Wei Jiang - Papers

Journal Articles

  1. Prayitno, Chi-Ren Shyu, Karisma T. Putra, Hsing-Chung Chen, Yuan-Yu Tsai, K. S.M.T. Hossain, Wei Jiang, and Zon-Yin Shae, "A Systematic Review of Federated Learning in the Healthcare Area: From the Perspective of Data Properties and Applications", Applied Sciences 11, no. 23: 11191, 2021. https://doi.org/10.3390/app112311191

  2. Nitish Uplavikar, Bradley A. Malin, Wei Jiang, "Lucene-P2: A Distributed Platform for Privacy-Preserving Text-based Search", IEEE Transactions on Dependable and Secure Computing (TDSC), 8(4):578–587, January 9, 2020. DOI: 10.1109/TDSC.2020.2965111

  3. Hu Chun, Kui Ren, Wei Jiang, “Privacy-Preserving Power Usage and Supply Control in Smart Grid”, Computers & Security, Elsevier, 2018.

  4. Jian Kang, Dan Lin, Wei Jiang, Elisa Bertino, “Highly Efficient Randomized Authentication in VANETs”, Pervasive and Mobile Computing, 2018.

  5. Dan Lin, Nicholas Hilbert, Christian Storer, Wei Jiang, Jianping Fan, “UFace: Your Universal Password That No One Can See”, Computers & Security, Elsevier, 2018.

  6. Ravi S Arvapally, Xiaoqing Frank Liu, Fiona Fui and Wei Jiang, “Identifying Outlier Opinions in an Online Intelligent Argumentation System”, Concurrency and Computation: Practice and Experience, Wiley, 2017.

  7. Jingwei Li, Adam Bowers, Dan Lin, Peng Jiang and Wei Jiang, “PAS: Policy-based Assistance in Sensor Networks”, Computing, Springer, 2017.

  8. Bharath K. Samanthula, Lei Cen, Wei Jiang and Luo Si, “Privacy-Preserving and Efficient Friend Recommendation in Social Networks”, Transactions on Data Privacy, (8) 141–171, 2015.

  9. Bharath K. Samanthula, Yousef Elmehdwi and Wei Jiang, “k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data”, IEEE Transactions on Knowledge and Data Engineering, Issue 05, Vol. 27, pages 1261–1273, May 2015.

  10. Bharath K. Samanthula and Wei Jiang, “Secure Multiset Intersection Cardinality and its Appli- cation to Jaccard Coefficient”, IEEE Transactions on Dependable and Secure Computing, Issue 99, March 23, 2015.

  11. Dan Lin, Sashi Gurung, Wei Jiang, Ali Hurson and Rui Zhang, “Traffic Information Publication with Privacy Preservation”, ACM Transactions on Intelligent Systems and Technology (TIST), September 2014.

  12. Bharath K. Samanthula and Wei Jiang, “A Randomized Approach for Structural and Message based Private Friend Recommendation in Online Social Networks”, State of the Art Applications of Social Network Analysis, Lecture Notes in Social Networks, Springer, 2014.

  13. Bharath K. Samanthula, Hu Chun, Wei Jiang, and Bruce McMillin, “Secure and Threshold-based Power Usage Control in Smart Grid Environments”, International Journal of Parallel, Emergent and Distributed Systems (IJPEDS). November 6, 2013.

  14. Bharath K. Samanthula and Wei Jiang, “Interest-Driven Private Friend Recommendation”, Knowledge and Information Systems. October 2013.

  15. Murat Kantarcıo ̆glu and Wei Jiang, “Incentive Compatible Privacy-Preserving Data Analysis”, IEEE Transactions on Knowledge and Data Engineering, 25(6):1323–1335, June 2013. http://dx.doi.org/10.1109/TKDE.2012.61

  16. Balamurgan Anandan, Chris Clifton, Wei Jiang, Mummoorthy Murugesan, Pedro Pastrana-Camacho, and Luo Si. “t-Plausibility: Generalizing Words to Desensitize Text”, Transactions on Data Privacy, 5(3):505–534, December 2012. http://www.tdp.cat/issues11/abs.a095a12.php

