Erman Ayday, PhD, MS, BS

Associate Professor
Department of Computer and Data Sciences
Case School of Engineering

Privacy enhancing technologies, data security and applied cryptographyy.

Research Information

Research Interests

  • Privacy enhancing technologies (including online social networks and genomic privacy).
  • Data security and applied cryptography.
  • Big data analytics and statistical inference from big data.
  • Iterative algorithms for trust and reputation management.
  • Trust and reputation management for ad-hoc networks and online services.
  • Information retrieval and recommender systems.
  • Data Privacy, authentication and availability for wireless sensor networks.
  • Game theory for wireless networks.
  • Cyber security for Smart Grid, Delay tolerant, and M2M networks.

Publications

  • Yilmaz, E., Ji, T., Ayday, E., & Li, P. (2021). Genomic Data Sharing under Dependent Local Differential Privacy. arXiv preprint arXiv:2102.07357.
  • Halimi, A., Dervishi, L., Ayday, E., Pyrgelis, A., Troncoso-Pastoriza, J., Hubaux, J., Jiang, X., & Vaidya, J. (2021). Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies. arXiv preprint arXiv:2101.08879.
  • Aysen, M., Ayday, E., & Cicek, A Ercument, E. (2020). The Effect of Kinship in Re-identification Attacks Against Genomic Data Sharing Beacons. bioRxiv.
  • Almadhoun, N., Ayday, E., & Ulusoy, \"Ozg\"ur, E. (2020). Inference attacks against differentially private query results from genomic datasets including dependent tuples. Bioinformatics, 36 (Supplement\_1), i136--i145.
  • Ayoz, K., Aysen, M., Ayday, E., & Cicek, A Ercument, E. (2020). The effect of kinship in re-identification attacks against genomic data sharing beacons. Bioinformatics, 36 (Supplement\_2), i903--i910.
  • Yilmaz, E., & Ayday, E. (2020). Collusion-Resilient Probabilistic Fingerprinting Scheme for Correlated Data. arXiv preprint arXiv:2001.09555.
  • Sariyildiz, M., Cinbis, R., & Ayday, E. (2020). Key protected classification for collaborative learning. Pattern Recognition, 104 , 107327.
  • Demirag, D., & Ayday, E. (2020). Tracking and controlling the spread of a virus in a privacy-preserving way. arXiv preprint arXiv:2003.13073.
  • Ayoz, K., Ayday, E., & Cicek, A Ercument, E. (2020). Genome reconstruction attacks against genomic data-sharing beacons. arXiv preprint arXiv:2001.08852.
  • Almadhoun, N., Ayday, E., & Ulusoy, \"Ozg\"ur, E. (2020). Differential privacy under dependent tuples—the case of genomic privacy. Bioinformatics.
  • \"Oks\"uz, Abdullah \cCa\uglar, Ayday, E., & G\"ud\"ukbay, U\ugur, E. (2020). Privacy-Preserving and Robust Watermarking on Sequential Genome Data using Belief Propagation and Local Differential Privacy. bioRxiv.
  • Zhu, X., Ayday, E., & Vitenberg, R. (2019). A privacy-preserving framework for outsourcing location-based services to the cloud. IEEE Transactions on Dependable and Secure Computing.
  • Ayday, E., Naveed, M., & Tang, H. (2019). GenoPri'17: International Workshop on Genome Privacy and Security. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16 (4), 1322--1323.
  • Zhu, X., Ayday, E., & Vitenberg, R. (2019). A privacy-preserving framework for outsourcing location-based services to the cloud. IEEE Transactions on Dependable and Secure Computing.
  • Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E. (2019). Key Protected Classification for Collaborative Learning. arXiv preprint arXiv:1908.10172.
