Rinku Dewri

Orcid: 0000-0002-8332-2157

According to our database1, Rinku Dewri authored at least 54 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A survey of anomaly detection methods for power grids.
Int. J. Inf. Sec., December, 2023

Evolution of Composition, Readability, and Structure of Privacy Policies over Two Decades.
Proc. Priv. Enhancing Technol., July, 2023

Substance use and sentiment and topical tendencies: a study using social media conversations of youth experiencing homelessness.
Inf. Technol. People, 2023

Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications.
Proceedings of the 2023 European Symposium on Usable Security, 2023

2022
Private record linkage with linkage maps.
Secur. Priv., 2022

Towards achieving efficient access control of medical data with both forward and backward secrecy.
Comput. Commun., 2022

Privacy and Security Evaluation of Mobile Payment Applications Through User-Generated Reviews.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

Privacy Policy Analysis with Sentence Classification.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage.
Proceedings of the Information Systems Security - 18th International Conference, 2022

On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems.
Proceedings of the Information Systems Security - 18th International Conference, 2022

2021
Detection of Demand Manipulation Attacks on a Power Grid.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Towards Change Detection in Privacy Policies with Natural Language Processing.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

2018
A Characterization of the Mass Surveillance Potential of Road Traffic Monitors.
Proceedings of the Information Systems Security - 14th International Conference, 2018

2017
Private Retrieval of POI Details in Top-K Queries.
IEEE Trans. Mob. Comput., 2017

GreenC5: An adaptive, energy-aware collection for green software development.
Sustain. Comput. Informatics Syst., 2017

Location Privacy for Rank-based Geo-Query Systems.
Proc. Priv. Enhancing Technol., 2017

A case study of black box fail-safe testing in web applications.
J. Syst. Softw., 2017

A graph traversal attack on Bloom filter-based medical data aggregation.
Int. J. Big Data Intell., 2017

Driving Habits Data: Location Privacy Implications and Solutions.
IEEE Secur. Priv., 2017

2016
Linking Health Records for Federated Query Processing.
Proc. Priv. Enhancing Technol., 2016

Mobile local search with noisy locations.
Pervasive Mob. Comput., 2016

Stochastic-based robust dynamic resource allocation for independent tasks in a heterogeneous computing system.
J. Parallel Distributed Comput., 2016

2015
Record linkage applications in health services research: opportunities and challenges.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Leveraging Smartphone Advances for Continuous Location Privacy.
Proceedings of the 16th IEEE International Conference on Mobile Data Management, 2015

Predicting data structures for energy efficient computing.
Proceedings of the Sixth International Green and Sustainable Computing Conference, 2015

2014
Exploiting Service Similarity for Privacy in Location-Based Search Queries.
IEEE Trans. Parallel Distributed Syst., 2014

Understanding the power-performance tradeoff through Pareto analysis of live performance data.
Proceedings of the International Green Computing Conference, 2014

2013
Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers.
IEEE Trans. Mob. Comput., 2013

Can a Phone's GPS "Lie" Intelligently?
Computer, 2013

Inferring trip destinations from driving habits data.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Beyond the thin client model for location privacy.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

2012
Dynamic Security Risk Management Using Bayesian Attack Graphs.
IEEE Trans. Dependable Secur. Comput., 2012

Optimal security hardening on attack tree models of networks: a cost-benefit analysis.
Int. J. Inf. Sec., 2012

Utility driven optimization of real time data broadcast schedules.
Appl. Soft Comput., 2012

2011
k-Anonymization in the Presence of Publisher Preferences.
IEEE Trans. Knowl. Data Eng., 2011

Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization.
J. Comput. Secur., 2011

Location Privacy and Attacker Knowledge: Who Are We Fighting against?
Proceedings of the Security and Privacy in Communication Networks, 2011

2010
Real time stochastic scheduling in broadcast systems with decentralized data storage.
Real Time Syst., 2010

On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS.
Proceedings of the Security and Privacy in Communication Networks, 2010

Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

On the Identification of Property Based Generalizations in Microdata Anonymization.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
A multi-objective approach to data sharing with privacy constraints and preference based objectives.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

On the comparison of microdata disclosure control algorithms.
Proceedings of the EDBT 2009, 2009

POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy.
Proceedings of the Parallel Problem Solving from Nature, 2008

On the Optimal Selection of k in the k-Anonymity Problem.
Proceedings of the 24th International Conference on Data Engineering, 2008

Evolution strategy based optimization of on-demand dependent data broadcast scheduling.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Security Provisioning in Pervasive Environments Using Multi-objective Optimization.
Proceedings of the Computer Security, 2008

Optimizing on-demand data broadcast scheduling in pervasive environments.
Proceedings of the EDBT 2008, 2008

An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems.
Proceedings of the Data and Applications Security XXII, 2008

2007
Measuring the Robustness of Resource Allocations in a Stochastic Dynamic Environment.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Towards Optimal Multi-level Tiling for Stencil Computations.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Optimal security hardening using multi-objective optimization on attack tree models of networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2004
Unveiling Optimal Operating Conditions for an Epoxy Polymerization Process Using Multi-objective Evolutionary Computation.
Proceedings of the Genetic and Evolutionary Computation, 2004


  Loading...