  17. Alberto Trombetta, Wei Jiang, Elisa Bertino and Lorenzo Bossi, “Privacy-Preserving Updates to Anonymous and Confidential Databases”, IEEE Transactions on Dependable and Secure Com- puting, 8(4):578–587, July-Aug. 2011. http://dx.doi.org/10.1109/TDSC.2010.72

  18. Mummoorthy Murugesan, Wei Jiang, Chris Clifton, Luo Si and Jaideep Vaidya, “Efficient Privacy-Preserving Similar Document Detection”, the VLDB Journal, Springer-Verlag, 19(4):457– 475, August 2010. http://dx.doi.org/10.1007/s00778-009-0175-9

  19. Murat Kantarcıo ̆glu, Ali Inan, Wei Jiang and Bradley Malin, “Formal Anonymity Models for Efficient Privacy-Preserving Joins”, Data & Knowledge Engineering (DKE), 68(11):1206–1223, Elsevier, November, 2009. http://www.sciencedirect.com/science/article/pii/S0169023X09000949

  20. Chris Clifton, Ananth Iyer, Richard Cho, Wei Jiang, Murat Kantarcioglu and Jaideep Vaidya, “An Approach to Identifying Beneficial Collaboration Securely in Decentralized Logistics Systems”, Manufacturing & Service Operations Management, INFORMS, Maryland, 10(1):108-125, Winter 2008. http://msom.journal.informs.org/content/10/1/108

  21. Murat Kantarcıo ̆glu, Wei Jiang, Ying Liu and Bradley Malin, “A Cryptographic Approach to Securely Share and Query Genomic Sequences”, IEEE Transactions on Information Technology in Biomedicine (TITB), 12(5): 606-617, September 2008. http://dx.doi.org/10.1109/TITB.2007.908465

  22. Wei Jiang, Chris Clifton and Murat Kantarcıo ̆glu, “Transforming Semi-Honest Protocols to Ensure Accountability”, Data & Knowledge Engineering (DKE), Elsevier, 65(1):57-74, April 2008. http://www.sciencedirect.com/science/article/pii/S0169023X07001358

  23. Wei Jiang and Chris Clifton, “A Secure Distributed Framework for Achieving k-Anonymity”, Special Issue of the VLDB Journal on “Privacy-Preserving Data Management”, 15(4):316-333, November 2006. http://dx.doi.org/10.1007/s00778-006-0008-z

Refereed Conferences and Workshops

  1. Jian Kang, Alian Yu, Wei Jiang, Dan Lin, "NWADE: A Neighborhood Watch Mechanism for Attack Detection and Evacuation in Autonomous Intersection Management", 42nd IEEE International Conference on Distributed Computing Systems (ICDCS), 2022.

  2. Adam Bowers, Jize Du, Dan Lin, and Wei Jiang, “Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security”, In Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS ’22), May 30-June 3, 2022, Nagasaki, Japan. ACM, New York, NY, USA. https://doi.org/10.1145/3488932.3523264

  3. Nitish Uplavikar, Jaideep Vaidya, Dan Lin and Wei Jiang, “Privacy-Preserving Friend Recom- mendation in an Integrated Social Environment”, the 16th International Conference on Informa- tion Systems Security, Indian Institute of Technology Jammu, India, December 16 - 20, 2020.

  4. Kunpeng Liu, Nitish Uplavikar, Yanjie Fu and Wei Jiang, “Privacy-Preserving Multi-Task Learn- ing”, ICDM IEEE International Conference on Data Mining, Singapore, November 17 - 20, 2018.

  5. Ali Al-Lami, Mukesh Mohania and Wei Jiang, “Privacy-Preserving Watermarking Transforma- tion Technique in a Distributed Environment”, IEEE Conference on Communications and Network Security (CNS), Beijing China, May 30 - June 1, 2018.

  6. Ying Zhang, Lingxiang Wang, Wei Jiang and Zhishan Guo, “RWS - A Roulette Wheel Sched- uler for Preventing Execution Pattern Leakage”, Proceedings of the 24th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), BP Session, Porto, Portugal, April, 2018.