  • Von Thenen, N., Ayday, E., & Cicek, A Ercument, E. (2019). Re-identification of individuals in genomic data-sharing beacons via allele inference. Bioinformatics, 35 (3), 365--371.
  • B\"ulent Sar\iy\ild\iz, Mert, G\"okberk Cinbiș, Ramazan, & Ayday, E. (2019). Key Protected Classification for Collaborative Learning. arXiv e-prints.
  • Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E. (2018). Key Protected Classification for GAN Attack Resilient Collaborative Learning. .
  • Ozercan, H., Ileri, A., Ayday, E., & Alkan, C. (2018). Realizing the potential of blockchain technologies in genomics. Genome research, 28 (9), 1255--1263.
  • Kale, G., Ayday, E., & Tastan, O. (2018). A utility maximizing and privacy preserving approach for protecting kinship in genomic databases. Bioinformatics, 34 (2), 181--189.
  • Sar\iy\ild\iz, Mert B\"ulent, Cinbi\cs, Ramazan G\"okberk, & Ayday, E. (2018). Key Protected Classification for GAN Attack Resilient Collaborative Learning. .
  • Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E. (2018). An inference attack on genomic data using kinship, complex correlations, and phenotype information. IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), 15 (4), 1333--1343.
  • Yilmaz, E., Ferhatosmanoglu, H., Ayday, E., & Aksoy, R. (2018). Privacy-preserving aggregate queries for optimal location selection. arXiv preprint arXiv:1801.02069.
  • G\"ursoy, Gamze, Harmanci, A., Tang, H., Ayday, E., & Brenner, S. (2018). When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data. World Scientific.
  • Ailijiang, A., Bayir, M., Altiparmak, N., Peixoto, D., Arora, V., Assent, I., Athanassoulis, M., Ayday, E., Babalou, S., Bahrami, M., & Others, M. (2018). Appreciation to distributed and parallel databases reviewers. Distrib Parallel Databases, 36 , 1--3.
  • Ozercan, H., Ileri, A., Ayday, E., & Alkan, C. (2018). Realizing the potential of blockchain technologies in genomics. Genome research, 28 (9), 1255--1263.
  • Ayday, E., Jiang, X., & Malin, B. (2018). GenoPri'16: International Workshop on Genome Privacy and Security. IEEE/ACM Transactions on Computational Biology and Bioinformatics.
  • Von Thenen, N., Ayday, E., & Cicek, A Ercument, E. (2018). Re-identification of individuals in genomic data-sharing beacons via allele inference. Bioinformatics, 35 (3), 365--371.
  • Harmanci, A., Tang, H., Ayday, E., & Brenner, S. (2018). When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data. .
  • Ayday, E., Jiang, X., & Malin, B. (2018). GenoPri'16: International Workshop on Genome Privacy and Security. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 15 (5), 1403--1404.
  • Harmanci, A., Tang, H., Ayday, E., & Brenner, S. (2018). When Biology Gets Personal: Hidden Challenges of Privacy and Ethics in Biological Big Data. .
  • Yilmaz, E., Ferhatosmanoglu, H., Ayday, E., & Aksoy, R. (2017). Privacy-preserving aggregate queries for optimal location selection. IEEE Transactions on Dependable and Secure Computing, 16 (2), 329--343.
  • Kale, G., Ayday, E., & Tastan, O. (2017). Supplementary Materials for A Utility Maximizing and Privacy Preserving Approach for Protecting Kinship in Genomic Databases. .
  • Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, C., & Ayday, E. (2017). A survey on information security threats and solutions for Machine to Machine (M2M) communications. Journal of Parallel and Distributed Computing, 109 , 142--154.
  • Ayday, E., Tang, Q., & Yilmaz, A. (2017). Cryptographic solutions for credibility and liability issues of genomic data. IEEE Transactions on Dependable and Secure Computing.
