{"id":114,"date":"2022-08-25T22:54:50","date_gmt":"2022-08-25T22:54:50","guid":{"rendered":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/?page_id=114"},"modified":"2024-09-30T01:56:22","modified_gmt":"2024-09-30T01:56:22","slug":"publications","status":"publish","type":"page","link":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<div class=\"CjVfdc\">(Students that I advised or co-advised are marked by *)<\/div>\n<div class=\"CjVfdc\">\n<div class=\"PPhIP rviiZ\"><\/div>\n<\/div>\n<div class=\"CjVfdc\"><strong>Refereed Journals<\/strong><\/div>\n<ol class=\"n8H08c BKnRcf\">\n<li>Alian Yu*, Jian Kang*, Wei Jiang, <strong>Dan Lin<\/strong>, &#8220;Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments&#8221;, IEEE Transactions on Dependable and Secure Computing (<strong>TDSC<\/strong>), 2024. (Impact Factor = 7.329)<\/li>\n<li>Alian Yu*, Jian Kang*, Joshua Morris*, Elisa Bertino, <strong>Dan Lin<\/strong>, &#8220;Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware&#8221;, IEEE Transactions on Dependable and Secure Computing (<strong>TDSC<\/strong>), 2024.<\/li>\n<li>Ke Li*, Cameron Baird*, <strong>Dan Lin<\/strong>, &#8220;<a href=\"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-content\/uploads\/sites\/180\/2022\/11\/Defend-Data-Poisoning-Attacks-on-Voice-Authentication.pdf\">Defend Data Poisoning Attacks on Voice Authentication<\/a>&#8220;, IEEE Transactions on Dependable and Secure Computing (<strong>TDSC<\/strong>), 2023. (Impact Factor = 7.329)<\/li>\n<li>Chaoquan Cai*, <strong>Dan Lin<\/strong>, &#8220;<a href=\"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-content\/uploads\/sites\/180\/2022\/10\/findanotherme.pdf\">Find Another Me Across the World &#8211; Large-scale Semantic Trajectory Analysis Using Spark<\/a>&#8220;, IEEE Transactions on Knowledge and Data Engineering (<strong>TKDE<\/strong>), 2022.\u00a0 (Impact Factor=6.977)<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jian Kang*, and <strong>Dan Lin<\/strong>, &#8220;<a href=\"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-content\/uploads\/sites\/180\/2022\/11\/DASH___TIST.pdf\">Highly Efficient Traffic Planning for Autonomous Vehicles to Cross Intersections without a Stop<\/a>&#8220;, IEEE Transactions on Intelligent Transportation Systems (<strong>TITS<\/strong>), 2022.\u00a0 (Impact Factor = 9.936)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">Tao Jiang, Bin Zhang, <strong>Dan Lin<\/strong>, Yunjun Gao, Qing Li, &#8220;Efficient parallel processing of high-dimensional spatial kNN queries&#8221;, Soft Computing, 2022. (Impact Factor=3.732)<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Joshua Morris*, Sara Newman*, Kannappan Palaniappan, Jianping Fan, and <strong>Dan Lin<\/strong>, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-content\/uploads\/sites\/180\/2022\/10\/Do_You_Know_You_Are_Tracked_by_Photos_That_You_Didnt_Take_Large-Scale_Location-Aware_Multi-Party_Image_Privacy_Protection.pdf\" target=\"_blank\" rel=\"noopener\">Do You Know You Are Tracked by Photos That You Didn&#8217;t Take: Location-Aware Multi-Party Image Privacy Protection<\/a><\/span>&#8220;, IEEE Transactions on Dependable and Secure Computing (<strong>TDSC<\/strong>), 2021. (Impact Factor = 7.329)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Danlu Liu, Yu Li, William Baskett, <strong>Dan Lin<\/strong>, Chi-Ren Shyu, &#8220;RHPTree-Risk Hierarchical Pattern Tree for Scalable Long Pattern Mining&#8221;, ACM Transactions on Knowledge Discovery from Data (<strong>TKDD<\/strong>), 2021. (Impact Factor = 2.01)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Dalton Cole*, Sara Newman*, <strong>Dan Lin<\/strong>, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"https:\/\/drive.google.com\/file\/d\/1EgzrXX5QvReTAN2Fb0YAC2oxCwwDn2C9\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">A New Facial Authentication Pitfall and Remedy in Web Services<\/a><\/span>&#8220;, IEEE Transactions on Dependable and Secure Computing (<strong>TDSC<\/strong>), 2021. (Impact Factor = 7.329)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Tao Jiang, Bin Zhang, <strong>Dan Lin<\/strong>, Yunjun Gao, Li Qing, &#8220;Efficient column-oriented processing for mutual subspace skyline queries&#8221;, Soft Computing, 2020. (Impact factor = 3.643).<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jian Kang*, Doug Steiert*, <strong>Dan Lin<\/strong>, and Yanjie Fu, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"https:\/\/drive.google.com\/file\/d\/1pYhUJShW3qq_v4NcX6kyXLvIGWeqS1It\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">MoveWithMe: Location Privacy Preservation for Smartphone Users<\/a><\/span>&#8220;, IEEE Transactions on Information Forensics &amp; Security (<strong>TIFS<\/strong>), 2020. (Impact Factor = 7.178)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><strong>Dan Lin<\/strong>, Douglas Steiert*, Joshua Morris*, Anna Squicciarini, and Jianping Fan, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"https:\/\/drive.google.com\/file\/d\/1peoN3TJ621pKkh4QMdEwz1tmR8Sp5HeE\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">REMIND: Risk Estimation Mechanism for Images in Network Distribution<\/a><\/span>&#8220;, IEEE Transactions on Information Forensics &amp; Security (<strong>TIFS<\/strong>), 2020. (Impact Factor = 7.178)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Katrina Ward*, <strong>Dan Lin<\/strong>, Sanjay Madria, &#8220;A Parallel Algorithm For Anonymizing Large-Scale Trajectory Data&#8221;, ACM Transactions on Data Science (<strong>TDS<\/strong>), 2020.