Rinku Dewri
Srinidhi Madabhushi
Rinku Dewri
A survey of anomaly detection methods for power grids.
1799-1832
2023
December
22
Int. J. Inf. Sec.
6
https://doi.org/10.1007/s10207-023-00720-z
db/journals/ijisec/ijisec22.html#MadabhushiD23
Tianjie Deng
Anamika Barman-Adhikari
Young Jin Lee
Rinku Dewri
Kimberly Bender
Substance use and sentiment and topical tendencies: a study using social media conversations of youth experiencing homelessness.
2515-2542
2023
36
Inf. Technol. People
6
https://doi.org/10.1108/ITP-12-2020-0860
db/journals/itp/itp36.html#DengBLDB23
Andrick Adhikari
Sanchari Das
Rinku Dewri
Evolution of Composition, Readability, and Structure of Privacy Policies over Two Decades.
138-153
2023
July
2023
Proc. Priv. Enhancing Technol.
3
https://doi.org/10.56553/popets-2023-0074
db/journals/popets/popets2023.html#AdhikariDD23
Urvashi Kishnani
Naheem Noah
Sanchari Das
Rinku Dewri
Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications.
143-157
2023
EuroUSEC
https://doi.org/10.1145/3617072.3617102
conf/eurousec/2023
db/conf/eurousec/eurousec2023.html#KishnaniNDD23
Suryakanta Panda
Samrat Mondal
Rinku Dewri
Ashok Kumar Das
Towards achieving efficient access control of medical data with both forward and backward secrecy.
36-52
2022
189
Comput. Commun.
https://doi.org/10.1016/j.comcom.2022.03.001
db/journals/comcom/comcom189.html#PandaMDD22
Shreya Patel
Rinku Dewri
Private record linkage with linkage maps.
2022
November/December
5
Secur. Priv.
6
https://doi.org/10.1002/spy2.265
db/journals/sap/sap5.html#PatelD22
Karin Mortl
Rinku Dewri
Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage.
44-63
2022
ICISS
https://doi.org/10.1007/978-3-031-23690-7_3
conf/iciss/2022
db/conf/iciss/iciss2022.html#MortlD22
Srinidhi Madabhushi
Rinku Dewri
On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems.
220-234
2022
ICISS
https://doi.org/10.1007/978-3-031-23690-7_13
conf/iciss/2022
db/conf/iciss/iciss2022.html#MadabhushiD22
Andrick Adhikari
Sanchari Das
Rinku Dewri
Privacy Policy Analysis with Sentence Classification.
1-10
2022
PST
https://doi.org/10.1109/PST55820.2022.9851977
conf/pst/2022
db/conf/pst/pst2022.html#AdhikariDD22
Urvashi Kishnani
Naheem Noah
Sanchari Das
Rinku Dewri
Privacy and Security Evaluation of Mobile Payment Applications Through User-Generated Reviews.
159-173
2022
WPES@CCS
https://doi.org/10.1145/3559613.3563196
conf/wpes/2022
db/conf/wpes/wpes2022.html#KishnaniNDD22
Andrick Adhikari
Rinku Dewri
Towards Change Detection in Privacy Policies with Natural Language Processing.
1-10
2021
PST
https://doi.org/10.1109/PST52912.2021.9647767
conf/pst/2021
db/conf/pst/pst2021.html#AdhikariD21
Srinidhi Madabhushi
Rinku Dewri
Detection of Demand Manipulation Attacks on a Power Grid.
1-7
2021
PST
https://doi.org/10.1109/PST52912.2021.9647758
conf/pst/2021
db/conf/pst/pst2021.html#MadabhushiD21
Kirk Boyer
Hao Chen
Jingwei Chen
Jian Qiu
Rinku Dewri
A Characterization of the Mass Surveillance Potential of Road Traffic Monitors.
3-23
2018
ICISS
https://doi.org/10.1007/978-3-030-05171-6_1
conf/iciss/2018
db/conf/iciss/iciss2018.html#BoyerCCQD18
Jacob Bellatti
Andrew Brunner
Joseph Lewis
Prasad Annadata
Wisam Eltarjaman
Rinku Dewri
Ramakrishna Thurimella
Driving Habits Data: Location Privacy Implications and Solutions.
