the
NSF Cybertrust PI Meeting,
Pittsburgh, Pennsylvania
August 18-20, 2004.
Knowledge Projection for Tele-Maintenance
,
Crane Naval Surface Warfare Center Distinguished Lecture Series,
February 3, 2004.
Turning Data into Knowledge Without Violating Privacy
,
Joint
Biostatistics & Medical Informatics / Statistics /
Computer Sciences Seminar,
University of Wisconsin, January 29, 2004.
Tutorial:
Privacy-Enhanced
Data Management for Next-Generation e-Commerce
,
with Irini Fundulaki,
Richard Hull,
Bharat Kumar,
Daniel Lieuwen,
and Arnaud Sahuguet,
given at the
29th International Conference on Very Large Data Bases,
September 9-12, 2003, Berlin, Germany.
Tutorial:
Privacy Preserving Data Mining
,
given at
The Ninth ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining,
August 24-27, 2003,
Washington, D.C.
Privacy Preservation to Enable Data Mining Across Enterprises
invited talk at the
IBM Almaden
Institute Symposium on Privacy,
April 9-11, 2003, San Jose, California.
Defining Privacy for Data Mining
,
invited talk at the
National Science
Foundation Workshop on Next Generation Data Mining,
November 1-3, 2002, Baltimore, MD.
Tutorial:
Privacy, Security, and Data Mining
,
given at the combined conference
13th European Conference on Machine Learning (ECML'02)
and
6th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD'02),
Helsinki, Finland, 19-23 August, 2002.
Developing Custom Intrusion Detection Filters Using Data Mining
,
2000 Military Communications
International Symposium (MILCOM2000), Los Angeles, California,
October 24, 2000.
Developing
Custom Intrusion Detection Filters Using Data Mining
,
Purdue
Center for Education and Research
in Information Assurance, December 10, 1999.
TopCat: Data Mining for Topic Identification in a Text Corpus
,
3rd European Conference
on Principles and Practice of Knowledge Discovery in Databases,
Prague, Czech Republic, September 16, 1999.
Protecting Against Data Mining through Samples
,
Thirteenth
Annual IFIP WG 11.3 Working Conference on Database Security,
July 27, 1999, Seattle, WA. Also served on panel on Intrusion Detection.
Knowledge Discovery in Text
,
European
Conference on Machine Learning
Workshop
on Text Mining, April 24, 1998, Chemnitz, Germany.
Knowledge Discovery in Text
,
First
Federal Data Mining Symposium,
AFCEA
December 16-17, 1997, Washington, D.C.
Experience with a Combined Approach to Attribute-Matching Across Heterogeneous Databases
,
joint presentation/demonstration with
Ed Housman,
7th IFIP 2.6 Working Conference on Database Semantics
October 7-10, 1997, Leysin, Switzerland.
Data Mining at MITRE
,
Third Applied Database Technology Conference,
The MITRE Corporation,
Bedford, MA, June 5, 1997.
Data Mining in Text
,
Symposium on Advanced Information Processing and Analysis,
Tysons Corner, Virginia, March 26, 1997.
Security and Privacy Implications of Data Mining
,
ACM
SIGMOD
Workshop
on Data Mining and Knowledge Discovery,
Montreal, Canada, June 2, 1996.
Data Mining at MITRE
,
Second Applied Database Technology Conference,
The MITRE Corporation,
Bedford, MA, December 7, 1995.
Neural Networks for Semantic Integration
,
Second Applied Database Technology Conference,
The MITRE Corporation,
Bedford, MA, December 7, 1995.
Classifying Software Components Using Design Characteristics
,
The Tenth
Knowledge-Based Software Engineering Conference,
November 12-15, 1995, Boston, MA.
Semantic Integration in Heterogeneous Databases using Neural Networks
,
20th
International Conference on Very Large Data Bases,
Santiago, Chile, September 12-15 1994.
Using Field Specifications to Determine Attribute Equivalence in Heterogeneous Databases
,
RIDE-IMS'93,
Vienna, Austria, April 18-20, 1993.
Distributed Processing of Filtering Queries in HyperFile
,
11th International Conference on Distributed Computing Systems,
Arlington, TX, May 20-24 1991.
Indexing in a Hypertext Database
,
1990 conference on Very Large Data Bases,
Brisbane, Australia, August 13-16 1990.
The Design of a Document Database
,
ACM Conference on Document Processing Systems,
Santa Fe, NM, December 5-9, 1988.
Chris Clifton (Lead PI), Dan Lin, Kannappan Palaniappan, Ming Yin, Collaborative Research: SaTC: CORE: Medium: Broad-Spectrum Facial Image Protection with Provable Privacy Guarantees, NSF Secure and Trustworthy Cyberspace, 10/1/21-09/30/24, $1,243,682 ($531,168 Purdue).
Brad Malin (Lead PI), Chris Clifton, Ramesh Raskar, Anna Oganyan, Collaborative Research: Workshop to Develop a Roadmap for Greater Public Use of Privacy-Sensitive Government Data, NSF Secure and Trustworthy Cyberspace, 5/1/21-4/30/22, $91,534 ($31,713 Purdue).
Chris Clifton (PI), Murat Kantarcioglu, Blase Ur, Lindsay Weinberg, Christopher Yeomans, FAI: Identifying, measuring, and mitigating fairness issues in AI, NSF Program on Fairness in Artificial Intelligence in collaboration with Amazon, 1/1/20-12/31/20, $216,908 NSF, $128,092 Amazon.
Chris Clifton, Measuring Adversarial Vulnerability for Anomaly Detection, Northrop Grumman Corporation, 1/1/19-12/31/19, $64,367
Chris Clifton (PI) and Keith Merrill, Tools to Support Anonymization, U. S. Census Bureau, 1/1/17-12/31/19, $572,766.
Chris Clifton, Daniel Kelly, and Kendall Roark, Big Data Ethics: Detecting Bias in Data Collection, Algorithmic Discrimination and `Informed Refusal', Andrew W. Mellon Foundation, 1/1/17-12/31/18, $142,511.
Chris Clifton, Mining Anonymized Data, Northrop Grumman Corporation, 1/1/16-8/31/16, $94,941.
Chris Clifton, Secure Printing from the Cloud, Ricoh Co., 5/1/2011-3/31/2012, $89,585.
Chris Clifton (PI), Qutaibah Maluhi (Qatar University), and Khaled M. Khan (Qatar University), Managing Private Data in the Cloud, Qatar National Research Foundation, 9/15/2010-9/14/2013, $954,095 ($333,840 Purdue).
Chris Clifton (PI), Luo Si, Chyi-Kong (Karen) Chang, Victor Raskin, Raquel L. Hill (PI Indiana U.), Stephanie Sanders, Wei Jiang (PI Missouri S&T), Anonymizing Textual Data and its Impact on Utility, NSF Trustworthy Computing, September 2010-August 2016, $2,480,300 ($1,554,441 Purdue).
Chris Clifton, Secure Multiparty Computation for Outsourcing Image Processing, Ricoh Co., 5/1/2010-3/31/2011, $78,792.
Tim Finin (PI, UMBC) et al. (19 co-PIs, 4 Purdue), A Framework for Managing the Assured Information Sharing Lifecycle, DoD Multidisplicinary University Research Initiative, 5/1/2008-4/30-/2013, $4.35M base + 3M option years ($1.5M Purdue).
Elisa Bertino (PI) and Chris Clifton, Identity Management and Trust Negotiation Services, Department of Homeland Security / Institute for Information Infrastructure Protection, 4/1/2007-3/31/2009, $300,000.
David Ebert (Director), Alok Chaturvedi, William Cleveland, Chris Clifton, Ahmed Elmagarmid, and Marc Overhage, Purdue University Regional Visualization and Analytics Center, Department of Homeland Security, January 2006-December 2008, $517,000.
Ann Hendrich (Ascension Health), Marilyn Chow (Kaiser Permanente), Nelson Lee (Rapid Modeling), William Cleveland, Chris Clifton, Jason Abrevaya, A Multi-Site Study of How Medical Surgical Nurses Spend Their Time: A Baseline Study in Preparation for an Electronic Health Record and an Evidenced-based Nursing Unit Design, Robert Wood Johnson Foundation, April 2005-August 2006. (Purdue CS portion $91,269).
Clement J. McDonald (PI) et al., Chris Clifton (Purdue PI) A Center of Excellence in Medical Informatics to Provide an Advanced Infrastructure for Human Research: A Catalyst for Indiana Research, Indiana 21st Century Fund, August 2004-August 2006, $3,832,196 (Lead: Regenstrief Institute for Healthcare; Purdue portion $50,000.)
Chris Clifton (PI), AnHai Doan, Ahmed Elmagarmid, Gunther Schadow, Dan Suciu, Privacy-Preserving Data Integration and Sharing NSF ITR, September 2004-August 2007, $1,012,000.
Chris Clifton (PI) and Mikhail Atallah, Collaborative Research: Distributed Data Mining to Protect Information Privacy, NSF Small ITR, August 2003 - August 2006, $276,274. (Collaborative with Wenliang (Kevin) Du, Syracuse University - funded under separate award.)
Chris Clifton, Walid Aref, Ahmed Elmagarmid, Arif Ghafoor, and Sunil Prabhakar, Knowledge Projection for TeleMaintenance, Naval Surface Warfare Center, Crane Division / EG&G October 21, 2002 - September 30, 2005, $1,746,813.
Chris Clifton, Ananth Iyer, and Reha Uzsoy, A Prototype Integrated Transaction Data Analysis and Visualization Environment for the Transportation, Distribution and Logistics Sector, e-Enterprise Center at Discovery Park, August 19 2002 - August 31, 2003, $34,278.
Chris Clifton, Pascal Meunier, and Gustavo Rodriguez-Rivera, Secure Programming: Add-on Course Module and Short Course, e-Enterprise Center at Discovery Park, August 19 2002 - June 30, 2003, $19,344.
Privacy Preserving Distributed Data Mining, Purdue Research Foundation, August 2002 through July 2004, $26,403.
Data Mining for Intrusion Detection, June 1999 through September 2001, ~$360,000.
Data Mining in Text, Co-PI with Arnon Rosenthal and Jeffrey Ullman (Stanford University) September 1996 through June 2000, $589,913 (MITRE's portion $442,174).
Data Mining in Text and Images, MITRE Sponsored Research, January 1996 through October 1999, $521,421.
Data Mining Security, October 1995 through September 1997, ~$120,000.
Shared Software Database, NSF Research Initiation Award, September 1992 through August 1995, $90,000.
Chowdhury Mohammad Rakin Haider, Identifying Induced Bias in Machine Learning Ph.D. May 2024.
Shawn Merrill, Privacy in Complex Sample Based Surveys, Ph.D. December 2021.
Radhika Bhargava, Adversarial Anomaly Detection, Ph.D. August 2019.
Koray Mancuhan, Data Classification for l-Diversity, Ph.D. December 2017.
Balamurugan Anandan, Privacy-Preserving Analysis with Applications to Textual Data, Ph.D. May 2017.
Christine Task, Privacy-Preserving Social Network Analysis, Ph.D. May 2015.
John Ross Wallrabenstein, Rational Multiparty Computation, Ph.D. December 2014.
Jaewoo Lee, Achieving Practical Differential Privacy, Ph.D. August 2014.
Ahmet Erhan Nergiz, Private Data Outsourcing using Anonymization, Ph.D. December 2012.
Pedro J. Pastrana-Camacho, Ontology Based Text Sanitization, M.S. with Thesis December 2012.
Mummoorthy Murugesan, Privacy Through Deniable Search, Ph.D. August 2010.
Mehmet Ercan Nergiz, Anonymization-Based Privacy Protection, Ph.D. December 2008.
Wei Jiang, Incentive Driven and Privacy-Preserving Collaborative Computing, Ph.D. August 2008.
Murat Kantarcioglu, Privacy Preserving Data Mining for Horizontally Partitioned Data, Ph.D. August 2005.
Jaideep S. Vaidya, Privacy-Preserving Data Mining over Vertically Partitioned Data, Ph.D. August 2004.
Siddhartha K. Goel, Derived Access Control Specification for XML, M.S. with thesis August 2003.
Wen-Syan Li, Semantic Integration in Heterogeneous Databases, Ph.D. December 1995; Using Field Specifications to Determine Attribute Equivalence in Heterogeneous Databases, M.S. December 1992.
Shu-Yao Liu, Study of Metadata in Heterogeneous Databases, M.S. December 1995.
Herts Chen, Concurrency Control Using Semantic Knowledge: A Proof Theoretic Basis, Ph.D. December 1994.
Robert Haddleton, An Analysis of an Active Database as Applied to a Real-Time Application, M.S. June 1994.
Shashidar Jasthi, Application of Software Quality Models to Individual Evaluation, M.S. December 1993.
Christopher Fernandes, Determining Semantic Equivalence Using a Nucleatide Base Genetic Sequencing Algorithm, M.S. December 1993.
Robert Milfajt, A Comparison of Two Heterogeneous Database Schema Integration Methods, M.S. June 1992.
Stephen Gene Jacobson, Integrating DB Design and CASE Tools, M.S. June 1992.
Inaugural Editor-in-Chief, IEEE Transactions on Privacy, IEEE Computer Society, Los Alamitos, CA, 2024-2026.
Editorial Board (2008-present, Review Board 2000-2007), Applied Intelligence: The International Journal of Artificial Intelligence, Neural Networks, and Complex Problem-Solving Technologies, Springer.
Editorial Board, Transactions on Data Privacy.
Vice-Chair, IEEE P7003 Working Group Standard for Algorithmic Bias Considerations.
Area chair, 23rd IEEE International Conference on Data Mining December 1-4, 2023, Shanghai, China.
Program committee, USENIX Conference on Privacy Engineering Practice and Respect September 11-12, 2023, Santa Clara, California.
Senior Program Committee, The 23rd Privacy Enhancing Technologies Symposium (PETS 2023), July 10-15, 2023, Lausanne, Switzerland.
Area chair, 22nd IEEE International Conference on Data Mining Nov. 28 – Dec. 1, 2022, Orlando, FL, USA.
Program Committee, Privacy in Statistical Databases, September 14-16, 2022, Paris, France.
Senior Program Committee, The 22nd Privacy Enhancing Technologies Symposium (PETS 2022), July 18-23, 2022, Sydney, Australia.
Program Committee Co-Chair, 8th International Conference on Mathematics and Computing (ICMC 2022), Jan 6-8, 2022, Vellore, Tamil Nadu, India.
Program committee, Workshop on Privacy in the Electronic Society held in association with the 10th ACM Conference on Computer and Communications Security November 15, 2021, online.
Program Committee, The 21st Privacy Enhancing Technologies Symposium (PETS 2021), July 19-24, 2021, online.
Program Committee, Privacy in Statistical Databases September 23-25, 2020, Tarragona, Catalonia.
Senior Program Committee, SIAM International Conference on Data Mining (SDM19) May 2 - 4, 2019, Calgary, Alberta, Canada.
Program Committee, The 19th Privacy Enhancing Technologies Symposium (PETS 2019), Stockholm, Sweden, 2019.
Program Committee, 33rd AAAI Conference on Artificial Intelligence (AAAI 2019), January 27-February 1, 2019, Honolulu, Hawaii.
Program Committee, IEEE International Conference on Data Mining series (ICDM 2018), November 17-20, 2018, Singapore.
Program Committee, The 18th Privacy Enhancing Technologies Symposium (PETS 2018), Barcelona, Spain, July 24-27, 2018.
Advisory board, Future of Privacy Forum workshop Bridging Industry and Academia to Tackle Responsible Research and Privacy Practices, November 2-3, 2017, New York.
Program Committee, IJCAI 2017 Workshop: Abuse Preventive Data Mining 2017 held in conjunction with The Twenty-sixth International Joint Conference on Artificial Intelligence (IJCAI-17), Melbourne, Australia, August 20, 2017.
Program Committee, The 17th Privacy Enhancing Technologies Symposium (PETS 2017), Minneapolis, MN, July 18-21, 2017.
Editorial Board, Journal of Privacy Technology.
Editorial board, Knowledge and Information Systems, Springer-Verlag, London, 2000-2014.
Editorial Board, IEEE Transactions on Knowledge and Data Engineering, IEEE Computer Society, Los Alamitos, CA, 2003-2007; survey editor 2007-2011.
Senior program committee, The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 11-14, 2013, Chicago, IL.
Program Committee vice-chair, IEEE International Conference on Data Mining series (ICDM 2012), December 10-13, 2012, Brussels, Belgium.
Program Committee, The 38th International Conference on Very Large Data Bases (VLDB 2012), August 2012, Istanbul.
Program Committee, The 2012 ACM SIGMOD International Conference on Management of Data, May 20-25, 2012, Scottsdale, Arizona.
Co-editor, Statistical Analysis and Data Mining: The ASA Data Science Journal 5(1) Special Issue: Best Papers of SDM'11.
Program Committee, The 2011 International Workshop on Privacy Aspects of Data Mining held in conjunction with ICDM'11, December 11, 2011, Vancouver, Canada.
Program Committee, The 37th International Conference on Very Large Data Bases (VLDB 2011), August 2011, Seattle. (Inaugural year of pure journal-style review process.)
Editorial board, Proceedings of the VLDB Endowment (the journal of the VLDB conference), VLDB Endowment, 2008 (Founding) - 2010 (changeover of VLDB conference to journal-style review process.)
Program Committee co-chair, 11th SIAM International Conference on Data Mining (SDM) April 28-30th, 2011, Phoenix, AZ.
Program Committee, European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD 2010), September 20-24, 2010, Barcelona.
Program Committee, ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning (PSDML 2010), September 20-24, 2010, Barcelona.
Program Committee, The 19th ACM International Conference on Information and Knowledge Management (CIKM 2010), October 26 - 30, 2010, Toronto.
Program Committee, The 36th International Conference on Very Large Data Bases, September 13 - 17, 2010, Singapore.
Senior program committee, The 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, July 25 - 28, 2010, Washington, D.C.
Program Committee, The 26th IEEE International Conference on Data Engineering, March 1-6, 2010, Long Beach, California.
Program Committee, IEEE International Conference on Data Mining series (ICDM 2009), December 6-9, 2009, Miami, Florida.
The 2009 International Workshop on Privacy Aspects of Data Mining held in conjunction with ICDM'09, December 6, 2009, Miami, Florida.
Program Committee, The 2009 IEEE International Conference on Information Privacy, Security, Risk and Trust, August 29-13, Vancouver, Canada.
Program Committee, The 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 12-15, 2009, Montreal, Canada.
Senior program committee, The 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, June 28 - July 1, 2009, Paris, France.
Program Committee, International Workshop on Privacy-Preserving Data Analysis (PPDA), April 20, 2009, Brisbane, Australia.
Program Committee, 25th International Conference on Data Engineering, March 29-April 4, 2009, Shanghai, China.
Program Committee, The 2008 IEEE International Conference on Data Mining, December 15-19, 2008, Pisa, Italy.
Program Committee, 3rd Workshop on Secure Knowledge Management, November 3-4, 2008, Dallas, Texas.
Program Committee, European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD 2008), September 15-19, 2008, Antwerp, Belgium.
Program Committee, 34th International Conference on Very Large Databases (VLDB'08), August 25-28, 2008, Auckland, New Zealand.
Program Committee, 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD (PinKDD'08), August 24-27, 2008, Las Vegas, Nevada.
Program Committee, The 27th ACM SIGMOD International Conference on Management of Data, June 9-12, 2008, Vancouver, Canada.
Area chair for Privacy and Social Factors, 8th SIAM International Conference on Data Mining (SDM) April 24-26, 2008, Atlanta, GA.
Editorial Board (2008-present, Review Board 2000-2007), Applied Intelligence: The International Journal of Artificial Intelligence, Neural Networks, and Complex Problem-Solving Technologies, Springer.
General Co-Chair, The Seventh IEEE International Conference on Data Mining, October 28-31, 2007, Omaha, NE.
Program Committee, 18th International Conference on Database and Expert Systems Applications (DEXA '07), September 3-7, 2007, Regensburg, Germany.
Senior program committee, The 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 12-15, 2007, San Jose, CA.
Program Committee Co-Chair, The Sixth IEEE International Conference on Data Mining, December 18 - 22, 2006, Hong Kong.
Program committee, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 31-August 2, 2006, Sophia Antipolis, France.
Program committee, The 25th ACM SIGMOD International Conference on Management of Data, June 26-29, 2006, Chicago, Illinois.
Treasurer, The Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 21-24, 2005, Chicago, Illinois.
Program committee, 2005 SIAM International Conference on Data Mining, April 21-23, 2005, Newport Beach, California, USA.
Program Committee, International Workshop on Privacy Data Management held in conjunction with The 21st International Conference on Data Engineering (ICDE 2005), April 8-9, 2005, Tokyo, Japan.
Program Committee, The Fourth IEEE International Conference on Data Mining, November 1-4, 2004, Brighton, United Kingdom. Also served on program committee of the associated Workshop on Privacy and Security Aspects of Data Mining and Workshop on Data Mining and the Grid.
Program Committee, The 8th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD), September 20-24, 2004, Pisa, Italy. Also served on program committee of the associated workshop International Workshop on Privacy and Security Issues in Data Mining.
Program Committee, The Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 22-25, 2004, Seattle, Washington.
Program Committee, 2004 SIAM International Conference on Data Mining, April 22-24, 2004, Kissimmee, Florida, USA.
Program Committee Vice Chair, The Third IEEE International Conference on Data Mining, November 19 - 22, 2003, Melbourne, Florida, USA. Also co-organized associated workshop on Privacy-Preserving Data Mining.
Program Committee, The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 24-27, 2003, Washington, D.C. Also served on program committee for associated workshop Data Cleaning, Record Linkage, and Object Consolidation and on panel Privacy and Data Mining: Friends or Foes?
Organizer and chair, workshop on Privacy, Security, and Data Mining held in conjunction with The 2002 IEEE International Conference on Data Mining (ICDM '02).
Program committee, Workshop on Mining Data Across Multiple Customer Touchpoints for CRM (in conjunction with PAKDD-02), May 6, 2002.
Tutorials chair and member of program committee, The 2001 IEEE International Conference on Data Mining (ICDM '01).
Program Committee, Workshop on Data Mining for Security Applications to be held as part of the 8th ACM Conference on Computer Security, November 8, 2001.
Program Committee, The 2001 Symposium on Applications and the Internet (SAINT-2001).
Program committee, Fifth IFCIS International Conference on Cooperative Information Systems (CoopIS'2000).
Guest editor, The Edge Data Mining Issue 4(2), The MITRE Corporation, August 2000.
Program committee, 1999 IEEE Knowledge and Data Engineering Exchange Workshop (KDEX-99). Served on panel Convergence of Technologies on the Web: the Case of Distributed Artificial Intelligence, Databases and Information Retrieval, chaired session on Data Mining.
Program committee, Twenty-Third Annual International Computer and Software Application Conference (COMPSAC99).
Program committee, ACM Digital Libraries Conference Workshop on Organizing Web Space (WOWS), August 14, 1999.
Proposal review panel, National Science Foundation Division of Information and Intelligent Systems, 1999, 2003, 2004.
Planning committee, 1999 DARPA-sponsored workshop on novelty detection in documents.
Program committee, 1998 IEEE Knowledge and Data Engineering Exchange Workshop (KDEX-98).
Program Committee, Sixth International Workshop on Research Issues on Data Engineering: Interoperability of Nontraditional Database Systems. Served on plenary panel on future of interoperability.
Program Committee,
1995
International Conference on Distributed Computing Systems.
Organized and chaired panel
Fee-for-Service in Distributed Systems: Research and Policy Issues
.
(Panel writeup in IEEE Digital Library.)
Local Arrangements Chair, Fourth International Conference on Foundations of Data Organization and Algorithms, October 13-15, 1993.
Proposal review panel, Texas Higher Education Board, 1993.
Invited attendance, NSF Workshop on Hyperbase Systems, October 15-16, 1992, Washington DC.
Fellow, IEEE; Distinguished member, ACM.
Recipient of the
2020 ACM CODASPY Research Award for lasting and innovative research contributions to the cybersecurity and privacy fields and the
2011 IEEE International Conference on Data Mining Outstanding Service Award.