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Adam Bowers*, Cong Liao, Douglas Steiert*, <strong>Dan Lin<\/strong>, Anna Squicciarini, Ali Hurson, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Ffaculty.missouri.edu%2Flindan%2Fpapers%2FDetectingAnomalousFileTransfer.pdf&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw3fANjsA3v_R9seg25I7FMp\" target=\"_blank\" rel=\"noopener\">Detecting Suspicious File Migration or Replication in the Cloud<\/a><\/span>&#8220;, IEEE Transactions on Dependable and Secure Computing (<strong>TDSC<\/strong>), 2019. (Impact Factor = 7.329)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Douglas McGeehan*, Sanjay Madria, <strong>Dan Lin<\/strong>, &#8220;Effective Social-context based Message Delivery Using ChitChat in Sparse Delay Tolerant Networks&#8221;, Distributed and Parallel Databases, 2019. (Impact Factor = 1.5)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Pengyang Wang, Yanjie Fu, Jiawei Zhang, Xiaolin Li, <strong>Dan Lin<\/strong>, &#8220;Learning Urban Community Structures: A Collective Embedding Perspective with Periodic Spatial-temporal Mobility Graphs&#8221;, ACM Transactions on Intelligent Systems and Technology (<strong>TIST<\/strong>), 2018. (Impact Factor = 2.672)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jian Kang*, <strong>Dan Lin<\/strong>, Wei Jiang, Elisa Bertino, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Ffaculty.missouri.edu%2Flindan%2Fpapers%2FRAU.pdf&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw3NJwGhA1tZoPpTEfUocsE_\" target=\"_blank\" rel=\"noopener\">Highly Efficient Randomized Authentication in VANETs<\/a><\/span>&#8220;, Pervasive and Mobile Computing, 2018. (Impact Factor = 3.453)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, <strong>Dan Lin<\/strong>, Jianping Fan, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Ffaculty.missouri.edu%2Flindan%2Fpapers%2Fcontentsensitivity.pdf&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1p9Kx43WjgMoUSeaF0A1Wc\" target=\"_blank\" rel=\"noopener\">Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing<\/a><\/span>&#8220;, IEEE Transactions on Information Forensics &amp; Security (<strong>TIFS<\/strong>), 2018. (Impact Factor = 7.178)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><strong>Dan Lin<\/strong>, Nicholas Hilbert*, Christian Storer*, Wei Jiang, Jianping Fan, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Ffaculty.missouri.edu%2Flindan%2Fpapers%2FuFace.pdf&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1hnlwV2xfXY2fdYpG2pwWE\" target=\"_blank\" rel=\"noopener\">UFace: Your Universal Password That No One Can See<\/a><\/span>&#8220;, Computer &amp; Security, 2017. (Impact Factor = 4.438)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jingwei Li, Adam Bowers*, <strong>Dan Lin<\/strong>, Peng Jiang, Wei Jiang, &#8220;PAS: Policy-based Assistance in Sensor Networks&#8221;, Computing, 2017. (Impact Factor= 2.22)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jianping Fan, Zhenzhong Kuang, Baopeng Zhang, Jun Yu, <strong>Dan Lin<\/strong>, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Ffaculty.missouri.edu%2Flindan%2Fpapers%2Fiprivacy.pdf&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw2fygG5A8Cr7zdXSjq6gSvb\" target=\"_blank\" rel=\"noopener\">iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning<\/a><\/span>&#8220;, IEEE Transactions on Information Forensics and Security (<strong>TIFS<\/strong>), 2016. (Impact Factor = 7.178)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><strong>Dan Lin<\/strong>, Anna Cinzia Squicciarini, Venkata Nagarjuna Dondapati*, Smitha Sundareswaran, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Ffaculty.missouri.edu%2Flindan%2Fpapers%2Fcloudbroker-journal.pdf&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw3Z8zRI_aZeu6eni8omWO9g\" target=\"_blank\" rel=\"noopener\">A Cloud Brokerage Architecture for Efficient Cloud Service Selection<\/a><\/span>&#8220;, IEEE Transactions on Services Computing (<strong>TSC<\/strong>), 2016. (Impact Factor = 8.216)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><strong>Dan Lin<\/strong>, Jian Kang*, Anna Squicciarini, Yingjie Wu, Sashi Gurung, and Ozan Tonguz, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Ffaculty.missouri.edu%2Flindan%2Fpapers%2Fmozo_journalTMC2016_final.pdf&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw3GqHXkUjBX8kVij_t2mNEB\" target=\"_blank\" rel=\"noopener\">MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs<\/a><\/span>&#8220;, IEEE Transactions on Mobile Computing (<strong>TMC<\/strong>), 2016. (Impact Factor = 7.9)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jingwei Li*, <strong>Dan Lin<\/strong>, Anna Squicciarini, Jin Li and Chunfu Jia, &#8220;Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds&#8221;, IEEE Transactions on Cloud Computing (<strong>TCC<\/strong>), 2016. (Impact Factor = 6.5)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jingwei Li*, Anna Squicciarini, <strong>Dan Lin<\/strong>, Smitha Sundareswaran, and Chunfu