- Privacy-Preserving Technologies in Data
- Privacy, Security, and Data Protection
- Cryptography and Data Security
- Mobile Crowdsensing and Crowdsourcing
- Internet Traffic Analysis and Secure E-voting
- Distributed and Parallel Computing Systems
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Distributed systems and fault tolerance
- Parallel Computing and Optimization Techniques
- Optimization and Search Problems
- Data Quality and Management
- Information and Cyber Security
- Homelessness and Social Issues
- Cloud Computing and Resource Management
- Solidification and crystal growth phenomena
- Caching and Content Delivery
- Cybercrime and Law Enforcement Studies
- HIV, Drug Use, Sexual Risk
- Metallurgy and Material Forming
- Green IT and Sustainability
- Spam and Phishing Detection
- Smart Grid Security and Resilience
- Advanced Data Storage Technologies
- Human Mobility and Location-Based Analysis
University of Denver
2014-2024
University of Colorado Denver
2016
Colorado State University
2007-2010
Indian Institute of Technology Kharagpur
2004-2005
Security risk assessment and mitigation are two vital processes that need to be executed maintain a productive IT infrastructure. On one hand, models such as attack graphs trees have been proposed assess the cause-consequence relationships between various network states, while on other different decision problems explored identify minimum-cost hardening measures. However, these do not help reason about causal dependencies states. Further, optimization formulations ignore issue of resource...
Researchers have previously looked into the problem of determining if a given set security hardening measures can effectively make networked system secure. Many them also addressed minimizing total cost implementing these measures, costs for individual measures. However, administrators are often faced with more challenging since they to work within fixed budget which may be less than minimum hardening. Their is how select subset so as and yet minimize residual damage caused by not plugging...
Location privacy research has received wide attention in the past few years owing to growing popularity of location-based applications, and skepticism thereof on collection location information. A large section this is directed toward mechanisms based obfuscation enforced using cloaking regions. The primary motivation for engagement comes from relatively well-researched area database privacy. Researchers sibling domain have indicated multiple times that any notion incomplete without explicit...
Natural Language Processing (NLP) is an essential subset of artificial intelligence. It has become effective in several domains, such as healthcare, finance, and media, to identify perceptions, opinions, misuse, among others. Privacy no exception, initiatives have been taken address the challenges usable privacy notifications users with help NLP. To this aid, we conduct a literature review by analyzing 109 papers at intersection NLP policies. First, provide brief introduction policies...
Location-based applications utilize the positioning capabilities of a mobile device to determine current location user, and customize query results include neighboring points interests. However, knowledge is often perceived as personal information. One immediate issues hindering wide acceptance location-based lack appropriate methodologies that offer fine grain privacy controls user without vastly affecting usability service. While number privacy-preserving models algorithms have taken shape...
Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, region should also guarantee that type queries issued users within are mutually diverse enough. The first requirement is fulfilled satisfying k-anonymity while second one ensured query l-diversity. However, these two models not sufficient to prevent association when service depends on continuous updates. Successive for may be k-anonymous and...
The collection of driving habits data is gaining momentum as vehicle telematics based solutions become popular in consumer markets such auto-insurance and driver assistance services. These rely on features time travel, speed, braking to assess accident risk safety. Given the privacy issues surrounding geographic tracking individuals, many explicitly claim that customer's GPS coordinates are not recorded. Although revealing can give us access a number innovative products, we believe...
A simulation of the recrystallization process was conducted by coupling a cellular automation with lookup table that evolved using genetic algorithms. Through an evolutionary inverse modelling, rate recrystallization, and grain size distribution were successfully optimized recrystallized microstructure acceptably predicted.
Stencil computations form the performance-critical core of many applications. Tiling and parallelization are two important optimizations to speed up stencil computations. Many tiling strategies applicable a given computation. The best strategy depends not only on combination techniques, but also parameters: tile loop sizes in each dimension; computation-communication balance code; processor architecture; message startup costs; etc. choices can be determined through design-space exploration,...
Privacy policies outline data collection and sharing practices followed by an organization, together with choice control measures available to users manage the process. However, have often needed help reading understanding such documents, regardless of their being written in a natural language. The fundamental problems privacy persist despite advancements design, frameworks, regulations. To identify causes persistently challenging comprehend, it is vital investigate historical policy...
The power grid is a constant target for attacks as they have the potential to affect large geographical location, thus affecting hundreds of thousands customers. With advent wireless sensor networks in smart grids, distributed network has more vulnerabilities than before, giving numerous entry points an attacker. operation usually not hindered by small-scale attacks; it popularly known be self-healing and recovers from attack neighboring areas can mitigate loss prevent cascading failures....
A proof-of-concept device can provide auto insurers with the aggregate statistics they seek without affecting driver privacy by transmitting data points collected during a trip.
When disseminating data involving human subjects, researchers have to weigh in the requirements of privacy individuals involved data. A model widely used for enhancing individual is k-anonymity, where an record rendered similar k - 1 other records set by using generalization and/or suppression operations on attributes. The drawback this that such transformations result considerable loss information proportional choice k. Studies context so far focused minimizing some given value However,...
Data dissemination in pervasive environments is often accomplished by on-demand broadcasting. The time critical nature of the data requests plays an important role scheduling these broadcasts. Most research broadcast has focused on timely servicing so as to minimize number missed deadlines. However, there exists many where utility equally criterion its timeliness. Missing deadline reduces but does not make it zero. In this work, we address problem broadcasts with soft We investigate search...
Heterogeneous distributed computing systems often must operate in an environment where system parameters are subject to uncertainty. Robustness can be defined as the degree which a function correctly presence of parameter values different from those assumed. We present methodology for quantifying robustness resource allocations dynamic task execution times stochastic. The is evaluated through measuring three allocation heuristics within context stochastic environment. A Bayesian regression...
Mobile payment applications facilitate quick digital transactions; thus, evaluating these for security, privacy, user interaction, and accessibility is crucial. In our study, we analyzed the most downloaded 50 mobile on Google Play Store. Thereafter, used three open-source tools (MobSF, AndroBugs, RiskInDroid) to assess their security privacy features. We then employed Microsoft's Accessibility Insights analysis evaluated 1,886,352 Store reviews, specifically 90,494 with negative sentiments...
We present a novel cryptanalytic method based on graph traversals to show that record linkage using Bloom filter encoding does not preserve privacy in two-party setting. is often suggested as practical approach medical data aggregation. This attack stronger than simple dictionary it assume knowledge of the universe. The very and produced accurate results when experimented large amounts name-like derived from North Carolina voter registration database. also give theoretical arguments going...