Riya Mahesh

ORCID: 0000-0003-1489-5418
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Privacy, Security, and Data Protection
  • COVID-19 epidemiological studies
  • Cryptography and Data Security
  • COVID-19 Pandemic Impacts
  • COVID-19 and healthcare impacts
  • Cloud Data Security Solutions
  • COVID-19 Clinical Research Studies
  • Internet Traffic Analysis and Secure E-voting
  • Diverse Scientific Research Studies
  • Healthcare Systems and Reforms
  • Advanced Text Analysis Techniques
  • IoT and Edge/Fog Computing
  • ECG Monitoring and Analysis
  • Global Health Care Issues
  • COVID-19 impact on air quality
  • Antibiotic Use and Resistance
  • Web Data Mining and Analysis
  • SARS-CoV-2 and COVID-19 Research
  • Global Health and Epidemiology
  • Data Mining Algorithms and Applications
  • COVID-19 diagnosis using AI
  • COVID-19 and Mental Health
  • Climate Change and Health Impacts
  • Cooperative Communication and Network Coding

Los Alamos National Laboratory
2021-2022

The University of Texas at Austin
2021

Alagappa University
2012-2020

Bangalore University
2017

In early 2020, Ecuador reported one of the highest surges per capita deaths across globe.

10.1093/ije/dyab163 article EN cc-by-nc International Journal of Epidemiology 2021-07-16

This study investigates the application of Gaussian Naive Bayes (GNB) algorithm for classifying electrocardiogram (ECG) signals using MIT-BIH Arrhythmia dataset. The research encompasses dataset preprocessing, GNB model training, and performance evaluation through metrics such as accuracy, precision, recall, F1-score. Results are visualized confusion matrices receiver operating characteristic (ROC) curves, highlighting model's ability to differentiate between normal abnormal heartbeats....

10.47392/irjaem.2025.0049 article EN Deleted Journal 2025-02-20

The term Data Privacy is associated with data collection and dissemination of data. issues arise in various area such as health care, intellectual property, biological etc. It one the challenging when sharing or publishing between to many sources for research purpose analysis. Sensitive information owners must be protected. There are two kinds major attacks against privacy namely record linkage attribute Earlier, researchers have proposed new methods k-anonymity, l-dlverslty, t-closeness...

10.1109/icprime.2013.6496495 article EN 2013-02-01

Abstract Background In early 2020, Ecuador reported one of the highest surges per capita deaths across globe. Methods We collected a comprehensive dataset containing individual death records between 2015 and 2020 from Ecuadorian National Institute Statistics Census Ministry Government. computed number excess time, geographical locations demographic groups using Poisson regression methods. Results Between January 1 st September 23 rd , in is 36,402 (95% CI: 35,762-36,827) or 208 10 5...

10.1101/2021.02.25.21252481 preprint EN cc-by-nc-nd medRxiv (Cold Spring Harbor Laboratory) 2021-03-01

Abstract COVID-19 outbreaks have had high mortality in low- and middle-income countries such as Ecuador. Human mobility is an important factor influencing the spread of diseases possibly leading to a burden disease at country level. Drastic control measures, complete lockdown, are effective epidemic controls, yet practice one hopes that partial shutdown would suffice. It open problem determine how much can be allowed while controlling outbreak. In this paper, we use statistical models relate...

10.1038/s41598-021-03926-0 article EN cc-by Scientific Reports 2022-01-10

Sharing, transferring, mining and publishing data are fundamental operations in day to life.Preserving the privacy of individuals is essential one.Sensitive personal information must be protected when published.There two kinds risks namely attribute disclosure identity that affects whose published.Early Researchers have contributed new methods k-anonymity, l-diversity, t-closeness preserve privacy.K-anonymity method preserves against attack alone.But Attribute makes compromise this...

10.5121/ijcis.2013.3203 article EN International Journal on Cryptography and Information Security 2013-06-30

This paper details the privacy and security landscape in today's cloud ecosystem identifies that there is a gap addressing risks introduced by machine learning models. As algorithms continue to evolve find applications across diverse domains, need categorize quantify becomes increasingly critical. With emerging trend of AI-as-a-Service (AIaaS), learned AI models (or ML models) are deployed on model providers used consumers. We first survey AIaaS document various kinds liabilities models,...

10.48550/arxiv.2402.00896 preprint EN arXiv (Cornell University) 2024-01-31

Protection of individuals' privacy is a vital activity in data publishing.Government and public sector websites publish enormous amount for sharing the among their departments also to research.Sensitive information individuals, whose are published must be protected.Privacy challenged through two kinds attack namely attribute disclosure identity disclosure.Early Research contributions were made this direction new methods k-anonymity, ℓ-diversity, t-closeness evolved.K-anonymity method...

10.5121/csit.2012.2423 article EN 2012-10-31

Background: In early 2020, Ecuador reported one of the highest surges per capita deaths across globe.Method: We collected a comprehensive dataset containing individual death records between 2015 and 2020 from Ecuadorian National Institute Statistics Census Ministry Government. computed number excess time, geographical locations demographic groups using Poisson regression methods.Findings: Between January 1st September 23rd, in is 36,402 (95% CI: 35,762-36,827) or 208 105 population, which...

10.2139/ssrn.3785993 article EN SSRN Electronic Journal 2021-01-01

Rising threat of the global pandemic COVID 19 has become major cause concern among nations worldwide. The appalling aggravated health people making normal life come to a virtual standstill. purpose this study is investigate and compare similarities differences between previous outbreak SARS-COV-1 with that 19. It makes use bioinformatic approach analyze why made situations uncontrollable as opposed although both belong same coronavirus family. Discusses about recent clinical trials are being...

10.4018/ijarphm.2022010105 article EN International Journal of Applied Research on Public Health Management 2021-07-23

Nowadays people are sharing their information in digitally, and plays the significant role public sectors business world assist understanding social behavior, statistical analysis drafting policies for future direction. At same time, users’ pers onal should be preserved from adversaries while data publishing. Privacy preservation is one of main agenda publishing, K-anonymity its families likel-diversity t-closeness which most familiar models to preserve sensitive individuals Besides,...

10.3233/jifs-179079 article EN Journal of Intelligent & Fuzzy Systems 2019-04-23

Abstract COVID-19 outbreaks have had high mortality in low- and medium-income countries such as Ecuador. Human mobility is an important factor influencing the spread of diseases possibly leading to a burden disease at country level. Drastic control measures, complete lockdown are effective epidemic controls, yet practice, one hopes that partial shutdown would suffice. It open problem determine how much can be allowed while controlling outbreak. In this paper, we use statistical models relate...

10.1101/2021.05.19.21257056 preprint EN cc-by-nc-nd medRxiv (Cold Spring Harbor Laboratory) 2021-05-22

Privacy preservation is an important branch of Data Mining which handles hiding individual's sensitive data without affecting the usability. This paper proposes a new technique to provide privacy based on semantic context. Multisource Keyword Extraction and Graph Construction for Preservation involves extracting keywords from various formats preserving among extracted using techniques Vector Marking. Initially, cleaning preprocessing done document extract by applying such as parsing,...

10.1145/3029387.3029414 article EN 2017-01-10

10.5281/zenodo.4013312 article EN cc-by Zenodo (CERN European Organization for Nuclear Research) 2020-09-03
Coming Soon ...