Jia, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Ffaculty.missouri.edu%2Flindan%2Fpapers%2FMMB-tree.pdf&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1e5YI--4J29HrfOhXct9bU\" target=\"_blank\" rel=\"noopener\">MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection<\/a><\/span>&#8220;, Transactions on Dependable and Secure Computing (<strong>TDSC<\/strong>), 2016. (Impact Factor = 7.329)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Tao Jiang, Bing Zhang, <strong>Dan Lin<\/strong>, Yunjun Gao and Qing Li, &#8220;Incremental evaluation of top-k combinatorial metric skyline query&#8221;, Knowledge-Based Systems, volume 74, pages 89-105, 2015. (Impact Factor=8.038)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Sushama Karumanchi*, Anna Squicciarini, <strong>Dan Lin<\/strong>, &#8220;Attribute-Based Access Control in Vehicular Ad-hoc Networks&#8221;, Telecommunication Systems Journal, Springer, 2015. (Impact Factor = 2.314)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Anna Squicciarini, <strong>Dan Lin<\/strong>, Smitha Sundareswaran*, and Josh Wede, &#8220;Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites&#8221;, IEEE Transactions on Knowledge and Data Engineering (<strong>TKDE<\/strong>), 2014. (Impact Factor=6.977)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Lasanthi Heendaliya*, <strong>Dan Lin<\/strong>, and Ali Hurson, &#8220;Continuous Predictive Line Queries for On-the-go Traffic Estimation&#8221;, Transactions on Large-Scale Data and Knowledge-Centered Systems, 2014.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Sashi Gurung*, <strong>Dan Lin<\/strong>, Wei Jiang, Ali Hurson, and Rui Zhang, &#8220;Traffic Information Publication with Privacy Preservation&#8221;, ACM Transactions on Intelligent Systems and Technology (<strong>TIST<\/strong>), 2014. (Impact Factor = 2.672)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Tao Jiang, Yunjun Gao, Bin Zhang, <strong>Dan Lin<\/strong>, and Qing Li, &#8220;Monochromatic and Bichromatic Mutual Skyline Queries&#8221;, Expert Systems with Applications, 2015. (Impact Factor = 6.954)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Anna Squicciarini, <strong>Dan Lin<\/strong>, Sushama Karumanchi*, and Nicole Desisto, &#8220;Identifying Hidden Social Circles for Advanced Privacy Configuration&#8221;, Computers &amp; Security, 2014. (Impact Factor = 4.438)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><strong>Dan Lin<\/strong>, Prathima Rao*, Rodolfo Ferrini, Elisa Bertino, Jorge Lobo, &#8220;A Similarity Measure for Comparing XACML Policies&#8221;, IEEE Transactions on Knowledge and Data Engineering (<strong>TKDE<\/strong>), 2012. (Impact Factor=6.977)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Lasanthi Heendaliya*, <strong>Dan Lin<\/strong>, Ali Hurson, , &#8220;Predictive Line Queries for Traffic Forecasting&#8221;, Transactions on Large-Scale Data and Knowledge-Centered Systems, 2012.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Anna Squicciarini, Smitha Sundareswaran*, <strong>Dan Lin<\/strong>, and Shuo Huang, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Ffaculty.missouri.edu%2Flindan%2Fpapers%2Finformationleakage_cloud.pdf&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw2ZaR-vo3fttwewEt6qNlNl\" target=\"_blank\" rel=\"noopener\">Ensuring Distributed Accountability for Data Sharing in the Cloud<\/a><\/span>&#8220;, in IEEE Transactions on Dependable and Secure Computing (<strong>TDSC<\/strong>),2012. (Impact Factor = 7.329)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Rui Zhang, Jiangzhong Qi, <strong>Dan Lin<\/strong>, Wei Wang, Raymond Wong, &#8220;A Highly Optimized Algorithm for Continuous Intersection Join Queries over Moving Objects&#8221;, <strong>VLDB<\/strong> Journal, 2011. (Impact Factor = 2.868)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Prathima Rao*, <strong>Dan Lin<\/strong>, Elisa Bertino, Ninghui Li, Jorge Lobo, &#8220;Fine-Grained Integration of Access Control Policies&#8221; Computer &amp; Security, 2011. (Impact Factor = 4.438)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Alex Hindle, Jie Shao, <strong>Dan Lin<\/strong>, Jiaheng Lu, Rui Zhang, &#8220;Clustering Web Video Search Results based on Integration of Multiple Features&#8221;, World Wide Web Journal (<strong>WWWJ<\/strong>), 2011. (Impact Factor = 2.716)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><strong>Dan Lin<\/strong>, Prathima Rao*, Elisa Bertino, Ninghui Li, Jorge Lobo, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Ffaculty.missouri.edu%2Flindan%2Fpapers%2Fexam.pdf&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw2vCaMyGonY-siJMR0k0AOI\" target=\"_blank\" rel=\"noopener\">EXAM &#8211; A Comprehensive Environment for the Analysis of Access Control Policies<\/a><\/span>&#8220;, International Journal of Information Security, 2010. (Impact Factor = 1.988)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><strong>Dan Lin<\/strong>, Elisa Bertino, Reynold Cheng, Sunil Prabhakar, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Ffaculty.missouri.edu%2Flindan%2Fpapers%2Flocationprivacy.pdf&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw182LkMlGmhJRq7UjrQcoe8\" target=\"_blank\" rel=\"noopener\">Location Privacy in Moving-Object Environments<\/a><\/span>&#8221; , Transactions