Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Rinku Dewri
@article{DBLP:journals/ijisec/MadabhushiD23, author = {Srinidhi Madabhushi and Rinku Dewri}, title = {A survey of anomaly detection methods for power grids}, journal = {Int. J. Inf. Sec.}, volume = {22}, number = {6}, pages = {1799--1832}, year = {2023}, url = {https://doi.org/10.1007/s10207-023-00720-z}, doi = {10.1007/S10207-023-00720-Z}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MadabhushiD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itp/DengBLDB23, author = {Tianjie Deng and Anamika Barman{-}Adhikari and Young Jin Lee and Rinku Dewri and Kimberly Bender}, title = {Substance use and sentiment and topical tendencies: a study using social media conversations of youth experiencing homelessness}, journal = {Inf. Technol. People}, volume = {36}, number = {6}, pages = {2515--2542}, year = {2023}, url = {https://doi.org/10.1108/ITP-12-2020-0860}, doi = {10.1108/ITP-12-2020-0860}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itp/DengBLDB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/AdhikariDD23, author = {Andrick Adhikari and Sanchari Das and Rinku Dewri}, title = {Evolution of Composition, Readability, and Structure of Privacy Policies over Two Decades}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {3}, pages = {138--153}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0074}, doi = {10.56553/POPETS-2023-0074}, timestamp = {Sat, 24 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/AdhikariDD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurousec/KishnaniNDD23, author = {Urvashi Kishnani and Naheem Noah and Sanchari Das and Rinku Dewri}, title = {Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications}, booktitle = {Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023}, pages = {143--157}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617072.3617102}, doi = {10.1145/3617072.3617102}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurousec/KishnaniNDD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PandaMDD22, author = {Suryakanta Panda and Samrat Mondal and Rinku Dewri and Ashok Kumar Das}, title = {Towards achieving efficient access control of medical data with both forward and backward secrecy}, journal = {Comput. Commun.}, volume = {189}, pages = {36--52}, year = {2022}, url = {https://doi.org/10.1016/j.comcom.2022.03.001}, doi = {10.1016/J.COMCOM.2022.03.001}, timestamp = {Mon, 23 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/PandaMDD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PatelD22, author = {Shreya Patel and Rinku Dewri}, title = {Private record linkage with linkage maps}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.265}, doi = {10.1002/SPY2.265}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/PatelD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MortlD22, author = {Karin Mortl and Rinku Dewri}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {44--63}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_3}, doi = {10.1007/978-3-031-23690-7\_3}, timestamp = {Fri, 23 Dec 2022 17:47:39 +0100}, biburl = {https://dblp.org/rec/conf/iciss/MortlD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MadabhushiD22, author = {Srinidhi Madabhushi and Rinku Dewri}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {220--234}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_13}, doi = {10.1007/978-3-031-23690-7\_13}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/MadabhushiD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AdhikariDD22, author = {Andrick Adhikari and Sanchari Das and Rinku Dewri}, title = {Privacy Policy Analysis with Sentence Classification}, booktitle = {19th Annual International Conference on Privacy, Security {\&} Trust, {PST} 2022, Fredericton, NB, Canada, August 22-24, 2022}, pages = {1--10}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/PST55820.2022.9851977}, doi = {10.1109/PST55820.2022.9851977}, timestamp = {Fri, 02 Sep 2022 18:51:56 +0200}, biburl = {https://dblp.org/rec/conf/pst/AdhikariDD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/KishnaniNDD22, author = {Urvashi Kishnani and Naheem Noah and Sanchari Das and Rinku Dewri}, editor = {Yuan Hong and Lingyu Wang}, title = {Privacy and Security Evaluation of Mobile Payment Applications Through User-Generated Reviews}, booktitle = {Proceedings of the 21st Workshop on Privacy in the Electronic Society, WPES2022, Los Angeles, CA, USA, 7 November 2022}, pages = {159--173}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3559613.3563196}, doi = {10.1145/3559613.3563196}, timestamp = {Thu, 03 Nov 2022 11:08:36 +0100}, biburl = {https://dblp.org/rec/conf/wpes/KishnaniNDD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AdhikariD21, author = {Andrick Adhikari and Rinku Dewri}, title = {Towards Change Detection in Privacy Policies with Natural Language Processing}, booktitle = {18th International Conference on Privacy, Security and Trust, {PST} 2021, Auckland, New Zealand, December 13-15, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PST52912.2021.9647767}, doi = {10.1109/PST52912.2021.9647767}, timestamp = {Tue, 28 Dec 2021 14:39:32 +0100}, biburl = {https://dblp.org/rec/conf/pst/AdhikariD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MadabhushiD21, author = {Srinidhi Madabhushi and Rinku Dewri}, title = {Detection of Demand Manipulation Attacks on a Power Grid}, booktitle = {18th International Conference on Privacy, Security and Trust, {PST} 2021, Auckland, New Zealand, December 13-15, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PST52912.2021.9647758}, doi = {10.1109/PST52912.2021.9647758}, timestamp = {Tue, 28 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/MadabhushiD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BoyerCCQD18, author = {Kirk Boyer and Hao Chen and Jingwei Chen and Jian Qiu and Rinku Dewri}, editor = {Vinod Ganapathy and Trent Jaeger and R. K. Shyamasundar}, title = {A Characterization of the Mass Surveillance Potential of Road Traffic Monitors}, booktitle = {Information Systems Security - 14th International Conference, {ICISS} 2018, Bangalore, India, December 17-19, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {3--23}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05171-6\_1}, doi = {10.1007/978-3-030-05171-6\_1}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/BoyerCCQD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BellattiBLAEDT17, author = {Jacob Bellatti and Andrew Brunner and Joseph Lewis and Prasad Annadata and Wisam Eltarjaman and Rinku Dewri and Ramakrishna Thurimella}, title = {Driving Habits Data: Location Privacy Implications and Solutions}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {1}, pages = {12--20}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.6}, doi = {10.1109/MSP.2017.6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BellattiBLAEDT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbdi/MitchellDTR17, author = {William Mitchell and Rinku Dewri and Ramakrishna Thurimella and Max Roschke}, title = {A graph traversal attack on Bloom filter-based medical data aggregation}, journal = {Int. J. Big Data Intell.}, volume = {4}, number = {4}, pages = {217--226}, year = {2017}, url = {https://doi.org/10.1504/IJBDI.2017.10006842}, doi = {10.1504/IJBDI.2017.10006842}, timestamp = {Wed, 25 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijbdi/MitchellDTR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/BoukhrisAAD17, author = {Salah Boukhris and Anneliese Andrews and Ahmed Alhaddad and Rinku Dewri}, title = {A case study of black box fail-safe testing in web applications}, journal = {J. Syst. Softw.}, volume = {131}, pages = {146--167}, year = {2017}, url = {https://doi.org/10.1016/j.jss.2016.09.031}, doi = {10.1016/J.JSS.2016.09.031}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/BoukhrisAAD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/EltarjamanDT17, author = {Wisam Eltarjaman and Rinku Dewri and Ramakrishna Thurimella}, title = {Location Privacy for Rank-based Geo-Query Systems}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {4}, pages = {77--96}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0039}, doi = {10.1515/POPETS-2017-0039}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/EltarjamanDT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/suscom/MichananDR17, author = {Junya Michanan and Rinku Dewri and Matthew J. Rutherford}, title = {GreenC5: An adaptive, energy-aware collection for green software development}, journal = {Sustain. Comput. Informatics Syst.}, volume = {13}, pages = {42--60}, year = {2017}, url = {https://doi.org/10.1016/j.suscom.2016.11.004}, doi = {10.1016/J.SUSCOM.2016.11.004}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/suscom/MichananDR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/EltarjamanDT17, author = {Wisam Eltarjaman and Rinku Dewri and Ramakrishna Thurimella}, title = {Private Retrieval of {POI} Details in Top-K Queries}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {16}, number = {9}, pages = {2611--2624}, year = {2017}, url = {https://doi.org/10.1109/TMC.2016.2625256}, doi = {10.1109/TMC.2016.2625256}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/EltarjamanDT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/SalehiSMSCABRSL16, author = {Mohsen Amini Salehi and Jay Smith and Anthony A. Maciejewski and Howard Jay Siegel and Edwin K. P. Chong and Jonathan Apodaca and Luis Diego Briceno and Timothy Renner and Vladimir Shestak and Joshua Ladd and Andrew M. Sutton and David L. Janovy and Sudha Govindasamy and Amin Alqudah and Rinku Dewri and Puneet Prakash}, title = {Stochastic-based robust dynamic resource allocation for independent tasks in a heterogeneous computing system}, journal = {J. Parallel Distributed Comput.