Gabriel Ghinita

Orcid: 0000-0002-8372-3006

According to our database1, Gabriel Ghinita authored at least 103 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Supporting secure dynamic alert zones using searchable encryption and graph embedding.
VLDB J., January, 2024

Fair Spatial Indexing: A paradigm for Group Spatial Fairness.
Proceedings of the Proceedings 27th International Conference on Extending Database Technology, 2024

2023
HTF: Homogeneous Tree Framework for Differentially Private Release of Large Geospatial Datasets with Self-tuning Structure Height.
ACM Trans. Spatial Algorithms Syst., December, 2023

A Neural Approach to Spatio-Temporal Data Release with User-Level Differential Privacy.
Proc. ACM Manag. Data, 2023

Holistic Survey of Privacy and Fairness in Machine Learning.
CoRR, 2023

Towards Mobility Data Science (Vision Paper).
CoRR, 2023

VPASS: Voice Privacy Assistant System for Monitoring In-home Voice Commands.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

2022
A Neural Database for Differentially Private Spatial Range Queries.
Proc. VLDB Endow., 2022

Models and Mechanisms for Spatial Data Fairness.
Proc. VLDB Endow., 2022

Mobility Data Science (Dagstuhl Seminar 22021).
Dagstuhl Reports, 2022

Models and Mechanisms for Fairness in Location Data Processing.
CoRR, 2022

Differentially-Private Publication of Origin-Destination Matrices with Intermediate Stops.
Proceedings of the 25th International Conference on Extending Database Technology, 2022

2021
Secure Dynamic Skyline Queries Using Result Materialization.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

HTF: Homogeneous Tree Framework for Differentially-Private Release of Location Data.
Proceedings of the SIGSPATIAL '21: 29th International Conference on Advances in Geographic Information Systems, 2021

An Efficient and Secure Location-based Alert Protocol using Searchable Encryption and Huffman Codes.
Proceedings of the 24th International Conference on Extending Database Technology, 2021

Sharing of Network Flow Data across Organizations using Searchable Encryption.
Proceedings of the 23rd International Conference on Control Systems and Computer Science, 2021

2020
Precision-Enhanced Differentially-Private Mining of High-Confidence Association Rules.
IEEE Trans. Dependable Secur. Comput., 2020

A secure location-based alert system with tunable privacy-performance trade-off.
GeoInformatica, 2020

Dynamic Skyline Queries on Encrypted Data Using Result Materialization.
CoRR, 2020

Differentially-Private Next-Location Prediction with Neural Networks.
Proceedings of the 23rd International Conference on Extending Database Technology, 2020

Enhancing the Performance of Spatial Queries on Encrypted Data Through Graph Embedding.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

2019
AMIS: Programmable Privacy-Preserving Network Measurement for Analysis and Troubleshooting.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Protecting against Inference Attacks on Co-Location Data.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

A Privacy-Preserving, Accountable and Spam-Resilient Geo-Marketplace.
Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2019

A Utility-Preserving and Scalable Technique for Protecting Location Data with Geo-Indistinguishability.
Proceedings of the Advances in Database Technology, 2019

2018
Spatial Anonymity.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Privacy-Preserving Spatial Crowdsourcing Based on Anonymous Credentials.
Proceedings of the 19th IEEE International Conference on Mobile Data Management, 2018

Hybrid Differentially-Private String Matching.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

An Empirical Study of Differentially-Private Analytics for High-Speed Network Data.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Olap Results, Distributed Caching.
Proceedings of the Encyclopedia of GIS., 2017

Differentially Private Location Protection for Worker Datasets in Spatial Crowdsourcing.
IEEE Trans. Mob. Comput., 2017

Privacy-preserving detection of anomalous phenomena in crowdsourced environmental sensing using fine-grained weighted voting.
GeoInformatica, 2017

A Game-Oriented Educational Tool for Location Privacy Topics.
Proceedings of the 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2017

Differentially-Private Big Data Analytics for High-Speed Research Network Traffic Measurement.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Protecting Against Velocity-Based, Proximity-Based, and External Event Attacks in Location-Centric Social Networks.
ACM Trans. Spatial Algorithms Syst., 2016

Processing uncertain spatial data resulting from differentially-private sanitization.
ACM SIGSPATIAL Special, 2016

Differentially-Private Mining of Representative Travel Patterns.
Proceedings of the IEEE 17th International Conference on Mobile Data Management, 2016

Privacy-Preserving Mining of Sequential Association Rules from Provenance Workflows.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2015

Privacy-Preserving Detection of Anomalous Phenomena in Crowdsourced Environmental Sensing.
Proceedings of the Advances in Spatial and Temporal Databases, 2015

PrivGeoCrowd: A toolbox for studying private spatial Crowdsourcing.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Disseminating Location Privacy Threats and Protection Techniques through Capture-the-Flag Games (Vision Paper).
Proceedings of the 2nd Workshop on Privacy in Geographic Information Collection and Analysis, 2015

