Rinku Dewri

ORCID: 0000-0002-8332-2157
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Privacy, Security, and Data Protection
  • Cryptography and Data Security
  • Mobile Crowdsensing and Crowdsourcing
  • Internet Traffic Analysis and Secure E-voting
  • Distributed and Parallel Computing Systems
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Distributed systems and fault tolerance
  • Parallel Computing and Optimization Techniques
  • Optimization and Search Problems
  • Data Quality and Management
  • Information and Cyber Security
  • Homelessness and Social Issues
  • Cloud Computing and Resource Management
  • Solidification and crystal growth phenomena
  • Caching and Content Delivery
  • Cybercrime and Law Enforcement Studies
  • HIV, Drug Use, Sexual Risk
  • Metallurgy and Material Forming
  • Green IT and Sustainability
  • Spam and Phishing Detection
  • Smart Grid Security and Resilience
  • Advanced Data Storage Technologies
  • Human Mobility and Location-Based Analysis

University of Denver
2014-2024

University of Colorado Denver
2016

Colorado State University
2007-2010

Indian Institute of Technology Kharagpur
2004-2005

Security risk assessment and mitigation are two vital processes that need to be executed maintain a productive IT infrastructure. On one hand, models such as attack graphs trees have been proposed assess the cause-consequence relationships between various network states, while on other different decision problems explored identify minimum-cost hardening measures. However, these do not help reason about causal dependencies states. Further, optimization formulations ignore issue of resource...

10.1109/tdsc.2011.34 article EN IEEE Transactions on Dependable and Secure Computing 2011-07-06

Researchers have previously looked into the problem of determining if a given set security hardening measures can effectively make networked system secure. Many them also addressed minimizing total cost implementing these measures, costs for individual measures. However, administrators are often faced with more challenging since they to work within fixed budget which may be less than minimum hardening. Their is how select subset so as and yet minimize residual damage caused by not plugging...

10.1145/1315245.1315272 article EN 2007-10-28

Location privacy research has received wide attention in the past few years owing to growing popularity of location-based applications, and skepticism thereof on collection location information. A large section this is directed toward mechanisms based obfuscation enforced using cloaking regions. The primary motivation for engagement comes from relatively well-researched area database privacy. Researchers sibling domain have indicated multiple times that any notion incomplete without explicit...

10.1109/tmc.2012.208 article EN IEEE Transactions on Mobile Computing 2012-10-03

Natural Language Processing (NLP) is an essential subset of artificial intelligence. It has become effective in several domains, such as healthcare, finance, and media, to identify perceptions, opinions, misuse, among others. Privacy no exception, initiatives have been taken address the challenges usable privacy notifications users with help NLP. To this aid, we conduct a literature review by analyzing 109 papers at intersection NLP policies. First, provide brief introduction policies...

10.48550/arxiv.2501.10319 preprint EN arXiv (Cornell University) 2025-01-17

Location-based applications utilize the positioning capabilities of a mobile device to determine current location user, and customize query results include neighboring points interests. However, knowledge is often perceived as personal information. One immediate issues hindering wide acceptance location-based lack appropriate methodologies that offer fine grain privacy controls user without vastly affecting usability service. While number privacy-preserving models algorithms have taken shape...

10.1109/tpds.2013.34 article EN IEEE Transactions on Parallel and Distributed Systems 2014-01-03

Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, region should also guarantee that type queries issued users within are mutually diverse enough. The first requirement is fulfilled satisfying k-anonymity while second one ensured query l-diversity. However, these two models not sufficient to prevent association when service depends on continuous updates. Successive for may be k-anonymous and...

10.1109/mdm.2010.52 article EN 2010-01-01

The collection of driving habits data is gaining momentum as vehicle telematics based solutions become popular in consumer markets such auto-insurance and driver assistance services. These rely on features time travel, speed, braking to assess accident risk safety. Given the privacy issues surrounding geographic tracking individuals, many explicitly claim that customer's GPS coordinates are not recorded. Although revealing can give us access a number innovative products, we believe...