on Data Privacy, Vol(2):1, pages: 21 &#8211; 46, 2009. (Impact Factor = 1.1)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Elisa Bertino, Carolyn Brodie, Seraphin Calo, Lorrie Cranor, Clare-Marie Karat, John Karat, Ninghui Li, <strong>Dan Lin<\/strong>, Jorge Lobo, Qun Ni, Prathima Rao, and Xiping Wang, &#8220;Analysis of Privacy and Security Policies&#8221;, IBM Systems Journal, 2009. (Impact Factor = 1.266)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Christian S. Jensen, <strong>Dan Lin<\/strong>, and Beng Chin Ooi, &#8220;Continuous Clustering of Moving Objects&#8221;, IEEE Transactions on Knowledge and Data Engineering (<strong>TKDE<\/strong>), 2007. (Impact Factor=6.977)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><strong>Dan Lin<\/strong>, Rui Zhang, Aoying Zhou, &#8220;Indexing Fast Moving Objects for KNN Queries Based on Nearest Landmarks&#8221;, GeoInformatica Journal, 2006. (Impact Factor=2.684)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Bin Cui, <strong>Dan Lin<\/strong>, Kian-Lee Tan, &#8220;IMPACT: A Twin-index Framework for Efficient Moving Object Query Processing&#8221;, Data &amp; Knowledge Engineering (<strong>DKE<\/strong>), 2005. (Impact Factor=1.992)<\/p>\n<\/li>\n<\/ol>\n<div id=\"h.fa9zf3i15x0y\" class=\"CobnVe aP9Z7e\"><\/div>\n<div class=\"CjVfdc\"><strong>Refereed Conferences<\/strong><\/div>\n<ol class=\"n8H08c BKnRcf\">\n<li>Tyler Nicewarner*,\u00a0 Wei Jiang, Aniruddha Gokhale, <strong>Dan Lin, &#8220;<\/strong><a href=\"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-content\/uploads\/sites\/180\/2022\/12\/prevent.pdf\">Provable Privacy Guarantee for Individual Identities and Locations During Virus Contact Tracing<\/a>&#8220;, under submission.<\/li>\n<li>Yu Alian*, Jian Kang, and <strong>Dan Lin<\/strong>, &#8220;AI-Enabled Efficient Traffic Scheduling for Autonomous Vehicles&#8221;, IEEE Consumer Communications &amp; Networking Conference (<strong>CCNC<\/strong>), 2025. (acceptance rate = 34.8%)<\/li>\n<li>Ke Li*, Cameron Baird*, and <strong>Dan Lin<\/strong>, &#8220;Can We Trust Your Voice? Exploring Vulnerabilities in Voice Authentication&#8221;, IEEE Consumer Communications &amp; Networking Conference (<strong>CCNC<\/strong>), 2025. (acceptance rate = 34.8%)<\/li>\n<li>David Gao*, Ian Miller*, Ali Allami*, <strong>Dan Lin<\/strong>, &#8220;Preserving Privacy During Reinforcement Learning With AI Feedback&#8221;, IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (<strong>TPS<\/strong>), 2024.<\/li>\n<li>Tyler Nicewarner*, Alex Esser*, Alian Yu*, <strong>Dan Lin<\/strong>, &#8220;Advanced Privacy-Preserving Data Aggregation for Accurate Traffic Flow Prediction&#8221;, 27th IEEE International Conference on Intelligent Transportation Systems (<strong>ITSC<\/strong>), 2024.<\/li>\n<li>Srikanth Narayanan*, Chaoquan Cai*, <strong>Dan Lin<\/strong>, &#8220;GeoGRCNN: Synthetic Trajectory Generation for Location Privacy Protection&#8221;, IEEE Computers, Software, and Applications Conference (<strong>COMPSAC<\/strong>), 2024.<\/li>\n<li>Jay Barot*, Ali Allami, Yin Ming. <strong>Dan Lin<\/strong>,&#8221;ToneCheck: Unveiling the Impact of Dialects in Privacy Policy&#8221;, ACM symposium on access control models and technologies (<strong>SACMAT<\/strong>), 2024.<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">Tyler Nicewarner*, Alian Yu*, Wei Jiang, <strong>Dan Lin<\/strong>, &#8220;Preserving Location Privacy in the Modern Era of Pervasive Environments&#8221;, IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (<strong>TPS<\/strong>), 2023.<\/li>\n<li>Chaoquan Cai*, Wei Jiang, <strong>Dan Lin<\/strong>, &#8220;<a href=\"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-content\/uploads\/sites\/180\/2023\/06\/social_community_recommendation.pdf\">Social Community Recommendation based on Large-scale Semantic Trajectory Analysis Using Deep Learning<\/a>&#8220;, the 18th International Symposium on Spatial and Temporal Data (<strong>SSTD<\/strong>), 2023.<\/li>\n<li>Jian Kang*, Alian Yu*, Wei Jiang, <strong>Dan Lin<\/strong>, &#8220;FACT: A Flexible Access Control Technique for Very Large Scale Public IoT Services&#8221;, IEEE International Conference on Pervasive Computing and Communications (<strong>Percom<\/strong>), 2023.<\/li>\n<li>Ian Miller*, <strong>Dan Lin, &#8220;<\/strong>Developing Self-evolving Deepfake Detectors Against AI Attacks&#8221;, IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (<strong>TPS<\/strong>), 2022.<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jian Kang*, Alian Yu*, Wei Jiang, <strong>Dan Lin<\/strong>, &#8220;<a href=\"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-content\/uploads\/sites\/180\/2022\/11\/Nwade_ICDCS2022.pdf\">NWADE: A Neighborhood Watch Mechanism for Attack Detection and Evacuation in Autonomous Intersection Management<\/a>&#8220;, 42nd IEEE International Conference on Distributed Computing Systems (<strong>ICDCS<\/strong>), 2022.