Reduced Relative Errors for Short Sequence Counting with Differential Privacy.
Proceedings of the 20th International Conference on Control Systems and Computer Science, 2015

Differentially-Private Mining of Moderately-Frequent High-Confidence Association Rules.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Hardware acceleration of Private Information Retrieval protocols using GPUs.
Proceedings of the 26th IEEE International Conference on Application-specific Systems, 2015

2014
Secure kNN Query Processing in Untrusted Cloud Environments.
IEEE Trans. Knowl. Data Eng., 2014

A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing.
Proc. VLDB Endow., 2014

A roadmap for privacy-enhanced secure data provenance.
J. Intell. Inf. Syst., 2014

Guest editorial: location-centric privacy in mobile services.
GeoInformatica, 2014

Differentially Private Location Recommendations in Geosocial Networks.
Proceedings of the IEEE 15th International Conference on Mobile Data Management, 2014

Large-scale frequent subgraph mining in MapReduce.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Towards efficient private spatial information retrieval using GPUs.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

Secure mutual proximity zone enclosure evaluation.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

Privacy-preserving publication of provenance workflows.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Privacy for Location-based Services
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02336-1, 2013

LBSN 2012 workshop report: the Fifth ACM SIGSPATIAL International Workshop on Location-Based Social Networks (Redondo Beach, California - November 6, 2012).
ACM SIGSPATIAL Special, 2013

A privacy-preserving location-based alert system.
Proceedings of the 21st SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2013

Efficient and accurate strategies for differentially-private sliding window queries.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Authenticating spatial skyline queries with low communication overhead.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Privacy-Preserving Enforcement of Spatially Aware RBAC.
IEEE Trans. Dependable Secur. Comput., 2012

Resilient Authenticated Execution of Critical Applications in Untrusted Environments.
IEEE Trans. Dependable Secur. Comput., 2012

A Hybrid Approach to Private Record Matching.
IEEE Trans. Dependable Secur. Comput., 2012

SPRINGL 2011 Workshop Report: the Fourth ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS: (Chicago, Illinois - November 1, 2011).
ACM SIGSPATIAL Special, 2012

Secure sensor network SUM aggregation with detection of malicious nodes.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

A Comparative Evaluation of Private Information Retrieval Techniques in Location-Based Services.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A Lightweight Secure Provenance Scheme for Wireless Sensor Networks.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

2011
Anonymous Publication of Sensitive Transactional Data.
IEEE Trans. Knowl. Data Eng., 2011

Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection.
GeoInformatica, 2011

Access Control for Databases: Concepts and Systems.
Found. Trends Databases, 2011

Privacy-preserving assessment of location data trustworthiness.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

The optimization of situational awareness for insider threat detection.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Enabling search services on outsourced private spatial data.
VLDB J., 2010

A reciprocal framework for spatial K-anonymity.
Inf. Syst., 2010

Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

Privacy-preserving matching of spatial datasets with protection against background knowledge.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010

Private record matching using differential privacy.
Proceedings of the EDBT 2010, 2010

Privacy-preserving similarity measurement for access control policies.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations.
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010

Controlling data disclosure in computational PIR protocols.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Spatial Anonymity.
Proceedings of the Encyclopedia of Database Systems, 2009

A framework for efficient data anonymization under privacy and accuracy constraints.
ACM Trans. Database Syst., 2009

Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy.
Trans. Data Priv., 2009

TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques.
Proc. VLDB Endow., 2009

A Hybrid Technique for Private Location-Based Queries with Database Protection.
Proceedings of the Advances in Spatial and Temporal Databases, 2009

Visualization for Access Control Policy Analysis Results Using Multi-level Grids.
Proceedings of the POLICY 2009, 2009

Interactive Location Cloaking with the PROBE Obfuscator.
Proceedings of the MDM 2009, 2009

Outsourcing Search Services on Private Spatial Data.
Proceedings of the 25th International Conference on Data Engineering, 2009

Towards location-based access control in healthcare emergency response.
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

Preventing velocity-based linkage attacks in location-aware applications.
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009

2008
Olap Results, Distributed Caching.
Proceedings of the Encyclopedia of GIS., 2008

Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites.
Proceedings of the Scientific and Statistical Database Management, 2008

Private queries in location based services: anonymizers are not necessary.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2008

On the Anonymization of Sparse High-Dimensional Data.
Proceedings of the 24th International Conference on Data Engineering, 2008

Understanding the privacy-efficiency trade-off in location based queries.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

Tracking Moving Objects in Anonymized Trajectories.
Proceedings of the Database and Expert Systems Applications, 19th International Conference, 2008

2007
Preventing Location-Based Identity Inference in Anonymous Spatial Queries.
IEEE Trans. Knowl. Data Eng., 2007

PRIVE: anonymous location-based queries in distributed mobile systems.
Proceedings of the 16th International Conference on World Wide Web, 2007

Fast Data Anonymization with Low Information Loss.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries.
Proceedings of the Advances in Spatial and Temporal Databases, 2007

2006
An adaptive stabilization framework for distributed hash tables.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006


  Loading...