Skip to main content

Computer Science

Photo of Prof Anne Kayem

Prof Anne Kayem

Associate Professor in Cyber-Security (E&R)

 A.V.Kayem@exeter.ac.uk

 (Streatham) 3600

 01392 723600


Overview

I am an Associate Professor in Cyber-Security and lead of the Privacy AnaLytics (PAL) Group. I hold a PhD in Computer Science obtained from Queen's University, Canada in 2009.

Research Interests

  • Privacy Analytics
  • Usable (Human-Centered) Security and Privacy
  • Green-IT Security/Privacy
  • Security Education 

Research Overview

In line with my research interests, I study various problems that fall under the banner of privacy analytics. My main goal is to design algorithms and models to analyse data to determine whether or not privacy violating information exists therein. This is especally important in enabling privacy preserving data analytics and/or machine learning. I also study issues related to usability, education, and energy efficiency in relation to designing computational and human-centered privacy solutions. 

More information can be accessed here.

Research Openings

We have openings for PhDs, and Research/Student Assistants. If you are interested in and passionate about working with us, please feel free to contact me

You might also find it useful to look at the following funding resources such as EPSRC DTP, and Commonwealth Scholarships, and contact me to discuss developing a proposal.

Back to top


Publications

Copyright Notice: Any articles made available for download are for personal use only. Any other use requires prior permission of the author and the copyright holder.

| 2024 | 2023 | 2022 | 2021 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2008 | 2007 |

2024

2023

2022

2021

2019

2018

2017

2016

2015

2014

2013

  • Kayem AVDM, Meinel C. (2013) Foreword, Technische Berichte des Hasso-Plattner-Instituts fur Softwaresystemtechnik an der Universitat Potsdam, volume 63.
  • Adamatzky A, Kayem AVDM. (2013) Biological evaluation of Trans-African highways, EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, volume 215, no. 1, pages 49-59, DOI:10.1140/epjst/e2013-01714-6. [PDF]
  • Ssembatya R, Kayem A, Marsden G. (2013) On the Challenge of Adopting Standard EHR Systems in Developing Countries, PROCEEDINGS OF THE 3RD ACM SYMPOSIUM ON COMPUTING FOR DEVELOPMENT (ACM DEV 2013). [PDF]

2012

  • Adamatzky A, Akl S, Alonso-Sanz R, van Dessel W, Ibrahim Z, Ilachinski A, Jones J, Kayem AVDM, Martinez GJ, de Oliveira P. (2012) Are motorways rational from slime mould's point of view?, DOI:10.48550/arxiv.1203.2851.
  • Adamatzky A, Kayem AVDM. (2012) Trans-African highways, Bioevaluation of World Transport Networks, 19-46, DOI:10.1142/9789814407045_0003.
  • Adamatzky A, Akl SG, Alonso-Sanz R, Van Dessel W, Ibrahim Z, Ilachinski A, Jones J, Kayem AVDM, Martínez GJ, De Oliveira PPB. (2012) Biorationality of motorways, Bioevaluation of World Transport Networks, 309-326, DOI:10.1142/9789814407045_0018.
  • Kayem AVDM, Deshai A, Hammer S. (2012) On Anonymizing Social Network Graphs, 2012 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA). [PDF]
  • Adamatzky A, Akl S, Alonso-Sanz R, Dessel WV, Ibrahim Z, Ilachinski A, Jones J, Kayem AVDM, Martinez GJ, Oliveira PD. (2012) Are motorways rational from slime mould's point of view?. [PDF]

2011

2010

2008

2007

Back to top


Further information

INTRICATE-SEC 2024

The 11th International Workshop on Privacy and Security Intricacies on the Web (INTRICATE-SEC 2024), Kitakyushu International Convention Center, Kitakyushu, Japan (April 17 to April 19, 2024)

Call for Papers...

This edition of INTRICATE-SEC is centered on Web Security and Privacy, and will be held in conjunction with the 38th IEEE International Conference on Advanced Information Networking and Applications (AINA-2024) as part of The Workshops of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024)

The workshop focuses on Security and Privacy Solutions, Designs and Considerations for digital environments. We are especially interested in work-in-progress papers show casing experiences in implementing security/privacy solutions and/or designs, as well as survey papers discussing current challenges and considerations around issues such as safety, privacy, and security. Workshop participants will have access to activities in the main conference such as regular presentations, and keynote addresses. 

