|Present||Associate Professor, Wright State University ‐ Computer Science|
|Present||Director, Data-Intensive Analysis and Computing (DIAC) Lab, Wright State University ‐ Ohio Center of Excellence in Knowledge-Enable Computing (Kno.e.sis)|
385 Joshi Research Center
3640 Colonel Glenn Hwy
Dayton, OH 45435
CRESP: Towards Optimal Resource Provisioning for MapReduce Computing in Public ...
IEEE Transactions on Parallel and Distributed Systems (2014)
Running MapReduce programs in the cloud introduces this unique problem: how to optimize resource provisioning to minimize the monetary cost ...
Optimizing Star-Coordinate Visualization Models for Effective Interactive Cluster Exploration on ...
Intelligent Data Analysis (2014)
Interactive visual cluster analysis is the most intuitive way for finding clustering patterns, validating algorithmic clustering results, understanding data clusters ...
Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation
IEEE Transactions on Parallel and Distributed Systems (2009)
In multiparty collaborative data mining, participants contribute their own data sets and hope to collaboratively mine a comprehensive model based ...
Contributions to Books (2)
Reports and Unpublished Papers (1)
A Random Rotation Perturbation Approach to Privacy Preserving Data Classification
Kno.e.sis Publications (2005)
This paper presents a random rotation perturbation approach for privacy preserving data classification. Concretely, we identify the importance of classification-specific ...
Conference Proceedings and Presentations (31)
Privacy-Preserving Spectral Analysis of Large Graphs in Public Clouds
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (2016)
Large graph datasets have become invaluable assets for studying problems in business applications and scientific research. These datasets, collected and ...
Tweet Properly: Analyzing Deleted Tweets to Understand and Identify Regrettable ...
Conference WWW '16 25th International World Wide Web Conference Montreal, Canada (2016)
Inappropriate tweets can cause severe damages on authors' reputation or privacy. However, many users do not realize the negative consequences ...
PerturBoost: Practical Confidential Classifier Learning in the Cloud
Proceedings of the 13th IEEE International Conference on Data Mining (2013)
Mining large data requires intensive computing resources and data mining expertise, which might not be available for many users. With ...
Secure Computation of Top-K Eigenvectors for Shared Matrices in the ...
Proceedings of the Sixth IEEE International Conference on Cloud Computing (2013)
With the development of sensor network, mobile computing, and web applications, data are now collected from many distributed sources to ...