Wei Jiang

Department of Computer Science
Missouri University of Science and Technology
310 Computer Science Building, 500 W. 15th St.
Rolla, MO 65409-0350

http://web.mst.edu/~wjiang/
Office: 573-341-4989

Fax: 573-341-4501
email

Research Interests

My research interests lie at the crossroad of Privacy, Security, Data Mining and Databases: Security and Privacy issues raised by data integration and distributed Data Mining techniques; Security issues in Databases and Federated Search; Applied Cryptography and Secure Multi-Party Computation techniques; Document anonymization techniques to prevent the disclosure of privacy sensitive attributes.

Education

Purdue University
West Lafayette, Indiana, USA
University of Iowa
Iowa City, Iowa, USA

Current and Past Projects


Current and Former Students


Publications

Journal Articles
  1. Dan Lin, Sashi Gurung, Wei Jiang, Ali Hurson and Rui Zhang, "Traffic Information Publication with Privacy Preservation", ACM Transactions on Intelligent Systems and Technology (TIST). To appear.
  2. Bharath K. Samanthula and Wei Jiang, "Interest-Driven Private Friend Recommendation", Knowledge and Information Systems. To appear.
  3. Bharath K. Samanthula and Wei Jiang, "A Randomized Approach for Structural and Message based Private Friend Recommendation in Online Social Networks", Social Network Analysis and Mining (SNAM), Springer. To appear.
  4. Bharath K. Samanthula, Hu Chun, Wei Jiang, and Bruce McMillin, "Secure and Threshold-based Power Usage Control in Smart Grid Environments", International Journal of Parallel, Emergent and Distributed Systems (IJPEDS). November 2013.
  5. Balamurgan Anandan, Chris Clifton, Wei Jiang, Mummoorthy Murugesan, Pedro Pastrana-Camacho, and Luo Si, "t-Plausibility: Generalizing Words to Desensitize Text", Transactions on Data Privacy, 5(3):505-534, December 2012.
  6. Murat Kantarcioglu and Wei Jiang, “Incentive Compatible Privacy-Preserving Data Analysis”, IEEE Transactions on Knowledge and Data Engineering, March 9, 2012.
  7. Alberto Trombetta, Wei Jiang, Elisa Bertino and Lorenzo Bossi, "Privacy-Preserving Updates to Anonymous and Confidential Databases", IEEE Transactions on Dependable and Secure Computing, July-Aug, 2011.
  8. Mummoorthy Murugesan, Wei Jiang, Chris Clifton, Luo Si and Jaideep Vaidya, "Efficient Privacy-Preserving Similar Document Detection", the VLDB Journal, January 16, 2010.
  9. Murat Kantarcioglu, Ali Inan, Wei Jiang and Bradley Malin, "Formal Anonymity Models for Efficient Privacy-Preserving Joins", Data & Knowledge Engineering (DKE), Elsevier, November 2009.
  10. Chris Clifton, Ananth Iyer, Richard Cho, Wei Jiang, Murat Kantarcioglu and Jaideep Vaidya, "An Approach to Identifying Beneficial Collaboration Securely in Decentralized Logistics Systems", Manufacturing & Service Operations Management (M&SOM), INFORMS, Linthicum, Maryland, Winter 2008.
  11. Murat Kantarcioglu, Wei Jiang, Ying Liu and Bradley Malin, "A Cryptographic Approach to Securely Share and Query Genomic Sequences", IEEE Transactions on Information Technology in Biomedicine (TITB), September 2008.
  12. Wei Jiang, Chris Clifton and Murat Kantarcioglu, "Transforming Semi-Honest Protocols to Ensure Accountability", Data and Knowledge Engineering (DKE), an Elsevier journal, July 26, 2007.
  13. Wei Jiang and Chris Clifton, "A Secure Distributed Framework for Achieving k-Anonymity", Special Issue of the VLDB Journal on "Privacy-Preserving Data Management", Aug. 5, 2006.