12-20
2017
15
IEEE Secur. Priv.
1
https://doi.org/10.1109/MSP.2017.6
http://doi.ieeecomputersociety.org/10.1109/MSP.2017.6
https://www.wikidata.org/entity/Q114986083
db/journals/ieeesp/ieeesp15.html#BellattiBLAEDT17
William Mitchell
Rinku Dewri
Ramakrishna Thurimella
Max Roschke
A graph traversal attack on Bloom filter-based medical data aggregation.
217-226
2017
4
Int. J. Big Data Intell.
4
https://doi.org/10.1504/IJBDI.2017.10006842
db/journals/ijbdi/ijbdi4.html#MitchellDTR17
Salah Boukhris
Anneliese Andrews
Ahmed Alhaddad
Rinku Dewri
A case study of black box fail-safe testing in web applications.
146-167
2017
131
J. Syst. Softw.
https://doi.org/10.1016/j.jss.2016.09.031
db/journals/jss/jss131.html#BoukhrisAAD17
Wisam Eltarjaman
Rinku Dewri
Ramakrishna Thurimella
Location Privacy for Rank-based Geo-Query Systems.
77-96
2017
2017
Proc. Priv. Enhancing Technol.
4
https://doi.org/10.1515/popets-2017-0039
db/journals/popets/popets2017.html#EltarjamanDT17
Junya Michanan
Rinku Dewri
Matthew J. Rutherford
GreenC5: An adaptive, energy-aware collection for green software development.
42-60
2017
13
Sustain. Comput. Informatics Syst.
https://doi.org/10.1016/j.suscom.2016.11.004
db/journals/suscom/suscom13.html#MichananDR17
Wisam Eltarjaman
Rinku Dewri
Ramakrishna Thurimella
Private Retrieval of POI Details in Top-K Queries.
2611-2624
2017
16
IEEE Trans. Mob. Comput.
9
https://doi.org/10.1109/TMC.2016.2625256
http://doi.ieeecomputersociety.org/10.1109/TMC.2016.2625256
db/journals/tmc/tmc16.html#EltarjamanDT17
Mohsen Amini Salehi
Jay Smith
Anthony A. Maciejewski
Howard Jay Siegel
Edwin K. P. Chong
Jonathan Apodaca
Luis Diego Briceno
Timothy Renner
Vladimir Shestak
Joshua Ladd
Andrew M. Sutton
David L. Janovy
Sudha Govindasamy
Amin Alqudah
Rinku Dewri
Puneet Prakash
Stochastic-based robust dynamic resource allocation for independent tasks in a heterogeneous computing system.
96-111
2016
97
J. Parallel Distributed Comput.
https://doi.org/10.1016/j.jpdc.2016.06.008
db/journals/jpdc/jpdc97.html#SalehiSMSCABRSL16
Rinku Dewri
Ramakrishna Thurimella
Mobile local search with noisy locations.
78-92
2016
32
Pervasive Mob. Comput.
https://doi.org/10.1016/j.pmcj.2016.04.014
db/journals/percom/percom32.html#DewriT16
Rinku Dewri
Toan Ong
Ramakrishna Thurimella
Linking Health Records for Federated Query Processing.
4-23
2016
2016
Proc. Priv. Enhancing Technol.
3
https://doi.org/10.1515/popets-2016-0013
db/journals/popets/popets2016.html#DewriOT16
Junya Michanan
Rinku Dewri
Matthew J. Rutherford
Predicting data structures for energy efficient computing.
1-8
2015
IGSC
https://doi.org/10.1109/IGCC.2015.7393698
https://doi.ieeecomputersociety.org/10.1109/IGCC.2015.7393698
conf/green/2015
db/conf/green/green2015.html#MichananDR15
Wisam Eltarjaman
Prasad Annadata
Rinku Dewri
Ramakrishna Thurimella
Leveraging Smartphone Advances for Continuous Location Privacy.
197-202
2015
MDM (1)
https://doi.org/10.1109/MDM.2015.36
https://doi.ieeecomputersociety.org/10.1109/MDM.2015.36
conf/mdm/2015-1
db/conf/mdm/mdm2015-1.html#EltarjamanADT15
Ramakrishna Thurimella
Rinku Dewri
William Mitchell
Record linkage applications in health services research: opportunities and challenges.