  7. Wei Jiang, Dan Lin, Feng Li and Elisa Bertino, ”No One Can Track You: Randomized Authen- tication in Vehicular Ad-hoc Networks”, IEEE International Conference on Pervasive Computing and Communications (PerCom), Kona, Big Island, Havaii, USA, March 13-17, 2017.

  8. Huchun, Kui Ren and Wei Jiang, “Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid”, 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Fairfax, VA, July 13 - 15, 2015.

  9. Bharath Samanthula, Wei Jiang and Elisa Bertino, “Privacy-Preserving Complex Query Evalu- ation over Semantically Secure Encrypted Data”, the 19th European Symposium on Research in Computer Security (ESORICS), Wroclaw, Poland, September 7-11, 2014.

  10. Hu Chun, Yousef Elmehdwi, Feng Li, Prabir Bhattacharya and Wei Jiang, “Outsourceable Two- Party Privacy-Preserving Biometric Authentication”, the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 4 - 6, 2014.

  11. Yousef Elmehdwi, Bharath K. Samanthula and Wei Jiang, “Secure k-Nearest Neighbor Query over Encrypted Data”, the 30th IEEE International Conference on Data Engineering (ICDE), Chicago, IL, USA, March 31 - April 4, 2014.

  12. Wenquan Wang, Marouane Kessentini and Wei Jiang, “Test Cases Generation for Model Trans- formations from Structural Information” Proceedings of the First International Workshop on Model-driven Engineering By Example co-located with ACM/IEEE 16th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2013), Miami, Florida, USA, September 29, 2013.

  13. Bharath K. Samanthula and Wei Jiang, “Efficient Privacy-Preserving Range Queries over En- crypted Data in Cloud Computing”, the 6th International Conference on Cloud Computing (IEEE CLOUD 2013), Santa Clara Marriott, CA, USA, June 27 - July 2, 2013.

  14. Bharath K. Samanthula, Wei Jiang and Sanjay Madria, “A Probabilistic Encryption based Min/Max Computation in Wireless Sensor Networks”, the 14th International Conference on Mo- bile Data Management (MDM), Pages 77–76, Milan, Italy, June 3-6 2013. http://dx.doi.org/10.1109/MDM.2013.18

  15. Feng Li, Nian Liu, Wei Jiang and Xiaoqing (Frank) Liu, “Argument Placement Recommenda- tion and Relevancy Assessment in an Intelligent Argumentation System”, The 2013 International Conference on Collaboration Technologies and Systems (CTS 2013), Pages 427–434, San Diego, California, USA, May 20-24, 2013. http://dx.doi.org/10.1109/CTS.2013.6567265

  16. Bharath K. Samanthula, Chun Hu and Wei Jiang, “An Efficient and Probabilistic Secure Bit- Decomposition”, 8th ACM Symposium on Information, Computer and Communications Security, Pages 541–546, Hangzhou, China, May 8-10, 2013. http://dx.doi.org/10.1145/2484313.2484386

  17. Wenquan Wang, Marouane Kessentini, Wei Jiang and Ali Ouni, “Test Cases Generation for Model Transformations from Structural Information”, 17th European Conference on Software Maintenance and Reengineering, Genova, Italy, March 5-8, 2013.

  18. Bharath K. Samanthula and Wei Jiang, “Structural and Message based Private Friend Rec- ommendation”, the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), Pages 684–690, Kadir Has University, Istanbul, Turkey, August 26 - 29, 2012. http://dx.doi.org/10.1109/ASONAM.2012.114

  19. Ravi Santosh Arvapally, Xiaoqing (Frank) Liu and Wei Jiang, “Identification of Faction Groups and Leaders in Web-based Intelligent Argumentation System for Collaborative Decision Support”, the 2012 International Conference on Collaboration Technologies and Systems (CTS 2012), Pages 509–516, Denver, Colorado, USA, May 21-25, 2012. http://dx.doi.org/10.1109/CTS.2012.6261098

  20. Hu Chun, Wei Jiang and Bruce M. McMillin, “Privacy-Preserving Power Usage Control in Smart Grid”, Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastruc- ture Protection, Pages 127–137, Fort McNair, Washington, DC, USA, March 19 - 21, 2012. http://link.springer.com/chapter/10.1007%2F978-3-642-35764-0_10