Refereed Conferences and Workshops
  1. Yousef Elmehdwi, Bharath K. Samanthula and Wei Jiang, "Secure k-Nearest Neighbor Query over Encrypted Data", the 30th IEEE International Conference on Data Engineering (ICDE), Chicago, IL, USA, March 31 - April 4, 2014. To appear.
  2. Bharath K. Samanthula and Wei Jiang, "Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing", the 6th International Conference on Cloud Computing (IEEE CLOUD 2013), Santa Clara Marriott, CA, USA, June 27-July 2, 2013.
  3. Bharath K. Samanthula, Wei Jiang and Sanjay Madria, "A Probabilistic Encryption based Min/Max Computation in Wireless Sensor Networks", the 14th International Conference on Mobile Data Management (MDM), Milan, Italy, June 3-6 2013.
  4. Feng Li, Nian Liu, Wei Jiang and Xiaoqing (Frank) Liu, "Argument Placement Recommendation and Relevancy Assessment in an Intelligent Argumentation System", The 2013 International Conference on Collaboration Technologies and Systems (CTS 2013), San Diego, California, USA, May 20-24, 2013.
  5. Bharath K. Samanthula, Chun Hu and Wei Jiang, “An Efficient and Probabilistic Secure Bit-Decomposition”, 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Hangzhou, China, May 8-10, 2013.
  6. Wenquan Wang, Marouane Kessentini, Wei Jiang and Ali Ouni, “Test Cases Generation for Model Transformations from Structural Information”, 17th European Conference on Software Maintenance and Reengineering, Genova, Italy, March 5-8, 2013.
  7. Bharath K. Samanthula and Wei Jiang, “Structural and Message based Private Friend Recommendation”, the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), Kadir Has University, Istanbul, Turkey, August 26 - 29, 2012.
  8. Ravi Santosh Arvapally, Xiaoqing (Frank) Liu and Wei Jiang, “Identification of Faction Groups and Leaders in Web-based Intelligent Argumentation System for Collaborative Decision Support”, the 2012 International Conference on Collaboration Technologies and Systems (CTS 2012), Denver, Colorado, USA, May 21-25, 2012.
  9. Hu Chun, Wei Jiang and Bruce M. McMillin, “Privacy-Preserving Power Usage Control in Smart Grid”, Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Fort McNair, Washington, DC, USA, March 19 - 21, 2012.
  10. Wei Jiang and Bharath K. Samanthula, “A Secure and Distributed Framework to Identify and Share Needed Information”, the Third IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT11), MIT, Boston, USA, October 9-11, 2011.
  11. Wei Jiang and Bharath K. Samanthula, “N-Gram Based Secure Similar Document Detection”, the 25th Annual WG 11.3 Conference on Data and Applications Security, Richmond, Virginia, July 11-13, 2011.
  12. Mummoorthy Murugesan, Wei Jiang, Erhan Nergiz and Serkan Uzunbaz, "k-out-of-n Oblivious Transfer based on Homomorphic Encryption and Solvability of Linear Equations", ACM Conference on Data and Application Security and Privacy (ACM CODASPY 2011), San Antonio, TX, February 21-23, 2011.
  13. Dan Lin, Sashi Gurung, Wei Jiang and Ali Hurson, "Privacy-Preserving Location Publishing under Road-Network Constraints", Database Systems for Advanced Applications (DASFAA), Tsukuba, Japan, April 1-4, 2010.
  14. Wei Jiang, Mummoorthy Murugesan, Chris Clifton and Luo Si, "t-Plausibility: Semantic Pre- serving Text Sanitization", The 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT09), Vancouver, Canada, August 29-31, 2009.