}, volume = {97}, pages = {96--111}, year = {2016}, url = {https://doi.org/10.1016/j.jpdc.2016.06.008}, doi = {10.1016/J.JPDC.2016.06.008}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/SalehiSMSCABRSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/DewriT16, author = {Rinku Dewri and Ramakrishna Thurimella}, title = {Mobile local search with noisy locations}, journal = {Pervasive Mob. Comput.}, volume = {32}, pages = {78--92}, year = {2016}, url = {https://doi.org/10.1016/j.pmcj.2016.04.014}, doi = {10.1016/J.PMCJ.2016.04.014}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/DewriT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DewriOT16, author = {Rinku Dewri and Toan Ong and Ramakrishna Thurimella}, title = {Linking Health Records for Federated Query Processing}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {3}, pages = {4--23}, year = {2016}, url = {https://doi.org/10.1515/popets-2016-0013}, doi = {10.1515/POPETS-2016-0013}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DewriOT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/green/MichananDR15, author = {Junya Michanan and Rinku Dewri and Matthew J. Rutherford}, title = {Predicting data structures for energy efficient computing}, booktitle = {Sixth International Green and Sustainable Computing Conference, {IGSC} 2015, Las Vegas, NV, USA, December 14-16, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/IGCC.2015.7393698}, doi = {10.1109/IGCC.2015.7393698}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/green/MichananDR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/EltarjamanADT15, author = {Wisam Eltarjaman and Prasad Annadata and Rinku Dewri and Ramakrishna Thurimella}, editor = {Christian S. Jensen and Xing Xie and Vladimir Zadorozhny and Sanjay Madria and Evaggelia Pitoura and Baihua Zheng and Chi{-}Yin Chow}, title = {Leveraging Smartphone Advances for Continuous Location Privacy}, booktitle = {16th {IEEE} International Conference on Mobile Data Management, {MDM} 2015, Pittsburgh, PA, USA, June 15-18, 2015 - Volume 1}, pages = {197--202}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MDM.2015.36}, doi = {10.1109/MDM.2015.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/EltarjamanADT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ThurimellaDM15, author = {Ramakrishna Thurimella and Rinku Dewri and William Mitchell}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {Record linkage applications in health services research: opportunities and challenges}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2799983}, doi = {10.1145/2799979.2799983}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/ThurimellaDM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/DewriT14, author = {Rinku Dewri and Ramakrishna Thurimella}, title = {Exploiting Service Similarity for Privacy in Location-Based Search Queries}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {25}, number = {2}, pages = {374--383}, year = {2014}, url = {https://doi.org/10.1109/TPDS.2013.34}, doi = {10.1109/TPDS.2013.34}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/DewriT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/green/MichananDR14, author = {Junya Michanan and Rinku Dewri and Matthew J. Rutherford}, title = {Understanding the power-performance tradeoff through Pareto analysis of live performance data}, booktitle = {International Green Computing Conference, {IGCC} 2014, Dallas, TX, USA, November 3-5, 2014}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IGCC.2014.7039164}, doi = {10.1109/IGCC.2014.7039164}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/green/MichananDR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DewriT13, author = {Rinku Dewri and Ramakrishna Thurimella}, title = {Can a Phone's {GPS} "Lie" Intelligently?