  21. Wei Jiang and Bharath K. Samanthula, “A Secure and Distributed Framework to Identify and Share Needed Information”, the Third IEEE International Conference on Privacy, Secu- rity, Risk and Trust (PASSAT11), Pages 1224–1230 MIT, Boston, USA, October 9-11, 2011. http://dx.doi.org/10.1109/PASSAT/SocialCom.2011.179

  22. Wei Jiang and Bharath K. Samanthula, “N-Gram Based Secure Similar Document Detection”, the 25th Annual WG 11.3 Conference on Data and Applications Security (DBSec), Pages 239–246, Richmond, Virginia, July 11-13, 2011. http://link.springer.com/chapter/10.1007%2F978-3-642- 22348-8_19

  23. Mummoorthy Murugesan, Wei Jiang, Erhan Nergiz and Serkan Uzunbaz, “k-out-of-n Oblivious Transfer based on Homomorphic Encryption and Solvability of Linear Equations”, ACM Confer- ence on Data and Application Security and Privacy (ACM CODASPY 2011), Pages 169–178, San Antonio, TX, February 21-23, 2011. http://dx.doi.org/10.1145/1943513.1943536

  24. Dan Lin, Sashi Gurung, Wei Jiang and Ali Hurson, “Privacy-Preserving Location Publishing under Road-Network Constraints”, Database Systems for Advanced Applications (DASFAA), Pages 17–31, Tsukuba, Japan, April 1-4, 2010. http://link.springer.com/chapter/10.1007%2F978- 3-642-12098-5_2

  25. Wei Jiang, Mummoorthy Murugesan, Chris Clifton and Luo Si, “t-Plausibility: Semantic Pre- serving Text Sanitization”, the 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT09), Pages 68–75, Vancouver, Canada, August 29-31, 2009. http://dx.doi.org/10.1109/CSE.2009.353

  26. Murat Kantarcıo ̆glu, Wei Jiang and Bradley Malin, “A Privacy Preserving Framework for In- tegrating Person-Specific Databases”, Lecture Notes in Computer Science: Proceedings of the 2008 Conference on Privacy in Statistical Databases, vol. 5262, 298-314, Istanbul, Turkey, 2008. http://link.springer.com/chapter/10.1007/978-3-540-87471-3_25

  27. Wei Jiang, Mummoorthy Murugesan, Chris Clifton and Luo Si, “Similar Document Detection with Limited Information Disclosure”, the 24th International Conference on Data Engineering (ICDE08), Pages 735–743, Cancun, Mexico, April 7-12, 2008. http://dx.doi.org/10.1109/ICDE.2008.4497482

  28. Alberto Trombetta, Wei Jiang, Elisa Bertino and Lorenzo Bossi “Privately Updating Suppression and Generalization based k-Anonymous Databases”, the 24th International Conference on Data Engineering (ICDE08), Pages 1370–1372, Cancun, Mexico, April 7-12, 2008. (Poster paper). http://dx.doi.org/10.1109/ICDE.2008.4497559

  29. Chris Clifton, Wei Jiang, Mummoorthy Murugesan and M. Ercan Nergiz, “Is Privacy Still an Issue for Data Mining?”, National Science Foundation Symposium on Next Generation of Data Mining and Cyber-Enabled Discovery for Innovation (NGDM’07), Baltimore, Oct. 10-12, 2007.

  30. Mingwu Zhang, Wei Jiang, Chris Clifton and Sunil Prabhakar, “Identifying Rare Classes with Sparse Training Data”, the 18th International Conference on Database and Expert Systems Ap- plications (DEXA07), Pages 751–760, Regensburg, Germany, September 3-7, 2007. http://link.springer.com/chapter/10.1007%2F978-3-540-74469-6_73

  31. Wei Jiang, Luo Si and Jing Li, “Protecting Source Privacy in Federated Search”, the 30th International ACM SIGIR Conference (SIGIR07), Pages 761–762, Amsterdam, July 23-27, 2007. (Poster paper). http://dx.doi.org/10.1145/1277741.1277896

