Research

My research interests include:

  • Data privacy and security
  • Cybersecurity
  • Adversarial machine learning
  • Security and privacy in artificial intelligence (AI)
  • Databases, data analytics and data mining
  • Internet of Things

My publications are listed below and on my Google Scholar profile.

Journal Publications

  1. E. Tire, and M.E. Gursoy. “Answering spatial density queries under local differential privacy”. IEEE Internet of Things Journal. [pdf]
  2. B. Boru, and M.E. Gursoy. “Forecasting daily COVID-19 case counts using aggregate mobility statistics”. Data 7 (11). [pdf]
  3. M.E. Gursoy, L. Liu, K-H. Chow, S. Truex, and W. Wei. “An adversarial approach to protocol analysis and selection in local differential privacy”. IEEE Transactions on Information Forensics and Security (TIFS). [pdf]
  4. E. Yigitoglu, M.E. Gursoy, and L. Liu. “Utility-aware and privacy-preserving mobile query services”. IEEE Transactions on Services Computing (TSC). [pdf]
  5. M.E. Gursoy, A. Tamersoy, S. Truex, W. Wei, and L. Liu. “Secure and utility-aware data collection with condensed local differential privacy”. IEEE Transactions on Dependable and Secure Computing (TDSC). [pdf]
  6. S. Truex, L. Liu, M.E. Gursoy, L. Yu, and W. Wei. “Demystifying membership inference attacks in machine learning as a service”. IEEE Transactions on Services Computing (TSC). [pdf]
  7. M.E. Gursoy, L. Liu, S. Truex, and L. Yu. “Differentially private and utility-preserving publication of trajectory data”. IEEE Transactions on Mobile Computing (TMC). [pdf]
  8. A. Inan, M.E. Gursoy, and Y. Saygin. “Sensitivity analysis for non-interactive differential privacy: bounds and efficient algorithms”. IEEE Transactions on Dependable and Secure Computing (TDSC). [pdf]
  9. E. Kaplan, M.E. Gursoy, M.E. Nergiz, and Y. Saygin. “Known sample attacks on relation preserving data transformations”. IEEE Transactions on Dependable and Secure Computing (TDSC). [pdf]
  10. M.E. Gursoy, A. Inan, M.E. Nergiz, and Y. Saygin. “Differentially private nearest neighbor classification”. Data Mining and Knowledge Discovery, 31 (5), 1544-1575. [pdf]
  11. E. Kaplan, M.E. Gursoy, M.E. Nergiz, and Y. Saygin. “Location disclosure risks of releasing trajectory distances”. Data and Knowledge Engineering (DKE). [pdf]
  12. M.E. Gursoy, A. Inan, M.E. Nergiz, and Y. Saygin. “Privacy-preserving learning analytics: challenges and techniques”. IEEE Transactions on Learning Technologies (TLT), 10 (1), 68-81. [pdf]
  13. I. Ozalp, M.E. Gursoy, M.E. Nergiz, and Y. Saygin. “Privacy-preserving publishing of hierarchical data”. ACM Transactions on Privacy and Security (TOPS), 19 (3), 7. [pdf]