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Adam Bowers*, Jize Du, <strong>Dan Lin<\/strong>, Wei Jiang, &#8220;<a href=\"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-content\/uploads\/sites\/180\/2022\/11\/asiaccs22.pdf\">Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security<\/a>&#8220;, 17th ACM ASIA Conference on Computer and Communications Security (<strong>AsiaCCS<\/strong>), 2022. (acceptance rate = 18.4%)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Imad Eddine Toubal, Linquan Lyu, <strong>Dan Lin<\/strong>, Kannappan Palaniappan, &#8220;Single View Facial Age Estimation Using Deep Learning with Cascading Random Forests&#8221; (<strong>3rd place winner<\/strong>), The 19th International Conference on Computer Analysis of Images and Patterns (CAIP), 2021.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jian Kang*, <strong>Dan Lin<\/strong>, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"https:\/\/drive.google.com\/file\/d\/1bjkHm7u5baAJVe79DvKRAoeVIrie3mp-\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">DASH: A Universal Intersection Traffic Management System for Autonomous Vehicles<\/a><\/span>&#8220;, IEEE International Conference on Distributed Computing Systems (<strong>ICDCS<\/strong>), 2020. (Rank A by CORE)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Nitish Uplavikar*, Jaideep Vaidya, <strong>Dan Lin<\/strong> and Wei Jiang, &#8220;Privacy-Preserving Friend Recommendation in an Integrated Social Environment&#8221;, 16th International Conference on Information Systems Security, 2020. (acceptance rate = 21%)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jian Kang*, <strong>Dan Lin<\/strong>, Elisa Bertino, Ozan Tonguz, &#8220;From Autonomous Vehicles to Vehicular Clouds: Challenges of Management, Security and Dependability&#8221;, IEEE International Conference on Distributed Computing Systems (<strong>ICDCS<\/strong>), 2019.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Joshua Morris*, <strong>Dan Lin<\/strong>, Anna Squicciarini, &#8220;FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure Degree&#8221; (<strong>Best Paper Award<\/strong>), ACM symposium on access control models and technologies (<strong>SACMAT<\/strong>), 2019.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Dakshak Keerthi Chandra*, Weerdhawal Chowgule*, Yanjie Fu, and <strong>Dan Lin<\/strong>, &#8220;RIPA: Real-time Image Privacy Alert System&#8221;, IEEE International Conference on Collaboration and Internet Computing (<strong>CIC<\/strong>), 2018. (acceptance rate = 26%)<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Wei Jiang, <strong>Dan Lin<\/strong>, Feng Li*, Elisa Bertino, &#8220;<span class=\" aw5Odc\"><a class=\"XqQF9c\" href=\"https:\/\/drive.google.com\/file\/d\/1NZ0-qgowsJGWtGpF7cfwyNe009drdjrm\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">No One Can Track You: Randomized Authentication in Vehicular Ad-hoc Networks<\/a><\/span>&#8220;, IEEE International Conference on Pervasive Computing and Communications (<strong>PerCom<\/strong>), 2017.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jian Kang*, Yousef Elmehdwi and <strong>Dan Lin<\/strong>, &#8220;SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure Reliance&#8221;, 13th International Conference on Security and Privacy in Communication Networks (<strong>SecureComm<\/strong>), 2017.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Anna Squicciarini, Andrea Novelli, <strong>Dan Lin<\/strong>, Haoti Zhong, and Cornelia Caragea, &#8220;From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing&#8221;, Privacy, Security and Trust (<strong>PST<\/strong>), 2017.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Zhenzhong Kuang, Zongmin Li, <strong>Dan Lin<\/strong>, Jianping Fan, &#8220;Automatic Privacy Prediction to Accelerate Social Image Sharing&#8221;. IEEE International Conference on Multimedia Big Data (<strong>BigMM<\/strong>), 2017.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jun Yu, Zhenzhong Kuang, Zhou Yu,<strong> Dan Lin<\/strong>, Jianping Fan, &#8220;Privacy Setting Recommendation for Image Sharing&#8221;, 16th IEEE International Conference on Machine Learning and Applications (<strong>ICMLA<\/strong>), 2017.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Katrina Ward*, <strong>Dan Lin<\/strong> and Sanjay Madria, &#8220;MELT: Mapreduce-based Efficient Large-scale Trajectory Anonymization&#8221;, 29th International Conference on Scientic and Statistical Database Management (<strong>SSDBM<\/strong>), 2017.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Douglas Steiert*, <strong>Dan Lin<\/strong>, Quincy Conduff*, Wei Jiang, &#8220;A Location-Privacy Approach for Continuous Queries&#8221; (Poster), 22th ACM symposium on access control models and technologies (<strong>SACMAT<\/strong>), 2017.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Adam Bowers*, Dan Lin, Anna Squicciarini, Ali Hurson, &#8220;Real-time Detection of Illegal File Transfers in the Cloud&#8221; (Poster), IEEE International Conference on Distributed Computing Systems (<strong>ICDCS<\/strong>), 2017.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Cong Liao, Anna Squicciarini Dan Lin, &#8220;LAST-HDFS: Location-Aware Storage Technique for Hadoop Distributed File System&#8221;, IEEE International Conference on Cloud Computing (<strong>CLOUD<\/strong>) (acceptance rate=16.7%), 2016.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Douglas McGeehan*, Dan Lin, Sanjay Madria, &#8220;ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks&#8221;, 36th IEEE International Conference on Distributed Computing Systems (<strong>ICDCS<\/strong>), 2016.