}, journal = {Computer}, volume = {46}, number = {2}, pages = {91--93}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.44}, doi = {10.1109/MC.2013.44}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DewriT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/Dewri13, author = {Rinku Dewri}, title = {Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {12}, number = {12}, pages = {2360--2372}, year = {2013}, url = {https://doi.org/10.1109/TMC.2012.208}, doi = {10.1109/TMC.2012.208}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/Dewri13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prisms/DewriEAT13, author = {Rinku Dewri and Wisam Eltarjaman and Prasad Annadata and Ramakrishna Thurimella}, title = {Beyond the thin client model for location privacy}, booktitle = {2013 International Conference on Privacy and Security in Mobile Systems, {PRISMS} 2013, Atlantic City, NJ, USA, June 24-27, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/PRISMS.2013.6927179}, doi = {10.1109/PRISMS.2013.6927179}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/prisms/DewriEAT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/DewriAET13, author = {Rinku Dewri and Prasad Annadata and Wisam Eltarjaman and Ramakrishna Thurimella}, editor = {Ahmad{-}Reza Sadeghi and Sara Foresti}, title = {Inferring trip destinations from driving habits data}, booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2013, Berlin, Germany, November 4, 2013}, pages = {267--272}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517840.2517871}, doi = {10.1145/2517840.2517871}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/DewriAET13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/DewriRRW12, author = {Rinku Dewri and Indrakshi Ray and Indrajit Ray and L. Darrell Whitley}, title = {Utility driven optimization of real time data broadcast schedules}, journal = {Appl. Soft Comput.}, volume = {12}, number = {7}, pages = {1832--1846}, year = {2012}, url = {https://doi.org/10.1016/j.asoc.2011.04.006}, doi = {10.1016/J.ASOC.2011.04.006}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/asc/DewriRRW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DewriRPW12, author = {Rinku Dewri and Indrajit Ray and Nayot Poolsappasit and L. Darrell Whitley}, title = {Optimal security hardening on attack tree models of networks: a cost-benefit analysis}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {3}, pages = {167--188}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0160-y}, doi = {10.1007/S10207-012-0160-Y}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/DewriRPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PoolsappasitDR12, author = {Nayot Poolsappasit and Rinku Dewri and Indrajit Ray}, title = {Dynamic Security Risk Management Using Bayesian Attack Graphs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {1}, pages = {61--74}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.34}, doi = {10.1109/TDSC.2011.34}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PoolsappasitDR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DewriRRW11, author = {Rinku Dewri and Indrajit Ray and Indrakshi Ray and L. Darrell Whitley}, title = {Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization}, journal = {J. Comput. Secur.}, volume = {19}, number = {5}, pages = {935--974}, year = {2011}, url = {https://doi.org/10.3233/JCS-2011-0428}, doi = {10.3233/JCS-2011-0428}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DewriRRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/DewriRRW11, author = {Rinku Dewri and Indrajit Ray and Indrakshi Ray and L. Darrell Whitley}, title = {k-Anonymization in the Presence of Publisher Preferences}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {23}, number = {11}, pages = {1678--1690}, year = {2011}, url = {https://doi.org/10.1109/TKDE.2011.106}, doi = {10.1109/TKDE.2011.106}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/DewriRRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Dewri11, author = {Rinku Dewri}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Location Privacy and Attacker Knowledge: Who Are We Fighting against?}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {96--115}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_6}, doi = {10.1007/978-3-642-31909-9\_6}, timestamp = {Tue, 23 May 2017 01:12:12 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/Dewri11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rts/DewriRRW10, author = {Rinku Dewri and Indrakshi Ray and Indrajit Ray and L. Darrell Whitley}, title = {Real time stochastic scheduling in broadcast systems with decentralized data storage}, journal = {Real Time Syst.}, volume = {45}, number = {3}, pages = {143--175}, year = {2010}, url = {https://doi.org/10.1007/s11241-010-9102-9}, doi = {10.1007/S11241-010-9102-9}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rts/DewriRRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DewriRRW10, author = {Rinku Dewri and Indrajit Ray and Indrakshi Ray and L. Darrell Whitley}, editor = {Sara Foresti and Sushil Jajodia}, title = {On the Identification of Property Based Generalizations in Microdata Anonymization}, booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, pages = {81--96}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6\_6}, doi = {10.1007/978-3-642-13739-6\_6}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/DewriRRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/DewriRRW10, author = {Rinku Dewri and Indrakshi Ray and Indrajit Ray and L. Darrell Whitley}, editor = {Takahiro Hara and Christian S. Jensen and Vijay Kumar and Sanjay Madria and Demetrios Zeinalipour{-}Yazti}, title = {Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services}, booktitle = {Eleventh International Conference on Mobile Data Management, {MDM} 2010, Kanas City, Missouri, USA, 23-26 May 2010}, pages = {95--104}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MDM.2010.52}, doi = {10.1109/MDM.2010.