  32. Wei Jiang and Chris Clifton, “AC-Framework for Privacy-Preserving Collaboration”, 2007 SIAM International Conference on Data Mining (SDM07), Minneapolis, Minnesota, April 26-28, 2007. http://www.siam.org/proceedings/datamining/2007/dm07 005wjiang.pdf

  33. Mummoorthy Murugesan and Wei Jiang, “Secure Content Validation”, the Third International Workshop on Privacy Data Management in Conjunction with ICDE 2007, Pages 157–162, Istanbul, Turkey, April 15-20, 2007. http://dx.doi.org/10.1109/ICDEW.2007.4400986

  34. Wei Jiang and Chris Clifton, “Transforming Semi-Honest Protocols to Ensure Accountability”, the ICDM workshop on Privacy Aspects of Data Mining (PADM06), Pages 524–529, Hong Kong, China, Dec. 18-22, 2006. http://dx.doi.org/10.1109/ICDMW.2006.161

  35. Wei Jiang and Maurizio Atzori, “Secure Distributed k-Anonymous Pattern Mining”, the 6th IEEE International Conference on Data Mining (ICDM06), Pages 319–329, Hong Kong, China, Dec. 18-22, 2006. http://dx.doi.org/10.1109/ICDM.2006.140

  36. Wei Jiang and Chris Clifton, “Privacy-Preserving Distributed k-Anonymity”, the 19th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, Pages 166–177, Storrs, Connecticut, Aug. 7-10, 2005. http://link.springer.com/chapter/10.1007/11535706_13

  37. Wei Jiang, Jaideep Vaidya, Zahir Balaporia, Chris Clifton and Brett Banich, “Knowledge Dis- covery from Transportation Network Data”, the 21st IEEE International Conference on Data Engineering (ICDE05), Pages 1061–1072, Tokyo, Japan, April 5-8, 2005. Best paper, Industrial Track. http://dx.doi.org/10.1109/ICDE.2005.82

Book Chapters

  1. Elmehdwi, Yousef, Wei Jiang and Ali Hurson, “Similarity of Private Keyword Search over Encrypted Document Collection”, Advances in Computers, Vol 94, pages 71-102, 2014.

  2. Alberto Trombetta, Wei Jiang and Elisa Bertino, “Advanced Privacy-Preserving Data Man- agement and Analysis”, Chapter 2 in Privacy and Anonymity in Information Management Sys- tems, Advanced Information and Knowledge Processing, Volume 0, Part 1, 7-27, Springer, 2010. http://link.springer.com/chapter/10.1007%2F978-1-84996-238-4_2

  3. Chris Clifton, Wei Jiang, Mummoorthy Murugesan and M. Ercan Nergiz, “Is Privacy Still an Issue for Data Mining?”, Chapter 18 in Next Generation of Data Mining, Hillol Kargupta, Jiawei Han, Philip Yu, Rajeev Motwani, and Vipin Kumar (Eds.), CRC Press, 2008.

  4. Elisa Bertino, Dan Lin and Wei Jiang, “A Survey of Quantification of Privacy Preserving Data Mining Algorithms”, in Privacy-Preserving Data Mining (Models and Algorithms), Advances in Database Systems, Charu C. Aggarwal and Philip S. Yu (Eds.), Volume 34, 183-205, Springer- Verlag, 2008. http://link.springer.com/chapter/10.1007/978-0-387-70992-5_8

Technical Reports

  1. Mummoorthy Murugesan, Wei Jiang, Erhan Nergiz and Serkan Uzunbaz, “Homomorphic Encryption based k-out-of-n Oblivious Transfer Protocols”, Purdue University, CSD TR# 09-007, September 4, 2009.

  2. Wei Jiang, Mummoorthy Murugesan, Chris Clifton and Luo Si, “Similar Document Detection with Limited Information Disclosure”, Purdue University, CSD TR# 08-024, September 19, 2008.

  3. Alberto Trombetta, Wei Jiang, Elisa Bertino and Lorenzo Bossi, “Privacy-Preserving Updates to Confidential and Anonymous Databases”, Purdue University, CSD TR# 07-023, October 30, 2007.

  4. Wei Jiang and Chris Clifton, “AC-Framework for Privacy-Preserving Collaboration”, Purdue University, CSD TR# 06-015, August 2, 2006.