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Lasanthi Heendaliya*, Michael Wisely, Dan Lin, Sahra Sedigh, and Ali Hurson, &#8220;Influence-aware Predictive Density Queries Under Road-network Constraints&#8221;, 14th International Symposium on Spatial and Temporal Databases (<strong>SSTD<\/strong>), 2015.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jingwei Li*, Anna Squicciarini, Dan Lin, Shuang Liang, and Chunfu Jia, &#8220;SecLoc: Securing Location-Sensitive Storage in the Cloud&#8221;, ACM symposium on access control models and technologies (<strong>SACMAT<\/strong>), 2015.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Anna Squicciarini, Dan Lin, Smitha Sundareswaran*, and Jingwei Li, &#8220;Policy Driven Node Selection in MapReduce&#8221;, the 10th International Conference on Security and Privacy in Communication Networks (<strong>SecureComm<\/strong>), 2014.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jingwei Li*, Dan Lin, Anna Squicciarini, and Chunfu Jia, &#8220;STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds&#8221;, the 10th International Conference on Security and Privacy in Communication Networks (<strong>SecureComm<\/strong>), 2014.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Lasanthi Heendaliya*, Dan Lin, and Ali Hurson, &#8220;Continuous Predictive Line Queries under Road-network Constraints&#8221;, the 24th International Conference on Database and Expert Systems Applications (<strong>DEXA<\/strong>), 2013.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Sashi Gurung*, Dan Lin, Anna Squicciarini, and Elisa Bertino, &#8220;Information-oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks&#8221;, the 7th International Conference on Network and System Security (<strong>NSS<\/strong>), 2013.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Sashi Gurung*, Dan Lin, Anna Squicciarini, Ozan Tonguz, &#8220;A Moving Zone Based Architecture for Message Dissemination in VANETs&#8221;, The International Conference on Network and Service Management (<strong>CNSM<\/strong>), 2012.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Sushama Karumanchi*, Anna Squicciarini, Dan Lin, &#8220;Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks&#8221;, The International Conference on Network and System Security (<strong>NSS<\/strong>), 2012.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Anna Squicciarini, Sushama Karumanchi*, Dan Lin, Nicole Desisto, &#8220;Automatic Social Group Organization and Privacy Management&#8221;, The IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (<strong>CollaborateCom<\/strong>), 2012.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Arej Muhammed*, Dan Lin, Anna Squicciarini, &#8220;Location Privacy Policy Management System&#8221;, The International Conference on Information and Communications Security <strong>(ICICS<\/strong>), 2012.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Smitha Sundareswaran*, Anna Squicciarini, Dan Lin, &#8220;A Brokerage-Based Approach for Cloud Service Selection&#8221;, In Proceedings of IEEE International Conference on Cloud Computing (<strong>CLOUD<\/strong>), 2012.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Jianzhong Qi, Rui Zhang, Lars Kulik, Dan Lin, Yuan Xue, &#8220;The Min-dist Location Selection Query&#8221;, In International Conference on Data Engineering (<strong>ICDE<\/strong>), 2012.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Dan Lin, Christian S. Jensen, Rui Zhang, Lu Xiao*, Jiaheng Lu, &#8220;A Moving-Object Index for Efficient Query Processing with Peer-Wise Location Privacy&#8221;, In Proceedings of International Conference on Very Large Data Bases (<strong>VLDB<\/strong>), Istanbul, Turkey,2012.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Lasanthi Heendaliya*, Dan Lin, Ali Hurson, &#8220;Optimizing Predictive Queries on Moving Objects under Road-network Constraints&#8221;, the 22nd International Conference on Database and Expert Systems Applications (<strong>DEXA<\/strong>), 2011.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Smitha Sundareswaran*, Anna Squicciarini, Dan Lin, Shuo Huang, &#8220;Promoting Distributed Accountability in the Cloud&#8221; IEEE International Conference on Cloud Computing (<strong>CLOUD<\/strong>), 2011.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Anna Squicciarini, Dan Lin, Alessandro Mancarella, &#8220;PAIM: Peer-based Automobile Identity Management in Vehicular Ad-hoc Network&#8221;, the 35th IEEE Computer Software and Applications Conference (<strong>COMPSAC<\/strong>), 2011.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Anna Squicciarini, Smitha Sundareswaran*, Dan Lin, Josh Wede, &#8220;A3P: Adaptive Policy Prediction for Shared Images on Content Sharing Sites&#8221; (<strong>Best Paper Award<\/strong>), 22nd ACM Conference on Hypertext and Hypermedia, 2011.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Anna Squicciarini, Smitha Sundareswaran*, Dan Lin, &#8220;Preventing Information Leakage from Indexing in the Cloud&#8221; IEEE International Conference on Cloud Computing (<strong>CLOUD<\/strong>), 2010.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Dan Lin, Anna Squicciarini, &#8220;Data Protection Models for Service Provisioning in the Cloud&#8221;, 15th ACM symposium on access control models and technologies (<strong>SACMAT<\/strong>), 2010.