Topics...

Prospective authors are invited to submit papers on the following topics (not exhaustive):

  • Authentication and Anonymisation 
  • Digital Privacy 
  • User Privacy and Security - Models, Beliefs, and Perceptions 
  • Privacy Metrics and Control 
  • Privacy Enhancing Models and Technologies 
  • Security and Privacy in Cloud Computing 
  • Security Awareness and Education 
  • Security Architecture Design 
  • Security frameworks, Architectures, and Protocols 
  • Threat Awareness 
  • Vulnerability Analysis and Countermeasures 
  • Identity and Trust Management 
  • Security, Privacy, and Trust in Low-Powered Network Systems 
  • Machine Learning in Security and Privacy 
Workshop Chairs 
  • Anne Kayem (Hasso-Plattner-Institute, Germany; & University of Exeter, UK) 
  • Christoph Meinel (Hasso-Plattner-Institute, Potsdam, Germany) 
Program Committee 
  • Stephen Marsh (University of Ontario Institute of Technology, Canada) 
  • Zeyar Aung (Masdar Institute of Science and Technology, UAE) 
  • Cheng Feng (Hasso-Plattner-Institute, Potsdam, Germany) 
  • Dieter Hutter (DFKI GmbH, Germany) 
  • Zekeriya Erkin (Delft University of Technology, Netherlands) 
  • Ingo Stengel (University of Applied Sciences Karlsruhe, Germany) 
  • Anesu Marufu (F-Secure, South Africa) 
  • Aderonke Sakpere (University of Ibadan, Nigeria) 
  • ... To be completed... 
Submission Procedure 

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with published proceedings. Duplications or overlap with other published or submitted papers will be considered as grounds for rejection.

Papers should be submitted in Portable Document Format (PDF) only and may not be longer than 10 pages, Springer style (including references). However, authors can add up to 2 extra pages with the appropriate fee payment. Templates and submission instructions are available here. When you are ready to submit, please use the following link which will direct you to (Workshop-INTRICATE-SEC-2024: The 11-th International Workshop on the Theories and Intricacies of Information Security problems (INTRICATE-SEC-2024)). At least one author of each accepted paper must register and present the paper.

If you encouter problems submitting, please send an email to Leonard Barolli (barolli@fit.ac.jp). General questions regarding the workshop can be addressed to Anne Kayem.

Important Dates... 

  • Paper Submission Deadline (Extended): December 1, 2023 December 20, 2023 
  • Author Notification: January 20, 2024 
  • Final Manuscript Due: February 5, 2024 
  • Author Registration: February 5, 2024 
  • Conference Dates: April 17 - 19, 2024 

© INTRICATE-SEC 2024. All rights reserved.

PAL Research Group

Privacy AnaLytics (PAL) Research Group

Current Projects

In line with my research interests, I study various problems that fall under the banner of privacy analytics. My main goal is to design algorithms and models to analyse data to determine whether or not privacy violating information exists therein. This is especally important in enabling privacy preserving data analytics and/or machine learning. I also study issues related to usability, education, and energy efficiency in relation to designing computational and human-centered privacy solutions.

Auto-PII: Automated PII Discovery in Mesh Data

We (Rakibul Islam, Hasan Shahriar, Abrar Kamal, Igor Fialko, Imtiaz Ahmed, and Prof A. Kayem) are working with Cimpress GmbH to develop efficient and accurate machine learning models to enable discovering personal identifying information in data meshes. Publications available on DBLP

Algorithms, Code, and Data:

 

Sec-Edu: Security Education and Usability

Working with Igor Fialko, Tim Depping, and Johannes Klemm, my goal in this project is to design a suite of security/privacy education tools to assess effectiveness in raising user awareness on security/privacy pitfalls in the digital environment. This project is funded by the HPI foundation.

Algotihms, Code, and Data:

Recent Past Project - Highlights

Quasi-Identifier Discovery in High Dimensional Data

Here, our (Dr. N.J. Podlesny (PhD Thesis) and Prof. A. Kayem) focus was on designing efficient algorithms to enable quasi-identifier discovery in large high dimensional data. Application areas for this work include genome data, health data, and online shopping data. Publications available on DBLP.

Algorithms, Code, and Data:

Back to top