  • Humbert, M., Ayday, E., Hubaux, J., & Telenti, A. (2017). Quantifying interdependent risks in genomic privacy. ACM Transactions on Privacy and Security (TOPS), 20 (1), 3.
  • Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, C., & Ayday, E. (2017). A survey on information security threats and solutions for Machine to Machine (M2M) communications. Journal of Parallel and Distributed Computing, 109 , 142--154.
  • Ayday, E., Tang, Q., & Yilmaz, A. (2017). Cryptographic solutions for credibility and liability issues of genomic data. IEEE Transactions on Dependable and Secure Computing, 16 (1), 33--43.
  • Halimi, A., & Ayday, E. (2017). Profile matching across unstructured online social networks: threats and countermeasures. arXiv preprint arXiv:1711.01815.
  • Kale, G., Ayday, E., & Tastan, O. (2017). A utility maximizing and privacy preserving approach for protecting kinship in genomic databases. Bioinformatics, 34 (2), 181--189.
  • Ayday, E., & Humbert, M. (2017). Inference attacks against kin genomic privacy. IEEE Security \& Privacy, 15 (5), 29--37.
  • Kale, G., Ayday, E., & Tastan, O. (2017). Supplementary Materials for A Utility Maximizing and Privacy Preserving Approach for Protecting Kinship in Genomic Databases. .
  • Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E. (2017). An inference attack on genomic data using kinship, complex correlations, and phenotype information. IEEE/ACM transactions on computational biology and bioinformatics, 15 (4), 1333--1343.
  • Ayday, E., & Humbert, M. (2017). Inference attacks against kin genomic privacy. IEEE Security \& Privacy, 15 (5), 29--37.
  • Humbert, M., Ayday, E., Hubaux, J., & Telenti, A. (2017). Quantifying interdependent risks in genomic privacy. ACM Transactions on Privacy and Security (TOPS), 20 (1), 1--31.
  • Yilmaz, A., & Ayday, E. (2017). Collusion-secure watermarking for sequential data. arXiv preprint arXiv:1708.01023.
  • Halimi, A., & Ayday, E. (2017). Profile Matching Across Unstructured Online Social Networks: Threats and Countermeasures. arXiv preprint arXiv:1711.01815.
  • Yilmaz, A., & Ayday, E. (2017). Collusion-Secure Watermarking for Sequential Data. arXiv preprint arXiv:1708.01023.
  • Avllazagaj, E., Ayday, E., & Cicek, A Ercument, E. (2016). Privacy-Related Consequences of Turkish Citizen Database Leak. arXiv preprint arXiv:1605.05847.
  • McLaren, P., RAISARO, J., Aouri, M., Rotger, M., Ayday, E., Bartha, Istv\'an, E., Delgado, M., Vallet, Y., G\"unthard, Huldrych F, Y., Cavassini, M., & Others, M. (2016). Privacy-preserving genomic testing in the clinic: a model using HIV treatment. Genetics in medicine, 18 (8), 814.
  • Huang, Z., Ayday, E., Lin, H., Aiyar, R., MOLYNEAUX, A., Xu, Z., Fellay, J., Steinmetz, L., & Hubaux, J. (2016). A privacy-preserving solution for compressed storage and selective retrieval of genomic data. Genome research, 26 (12), 1687--1696.
  • Avllazagaj, E., Ayday, E., & Cicek, A Ercument, E. (2016). Privacy-Related Consequences of Turkish Citizen Database Leak. arXiv preprint arXiv:1605.05847.
  • McLaren, P., RAISARO, J., Aouri, M., Rotger, M., Ayday, E., Bartha, Istv\'an, E., Delgado, M., Vallet, Y., G\"unthard, Huldrych F, Y., Cavassini, M., & Others, M. (2016). Privacy-preserving genomic testing in the clinic: a model using HIV treatment. Genetics in medicine, 18 (8), 814--822.