6
2015
SIN
https://doi.org/10.1145/2799979.2799983
conf/sin/2015
db/conf/sin/sin2015.html#ThurimellaDM15
Rinku Dewri
Ramakrishna Thurimella
Exploiting Service Similarity for Privacy in Location-Based Search Queries.
374-383
2014
25
IEEE Trans. Parallel Distributed Syst.
2
https://doi.org/10.1109/TPDS.2013.34
http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.34
db/journals/tpds/tpds25.html#DewriT14
Junya Michanan
Rinku Dewri
Matthew J. Rutherford
Understanding the power-performance tradeoff through Pareto analysis of live performance data.
1-8
2014
IGCC
https://doi.org/10.1109/IGCC.2014.7039164
https://doi.ieeecomputersociety.org/10.1109/IGCC.2014.7039164
conf/green/2014
db/conf/green/green2014.html#MichananDR14
Rinku Dewri
Ramakrishna Thurimella
Can a Phone's GPS "Lie" Intelligently?
91-93
2013
46
Computer
2
https://doi.org/10.1109/MC.2013.44
http://doi.ieeecomputersociety.org/10.1109/MC.2013.44
db/journals/computer/computer46.html#DewriT13
Rinku Dewri
Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers.
2360-2372
2013
12
IEEE Trans. Mob. Comput.
12
https://doi.org/10.1109/TMC.2012.208
http://doi.ieeecomputersociety.org/10.1109/TMC.2012.208
db/journals/tmc/tmc12.html#Dewri13
Rinku Dewri
Wisam Eltarjaman
Prasad Annadata
Ramakrishna Thurimella
Beyond the thin client model for location privacy.
1-8
2013
PRISMS
https://doi.org/10.1109/PRISMS.2013.6927179
conf/prisms/2013
db/conf/prisms/prisms2013.html#DewriEAT13
Rinku Dewri
Prasad Annadata
Wisam Eltarjaman
Ramakrishna Thurimella
Inferring trip destinations from driving habits data.
267-272
2013
WPES
https://doi.org/10.1145/2517840.2517871
conf/wpes/2013
db/conf/wpes/wpes2013.html#DewriAET13
Rinku Dewri
Indrakshi Ray
Indrajit Ray
L. Darrell Whitley
Utility driven optimization of real time data broadcast schedules.
1832-1846
2012
12
Appl. Soft Comput.
7
https://doi.org/10.1016/j.asoc.2011.04.006
db/journals/asc/asc12.html#DewriRRW12
Rinku Dewri
Indrajit Ray
Nayot Poolsappasit
L. Darrell Whitley
Optimal security hardening on attack tree models of networks: a cost-benefit analysis.
167-188
2012
11
Int. J. Inf. Sec.
3
https://doi.org/10.1007/s10207-012-0160-y
db/journals/ijisec/ijisec11.html#DewriRPW12
Nayot Poolsappasit
Rinku Dewri
Indrajit Ray
Dynamic Security Risk Management Using Bayesian Attack Graphs.
61-74
2012
9
IEEE Trans. Dependable Secur. Comput.
1
https://doi.org/10.1109/TDSC.2011.34
http://doi.ieeecomputersociety.org/10.1109/TDSC.2011.34
db/journals/tdsc/tdsc9.html#PoolsappasitDR12
Rinku Dewri
Indrajit Ray
Indrakshi Ray
L. Darrell Whitley
Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization.
935-974
2011
19
J. Comput. Secur.
5
https://doi.org/10.3233/JCS-2011-0428
https://www.wikidata.org/entity/Q114943927
db/journals/jcs/jcs19.html#DewriRRW11
Rinku Dewri
Indrajit Ray
Indrakshi Ray
L. Darrell Whitley
k-Anonymization in the Presence of Publisher Preferences.
1678-1690
2011
23
IEEE Trans. Knowl. Data Eng.
11
https://doi.org/10.1109/TKDE.2011.106
http://doi.ieeecomputersociety.org/10.1109/TKDE.2011.106
db/journals/tkde/tkde23.html#DewriRRW11
Rinku Dewri
Location Privacy and Attacker Knowledge: Who Are We Fighting against?