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/DewriRRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/DewriRRW10, author = {Rinku Dewri and Indrakshi Ray and Indrajit Ray and L. Darrell Whitley}, editor = {Sushil Jajodia and Jianying Zhou}, title = {On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous {LBS}}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {71--88}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_5}, doi = {10.1007/978-3-642-16161-2\_5}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/DewriRRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/DewriRRW09, author = {Rinku Dewri and Indrajit Ray and Indrakshi Ray and L. Darrell Whitley}, editor = {David Wai{-}Lok Cheung and Il{-}Yeol Song and Wesley W. Chu and Xiaohua Hu and Jimmy Lin}, title = {POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice}, booktitle = {Proceedings of the 18th {ACM} Conference on Information and Knowledge Management, {CIKM} 2009, Hong Kong, China, November 2-6, 2009}, pages = {1037--1046}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1645953.1646085}, doi = {10.1145/1645953.1646085}, timestamp = {Fri, 27 Aug 2021 11:13:00 +0200}, biburl = {https://dblp.org/rec/conf/cikm/DewriRRW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/DewriRRW09, author = {Rinku Dewri and Indrajit Ray and Indrakshi Ray and L. Darrell Whitley}, editor = {Martin L. Kersten and Boris Novikov and Jens Teubner and Vladimir Polutin and Stefan Manegold}, title = {On the comparison of microdata disclosure control algorithms}, booktitle = {{EDBT} 2009, 12th International Conference on Extending Database Technology, Saint Petersburg, Russia, March 24-26, 2009, Proceedings}, series = {{ACM} International Conference Proceeding Series}, volume = {360}, pages = {240--251}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1516360.1516389}, doi = {10.1145/1516360.1516389}, timestamp = {Wed, 04 May 2022 13:02:27 +0200}, biburl = {https://dblp.org/rec/conf/edbt/DewriRRW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/DewriWRR09, author = {Rinku Dewri and L. Darrell Whitley and Indrajit Ray and Indrakshi Ray}, editor = {Franz Rothlauf}, title = {A multi-objective approach to data sharing with privacy constraints and preference based objectives}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings, Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009}, pages = {1499--1506}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1569901.1570102}, doi = {10.1145/1569901.1570102}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/DewriWRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RayPD08, author = {Indrajit Ray and Nayot Poolsappasit and Rinku Dewri}, editor = {Vijay Atluri}, title = {An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {297--312}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_23}, doi = {10.1007/978-3-540-70567-3\_23}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/RayPD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/DewriRRW08, author = {Rinku Dewri and Indrakshi Ray and Indrajit Ray and L. Darrell Whitley}, editor = {Alfons Kemper and Patrick Valduriez and Noureddine Mouaddib and Jens Teubner and Mokrane Bouzeghoub and Volker Markl and Laurent Amsaleg and Ioana Manolescu}, title = {Optimizing on-demand data broadcast scheduling in pervasive environments}, booktitle = {{EDBT} 2008, 11th International Conference on Extending Database Technology, Nantes, France, March 25-29, 2008, Proceedings}, series = {{ACM} International Conference Proceeding Series}, volume = {261}, pages = {559--569}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1353343.1353411}, doi = {10.1145/1353343.1353411}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edbt/DewriRRW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DewriRRW08, author = {Rinku Dewri and Indrakshi Ray and Indrajit Ray and L. Darrell Whitley}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Security Provisioning in Pervasive Environments Using Multi-objective Optimization}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {349--363}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_23}, doi = {10.1007/978-3-540-88313-5\_23}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/DewriRRW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/DewriWRR08, author = {Rinku Dewri and L. Darrell Whitley and Indrakshi Ray and Indrajit Ray}, editor = {Conor Ryan and Maarten Keijzer}, title = {Evolution strategy based optimization of on-demand dependent data broadcast scheduling}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008}, pages = {1699--1700}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1389095.1389416}, doi = {10.1145/1389095.1389416}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/DewriWRR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/DewriRRW08, author = {Rinku Dewri and Indrajit Ray and Indrakshi Ray and L. Darrell Whitley}, editor = {Gustavo Alonso and Jos{\'{e}} A. Blakeley and Arbee L. P. Chen}, title = {On the Optimal Selection of k in the k-Anonymity Problem}, booktitle = {Proceedings of the 24th International Conference on Data Engineering, {ICDE} 2008, April 7-12, 2008, Canc{\'{u}}n, Mexico}, pages = {1364--1366}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDE.2008.4497557}, doi = {10.1109/ICDE.2008.4497557}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/DewriRRW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppsn/DewriWRR08, author = {Rinku Dewri and L. Darrell Whitley and Indrajit Ray and Indrakshi Ray}, editor = {G{\"{u}}nter Rudolph and Thomas Jansen and Simon M. Lucas and Carlo Poloni and Nicola Beume}, title = {Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy}, booktitle = {Parallel Problem Solving from Nature - {PPSN} X, 10th International Conference Dortmund, Germany, September 13-17, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5199}, pages = {991--1000}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87700-4\_98}, doi = {10.1007/978-3-540-87700-4\_98}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ppsn/DewriWRR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DewriPRW07, author = {Rinku Dewri and Nayot Poolsappasit and Indrajit Ray and L. Darrell Whitley}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Optimal security hardening using multi-objective optimization on attack tree models of networks}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {204--213}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315272}, doi = {10.1145/1315245.1315272}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DewriPRW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/RenganarayananHDR07, author = {Lakshminarayanan Renganarayanan and Manjukumar Harthikote{-}Matha and Rinku Dewri and Sanjay V. Rajopadhye}, title = {Towards Optimal Multi-level Tiling for Stencil Computations}, booktitle = {21th International Parallel and Distributed Processing Symposium {(IPDPS} 2007), Proceedings, 26-30 March 2007, Long Beach, California, {USA}}, pages = {1--10}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/IPDPS.2007.370291}, doi = {10.1109/IPDPS.2007.370291}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/RenganarayananHDR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/SmithBMSRSLSJGADP07, author = {Jay Smith and Luis Diego Briceno and Anthony A. Maciejewski and Howard Jay Siegel and Timothy Renner and Vladimir Shestak and Joshua Ladd and Andrew M. Sutton and David L. Janovy and Sudha Govindasamy and Amin Alqudah and Rinku Dewri and Puneet Prakash}, title = {Measuring the Robustness of Resource Allocations in a Stochastic Dynamic Environment}, booktitle = {21th International Parallel and Distributed Processing Symposium {(IPDPS} 2007), Proceedings, 26-30 March 2007, Long Beach, California, {USA}}, pages = {1--10}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/IPDPS.2007.370315}, doi = {10.1109/IPDPS.2007.370315}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/SmithBMSRSLSJGADP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/DebMDM04, author = {Kalyanmoy Deb and Kishalay Mitra and Rinku Dewri and Saptarshi Majumdar}, editor = {Kalyanmoy Deb and Riccardo Poli and Wolfgang Banzhaf and Hans{-}Georg Beyer and Edmund K. Burke and Paul J. Darwen and Dipankar Dasgupta and Dario Floreano and James A. Foster and Mark Harman and Owen Holland and Pier Luca Lanzi and Lee Spector and Andrea Tettamanzi and Dirk Thierens and Andrew M. Tyrrell}, title = {Unveiling Optimal Operating Conditions for an Epoxy Polymerization Process Using Multi-objective Evolutionary Computation}, booktitle = {Genetic and Evolutionary Computation - {GECCO} 2004, Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3103}, pages = {920--931}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24855-2\_105}, doi = {10.1007/978-3-540-24855-2\_105}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gecco/DebMDM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.