Mudhakar Srivatsa

According to our database1, Mudhakar Srivatsa authored at least 130 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Lightweight Indexing and Querying Services for Big Spatial Data.
IEEE Trans. Services Computing, 2019

Performance Bounds of Decentralized Search in Expert Networks for Query Answering.
TKDD, 2019

NN-SAR: A Neural Network Approach for Spatial AutoRegression.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Feature Importance Identification through Bottleneck Reconstruction.
Proceedings of the 2019 IEEE International Conference on Cognitive Computing, 2019

2018
Unsupervised Estimation of Domain Applicability of Models.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Doc2Img: A New Approach to Vectorization of Documents.
Proceedings of the 21st International Conference on Information Fusion, 2018

Learning to Simplify Distributed Systems Management.
Proceedings of the IEEE International Conference on Big Data, 2018

Learning Light-Weight Edge-Deployable Privacy Models.
Proceedings of the IEEE International Conference on Big Data, 2018

2017
Location attestation and access control for mobile devices using GeoXACML.
J. Network and Computer Applications, 2017

How to trust a few among many.
Autonomous Agents and Multi-Agent Systems, 2017

Beyond Spatial Auto-Regressive Models: Predicting Housing Prices with Satellite Imagery.
Proceedings of the 2017 IEEE Winter Conference on Applications of Computer Vision, 2017

Learning information release policies for preventing intersection attacks.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Darnet: a deep learning solution for distracted driving detection.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track, Las Vegas, NV, USA, December 11, 2017

On the Limits of Subsampling of Location Traces.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Stark: Optimizing In-Memory Computing for Dynamic Dataset Collections.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

SOM-TC: Self-Organizing Map for Hierarchical Trajectory Clustering.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

On the improvement of classifying EEG recordings using neural networks.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

Identifying sensor accesses from service descriptions.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

2016
Structural Data De-Anonymization: Theory and Practice.
IEEE/ACM Trans. Netw., 2016

General Graph Data De-Anonymization: From Mobility Traces to Social Networks.
ACM Trans. Inf. Syst. Secur., 2016

IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications.
IJNDC, 2016

Distributed Representations of Expertise.
Proceedings of the 2016 SIAM International Conference on Data Mining, 2016

Idea: A System for Efficient Failure Management in Smart IoT Environments.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Privacy enforcement through policy extension.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Unifying HDFS and GPFS: Enabling Analytics on Software-Defined Storage.
Proceedings of the 17th International Middleware Conference, Trento, Italy, December 12, 2016

MP-trie: Fast Spatial Queries on Moving Objects.
Proceedings of the Industrial Track of the 17th International Middleware Conference, 2016

Decentralized search in expert networks: Generic models and performance bounds.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

On the Efficiency of Decentralized Search in Expert Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Entity reconciliation in a multi-camera network.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

Spatial Predicates Evaluation in the Geohash Domain Using Reconfigurable Hardware.
Proceedings of the 24th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2016

Improving Semantic Parsing via Answer Type Inference.
Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, 2016

On Generating Characteristic-rich Question Sets for QA Evaluation.
Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, 2016

Query Answering Efficiency in Expert Networks Under Decentralized Search.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

2015
Fine-Grained Knowledge Sharing in Collaborative Environments.
IEEE Trans. Knowl. Data Eng., 2015

A review paper on preserving privacy in mobile environments.
J. Network and Computer Applications, 2015

Reasoning with streamed uncertain information from unreliable sources.
Expert Syst. Appl., 2015

Pyro: A Spatial-Temporal Big-Data Storage System.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Global attestation of location in mobile devices.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Exploiting Relevance Feedback in Knowledge Graph Search.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

Measuring enterprise network usage pattern & deploying passive optical LANs.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Social Trove: A Self-Summarizing Storage Service for Social Sensing.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

Fast and Flexible Conversion of Geohash Codes to and from Latitude/Longitude Coordinates.
Proceedings of the 23rd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2015

Picking vs. Guessing Secrets: A Game-Theoretic Analysis.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks.
IEEE Trans. Mob. Comput., 2014

Guest Editorial: Selected Papers from IEEE IEEE/EAI CollaborateCom 2013.
EAI Endorsed Trans. Collaborative Computing, 2014

A BSP approach to composite network analysis.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

When twitter meets foursquare: tweet location prediction using foursquare.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, 2014

Expertise-Based Data Access in Content-Centric Mobile Opportunistic Networks.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Analyzing expert behaviors in collaborative networks.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

Structure Based Data De-Anonymization of Social Networks and Mobility Traces.
Proceedings of the Information Security - 17th International Conference, 2014

Cloud service placement via subgraph matching.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

On Limits of Travel Time Predictions: Insights from a New York City Case Study.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Efficient spatial query processing for big data.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

Data Extrapolation in Social Sensing for Disaster Response.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

Structural Data De-anonymization: Quantification, Practice, and Implications.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Summarizing Answer Graphs Induced by Keyword Queries.
PVLDB, 2013

Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation.
Journal of Computer Security, 2013

Platform and applications for massive-scale streaming network analytics.
IBM Journal of Research and Development, 2013

Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

Spatio-temporal provenance: Identifying location information from unstructured text.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

TAF: A trust assessment framework for inferencing with uncertain streaming information.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Spatio-temporal Spread of Events in Social Networks: A Gas Shortage Case Study.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Inferring human mobility patterns from taxicab location traces.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Cross-path inference attacks on multipath TCP.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

Map matching: facts and myths.
Proceedings of the 21st SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2013

TIDY: A trust-based approach to information fusion through diversity.
Proceedings of the 16th International Conference on Information Fusion, 2013

Assessing trust over uncertain rules and streaming data.
Proceedings of the 16th International Conference on Information Fusion, 2013

IntegrityMR: Integrity assurance framework for big data analytics and management applications.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

Result Integrity Check for MapReduce Computation on Hybrid Clouds.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary.
IEEE/ACM Trans. Netw., 2012

Using Subjective Logic to Handle Uncertainty and Conflicts.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Microscopic Social Influence.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

Fine-grained access control of personal data.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Knowledge-oriented secure multiparty computation.
Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, 2012

Distributed graph query processing in dynamic networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Mining diverse opinions.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Byte Caching in Wireless Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Deanonymizing mobility traces: using social network as a side-channel.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-hoc Networks.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
Application-Level Denial of Service.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Privacy in VoIP Networks: Flow Analysis Attacks and Defense.
IEEE Trans. Parallel Distrib. Syst., 2011

EventGuard: A System Architecture for Securing Publish-Subscribe Networks.
ACM Trans. Comput. Syst., 2011

Trust-Based Probabilistic Query Answering.
Proceedings of the Web Information System Engineering - WISE 2011, 2011

Modeling data flow in socio-information networks: a risk estimation approach.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

Supporting Cooperative Caching in Disruption Tolerant Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Quantifying Information Leakage in Finite Order Deterministic Programs.
Proceedings of IEEE International Conference on Communications, 2011

Multiagent Communication Security in Adversarial Settings.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2011

Provenance-driven data dissemination in disruption tolerant networks.
Proceedings of the 14th International Conference on Information Fusion, 2011

Dynamic Enforcement of Knowledge-Based Security Policies.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Poster: on quantitative information flow metrics.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
A Decision Theoretic Approach to Data Leakage Prevention.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Assessing Trust in Uncertain Information.
Proceedings of the Semantic Web - ISWC 2010 - 9th International Semantic Web Conference, 2010

Spatio-temporal patterns in network events.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

Assessing trust in uncertain information using Bayesian description logic.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Search-as-a-service: Outsourced search over outsourced storage.
TWEB, 2009

Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach.
IEEE Trans. Parallel Distrib. Syst., 2009

Scalable key management algorithms for location-based services.
IEEE/ACM Trans. Netw., 2009

A Framework for Distributed Monitoring and Root Cause Analysis for Large IP Networks.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

A decision support system for secure information sharing.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Learning, indexing, and diagnosing network faults.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Privacy in VoIP Networks: A k-Anonymity Approach.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

A metadata calculus for secure information sharing.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

The fable of the bees: incentivizing robust revocation decision making in ad hoc networks.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach.
TWEB, 2008

A Policy Evaluation Tool for Multisite Resource Management.
IEEE Trans. Parallel Distrib. Syst., 2008

Scalable Topology Discovery and Link State Detection Using Routing Events.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

Preserving Caller Anonymity in Voice-over-IP Networks.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

Securing information flows: A metadata framework.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

A Scalable Method for Access Control in Location-Based Broadcast Services.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

SERvartuka: Dynamic Distribution of State to Improve SIP Server Scalability.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Trust management for secure information flows.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
An Access Control System for Web Service Compositions.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Efficient and Secure Search of Enterprise File Systems.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

DSphere: A Source-Centric Approach to Crawling, Indexing and Searching the World Wide Web.
Proceedings of the 23rd International Conference on Data Engineering, 2007

Secure Event Dissemination in Publish-Subscribe Networks.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

2006
Large Scaling Unstructured Peer-to-Peer Networks with Heterogeneity-Aware Topology and Routing.
IEEE Trans. Parallel Distrib. Syst., 2006

Securing decentralized reputation management using TrustGuard.
J. Parallel Distrib. Comput., 2006

A Client-Transparent Approach to Defend Against Denial of Service Attacks.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

A Middleware System for Protecting Against Application Level Denial of Service Attacks.
Proceedings of the Middleware 2006, 2006

Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems.
Proceedings of the Computer Security, 2006

2005
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks.
Proceedings of the 14th international conference on World Wide Web, 2005

Countering Targeted File Attacks Using LocationGuard.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

ExchangeGuard: A Distributed Protocol for Electronic Fair-Exchange.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

Resilient Trust Management for Web Service Integration.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

Securing publish-subscribe overlay services with EventGuard.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Scaling Unstructured Peer-to-Peer Networks With Multi-Tier Capacity-Aware Overlay Topologies.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004

Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Apoidea: A Decentralized Peer-to-Peer Architecture for Crawling the World Wide Web.
Proceedings of the Distributed Multimedia Information Retrieval, 2003


  Loading...