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Dan Lin, Sashi Gurung*, Wei Jiang, and Ali Hurson, &#8220;<a href=\"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-content\/uploads\/sites\/180\/2023\/08\/DASFAA10_conference_78.pdf\">Privacy-Preserving Location Publishing under Road-Network Constraints<\/a>&#8220;, 15th International Conference on Database Systems for Advanced Applications (<strong>DASFAA<\/strong>), 2010.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Chenyun Dai*, Dan Lin, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, and Bhavani Thuraisingham, &#8220;Query Processing Techniques for Compliance with Data Confidence Policies&#8221;, 6th <strong>VLDB<\/strong> Workshop on Secure Data Management, 2009.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Prathima Rao*, Dan Lin, Elisa Bertino, Ninghui Li, and Jorge Lobo, &#8220;An Algebra for Fine-Grained Integration of XACML Policies&#8221;, 14th ACM symposium on access control models and technologies (<strong>SACMAT<\/strong>), France, 2009.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Ninghui Li, Qihua Wang, Wahbeh Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, and Dan Lin, &#8220;Access Control Policy Combining: Theory Meets Practice&#8221;, ACM symposium on access control models and technologies (<strong>SACMAT<\/strong>), France, 2009.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Dan Lin, Elisa Bertino, Reynold Cheng and Sunil Prabhakar, &#8220;Position Transformation: A Location Privacy Protection Method for Moving Objects&#8221;, In Proceedings of ACM GIS Workshop on Security and Privacy, Irvine, CA, USA, 2008.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Su Chen, Christian S. Jensen, and Dan Lin, &#8220;A Benchmark for Evaluating Moving Object Indexes&#8221;, The 34th International Conference on Very Large Data Bases (<strong>VLDB<\/strong>), Auckland, New Zealand, 2008.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Chenyun Dai*, Dan Lin,Elisa Bertino, and Murat Kantarcioglu, &#8221; An Approach to Evaluate Data Trustworthiness Based on Data Provenance&#8221;, The 5th International Workshop on Secure Data Management (<strong>SDM<\/strong>) in conjunction with <strong>VLDB<\/strong>, Auckland, New Zealand, 2008.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Dan Lin, Prathima Rao*, Elisa Bertino, Ninghui Li, and Jorge Lobo, &#8220;Policy Decomposition for Collaborative Access Control&#8221;, ACM Symposium on Access Control Models and Technologies(<strong>SACMAT<\/strong>), Colorado, USA, 2008.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Prathima Rao*, Dan Lin, Elisa Bertino, Jorge Lobo and Ninghui Li, &#8220;EXAM- A Comprehensive Environment for XACML Policy Analysis and Management&#8221; (Demo), In Proceedings of IEEE Workshop on Policies for Distributed Systems and Networks, Palisades, NY, USA, 2008.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Lorenzo D. Martino, Qun Ni, Dan Lin, and Elisa Bertino, &#8220;Multi-domain and Privacy-aware Role Based Access Control in eHealth&#8221;,International Conference on Pervasive Computing Technologies for Healthcare, Tampere, Finland, 2008.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Rui Zhang, Dan Lin, Ramamohanarao Kotagiri, and Elisa Bertino, &#8220;Continuous Intersection Joins Over Moving Objects&#8221;, International Conference on Data Engineering (<strong>ICDE<\/strong>), Cancun, Mexico, 2008.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Qun Ni, Dan Lin, Elisa Bertino, and Jorge Lobo, &#8220;Conditional Privacy-Aware Role Based Access Control&#8221;, European Symposium on Research In Computer Security (<strong>ESORICS<\/strong>), Dresden, Germany, 2007.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Dan Lin, Hicham G. Elmongui, Elisa Bertino, and Beng Chin Ooi, &#8220;Data Management in RFID Applications&#8221;, International Conference on Database and Expert Systems Applications (<strong>DEXA<\/strong>), Regensburg, Germany, 2007.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Dan Lin, Prathima Rao*, Elisa Bertino and Jorge Lobo, &#8220;An Approach to Evaluate Policy Similarity&#8221;, ACM Symposium on Access Control Models and Technologies (<strong>SACMAT<\/strong>), Sophia Antipolis, France, 2007.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Prathima Rao*, Dan Lin, and Elisa Bertino, &#8220;XACML Function Annotations&#8221; (<strong>Best Student Paper<\/strong>), IEEE Workshop on Policies for Distributed Systems and Networks, Bologna, Italy, 2007.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Dan Lin, Bin Cui, &#8220;Optimizing Moving Queries Over Moving Object Data Streams&#8221;, International Conference on Database Systems for Advanced Applications (<strong>DASFAA<\/strong>), Bangkok, Thailand, 2007.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Beng Chin Ooi, Zhiyong Huang, Dan Lin, Hua Lu and Linhao Xu, &#8220;Adapting Relational Database Engine to Accommodate Moving Objects&#8221;(Demo), International Conference on Data Engineering (<strong>ICDE<\/strong>), Istanbul, Turkey, 2007.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Christian S. Jensen, Dan Lin, Beng Chin Ooi, Rui Zhang, &#8220;Effective Density Queries on Continuously Moving Objects&#8221;, International Conference on Data Engineering (<strong>ICDE<\/strong>), Atlanta, USA, 2006.