96-115
2011
SecureComm
https://doi.org/10.1007/978-3-642-31909-9_6
conf/securecomm/2011
db/conf/securecomm/securecomm2011.html#Dewri11
Rinku Dewri
Indrakshi Ray
Indrajit Ray
L. Darrell Whitley
Real time stochastic scheduling in broadcast systems with decentralized data storage.
143-175
2010
45
Real Time Syst.
3
https://doi.org/10.1007/s11241-010-9102-9
db/journals/rts/rts45.html#DewriRRW10
Rinku Dewri
Indrajit Ray
Indrakshi Ray
L. Darrell Whitley
On the Identification of Property Based Generalizations in Microdata Anonymization.
81-96
2010
DBSec
conf/dbsec/2010
https://doi.org/10.1007/978-3-642-13739-6_6
http://dl.ifip.org/db/conf/dbsec/dbsec2010/DewriRRW10.pdf
db/conf/dbsec/dbsec2010.html#DewriRRW10
Rinku Dewri
Indrakshi Ray
Indrajit Ray
L. Darrell Whitley
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services.
95-104
2010
Mobile Data Management
https://doi.org/10.1109/MDM.2010.52
https://doi.ieeecomputersociety.org/10.1109/MDM.2010.52
conf/mdm/2010
db/conf/mdm/mdm2010.html#DewriRRW10
Rinku Dewri
Indrakshi Ray
Indrajit Ray
L. Darrell Whitley
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS.
71-88
2010
SecureComm
https://doi.org/10.1007/978-3-642-16161-2_5
http://eudl.eu/doi/10.1007/978-3-642-16161-2_5
conf/securecomm/2010
db/conf/securecomm/securecomm2010.html#DewriRRW10
Rinku Dewri
Indrajit Ray
Indrakshi Ray
L. Darrell Whitley
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice.
1037-1046
2009
CIKM
https://doi.org/10.1145/1645953.1646085
conf/cikm/2009
db/conf/cikm/cikm2009.html#DewriRRW09
Rinku Dewri
Indrajit Ray
Indrakshi Ray
L. Darrell Whitley
On the comparison of microdata disclosure control algorithms.
240-251
2009
EDBT
https://doi.org/10.1145/1516360.1516389
conf/edbt/2009
db/conf/edbt/edbt2009.html#DewriRRW09
Rinku Dewri
L. Darrell Whitley
Indrajit Ray
Indrakshi Ray
A multi-objective approach to data sharing with privacy constraints and preference based objectives.
1499-1506
2009
GECCO
https://doi.org/10.1145/1569901.1570102
conf/gecco/2009g
db/conf/gecco/gecco2009.html#DewriWRR09
Indrajit Ray
Nayot Poolsappasit
Rinku Dewri
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems.
297-312
2008
DBSec
conf/dbsec/2008
https://doi.org/10.1007/978-3-540-70567-3_23
http://dl.ifip.org/db/conf/dbsec/dbsec2008/RayPD08.pdf
db/conf/dbsec/dbsec2008.html#RayPD08
Rinku Dewri
Indrakshi Ray
Indrajit Ray
L. Darrell Whitley
Optimizing on-demand data broadcast scheduling in pervasive environments.
559-569
2008
EDBT
https://doi.org/10.1145/1353343.1353411
conf/edbt/2008
db/conf/edbt/edbt2008.html#DewriRRW08
Rinku Dewri
Indrakshi Ray
Indrajit Ray
L. Darrell Whitley
Security Provisioning in Pervasive Environments Using Multi-objective Optimization.
349-363
2008
ESORICS
https://doi.org/10.1007/978-3-540-88313-5_23
conf/esorics/2008
db/conf/esorics/esorics2008.html#DewriRRW08
Rinku Dewri
L. Darrell Whitley
Indrakshi Ray
Indrajit Ray
Evolution strategy based optimization of on-demand dependent data broadcast scheduling.
