Please visit my Google Scholar page for a more up-to-date list.

JOURNAL / MAGAZINE ARTICLES


  1. Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
    E. Ayday, Q. Tang, and A. Yilmaz
    to appear in IEEE Transactions on Dependable and Secure Computing, 2017.

  2. Quantifying Interdependent Risks in Genomic Privacy
    E. Ayday and M. Humbert
    to appear in IEEE Security and Privacy Magazine, 2017.

  3. An Inference Attack on Genomic Data Using Kinship, Complex Correlations, and Phenotype Information
    I. Daznabi, M. Mobayen, N. Jafari, O. Tastan, and E. Ayday
    to appear in IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2017.

  4. Privacy-Preserving Aggregate Queries for Optimal Location Selection
    E. Yilmaz, H. Ferhatosmanoglu, E. Ayday, and R. C. Aksoy
    to appear in IEEE Transactions on Dependable and Secure Computing, 2017.

  5. Quantifying Interdependent Risks in Genomic Privacy
    M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti
    to appear in ACM Transaction on Privacy and Security (formerly known as TISSEC), 2016.

  6. A Privacy-Preserving Solution for Compressed Storage and Selective Retrieval of Genomic Data
    Z. Huang, E. Ayday, H. Lin, et al.
    to appear in Genome Research, 2016.

  7. Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
    E. Ayday, Q. Tang, and A. Yilmaz
    Cryptology ePrint Archive: Report 2016/478, May 2016. PDF

  8. Privacy-preserving genomic testing in the clinic - a model using HIV treatment
    2. P.-J. McLaren, J.-L. Raisaro, M. Aouri, M. Rotger, E. Ayday et al.
    Journal of Genetics in Medicine, Jan. 2016. PDF

  9. Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?
    E. Ayday, E. De Cristofaro, G. Tsudik, and J. P. Hubaux
    IEEE Computer Magazine, Feb. 2015. PDF

  10. Privacy and in the Genomic Era
    M. Naveed, E. Ayday, E. W. Clayton, J. Fellay, C. A. Gunter, J.-P. Hubaux, B. A. Malin, and X. Wang
    ACM Computing Surveys Volume 48, No.1, August 2015, also on arXiv: 1405.1891, 2014. PDF

  11. On genomics, kin, and privacy
    A. Telenti, E. Ayday, and J.-P. Hubaux
    F1000Research 3:80 (doi: 10.12688/f1000research.4089), 2014. PDF

  12. Patient Privacy in the Genomic Era
    J.L. Reisaro, E. Ayday, and J.-P. Hubaux
    PRAIX, 7 May 2014. PDF

  13. Iterative Trust and Reputation Management Using Belief Propagation
    E. Ayday and F. Fekri
    IEEE Transactions on Dependable and Secure Computing, Volume 9, No.3 May/June 2012. PDF

  14. Data Authenticity and Availability in Multi-hop Wireless Sensor Networks
    E. Ayday, F. Delgosha and F. Fekri
    ACM Transactions on Sensor Networks, Volume 8, Issue 2, March 2012. PDF

  15. An Iterative Algorithm for Trust Management and Adversary Detection for Delay Tolerant Networks
    E. Ayday and F. Fekri
    IEEE Transactions on Mobile Computing, Volume 11, No.9, September 2012. PDF

  16. A Secure Broadcasting Scheme to Provide Availability, Reliability and Authentication for Wireless Sensor Networks
    E. Ayday and F. Fekri
    Elsevier Ad Hoc Networks, Volume 10, No.7, September 2012, Pages 1278-1290. PDF

  17. A Protocol for Data Availability in Mobile Ad-Hoc Networks in the Presence of Insider attacks
    E. Ayday and F. Fekri
    Elsevier Ad Hoc Networks, Volume 8, Issue 2, March 2010, Pages 181-192. PDF

REFEREED CONFERENCE / WORKSHOP PAPERS


  1. A Privacy-Preserving Solution for the Bipartite Ranking Problem
    N. Salek, E. Ayday, and A. Guvenir
    In Proceedings of the 15th IEEE International Conference on Machine Learning and Applications (IEEE ICMLA'16), 2016.