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Dan Lin, Christian S. Jensen, Beng Chin Ooi, Simonas Saltenis, &#8220;Efficient Indexing of the Historical, Present, and Future Positions of Moving Objects&#8221;, International Conference on Mobile Data Management (<strong>MDM<\/strong>), Ayia Napa, Cyprus, 2005.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Bin Cui, Dan Lin, Kian-Lee Tan, &#8220;Towards Optimal Utilization of Main Memory for Moving Object Indexing&#8221;, International Conference on Database Systems for Advanced Applications (<strong>DASFAA<\/strong>), Beijing, China, 2005.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Christian S. Jensen, Dan Lin, Beng Chin Ooi, &#8220;Query and Update Efficient B+-Tree Based Indexing of Moving Objects&#8221;, International Conference on Very Large Data Bases (<strong>VLDB<\/strong>), Toronto, Canada, 2004. [bx-tree code]<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Bo Huang, Zhiyong Huang, Hongga Li, Dan Lin, Hua Lu, Yaxiao Song, &#8220;ITQS: An Integrated Transport Query System &#8220;(Demo) , ACM SIGMOD International Conference on Management of Data (<strong>SIGMOD<\/strong>), Paris, France, 2004.<\/p>\n<\/li>\n<\/ol>\n<div id=\"h.13zoiyu602u8\" class=\"CobnVe aP9Z7e\"><\/div>\n<div class=\"CjVfdc\">\n<div class=\"PPhIP rviiZ\"><\/div>\n<\/div>\n<div class=\"CjVfdc\"><strong>Book Chapters<\/strong><\/div>\n<ol class=\"n8H08c BKnRcf\">\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Lasanthi Heendaliya, Michael Wisely, <strong>Dan Lin<\/strong>, Sarah Sedigh Sarvestani, and Ali Hurson, &#8220;Indexing and Querying Techniques for Moving Objects in Both Euclidean Space and Road Network&#8221;, Advance in Computers, Volume 102, Chapter 4, Pages 111&#8211;169, 2016.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Elisa Bertino, Chenyun Dai, Hyo-Sang Lim, and <strong>Dan Lin<\/strong>, &#8220;High-Assurance Integrity Techniques for Databases&#8221; (invited paper), in proceedings of 25th British National Conference on Database (BNCOD) by Springer in the Lecture Notes in Computer Science (LNCS) series, 2008.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Elisa Bertino, <strong>Dan Lin<\/strong>, and Wei Jiang, &#8220;A Survey of Quantification of Privacy Preserving Data Mining Algorithms&#8221; in Privacy-Preserving Data Mining (Models and Algorithms), Charu C. Aggarwaland Philip S. Yu (Eds.), Springer-Verlag, 2008.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Christian S. Jensen, <strong>Dan Lin<\/strong>, and Beng Chin Ooi, &#8220;Indexing of Moving Objects&#8221;, in Encyclopedia of Geographic Information Science, Shashi Shekha and Hui Xiong (Eds.), Springer-Verlag, 2007.<\/p>\n<\/li>\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\">Christian S. Jensen, <strong>Dan Lin<\/strong>, and Beng Chin Ooi, &#8220;Maximum Update Interval in Moving Objects Databases&#8221;, Encyclopedia of Geographic Information Science, 2008.<\/p>\n<\/li>\n<\/ol>\n<div class=\"CjVfdc\">\n<div class=\"PPhIP rviiZ\"><\/div>\n<\/div>\n<div class=\"CjVfdc\"><strong>Books<\/strong><\/div>\n<ul class=\"n8H08c UVNKR\">\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><strong>Dan Lin<\/strong>, Anna Squicciarini, Daniela Oliveira, &#8220;Cloud Computing Security&#8221;, CRC Press.<\/p>\n<\/li>\n<\/ul>\n<div class=\"CjVfdc\"><strong>Thesis<\/strong><\/div>\n<ul class=\"n8H08c UVNKR\">\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><strong>Dan Lin<\/strong>, &#8220;Indexing and Querying Moving Objects Databases&#8221;, PhD Thesis.<\/p>\n<\/li>\n<\/ul>\n<div class=\"CjVfdc\"><span class=\" jW0mOd\"><strong>Patent<\/strong><\/span><\/div>\n<ul class=\"n8H08c UVNKR\">\n<li class=\"TYR86d wXCUfe zfr3Q\">\n<p class=\"CDt4Ke zfr3Q\" dir=\"ltr\"><strong>Dan Lin<\/strong>, Prathima Rao, Elisa Bertino and Jorge Lobo, &#8220;Method and System to Determine Policy Similarities&#8221;, US8020191B2, 2011.<\/p>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>(Students that I advised or co-advised are marked by *) Refereed Journals Alian Yu*, Jian Kang*, Wei Jiang, Dan Lin, &#8220;Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments&#8221;, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024. (Impact Factor = 7.329) Alian Yu*, Jian Kang*, Joshua Morris*, Elisa Bertino, Dan [&hellip;]<\/p>\n","protected":false},"author":393,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"tags":[],"class_list":["post-114","page","type-page","status-publish","hentry"],"acf":[],"ACF":false,"_links":{"self":[{"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/pages\/114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/users\/393"}],"replies":[{"embeddable":true,"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/comments?post=114"}],"version-history":[{"count":42,"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/pages\/114\/revisions"}],"predecessor-version":[{"id":218,"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/pages\/114\/revisions\/218"}],"wp:attachment":[{"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/media?parent=114"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab.dev.vanderbilt.edu\/lin-iprivacylab\/wp-json\/wp\/v2\/tags?post=114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}