


default search action
Rinku Dewri
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c32]Andrick Adhikari, Sanchari Das, Rinku Dewri:
PolicyPulse: Precision Semantic Role Extraction for Enhanced Privacy Policy Comprehension. NDSS 2025 - [i1]Andrick Adhikari, Sanchari Das, Rinku Dewri:
Natural Language Processing of Privacy Policies: A Survey. CoRR abs/2501.10319 (2025) - 2023
- [j23]Srinidhi Madabhushi, Rinku Dewri:
A survey of anomaly detection methods for power grids. Int. J. Inf. Sec. 22(6): 1799-1832 (2023) - [j22]Tianjie Deng
, Anamika Barman-Adhikari
, Young Jin Lee
, Rinku Dewri, Kimberly Bender:
Substance use and sentiment and topical tendencies: a study using social media conversations of youth experiencing homelessness. Inf. Technol. People 36(6): 2515-2542 (2023) - [j21]Andrick Adhikari, Sanchari Das, Rinku Dewri:
Evolution of Composition, Readability, and Structure of Privacy Policies over Two Decades. Proc. Priv. Enhancing Technol. 2023(3): 138-153 (2023) - [c31]Urvashi Kishnani
, Naheem Noah
, Sanchari Das
, Rinku Dewri
:
Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications. EuroUSEC 2023: 143-157 - 2022
- [j20]Suryakanta Panda
, Samrat Mondal, Rinku Dewri, Ashok Kumar Das:
Towards achieving efficient access control of medical data with both forward and backward secrecy. Comput. Commun. 189: 36-52 (2022) - [j19]Shreya Patel, Rinku Dewri
:
Private record linkage with linkage maps. Secur. Priv. 5(6) (2022) - [c30]Karin Mortl, Rinku Dewri:
Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage. ICISS 2022: 44-63 - [c29]Srinidhi Madabhushi, Rinku Dewri:
On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems. ICISS 2022: 220-234 - [c28]Andrick Adhikari, Sanchari Das, Rinku Dewri:
Privacy Policy Analysis with Sentence Classification. PST 2022: 1-10 - [c27]Urvashi Kishnani, Naheem Noah, Sanchari Das, Rinku Dewri:
Privacy and Security Evaluation of Mobile Payment Applications Through User-Generated Reviews. WPES@CCS 2022: 159-173 - 2021
- [c26]Andrick Adhikari, Rinku Dewri:
Towards Change Detection in Privacy Policies with Natural Language Processing. PST 2021: 1-10 - [c25]Srinidhi Madabhushi, Rinku Dewri:
Detection of Demand Manipulation Attacks on a Power Grid. PST 2021: 1-7
2010 – 2019
- 2018
- [c24]Kirk Boyer, Hao Chen, Jingwei Chen, Jian Qiu, Rinku Dewri:
A Characterization of the Mass Surveillance Potential of Road Traffic Monitors. ICISS 2018: 3-23 - 2017
- [j18]Jacob Bellatti, Andrew Brunner, Joseph Lewis, Prasad Annadata, Wisam Eltarjaman, Rinku Dewri, Ramakrishna Thurimella:
Driving Habits Data: Location Privacy Implications and Solutions. IEEE Secur. Priv. 15(1): 12-20 (2017) - [j17]William Mitchell, Rinku Dewri, Ramakrishna Thurimella, Max Roschke:
A graph traversal attack on Bloom filter-based medical data aggregation. Int. J. Big Data Intell. 4(4): 217-226 (2017) - [j16]Salah Boukhris
, Anneliese Andrews, Ahmed Alhaddad, Rinku Dewri:
A case study of black box fail-safe testing in web applications. J. Syst. Softw. 131: 146-167 (2017) - [j15]Wisam Eltarjaman, Rinku Dewri, Ramakrishna Thurimella:
Location Privacy for Rank-based Geo-Query Systems. Proc. Priv. Enhancing Technol. 2017(4): 77-96 (2017) - [j14]Junya Michanan, Rinku Dewri, Matthew J. Rutherford:
GreenC5: An adaptive, energy-aware collection for green software development. Sustain. Comput. Informatics Syst. 13: 42-60 (2017) - [j13]Wisam Eltarjaman, Rinku Dewri, Ramakrishna Thurimella:
Private Retrieval of POI Details in Top-K Queries. IEEE Trans. Mob. Comput. 16(9): 2611-2624 (2017) - 2016
- [j12]Mohsen Amini Salehi
, Jay Smith, Anthony A. Maciejewski
, Howard Jay Siegel, Edwin K. P. Chong, Jonathan Apodaca, Luis Diego Briceno, Timothy Renner, Vladimir Shestak, Joshua Ladd, Andrew M. Sutton
, David L. Janovy, Sudha Govindasamy, Amin Alqudah
, Rinku Dewri, Puneet Prakash:
Stochastic-based robust dynamic resource allocation for independent tasks in a heterogeneous computing system. J. Parallel Distributed Comput. 97: 96-111 (2016) - [j11]Rinku Dewri, Ramakrishna Thurimella:
Mobile local search with noisy locations. Pervasive Mob. Comput. 32: 78-92 (2016) - [j10]Rinku Dewri, Toan Ong, Ramakrishna Thurimella:
Linking Health Records for Federated Query Processing. Proc. Priv. Enhancing Technol. 2016(3): 4-23 (2016) - 2015
- [c23]Junya Michanan, Rinku Dewri, Matthew J. Rutherford:
Predicting data structures for energy efficient computing. IGSC 2015: 1-8 - [c22]Wisam Eltarjaman, Prasad Annadata, Rinku Dewri, Ramakrishna Thurimella:
Leveraging Smartphone Advances for Continuous Location Privacy. MDM (1) 2015: 197-202 - [c21]Ramakrishna Thurimella, Rinku Dewri, William Mitchell:
Record linkage applications in health services research: opportunities and challenges. SIN 2015: 6 - 2014