  2. Profile Matching Across Unstructured Online Social Networks
    V. Kucuk and E. Ayday
    In Proceedings of International Workshop on Inference & Privacy in a Hyperconnected World (collocated with SPW 2016), 2016.PDF

  3. Privacy-Related Consequences of Turkish Citizen Database Leak
    E. Avllazagaj, E. Ayday, and E. Cicek
    In Proceedings of International Workshop on Inference & Privacy in a Hyperconnected World (collocated with SPW 2016), 2016.PDF

  4. Cryptographic Solutions for Genomic Privacy
    E. Ayday
    In Proceedings of International Conference on Financial Cryptography and Data Security (FC), 2016.

  5. Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies
    F. Tramèr, Z. Huang, E. Ayday and J.-P. Hubaux
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2015.PDF

  6. Can You Really Anonymize the Donors of Genomic Data in Today's Digital World?
    M. Alser, N. Almadhoun, A. Nouri, C. Alkan and E. Ayday
    In Proceedings of Data Privacy Management (DPM) International Workshop (in conjunction with ESORICS), 2015.PDF

  7. A New Inference Attack against Kin Genomic Privacy
    F. Balci, H. Kulan, C. Alkan and E. Ayday
    In Privacy-aware computational genomics (PRIVAGEN), Tokyo, Japan, September 2015.PDF

  8. Identifying Anonymous Donors of Genetic Information
    M. Alser, N. Almadhoun, A. Nouri, C. Alkan and E. Ayday
    In Privacy-aware computational genomics (PRIVAGEN), Tokyo, Japan, September 2015.PDF

  9. On a Novel Privacy-Preserving Framework for Both Personalized Medicine and Genetic Association Studies
    J. L. Raisaro, E. Ayday, P. McLaren, A. Telenti, and J. P. Hubaux
    In Privacy-aware computational genomics (PRIVAGEN), Tokyo, Japan, September 2015.

  10. De-anonymizing Genomic Databases with Phenotypic Traits
    M. Humbert, K. Huguenin, J. Hugonot, E. Ayday, and J. P. Hubaux
    In Proceedings on Privacy Enhancing Technologies (PETS), 2015.PDF

  11. GenoGuard: Protecting Genomic Data Against Brute-Force Attacks
    Z. Huang, E. Ayday, J. P. Hubaux, J. Fellay, and A. Juels
    In Proceedings of IEEE Symposium on Security and Privacy, San Jose, CA, USA, May 2015.PDF

  12. Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations
    S. S. Samani, Z. Huang, E. Ayday, M. Elliot, J. Fellay, J.-P. Hubaux and Z. Kutalik
    In Workshop on Genome Privacy (in conjunction with IEEE Symposium on Security and Privacy), San Jose, CA, USA, May 2015.PDF

  13. Privacy Threats and Practical Solutions for Genetic Risk Tests
    L. Barman, M.-T. Elgraini, J. L. Raisaro, E. Ayday and J.-P. Hubaux
    In Workshop on Genome Privacy (in conjunction with IEEE Symposium on Security and Privacy), San Jose, CA, USA, May 2015.PDF

  14. On Non-cooperative Genomic Privacy
    M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti
    In Proceedings of 19th International Conference on Financial Cryptography and Data Security (FC), Puerto Rico, USA, Jan. 2015.PDF

  15. Controlled Functional Encryption
    M. Naveed, S. Agrawal, M. Prabhakaran, X. Wang, E. Ayday, J.-P. Hubaux and C.A. Gunter
    In proceedings of 21st ACM Conference on Computer and Communications Security (CCS 2014), Scottsdale, AZ, USA, November 2014.PDF

  16. Reconciling Utility with Privacy in Genomics
    M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti
    In Proceedings of ACM Workshop on Privacy in the Electronic Society (WPES), Scottsdale, AZ, USA, November 2014.PDF

  17. Privacy-Preserving HIV Pharmacogenetics: A Real Use Case of Genomic Data Protection
    J.L. Raisaro, E. Ayday, P.J. McLaren, J-P. Hubaux, and A. Telenti
    In Workshop on Genome Privacy (in conjunction with PETS 2014), Amsterdam, Netherlands, July 2014.