1699-1700
2008
GECCO
https://doi.org/10.1145/1389095.1389416
conf/gecco/2008
db/conf/gecco/gecco2008.html#DewriWRR08
Rinku Dewri
Indrajit Ray
Indrakshi Ray
L. Darrell Whitley
On the Optimal Selection of k in the k-Anonymity Problem.
1364-1366
2008
ICDE
https://doi.org/10.1109/ICDE.2008.4497557
https://doi.ieeecomputersociety.org/10.1109/ICDE.2008.4497557
conf/icde/2008
db/conf/icde/icde2008.html#DewriRRW08
Rinku Dewri
L. Darrell Whitley
Indrajit Ray
Indrakshi Ray
Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy.
991-1000
2008
PPSN
https://doi.org/10.1007/978-3-540-87700-4_98
conf/ppsn/2008
db/conf/ppsn/ppsn2008.html#DewriWRR08
Rinku Dewri
Nayot Poolsappasit
Indrajit Ray
L. Darrell Whitley
Optimal security hardening using multi-objective optimization on attack tree models of networks.
204-213
2007
CCS
https://doi.org/10.1145/1315245.1315272
conf/ccs/2007
db/conf/ccs/ccs2007.html#DewriPRW07
Lakshminarayanan Renganarayanan
Manjukumar Harthikote-Matha
Rinku Dewri
Sanjay V. Rajopadhye
Towards Optimal Multi-level Tiling for Stencil Computations.
1-10
2007
conf/ipps/2007
IPDPS
https://doi.org/10.1109/IPDPS.2007.370291
https://doi.ieeecomputersociety.org/10.1109/IPDPS.2007.370291
db/conf/ipps/ipdps2007.html#RenganarayananHDR07
Jay Smith
Luis Diego Briceno
Anthony A. Maciejewski
Howard Jay Siegel
Timothy Renner
Vladimir Shestak
Joshua Ladd
Andrew M. Sutton
David L. Janovy
Sudha Govindasamy
Amin Alqudah
Rinku Dewri
Puneet Prakash
Measuring the Robustness of Resource Allocations in a Stochastic Dynamic Environment.
1-10
2007
conf/ipps/2007
IPDPS
https://doi.org/10.1109/IPDPS.2007.370315
https://doi.ieeecomputersociety.org/10.1109/IPDPS.2007.370315
db/conf/ipps/ipdps2007.html#SmithBMSRSLSJGADP07
Kalyanmoy Deb
Kishalay Mitra
Rinku Dewri
Saptarshi Majumdar
Unveiling Optimal Operating Conditions for an Epoxy Polymerization Process Using Multi-objective Evolutionary Computation.
920-931
https://doi.org/10.1007/978-3-540-24855-2_105
2004
conf/gecco/2004-2
GECCO (2)
db/conf/gecco/gecco2004-2.html#DebMDM04
Andrick Adhikari
Ahmed Alhaddad
Amin Alqudah
Anneliese Amschler AndrewsAnneliese Andrews
Prasad Annadata
Jonathan Apodaca
Anamika Barman-Adhikari
Jacob Bellatti
Kimberly Bender
Salah Boukhris
Kirk Boyer
Luis Diego Briceno
Andrew Brunner
Hao Chen
Jingwei Chen
Edwin K. P. Chong
Ashok Kumar Das
Sanchari Das
Kalyanmoy Deb
Tianjie Deng
Wisam Eltarjaman
Sudha Govindasamy
Manjukumar Harthikote-Matha
David L. Janovy
Urvashi Kishnani
Joshua Ladd
Young Jin Lee
Joseph Lewis
Anthony A. Maciejewski
Srinidhi Madabhushi
Saptarshi Majumdar
Junya Michanan
William Mitchell
Kishalay Mitra
Samrat Mondal
Karin Mortl
Naheem Noah
Toan Ong
Suryakanta Panda
Shreya Patel
Nayot Poolsappasit
Puneet Prakash
Jian Qiu
Sanjay V. Rajopadhye
Indrajit Ray
Indrakshi Ray
Lakshminarayanan Renganarayanan
Timothy Renner
Max Roschke
Matthew J. Rutherford
Mohsen Amini Salehi
Vladimir Shestak
Howard Jay Siegel
Jay Smith
Andrew M. Sutton
Ramakrishna Thurimella
L. Darrell Whitley