Gabriel Ghinita

According to our database1, Gabriel Ghinita authored at least 76 papers between 2006 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Privacy-Preserving Spatial Crowdsourcing Based on Anonymous Credentials.
Proceedings of the 19th IEEE International Conference on Mobile Data Management, 2018

Hybrid Differentially-Private String Matching.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

An Empirical Study of Differentially-Private Analytics for High-Speed Network Data.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Olap Results, Distributed Caching.
Proceedings of the Encyclopedia of GIS., 2017

Differentially Private Location Protection for Worker Datasets in Spatial Crowdsourcing.
IEEE Trans. Mob. Comput., 2017

Privacy-preserving detection of anomalous phenomena in crowdsourced environmental sensing using fine-grained weighted voting.
GeoInformatica, 2017

A Game-Oriented Educational Tool for Location Privacy Topics.
Proceedings of the 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2017

Differentially-Private Big Data Analytics for High-Speed Research Network Traffic Measurement.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

2016
Protecting Against Velocity-Based, Proximity-Based, and External Event Attacks in Location-Centric Social Networks.
ACM Trans. Spatial Algorithms and Systems, 2016

Processing uncertain spatial data resulting from differentially-private sanitization.
SIGSPATIAL Special, 2016

Differentially-Private Mining of Representative Travel Patterns.
Proceedings of the IEEE 17th International Conference on Mobile Data Management, 2016

Privacy-Preserving Mining of Sequential Association Rules from Provenance Workflows.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks.
IEEE Trans. Dependable Sec. Comput., 2015

Privacy-Preserving Detection of Anomalous Phenomena in Crowdsourced Environmental Sensing.
Proceedings of the Advances in Spatial and Temporal Databases, 2015

PrivGeoCrowd: A toolbox for studying private spatial Crowdsourcing.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Disseminating Location Privacy Threats and Protection Techniques through Capture-the-Flag Games (Vision Paper).
Proceedings of the 2nd Workshop on Privacy in Geographic Information Collection and Analysis, 2015

Differentially-Private Mining of Moderately-Frequent High-Confidence Association Rules.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Hardware acceleration of Private Information Retrieval protocols using GPUs.
Proceedings of the 26th IEEE International Conference on Application-specific Systems, 2015

2014
Secure kNN Query Processing in Untrusted Cloud Environments.
IEEE Trans. Knowl. Data Eng., 2014

A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing.
PVLDB, 2014

A roadmap for privacy-enhanced secure data provenance.
J. Intell. Inf. Syst., 2014

Guest editorial: location-centric privacy in mobile services.
GeoInformatica, 2014

Differentially Private Location Recommendations in Geosocial Networks.
Proceedings of the IEEE 15th International Conference on Mobile Data Management, 2014

Large-scale frequent subgraph mining in MapReduce.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Towards efficient private spatial information retrieval using GPUs.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

Secure mutual proximity zone enclosure evaluation.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

Privacy-preserving publication of provenance workflows.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Privacy for Location-based Services
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 9781627051507, 2013

LBSN 2012 workshop report: the Fifth ACM SIGSPATIAL International Workshop on Location-Based Social Networks (Redondo Beach, California - November 6, 2012).
SIGSPATIAL Special, 2013

A privacy-preserving location-based alert system.
Proceedings of the 21st SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2013

Efficient and accurate strategies for differentially-private sliding window queries.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Authenticating spatial skyline queries with low communication overhead.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Privacy-Preserving Enforcement of Spatially Aware RBAC.
IEEE Trans. Dependable Sec. Comput., 2012

Resilient Authenticated Execution of Critical Applications in Untrusted Environments.
IEEE Trans. Dependable Sec. Comput., 2012

A Hybrid Approach to Private Record Matching.
IEEE Trans. Dependable Sec. Comput., 2012

SPRINGL 2011 Workshop Report: the Fourth ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS: (Chicago, Illinois - November 1, 2011).
SIGSPATIAL Special, 2012

Secure sensor network SUM aggregation with detection of malicious nodes.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

A Comparative Evaluation of Private Information Retrieval Techniques in Location-Based Services.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A Lightweight Secure Provenance Scheme for Wireless Sensor Networks.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

2011
Anonymous Publication of Sensitive Transactional Data.
IEEE Trans. Knowl. Data Eng., 2011

Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection.
GeoInformatica, 2011

Access Control for Databases: Concepts and Systems.
Foundations and Trends in Databases, 2011

Privacy-preserving assessment of location data trustworthiness.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

The optimization of situational awareness for insider threat detection.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Enabling search services on outsourced private spatial data.
VLDB J., 2010

A reciprocal framework for spatial K-anonymity.
Inf. Syst., 2010

Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

Privacy-preserving matching of spatial datasets with protection against background knowledge.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010

Private record matching using differential privacy.
Proceedings of the EDBT 2010, 2010

Privacy-preserving similarity measurement for access control policies.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations.
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010

Controlling data disclosure in computational PIR protocols.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Spatial Anonymity.
Proceedings of the Encyclopedia of Database Systems, 2009

A framework for efficient data anonymization under privacy and accuracy constraints.
ACM Trans. Database Syst., 2009

Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy.
Trans. Data Privacy, 2009

TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques.
PVLDB, 2009

A Hybrid Technique for Private Location-Based Queries with Database Protection.
Proceedings of the Advances in Spatial and Temporal Databases, 2009

Visualization for Access Control Policy Analysis Results Using Multi-level Grids.
Proceedings of the POLICY 2009, 2009

Interactive Location Cloaking with the PROBE Obfuscator.
Proceedings of the MDM 2009, 2009

Outsourcing Search Services on Private Spatial Data.
Proceedings of the 25th International Conference on Data Engineering, 2009

Towards location-based access control in healthcare emergency response.
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

Preventing velocity-based linkage attacks in location-aware applications.
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009

2008
Olap Results, Distributed Caching.
Proceedings of the Encyclopedia of GIS., 2008

Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites.
Proceedings of the Scientific and Statistical Database Management, 2008

Private queries in location based services: anonymizers are not necessary.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2008

On the Anonymization of Sparse High-Dimensional Data.
Proceedings of the 24th International Conference on Data Engineering, 2008

Understanding the privacy-efficiency trade-off in location based queries.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

Tracking Moving Objects in Anonymized Trajectories.
Proceedings of the Database and Expert Systems Applications, 19th International Conference, 2008

2007
Preventing Location-Based Identity Inference in Anonymous Spatial Queries.
IEEE Trans. Knowl. Data Eng., 2007

PRIVE: anonymous location-based queries in distributed mobile systems.
Proceedings of the 16th International Conference on World Wide Web, 2007

Fast Data Anonymization with Low Information Loss.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries.
Proceedings of the Advances in Spatial and Temporal Databases, 2007

2006
An adaptive stabilization framework for distributed hash tables.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006


  Loading...