  18. Protecting and Evaluating Genomic Privacy in Medical Tests and Personalized Medicine
    E. Ayday, J.L. Raisaro, J. Rougemont, and J.P. Hubaux
    In Proceedings of ACM Workshop on Privacy in the Electronic Society (WPES), Berlin, Germany, November 2013.PDF

  19. Privacy-Preserving Processing of Raw Genomic Data
    E. Ayday, J.L. Raisaro, U. Hengartner, A. Molyneaux, and J.P. Hubaux
    In proceedings of 8th Data Privacy Management (DPM 2013) International Workshop (in conjunction with ESORICS 2013), Egham, UK, September 2013.PDF

  20. Addressing the Concerns of the Lacks Family: Quantification of Kin Genomic Privacy
    M. Humbert, E. Ayday, J.P. Hubaux, and A. Telenti
    In proceedings of 20th ACM Conference on Computer and Communications Security (CCS 2013), Berlin, Germany, November 2013.PDF

  21. Personal Use of the Genomic Data: Privacy vs. Storage Cost
    E. Ayday, J.L. Raisaro, and J.P. Hubaux
    In proceedings of IEEE Global Communications Conference, Exhibition and Industry Forum – GLOBECOM, Atlanta, GA, December 2013.PDF

  22. Privacy-Preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data
    E. Ayday, J.L. Raisaro, P.J. McLaren, J. Fellay, and J.P. Hubaux
    In proceedings of USENIX Security Workshop on Health Information Technologies (HealthTech '13), Washington, DC, USA, August 2013.PDF

  23. Privacy-Enhancing Technologies for Medical Tests Using Genomic Data (short paper)
    E. Ayday, J.L. Raisaro, and J.P. Hubaux
    In 20th Annual Network & Distributed System Security Symposium – NDSS 2013, San Diego, CA, USA, February 2013.PDF

  24. Iterative Similarity Inference via Message Passing in Factor Graphs for Collaborative Filtering
    J. Zou, A. Einolghozati, E. Ayday, and F. Fekri
    In proceedings of IEEE Information Theory Workshop (ITW), Sevilla, Spain, September 2013.PDF

  25. A Recommender System Based on Belief Propagation over Pairwise Markov Random Fields
    E. Ayday, J. Zou, A. Einolghozati, and F. Fekri
    In Proceedings of 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton '2012), Monticello, IL, USA, October 2012.PDF

  26. BPRS: Belief Propagation Based Iterative Recommender System
    E. Ayday, A. Einolghozati and F. Fekri
    In Proceedings of IEEE International Symposium on Information Theory - ISIT 2012, Cambridge, MA, USA, July 2012 PDF

  27. BP-P2P: A Belief Propagation-Based Trust and Reputation Management for P2P Networks
    E. Ayday and F. Fekri
    In Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks - SECON, 2012, Seoul, Korea, June 2012. PDF

  28. Robust Reputation Management Using Probabilistic Message Passing
    E. Ayday and F. Fekri
    In Proceedings of IEEE Global Communications Conference, Exhibition and Industry Forum – GLOBECOM, Houston, TX, December 2011. PDF

  29. Application of Belief Propagation to Trust and Reputation Management
    E. Ayday and F. Fekri
    In Proceedings of IEEE International Symposium on Information Theory – ISIT, Saint Petersburg, Russia, August 2011. PDF

  30. Secure, Intuitive and Low-Cost Device Authentication for Smart Grid Networks
    E. Ayday and S. Rajagopal
    In Proceedings of IEEE Consumer Communications and Networking Conference - CCNS, Las Vegas, NV, USA, January 2011. PDF

  31. A Belief Propagation Based Recommender System for Online Services
    E. Ayday and F. Fekri
    In Proceedings of ACM Recommender Systems, Barcelona, Spain, September 2010. PDF

  32. Trust Management and Adversary Detection in Delay Tolerant Networks
    E. Ayday, H. Lee and F. Fekri
    In Proceedings of IEEE Military Communications Conference - MILCOM, San Jose, CA, USA, November 2010.PDF

  33. An Iterative Algorithm for Trust and Reputation Management
    E. Ayday, H. Lee and F. Fekri
    In Proceedings of IEEE International Symposium on Information Theory - ISIT, Seoul, Korea, June 2009. PDF