Conference and Workshop Publications

  1. A. Atabek, E. Eralp, and M.E. Gursoy. “Trust, privacy and security aspects of bias and fairness in machine learning”. 2023 IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA 2023). [pdf]
  2. E. Guner, and M.E. Gursoy. “Learning Markov chain models from sequential data under local differential privacy”. 28th European Symposium on Research in Computer Security (ESORICS 2023). [pdf] Acceptance rate: ~18%
  3. E. Alptekin, and M.E. Gursoy. “Building quadtrees for spatial data under local differential privacy”. 37th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2023). [pdf]
  4. Z.S. Kaya, and M.E. Gursoy. “On the effectiveness of re-identification attacks and local differential privacy-based solutions for smart meter data”. 20th International Conference on Security and Cryptography (SECRYPT 2023). [pdf]
  5. P. Erbil, and M.E. Gursoy. “Defending against targeted poisoning attacks in federated learning”. 2022 IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA 2022). [pdf]
  6. A. Kara*, N. Koprucu*, and M.E. Gursoy. “Beta poisoning attacks against machine learning models: extensions, limitations and defenses”. 2022 IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA 2022). [pdf] (* = equal contribution)
  7. P. Erbil, and M.E. Gursoy. “Detection and mitigation of targeted data poisoning attacks in federated learning”. 20th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2022). [pdf]
  8. B. Ataseven, A. Madani, B. Semiz, and M.E. Gursoy. “Physical activity recognition using deep transfer learning with convolutional neural networks”. 20th IEEE International Conference on Pervasive Intelligence and Computing (PICom 2022). [pdf]
  9. S. Truex, L. Liu, M.E. Gursoy, W. Wei, and K-H. Chow. “The TSC-PFed architecture for privacy-preserving FL”. 2021 IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA 2021). [pdf]
  10. B. Semiz, M.E. Gursoy, Md.M.H. Shandhi, L. Orlandic, V.J. Mooney, and O.T. Inan. “Automatic subject identification using scale-based ballistocardiogram signals”. 10th EAI International Conference on Wireless Mobile Communication and Healthcare (MobiHealth 2021). [pdf]
  11. M.E. Gursoy, V. Rajasekar, and L. Liu. “Utility-optimized synthesis of differentially private location traces”. 2020 IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA 2020). [pdf]
  12. W. Wei, L. Liu, M. Loper, K-H. Chow, M.E. Gursoy, S. Truex, and Y. Wu. “Adversarial deception in deep learning: analysis and mitigation”. 2020 IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA 2020). [pdf]
  13. K-H. Chow, L. Liu, M. Loper, J. Bae, M.E. Gursoy, S. Truex, W. Wei, and Y. Wu. “Adversarial objectness gradient attacks in real-time object detection systems”. 2020 IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA 2020). [pdf]
  14. V. Tolpegin, S. Truex, M.E. Gursoy, and L. Liu. “Data poisoning attacks against federated learning systems”. 25th European Symposium on Research in Computer Security (ESORICS 2020). [pdf] Acceptance rate: 19.6%
  15. W. Wei, L. Liu, M. Loper, K-H. Chow, M.E. Gursoy, S. Truex, and Y. Wu. “A framework for evaluating client privacy leakages in federated learning”. 25th European Symposium on Research in Computer Security (ESORICS 2020). [pdf] Acceptance rate: 19.6%
  16. K-H. Chow, L. Liu, M.E. Gursoy, S. Truex, W. Wei, and Y. Wu. “Understanding object detection through an adversarial lens”. 25th European Symposium on Research in Computer Security (ESORICS 2020). [pdf] Acceptance rate: 19.6%
  17. S. Truex, L. Liu, K-H. Chow, M.E. Gursoy, and W. Wei. “LDP-Fed: Federated learning with local differential privacy”. 2020 ACM International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2020). [pdf] Best Paper Award!
  18. W. Wei, L. Liu, M. Loper, K-H. Chow, M.E. Gursoy, S. Truex, and Y. Wu. “Cross-layer strategic ensemble defense against adversarial examples”. 2020 International Conference on Computing, Networking and Communications (ICNC 2020). [pdf]
  19. S. Truex, L. Liu, M.E. Gursoy, W. Wei, and L. Yu. “Effects of differential privacy and data skewness on membership inference vulnerability”. 2019 IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS 2019). [pdf]
  20. L. Yu, L. Liu, C. Pu, K-H. Chow, M.E. Gursoy, S. Truex, H. Min, A. Iyengar, G. Su, Q. Zhang, and D. Dillenberger. “GRAHIES: Multi-scale graph representation learning with latent hierarchical structure”. 2019 IEEE International Conference on Cognitive Machine Intelligence (CogMI 2019). [pdf]
  21. V. Krishnamurthy, K. Nezafati, J. Bae, M.E. Gursoy, M. Zhong, and V. Singh. “Classification of driving behavior events utilizing kinematic classification and machine learning for down sampled time series data”. 2019 International Workshop in Big Data for Intelligent Transportation Systems (BITS 2019). [pdf]
  22. L. Liu, W. Wei, K-H. Chow, M. Loper, M.E. Gursoy, S. Truex, and Y. Wu. “Deep neural network ensembles against deception: ensemble diversity, accuracy and robustness”. 2019 IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS 2019). [pdf]
  23. L. Yu, L. Liu, C. Pu, M.E. Gursoy, and S. Truex. “Differentially private model publishing for deep learning”. 2019 IEEE Symposium on Security and Privacy (S&P 2019). [pdf] Acceptance rate: 12%
  24. M.E. Gursoy, L. Liu, S. Truex, L. Yu, and W. Wei. “Utility-aware synthesis of differentially private and attack-resilient location traces”. 2018 ACM Conference on Computer and Communications Security (CCS 2018). [pdf] Acceptance rate: 16.6%
  25. E. Yigitoglu, M.E. Gursoy, L. Liu, M. Loper, B. Bamba, and K. Lee. “PrivacyZone: A novel approach to protecting location privacy of mobile users”. 2018 IEEE International Conference on Big Data (BigData 2018). [pdf] Acceptance rate: 19.7%
  26. S. Truex, L. Liu, M.E. Gursoy, and L. Yu. “Privacy-preserving inductive learning with decision trees”. 2017 IEEE International Congress on Big Data (BigData Congress 2017). [pdf]
  27. E. Esmerdag, M.E. Gursoy, A. Inan, and Y. Saygin. “Explode: An extensible platform for differentially private data analysis”. 16th IEEE International Conference on Data Mining (ICDM 2016). [pdf] Demo track
  28. A. Inan, M.E. Gursoy, E. Esmerdag, and Y. Saygin. “Graph-based modelling of query sets for differential privacy”. 28th International Conference on Scientific and Statistical Database Management (SSDBM 2016). [pdf]
  29. M.T. Garip, M.E. Gursoy, P. Reiher, and M. Gerla. “Congestion attacks to autonomous cars using vehicular botnets”. NDSS Workshop on Security of Emerging Networking Technologies (SENT 2015). [pdf]
  30. M.T. Garip, M.E. Gursoy, P. Reiher, and M. Gerla. “Scalable reactive vehicle-to-vehicle congestion avoidance mechanism”. In Proceedings of the 12th Annual Consumer Communications and Networking Conference (CCNC 2015), presented in the International Workshop on Vehicular Networking and Intelligent Transportation Systems (VENITS 2015). [pdf]

Patents

  1. M.E. Gursoy and A. Tamersoy. “Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP)”. US Patent 10,795,999 (granted).
  2. M.E. Gursoy and A. Tamersoy. “Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP)”. US Patent 10,789,363 (granted).
  3. V. Krishnamurthy and M.E. Gursoy. “Driver scoring and safe driving notifications”. US Patent 10,556,596 (granted).

Ph.D. Dissertation

  1. M.E. Gursoy. “Privacy-preserving data collection and sharing in modern mobile internet systems”. Ph.D. Dissertation, Georgia Institute of Technology. [pdf]