Skip to Main Content

Xiaobai Li

Xiaobai Li
Dr. Xiaobai LiProfessor
  • CollegeManning School of Business
  • DepartmentOperations Informat Systems
  • Phone(978) 934-2707
  • OfficePulichino Tong Business Center - 448
  • EmailXiaobai_Li@uml.edu

Research Interests

Data science, business analytics, data privacy, data mining, information economics, health information systems

Privacy-preserving data mining and publishing, Big Data, text and network data analytics, medical and health informatics, auctions, mechanism design

Education

  • Ph D: Management Science, (1999), University of South Carolina - Columbia, SC
    Dissertation/Thesis Title: Multivariate Decision Trees for Data Mining
  • MBA, (1994), University of New Hampshire - Durham, NH
  • BS: Civil Engineering, (1984), Chongqing University - Chongqing, China

Awards and Honors

  • Teaching Excellence Award (2011) - Operations and Information Systems Department University of Massachusetts Lowell
  • Teaching Excellence Award (2011) - University of Massachusetts Lowell
  • The Best Paper Runner-Up Award (2011) - The 21st Workshop on Information Technologies and Systems (WITS
  • The Second Runner-Up Best Paper Award (2010) - The 31st International Conference on Information Systems (ICIS 2010)
  • The Best Poster Paper Award (2009) - The 8th Workshop on E-Business