  34. Using Node Accountability in Credential Based Routing for Mobile Ad-Hoc Networks
    E. Ayday and F. Fekri
    In Proceedings of IEEE International Conference on Mobile Ad-hoc and Sensor Systems - MASS, Atlanta, GA, USA, September 2008. PDF

  35. AuCRB: An Efficient Mechanism to Provide Availability, Reliability and Authentication for Multihop Broadcasting in Wireless Networks
    E. Ayday, F. Delgosha and F. Fekri
    In Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks - SECON, San Francisco, CA, USA, June 2008. PDF

  36. Efficient Broadcast Authentication for Wireless Sensor Networks
    E. Ayday, F. Delgosha and F. Fekri
    In Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks - SECON, San Diego, CA, USA, June 2007. PDF

  37. MKPS: A Multivariate Polynomial Scheme for Symmetric Key-Establishment in Distributed Sensor Networks
    F. Delgosha, E. Ayday and F. Fekri
    In Proceedings of International Wireless Communications and Mobile Computing Conference - IWCMC, Hanolulu, Hawaii, USA, August 2007. PDF

  38. Location-Aware Security Services for Wireless Sensor Networks using Network Coding
    E. Ayday, F. Delgosha and F. Fekri
    In Proceedings of IEEE Conference on Computer Communications - INFOCOM, Anchorage, AL, USA, May 2007. PDF

  39. Security Services in Wireless Sensor Networks Using Sparse Random Coding
    F.Delgosha, E. Ayday, K.Chan and F.Fekri
    In Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks - SECON, Reston, VA, USA, September 2006. PDF

  40. Preparation and evaluation of engineering geological maps in 3-dimensional geographic information systems environment
    E. Ayday, M. Altan and C. Ayday
    In Proceedings of the 8th AGILE Conference on GIScience, Estoril, Portugal, May 2005. PDF

  41. The Use of GIS and GPS Integration for the Preparation of Quick Plans
    C.Ayday and E. Ayday
    In Proceeding of GIS Ostrava Symposium, Ostrava, Czech Republic, January 2005. PDF

  42. 27 August 2004 Mars Observation and Results Obtained by Anadolu University, Satellite and Space Sciences Research Institute
    M.Altan, H.Esenoglu, E. Ayday
    In Proceeding of National Astronomy Congress, Kayseri, Turkey, September 2004.

BOOK CHAPTER


  • Threats and Solutions for Genomic Data Privacy
    E. Ayday and J.-P. Hubaux
    in Medical Data Privacy Handbook, Editors: Gkoulalas-Divanis, Aris, Loukides, Grigorios, Springer, 2015.

PATENTS


  • Privacy-Preserving Processing of Raw Genomic Data
    Provisional patent application has been filed, June 2013.

  • Methods and Algorithms for Recommender Systems via Belief Propagation on Graphical Models
    Provisional patent application has been filed, February 2013.

  • Genomic Privacy Protection
    Provisional patent application has been filed, September 2012.

  • Systems and Methods for Providing Reputation Management
    Provisional patent application has been filed, July 2011.

TECHNICAL REPORTS


  • Reconciling Utility with Privacy in Genomics
    M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti
    EPFL-REPORT-201547, September 2014.

  • Secure Device Authentication Mechanisms for the Smart Grid-Enabled Home Area Networks
    E. Ayday and S. Rajagopal
    EPFL-REPORT-188373, September 2013.

  • Privacy-Preserving Processing of Raw Genomic Data
    E. Ayday, J.L. Raisaro, U. Hengartner, A. Molyneaux, and J.P. Hubaux
    EPFL-REPORT-187573, July 2013.

  • The Chills and Thrills of Whole Genome Sequencing
    E. Ayday, E. De Cristofaro, J.P. Hubaux, and G. Tsudik
    EPFL-REPORT-186866, June 2013.

  • Privacy-Enhancing Technologies for Medical Tests Using Genomic Data
    E. Ayday, J. L. Raisaro, and J. P. Hubaux
    EPFL-REPORT-182897, September 2012.

THESIS


  • Iterative Algorithms for Trust and Reputation Management and Recommender Systems
    E. Ayday
    Georgia Institute of Technology, December 2011.PDF