- [j9]Rinku Dewri, Ramakrishna Thurimella:
Exploiting Service Similarity for Privacy in Location-Based Search Queries. IEEE Trans. Parallel Distributed Syst. 25(2): 374-383 (2014) - [c20]Junya Michanan, Rinku Dewri, Matthew J. Rutherford:
Understanding the power-performance tradeoff through Pareto analysis of live performance data. IGCC 2014: 1-8 - 2013
- [j8]Rinku Dewri, Ramakrishna Thurimella:
Can a Phone's GPS "Lie" Intelligently? Computer 46(2): 91-93 (2013) - [j7]Rinku Dewri:
Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers. IEEE Trans. Mob. Comput. 12(12): 2360-2372 (2013) - [c19]Rinku Dewri, Wisam Eltarjaman, Prasad Annadata, Ramakrishna Thurimella:
Beyond the thin client model for location privacy. PRISMS 2013: 1-8 - [c18]Rinku Dewri, Prasad Annadata, Wisam Eltarjaman, Ramakrishna Thurimella:
Inferring trip destinations from driving habits data. WPES 2013: 267-272 - 2012
- [j6]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Utility driven optimization of real time data broadcast schedules. Appl. Soft Comput. 12(7): 1832-1846 (2012) - [j5]Rinku Dewri, Indrajit Ray, Nayot Poolsappasit, L. Darrell Whitley:
Optimal security hardening on attack tree models of networks: a cost-benefit analysis. Int. J. Inf. Sec. 11(3): 167-188 (2012) - [j4]Nayot Poolsappasit, Rinku Dewri, Indrajit Ray:
Dynamic Security Risk Management Using Bayesian Attack Graphs. IEEE Trans. Dependable Secur. Comput. 9(1): 61-74 (2012) - 2011
- [j3]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization. J. Comput. Secur. 19(5): 935-974 (2011) - [j2]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
k-Anonymization in the Presence of Publisher Preferences. IEEE Trans. Knowl. Data Eng. 23(11): 1678-1690 (2011) - [c17]Rinku Dewri:
Location Privacy and Attacker Knowledge: Who Are We Fighting against? SecureComm 2011: 96-115 - 2010
- [j1]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Real time stochastic scheduling in broadcast systems with decentralized data storage. Real Time Syst. 45(3): 143-175 (2010) - [c16]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
On the Identification of Property Based Generalizations in Microdata Anonymization. DBSec 2010: 81-96 - [c15]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services. Mobile Data Management 2010: 95-104 - [c14]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS. SecureComm 2010: 71-88
2000 – 2009
- 2009
- [c13]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice. CIKM 2009: 1037-1046 - [c12]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
On the comparison of microdata disclosure control algorithms. EDBT 2009: 240-251 - [c11]Rinku Dewri, L. Darrell Whitley, Indrajit Ray, Indrakshi Ray:
A multi-objective approach to data sharing with privacy constraints and preference based objectives. GECCO 2009: 1499-1506 - 2008
- [c10]Indrajit Ray, Nayot Poolsappasit, Rinku Dewri:
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems. DBSec 2008: 297-312 - [c9]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Optimizing on-demand data broadcast scheduling in pervasive environments. EDBT 2008: 559-569 - [c8]Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
Security Provisioning in Pervasive Environments Using Multi-objective Optimization. ESORICS 2008: 349-363 - [c7]Rinku Dewri, L. Darrell Whitley, Indrakshi Ray, Indrajit Ray:
Evolution strategy based optimization of on-demand dependent data broadcast scheduling. GECCO 2008: 1699-1700 - [c6]Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
On the Optimal Selection of k in the k-Anonymity Problem. ICDE 2008: 1364-1366 - [c5]Rinku Dewri, L. Darrell Whitley, Indrajit Ray, Indrakshi Ray:
Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy. PPSN 2008: 991-1000 - 2007
- [c4]Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, L. Darrell Whitley:
Optimal security hardening using multi-objective optimization on attack tree models of networks. CCS 2007: 204-213 - [c3]Lakshminarayanan Renganarayanan, Manjukumar Harthikote-Matha, Rinku Dewri, Sanjay V. Rajopadhye:
Towards Optimal Multi-level Tiling for Stencil Computations. IPDPS 2007: 1-10 - [c2]Jay Smith, Luis Diego Briceno, Anthony A. Maciejewski
, Howard Jay Siegel, Timothy Renner, Vladimir Shestak, Joshua Ladd, Andrew M. Sutton
, David L. Janovy, Sudha Govindasamy, Amin Alqudah
, Rinku Dewri, Puneet Prakash:
Measuring the Robustness of Resource Allocations in a Stochastic Dynamic Environment. IPDPS 2007: 1-10 - 2004
- [c1]Kalyanmoy Deb, Kishalay Mitra
, Rinku Dewri, Saptarshi Majumdar:
Unveiling Optimal Operating Conditions for an Epoxy Polymerization Process Using Multi-objective Evolutionary Computation. GECCO (2) 2004: 920-931
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-21 01:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint