The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2014

PDF

Active Hashing with Joint Data Example and Tag Selection, Qifan Wang and Luo Si

Link

A formal proximity model for RBAC systems, Aditi Gupta, Michael Kirkpatrick, and Elisa Bertino

Link

A practical approach for provenance transmission in wireless sensor networks, S.M.I. Alam and Sonia Fahmy

PDF

A practical approach for provenance transmission in wireless sensor networks, S.M. Iftekharul Alam and Sonia Fahmy

PDF

Cross-Domain and Cross-Category Emotion Tagging for Comments of Online News, Ying Zhang, Ning Zhang, Luo Si, Yanshan Lu, Qifan Wang, and Xiaojie Yuan

Link

Detecting mobile malware threats to homeland security through static analysis, Seung-Hyun Seo, Aditi Gupta, Asmaa Mohamed Sallama, and Kangbin Yimb

PDF

Draft Genome Sequence of Acetobacter aceti Strain 1023, a Vinegar Factory Isolate, John Hung, Christopher Mill, Sandra Clifton, Vincent Magrini, Ketaki Bhide, Julie Francois, Aaron Ransome, Lucinda Fulton, Jyothi Thimmapuram, Richard Wilson, and T. Joseph Kappock

Link

Flow-based partitioning of network testbed experiments, Wei-Min Yao and Sonia Fahmy

PDF

IdentiDroid: Android can finally Wear its Anonymous Suit, Bilal Shebaro, Oluwatosin Ogunwuyi, Daniele Midi, and Elisa Bertino

Link

IEEE TDSC Editorial, Elisa Bertino

Link

Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases, Bharath Samanthula, Wei Jiang, and Elisa Bertino

Link

MED18 interaction with distinct transcription factors regulates multiple plant functions., Z Lai, C Schluttenhofer, Ketaki Bhide, J Schreve, Jyothi Thimmapuram, S Y. Lee, D J. Yum, and T Mengiste

PDF

Practical k Nearest Neighbor Queries with Location Privacy, Xun Yi, Russell Paulet, Elisa Bertino, and Vijay Varadharajan

Preference Preserving Hashing for Efficient Recommendation, Zhiwei Zhang, Qifan Wang, Lingyun Ruan, and Luo Si

PDF

Privacy of Outsourced k-mean Clustering, Dongxi Liu, Elisa Bertino, and Xun Yi

Link

Representation and querying of unfair evaluations in social rating systems, Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, Norman Foo, and Elisa Bertino

Submissions from 2013

Link

Active Learning with Optimal Instance Subset Selection, Yifan Fu, Xingquan Zhu, and Ahmed Elmagarmid

Link

Adaptive data protection in distributed systems, Anna Squicciarini, Giuseppe Petracca, and Elisa Bertino

Link

A distributed cloud architecture for mobile multimedia services, Muhamed Felemban, Saleh Basalamah, and Arif Ghafoor

Link

A fast parallel maximum clique algorithm for large sparse graphs and temporal strong components, Ryan Rossi, David Gleich, and Assefaw Gebramedhin

Link

A file provenance system, Salmin Sultana and Elisa Bertino

Link

An efficient certificateless cryptography scheme without pairing, Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, and Elisa Bertino

Link

An Experimental Framework for BGP Securuty Evaluation, Debbie Perouli, Olaf Maennel, Iain Phillips, Sonia Fahmy, Randy Bush, and Rob Austein

Link

Author disambiguation by hierarchical agglomerative clustering with adaptive stopping criterion, Lei Cen, Eduard Dragut, Luo Si, and Mourad Ouzzani

Link

Collaboration in Multicloud computing environments: Framework and security issues, S Chandrasekhar, M Singhl, GE Tingjian, R Krishnan, Gail Joon Ahn, and Elisa Bertino