  15. Murat Kantarcioglu, Wei Jiang and Bradley Malin, "A Privacy Preserving Framework for Integrating Person-Specific Databases", Lecture Notes in Computer Science: Proceedings of the 2008 Conference on Privacy in Statistical Databases, vol. 5262, 298-314, Istanbul, Turkey, 2008.
  16. Wei Jiang, Mummoorthy Murugesan, Chris Clifton and Luo Si, "Similar Document Detection with Limited Information Disclosure", the 24th IEEE International Conference on Data Engineering (ICDE08), April 7-12, 2008, Cancun, Mexico.
  17. Alberto Trombetta, Wei Jiang, Elisa Bertino and Lorenzo Bossi "Private Updates to Anonymous Databases", the 24th IEEE International Conference on Data Engineering (ICDE08), April 7-12, 2008, Cancun, Mexico. (Poster paper)
  18. Chris Clifton, Wei Jiang, Mummoorthy Murugesan and M. Ercan Nergiz, "Is Privacy Still an Issue for Data Mining?", National Science Foundation Symposium on Next Generation of Data Mining and Cyber-Enabled Discovery for Innovation (NGDM'07), Baltimore, Oct. 10-12, 2007.
  19. Mingwu Zhang, Wei Jiang, Chris Clifton and Sunil Prabhakar, "Identifying Rare Classes with Sparse Training Data", the 18th International Conference on Database and Expert Systems Applications (DEXA07), Regensburg, Germany, September 3-7, 2007.
  20. Wei Jiang, Luo Si and Jing Li, "Protecting Source Privacy in Federated Search", the 30th Annual International ACM SIGIR Conference (SIGIR07) , Amsterdam, July 23-27, 2007. (Poster paper)
  21. Wei Jiang and Chris Clifton, "AC-Framework for Privacy-Preserving Collaboration", 2007 SIAM International Conference on Data Mining (SDM07), Minneapolis, Minnesota, April 26-28, 2007.
  22. Mummoorthy Murugesan and Wei Jiang, "Secure Content Validation", the 3rd International Workshop on Privacy Data Management in Conjunction with ICDE 2007, Istanbul, Turkey, April 15-20, 2007.
  23. Wei Jiang and Chris Clifton, "Transforming Semi-Honest Protocols to Ensure Accountability", the ICDM workshop on Privacy Aspects of Data Mining (PADM06), Hong Kong, China, Dec. 18-22, 2006.
  24. Wei Jiang and Maurizio Atzori, "Secure Distributed k-Anonymous Pattern Mining", the Sixth IEEE International Conference on Data Mining (ICDM06), Hong Kong, China, Dec. 18-22, 2006.
  25. Wei Jiang and Chris Clifton, "Privacy-Preserving Distributed k-Anonymity", the 19th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, Storrs, Connecticut, Aug. 7 - 10, 2005.
  26. Wei Jiang, Jaideep Vaidya, Zahir Balaporia, Chris Clifton and Brett Banich, "Knowledge Discovery from Transportation Network Data", the 21st IEEE International Conference on Data Engineering (ICDE05), Tokyo, Japan, Apr. 5 - 8, 2005. Best paper, Industrial Track.
Book Chapters
  1. Alberto Trombetta, Wei Jiang, and Elisa Bertino, "Advanced Privacy-Preserving Data Management and Analysis", Chapter 2 in Privacy and Anonymity in Information Management Systems, Advanced Information and Knowledge Processing, Volume 0, Part 1, 7-27, Springer, 2010.
  2. Chris Clifton, Wei Jiang, Mummoorthy Murugesan, and M. Ercan Nergiz, "Is Privacy Still an Issue for Data Mining?", Chapter 18 in Next Generation of Data Mining, Hillol Kargupta, Jiawei Han, Philip Yu, Rajeev Motwani, and Vipin Kumar (Eds.), CRC Press, 2008.
  3. Elisa Bertino, Dan Lin and Wei Jiang, "A Survey of Quantification of Privacy Preserving Data Mining Algorithms", in Privacy-Preserving Data Mining (Models and Algorithms), Charu C. Aggarwaland Philip S. Yu (Eds.), Springer-Verlag, 2008.

Last modified: Wed Nov 17 23:53:10 CDT 2013