  • Huang, Z., Ayday, E., Lin, H., Aiyar, R., MOLYNEAUX, A., Xu, Z., Fellay, J., Steinmetz, L., & Hubaux, J. (2016). A privacy-preserving solution for compressed storage and selective retrieval of genomic data. Genome research, 26 (12), 1687--1696.
  • Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., Malin, B., & Wang, X. (2015). Privacy in the genomic era. ACM Computing Surveys (CSUR), 48 (1), 1--44.
  • Humbert, M., Huguenin, K\'evin, M., Hugonot, J., Ayday, E., & Hubaux, J. (2015). De-anonymizing genomic databases using phenotypic traits. Proceedings on Privacy Enhancing Technologies, 2015 (2), 99--114.
  • Balci, F., Kulan, H., Alkan, C., & Ayday, E. (2015). A New Inference Attack against Kin Genomic Privacy. Proc. Privacy-Aware Computational Genomics.
  • Ayday, E., De Cristofaro, E., Hubaux, J., & Tsudik, G. (2015). Whole genome sequencing: Revolutionary medicine or privacy nightmare?. Computer, 48 (2), 58--66.
  • Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., Malin, B., & Wang, X. (2015). Privacy in the genomic era. ACM Computing Surveys (CSUR), 48 (1), 6.
  • Humbert, M., Huguenin, K\'evin, M., Hugonot, J., Ayday, E., & Hubaux, J. (2015). De-anonymizing genomic databases using phenotypic traits. Proceedings on Privacy Enhancing Technologies, 2015 (2), 99--114.
  • Balci, F., Kulan, H., Alkan, C., & Ayday, E. (2015). A New Inference Attack against Kin Genomic Privacy. Proc. Privacy-Aware Computational Genomics.
  • Ayday, E., De Cristofaro, E., Hubaux, J., & Tsudik, G. (2015). Whole genome sequencing: Revolutionary medicine or privacy nightmare?. Computer, 48 (2), 58--66.
  • RAISARO, J., Ayday, E., & Hubaux, J. (2014). Patient privacy in the genomic era. Praxis, 103 (10), 579--86.
  • Telenti, A., Ayday, E., & Hubaux, J. (2014). On genomics, kin, and privacy. F1000Research, 3
  • RAISARO, J., Ayday, E., McLaren, P., Hubaux, J., & Telenti, A. (2014). Privacy-Preserving HIV Pharmacogenetics: A Real Use Case of Genomic Data Protection. Workshop on Genome Privacy .
  • Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., Malin, B., Wang, X., & Others, X. (2014). Privacy and security in the genomic era. .
  • RAISARO, J., Ayday, E., & Hubaux, J. (2014). Patient privacy in the genomic era. Praxis, 103 (10), 579--86.
  • Telenti, A., Ayday, E., & Hubaux, J. (2014). On genomics, kin, and privacy. F1000Research, 3
  • Naveed, M., Ayday, E., Clayton, E., Fellay, J., Gunter, C., Hubaux, J., Malin, B., Wang, X., & Others, X. (2014). Privacy and security in the genomic era. .
  • Ayday, E., & Rajagopal, S. (2013). Secure device authentication mechanisms for the smart grid-enabled home area networks. Tech. Rep..
  • Ayday, E., De Cristofaro, E., Hubaux, J., & Tsudik, G. (2013). The chills and thrills of whole genome sequencing. Computer.
  • Ayday, E., & Fekri, F. (2012). A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks. Ad Hoc Networks, 10 (7), 1278--1290.
  • Ayday, E., Delgosha, F., & Fekri, F. (2012). Data authenticity and availability in multihop wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 8 (2), 1--26.
  • Ayday, E., & Fekri, F. (2012). An iterative algorithm for trust management and adversary detection for delay-tolerant networks. IEEE Transactions on Mobile Computing, 11 (9), 1514--1531.
  • Ayday, E., Delgosha, F., & Fekri, F. (2012). Data authenticity and availability in multihop wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 8 (2), 10.
  • Ayday, E., & Fekri, F. (2012). A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks. Ad Hoc Networks, 10 (7), 1278--1290.