Publications

  • Motiwalla, L.F., Li, X. (2016) "Unveiling consumers’ privacy paradox behaviour in an economic exchange," International journal of business information systems 23:3 pp. 307–329
  • Liu, X., Li, X. (2015) "Acquiring High Quality Customer Data with Low Cost," Proceedings of the 14th Workshop on e-Business (WeB 2015)
  • Kartal, H., Li, X. (2015) "Protecting Privacy Against Multiple Record Linkage Attacks," Proceedings of the 25th Annual Workshop on Information Technologies and Systems (WITS 2015)
  • Liu, X., Li, X., Motiwalla, L.F. (2015) "Sharing Patient Disease Data with Privacy Preservation," Proceedings of the 2015 AIS SIGSEC Workshop on Information Security and Privacy (WISP 2015)
  • Li, X., Liu, X., Motiwalla, L.F. (2015) "Valuation of Personal Information," Proceedings of the 36th International Conference on Information Systems (ICIS 2015)
  • Li, X., Raghunathan, S. (2014) "Pricing and disseminating customer data with privacy awareness," Decision Support Systems 59:1 pp. 63-73
  • Motiwalla, L.F., Li, X., Liu, X. (2014) "Privacy Paradox: Does Stated Privacy Concerns Translate into the Valuation of Personal Information?," Proceedings of the 18th Pacific Asia Conference on Information Systems (PACIS 2014)
  • Li, X., Sarkar, S. (2014) "Digression and Value Concatenation to Enable Privacy-Preserving Regression," MIS Quarterly 38:3 pp. 679-698
  • Li, X., Qin, J. (2013) "A framework for privacy-preserving medical document sharing," International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design 1: pp. 142-158
  • Li, X., Sarkar, S. (2013) "Class-restricted clustering and microperturbation for data privacy," Management Science 59:4 pp. 796-812
  • Motiwalla, L.F., Li, X. (2013) "Developing privacy solutions for sharing and analysing healthcare data," International Journal of Business Information Systems 13:2 pp. 199-216
  • Li, X., Zhao, Z., Li, X. (2012) "Evaluation of estimation algorithms - Credibility tests," IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans 42:1 pp. 147-163
  • Li, X., Qin, J. (2012) "Extracting and releasing information from clinical documents with guaranteed privacy," 22nd Workshop on Information Technologies and Systems, WITS 2012 pp. 13-18
  • Li, X., Sarkar, S. (2011) "Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data," Information Systems Research 22:4 pp. 774
  • Li, X., Qin, J. (2011) "De-identification and anonymization for sharing patient medical documents," Proceedings - 21st Workshop on Information Technologies and Systems, WITS 2011 pp. 187-192
  • Li, X., Sarkar, S. (2011) "Protecting privacy against regression attacks in predictive data mining," International Conference on Information Systems 2011, ICIS 2011 4: pp. 2829-2843
  • Li, X., Sarkar, S. (2010) "Data clustering and micro-perturbation for privacy-preserving data sharing and analysis," ICIS 2010 Proceedings - Thirty First International Conference on Information Systems
  • Zhao, M., Li, X., Lang, R. (2010) "Improved adaptive stereo matching using double dynamic programming with correlation of row and column," 2010 2nd International Conference on Signal Processing Systems (ICSPS) pp. V3
  • Li, X. (2009) "A bayesian approach for estimating and replacing missing categorical data," Journal of Data and Information Quality 1:1
  • Zhu, D., Li, X., Wu, S. (2009) "Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining," Decision Support Systems 48:1 pp. 133-140
  • Li, X., Sarkar, S. (2009) "Against Classification Attacks: A Decision Tree Pruning Approach to Privacy Protection in Data Mining," Operations research 57:6 pp. 1496-1509
  • XIAO-BAI, L.I., Motiwalla, L.F. (2009) "For Sale by Owner Online: Who Gets the Saved Commission?," Communications of the ACM 52:2 pp. 110-114
  • Li, X., Jacob, V.S. (2008) "Adaptive data reduction for large-scale transaction data," European Journal of Operational Research 188:3 pp. 910-924
  • Li, X., Sarkar, S. (2008) "Data clustering with confidential class restriction: Regroupement de données avec contraintes de confidentialité," 2008 Workshop on Information Technologies and Systems, WITS 2008 pp. 115-120
  • Li, X., Raghunathan, S. (2008) "Incentive-compatible revelation mechanism for confidential data sharing," 2008 Workshop on Information Technologies and Systems, WITS 2008 pp. 139-144
  • Li, X., Li, X. (2008) "Common fallacies in applying hypothesis testing," 2008 11th International Conference on Information Fusion pp. 1
  • Guo, W., Niu, P., Li, X., Miao, C., Wang, W., Yu, X., Shang, Y., Feng, Z., Tian, G., Li, Y., Liu, Y., Yuan, M., Li, X. (2008) "The design, fabrication and characterization of GaAs-based RTT with groove and self-aligned Schottky gate structure," 2008 9th International Conference on Solid-State & Integrated-Circuit Technology pp. 571
  • Zhu, D., Wu, S., Li, X. (2007) "Identity disclosure protection: Adata reconstruction approach for preserving privacy in data mining," ICIS 2007 Proceedings - Twenty Eighth International Conference on Information Systems
  • Li, X., Sarkar, S. (2006) "Privacy protection in data mining: A perturbation approach for categorical data," Information Systems Research 17:3 pp. 254-270
  • Li, X., Sarkar, S. (2006) "Protecting privacy against re-identification by record linkage," 16th Workshop on Information Technologies and Systems, WITS 2006 pp. 19-24
  • Li, X., Sarkar, S. (2006) "A Tree-Based Data Perturbation Approach for Privacy-Preserving Data Mining," IEEE Transactions on Knowledge & Data Engineering 18:9 pp. 1278-1283
  • Li, X. (2005) "A scalable decision tree system and its application in pattern recognition and intrusion detection," Decision Support Systems 41:1 pp. 112-130
  • Li, X., Sarkar, S. (2005) "Protecting privacy against classification attacks in data mining," 15th Workshop on Information Technology and Systems, WITS 2005 pp. 69-74
  • Li, X., Zhao, Z., Li, X. (2005) "General Model-Set Design Methods for Multiple-Model Approach," IEEE Transactions on Automatic Control 50:9 pp. 1260-1276
  • Li, X., Jiang, R., Wu, Q. (2004) "Cellular Automaton Model Simulating Traffic Flow at an Uncontrolled T-Shaped Intersection," International Journal of Modern Physics B: Condensed Matter Physics; Statistical Physics; Applied Physics 18:17-19 pp. 2703-2707
  • Li, X. (2003) "Adaptive data reduction using genetic algorithms," Proceedings - Annual Meeting of the Decision Sciences Institute pp. 127-132
  • Li, X., Sweigart, J.R., Teng, J.T., Donohue, J.M., Thombs, L.A., Wang, S.M. (2003) "Multivariate Decision Trees Using Linear Discriminants and Tabu Search," IEEE Transactions on Systems, Man & Cybernetics: Part A 33:2 pp. 194-205
  • Li, X., Teng, J., Donohue, J., Thombs, L. (2001) "A Dynamic Programming Based Pruning Method for Decision Trees," INFORMS Journal on Computing 13:4 pp. 332
  • Li, X., Reeves, G.R. (1999) "A multiple criteria approach to data envelopment analysis," European Journal of Operational Research 115:3 pp. 507-517

Presentations

  • - Research Advancement Committee, 2015
  • - The 34th International Conference on Information Systems (ICIS 2013), December 2013 - Milan Italy
  • - The Annual Workshop on Information Technologies and Systems , December 2013 - Milan Italy

Contracts, Fellowships, Grants and Sponsored Research

  • (), Grant - University of Massachusetts, Lowell.
    Li, X.
  • (), Grant - University of Massachusetts, Lowell.
    Li, X.
  • (), - University of Massachusetts, Lowell.
    Li, X.
  • New Technology to Preserve Patient Privacy and Data Quality in Health Research (2011), Grant -
    Li, X. (Principal)
  • New Technology to Preserve Patient Privacy and Data Quality in Health Research (2011), Grant - National Institutes of Health (NIH)
    Li, X., Moticalla, L., Franklin, P., Li, W.
  • New Technology to Preserve Patient Privacy and Data Quality in Health Research (2011), Grant - National Institutes of Health (NIH)
    Li, X.
  • Consumer Electronic Privacy Protection System (2008), Contract - National Science Foundation (NSF)
    Li, X.