Rinku Dewri

According to our database1, Rinku Dewri
  • authored at least 39 papers between 2004 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Private Retrieval of POI Details in Top-K Queries.
IEEE Trans. Mob. Comput., 2017

A case study of black box fail-safe testing in web applications.
Journal of Systems and Software, 2017

A graph traversal attack on Bloom filter-based medical data aggregation.
IJBDI, 2017

Driving Habits Data: Location Privacy Implications and Solutions.
IEEE Security & Privacy, 2017

2016
Linking Health Records for Federated Query Processing.
PoPETs, 2016

Mobile local search with noisy locations.
Pervasive and Mobile Computing, 2016

Stochastic-based robust dynamic resource allocation for independent tasks in a heterogeneous computing system.
J. Parallel Distrib. Comput., 2016

2015
Record linkage applications in health services research: opportunities and challenges.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Leveraging Smartphone Advances for Continuous Location Privacy.
Proceedings of the 16th IEEE International Conference on Mobile Data Management, 2015

Predicting data structures for energy efficient computing.
Proceedings of the Sixth International Green and Sustainable Computing Conference, 2015

2014
Exploiting Service Similarity for Privacy in Location-Based Search Queries.
IEEE Trans. Parallel Distrib. Syst., 2014

Understanding the power-performance tradeoff through Pareto analysis of live performance data.
Proceedings of the International Green Computing Conference, 2014

2013
Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers.
IEEE Trans. Mob. Comput., 2013

Can a Phone's GPS "Lie" Intelligently?
IEEE Computer, 2013

Inferring trip destinations from driving habits data.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Beyond the thin client model for location privacy.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

2012
Dynamic Security Risk Management Using Bayesian Attack Graphs.
IEEE Trans. Dependable Sec. Comput., 2012

Optimal security hardening on attack tree models of networks: a cost-benefit analysis.
Int. J. Inf. Sec., 2012

Utility driven optimization of real time data broadcast schedules.
Appl. Soft Comput., 2012

2011
k-Anonymization in the Presence of Publisher Preferences.
IEEE Trans. Knowl. Data Eng., 2011

Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization.
Journal of Computer Security, 2011

Location Privacy and Attacker Knowledge: Who Are We Fighting against?
Proceedings of the Security and Privacy in Communication Networks, 2011

2010
Real time stochastic scheduling in broadcast systems with decentralized data storage.
Real-Time Systems, 2010

On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS.
Proceedings of the Security and Privacy in Communication Networks, 2010

Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

On the Identification of Property Based Generalizations in Microdata Anonymization.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
A multi-objective approach to data sharing with privacy constraints and preference based objectives.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

On the comparison of microdata disclosure control algorithms.
Proceedings of the EDBT 2009, 2009

POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy.
Proceedings of the Parallel Problem Solving from Nature, 2008

On the Optimal Selection of k in the k-Anonymity Problem.
Proceedings of the 24th International Conference on Data Engineering, 2008

Evolution strategy based optimization of on-demand dependent data broadcast scheduling.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Security Provisioning in Pervasive Environments Using Multi-objective Optimization.
Proceedings of the Computer Security, 2008

Optimizing on-demand data broadcast scheduling in pervasive environments.
Proceedings of the EDBT 2008, 2008

An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems.
Proceedings of the Data and Applications Security XXII, 2008

2007
Measuring the Robustness of Resource Allocations in a Stochastic Dynamic Environment.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Towards Optimal Multi-level Tiling for Stencil Computations.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Optimal security hardening using multi-objective optimization on attack tree models of networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2004
Unveiling Optimal Operating Conditions for an Epoxy Polymerization Process Using Multi-objective Evolutionary Computation.
Proceedings of the Genetic and Evolutionary Computation, 2004


  Loading...