  • Ayday, E., & Fekri, F. (2011). Iterative trust and reputation management using belief propagation. IEEE Transactions on Dependable and Secure Computing, 9 (3), 375--386.
  • Ayday, E., & Fekri, F. (2010). A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks, 8 (2), 181--192.
  • Ayday, E., & Fekri, F. (2010). A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks, 8 (2), 181--192.
  • Ayday, E., RAISARO, J., McLaren, P., Fellay, J., & Hubaux, J. (2007). Privacy-Enhancing Technologies for Disease Risk Tests Based on Genomic and Non-Genomic Data. .
  • Ayday, E., ALTAN, M., & AYDAY, C. (2005). Preparation and evaluation of engineering geological maps in 3-dimensional Geographic Information Systems environment. .
  • Ayday, E., ALTAN, M., & AYDAY, C. (2005). Preparation and Evaluation of Engineering Geological Maps in 3-dimensional Geographic Information Systems Environment. AGILE Conference on GIScience.
  • AYDAY, C., & Ayday, E. (2005). The Use of GIS and Handheld GPS Integration for the Preparation of Quick Plans. GIS Ostrava Symposium.
  • Kucuk, V., & Ayday, E. (). Profile Matching Across Unstructured Online Social Networks. .
  • Ayday, E., Shmatikov, V., Austin, U., & Kantarcioglu, M. (). Data Privacy Hiding Data from the Database User I. .
  • Ayday, E. (). Privacy in Mobile Networks. .
  • AYDAY, C., & Ayday, E. (). The Use of GIS and Handheld GPS Integration for the Preparation of Quick Plans. .
  • Ayday, E., Shmatikov, V., Austin, U., & Kantarcioglu, M. (). Data Privacy Hiding Data from the Database User I. .
  • Ahn, G., Alturi, V., Androulaki, E., Ayday, E., Baldimtsi, F., Barker, K., Basu, A., Boyd, C., Burmester, M., B\"ohme, Rainer, M., & Others, M. (). Stephen Marsh, UOIT Keith Martin, Royal Holloway, University of London Sjouke Mauw, University of Luxembourg Ali Miri, Ryerson University Aikaterini Mitrokotsa, Chalmers University of Technology. .
  • De Cristofaro, E., Malin, B., Jiang, X., Ayday, E., Bogdanov, D., Burton, P., Bush, W., Clayton, E., Craig, D., Dove, E., & Others, E. (). GenoPri 2015. .
  • Kucuk, V., & Ayday, E. (). Profile Matching Across Unstructured Online Social Networks. .
  • Aguirre, M., Ahn, G., Alghamdi, M., Alsaleh, M., Andersson, D., Asplund, M., Atluri, V., Ayday, E., Bakiras, S., Barker, J., & Others, J. (). 2012 Index IEEE Transactions on Dependable and Secure Computing| Vol. 9. .
  • De Cristofaro, E., Malin, B., Jiang, X., Ayday, E., Bogdanov, D., Burton, P., Bush, W., Clayton, E., Craig, D., Dove, E., & Others, E. (). GenoPri 2015. .
  • Ayday, E. (). Privacy in Mobile Networks. .
  • Ayday, E. (). Anonymity of E-Cash Protocols. .
  • Alser, M., Almadhoun, N., Nouri, A., Alkan, C., & Ayday, E. (). Identifying Anonymous Donors of Genetic Information. .
  • Ahn, G., Alturi, V., Androulaki, E., Ayday, E., Baldimtsi, F., Barker, K., Basu, A., Boyd, C., Burmester, M., B\"ohme, Rainer, M., & Others, M. (). Stephen Marsh, UOIT Keith Martin, Royal Holloway, University of London Sjouke Mauw, University of Luxembourg Ali Miri, Ryerson University Aikaterini Mitrokotsa, Chalmers University of Technology. .
  • Ayday, E. (). Anonymity of E-Cash Protocols. .
  • Alser, M., Almadhoun, N., Nouri, A., Alkan, C., & Ayday, E. (). Identifying Anonymous Donors of Genetic Information. .

Education

PhD
Electrical and Computer Engineering
Georgia Institute of Technology
2011
MS
Electrical and Computer Engineering
Georgia Institute of Technology
2007
BS
Electrical and Electronics Engineering
Middle East Technical University
2005