10.1145/2517840.2517871 article EN 2013-11-04

A simulation of the recrystallization process was conducted by coupling a cellular automation with lookup table that evolved using genetic algorithms. Through an evolutionary inverse modelling, rate recrystallization, and grain size distribution were successfully optimized recrystallized microstructure acceptably predicted.

10.1088/0965-0393/13/2/002 article EN Modelling and Simulation in Materials Science and Engineering 2004-12-23

Stencil computations form the performance-critical core of many applications. Tiling and parallelization are two important optimizations to speed up stencil computations. Many tiling strategies applicable a given computation. The best strategy depends not only on combination techniques, but also parameters: tile loop sizes in each dimension; computation-communication balance code; processor architecture; message startup costs; etc. choices can be determined through design-space exploration,...

10.1109/ipdps.2007.370291 article EN 2007-01-01

Privacy policies outline data collection and sharing practices followed by an organization, together with choice control measures available to users manage the process. However, have often needed help reading understanding such documents, regardless of their being written in a natural language. The fundamental problems privacy persist despite advancements design, frameworks, regulations. To identify causes persistently challenging comprehend, it is vital investigate historical policy...

10.56553/popets-2023-0074 article EN cc-by Proceedings on Privacy Enhancing Technologies 2023-05-15

The power grid is a constant target for attacks as they have the potential to affect large geographical location, thus affecting hundreds of thousands customers. With advent wireless sensor networks in smart grids, distributed network has more vulnerabilities than before, giving numerous entry points an attacker. operation usually not hindered by small-scale attacks; it popularly known be self-healing and recovers from attack neighboring areas can mitigate loss prevent cascading failures....

10.1007/s10207-023-00720-z article EN cc-by International Journal of Information Security 2023-07-08

A proof-of-concept device can provide auto insurers with the aggregate statistics they seek without affecting driver privacy by transmitting data points collected during a trip.

10.1109/msp.2017.6 article EN IEEE Security & Privacy 2017-01-01

When disseminating data involving human subjects, researchers have to weigh in the requirements of privacy individuals involved data. A model widely used for enhancing individual is k-anonymity, where an record rendered similar k - 1 other records set by using generalization and/or suppression operations on attributes. The drawback this that such transformations result considerable loss information proportional choice k. Studies context so far focused minimizing some given value However,...

10.1109/icde.2008.4497557 article EN 2008-04-01

Data dissemination in pervasive environments is often accomplished by on-demand broadcasting. The time critical nature of the data requests plays an important role scheduling these broadcasts. Most research broadcast has focused on timely servicing so as to minimize number missed deadlines. However, there exists many where utility equally criterion its timeliness. Missing deadline reduces but does not make it zero. In this work, we address problem broadcasts with soft We investigate search...

10.1145/1353343.1353411 article EN 2008-03-25

Heterogeneous distributed computing systems often must operate in an environment where system parameters are subject to uncertainty. Robustness can be defined as the degree which a function correctly presence of parameter values different from those assumed. We present methodology for quantifying robustness resource allocations dynamic task execution times stochastic. The is evaluated through measuring three allocation heuristics within context stochastic environment. A Bayesian regression...

10.1109/ipdps.2007.370315 article EN 2007-01-01

Mobile payment applications facilitate quick digital transactions; thus, evaluating these for security, privacy, user interaction, and accessibility is crucial. In our study, we analyzed the most downloaded 50 mobile on Google Play Store. Thereafter, used three open-source tools (MobSF, AndroBugs, RiskInDroid) to assess their security privacy features. We then employed Microsoft's Accessibility Insights analysis evaluated 1,886,352 Store reviews, specifically 90,494 with negative sentiments...

10.1145/3617072.3617102 article EN 2023-10-13

10.1016/j.suscom.2016.11.004 article EN Sustainable Computing Informatics and Systems 2016-11-24

We present a novel cryptanalytic method based on graph traversals to show that record linkage using Bloom filter encoding does not preserve privacy in two-party setting. is often suggested as practical approach medical data aggregation. This attack stronger than simple dictionary it assume knowledge of the universe. The very and produced accurate results when experimented large amounts name-like derived from North Carolina voter registration database. also give theoretical arguments going...

10.1504/ijbdi.2017.086956 article EN International Journal of Big Data Intelligence 2017-01-01
Coming Soon ...