Center for Discrete Mathematics and Theoretical Computer Science (DIMACS)

Filter
Conference contribution

Search results

  • 2022

    Complex Economic Consequence Analysis to Protect the Maritime Infrastructure

    Egan, D., Nelson, C., Roberts, F., Rose, A., Tucci, A. & Whytlaw, R., 2022, 2022 IEEE International Symposium on Technologies for Homeland Security, HST 2022. Institute of Electrical and Electronics Engineers Inc., (2022 IEEE International Symposium on Technologies for Homeland Security, HST 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    Living-learning community for women in computer science at Rutgers

    Wright, R. N., Nadler, S. J., Nguyen, T. D., Sanchez Gomez, C. N. & Wright, H. M., Feb 22 2019, SIGCSE 2019 - Proceedings of the 50th ACM Technical Symposium on Computer Science Education. Association for Computing Machinery, Inc, p. 286-292 7 p. (SIGCSE 2019 - Proceedings of the 50th ACM Technical Symposium on Computer Science Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Scopus citations
  • 2018

    A case study in tailoring a bio-inspired cyber-security algorithm: Designing anomaly detection for multilayer networks

    Suárez, G., Gallos, L. K. & Fefferman, N. H., Aug 2 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018. Institute of Electrical and Electronics Engineers Inc., p. 281-286 6 p. 8424661. (Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • IGroup Learning and iDetect for Dynamic Anomaly Detection with Applications in Maritime Threat Detection

    Cai, C., Chen, R., Liu, A. D., Roberts, F. S. & Xie, M., Dec 12 2018, 2018 IEEE International Symposium on Technologies for Homeland Security, HST 2018. Institute of Electrical and Electronics Engineers Inc., 8574162. (2018 IEEE International Symposium on Technologies for Homeland Security, HST 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • IGroup Learning and iDetect for Dynamic Anomaly Detection with Applications in Maritime Threat Detection

    Cai, C., Chen, R., Liu, A. D., Roberts, F. S. & Xie, M., Dec 11 2018, Proceedings of 2018 10th International Conference on Knowledge and Systems Engineering, KSE 2018. Phuong, T. M. & Nguyen, M. L. (eds.). Institute of Electrical and Electronics Engineers Inc., 8573348. (Proceedings of 2018 10th International Conference on Knowledge and Systems Engineering, KSE 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Using Noisy Binary Search for Differentially Private Anomaly Detection

    Bittner, D. M., Sarwate, A. D. & Wright, R. N., 2018, Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Proceedings. Dinur, I., Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 20-37 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10879 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • 2017

    Differentially private noisy search with applications to anomaly detection

    Bittner, D. M., Sarwate, A. D. & Wright, R. N., Nov 3 2017, AISec 2017 - Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 53 1 p. (AISec 2017 - Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Scopus citations
  • FACETS: Adaptive local exploration of large graphs

    Pienta, R., Kahng, M., Lin, Z., Vreeken, J., Talukdar, P., Abello, J., Parameswaran, G. & Chau, D. H., 2017, Proceedings of the 17th SIAM International Conference on Data Mining, SDM 2017. Chawla, N. & Wang, W. (eds.). Society for Industrial and Applied Mathematics Publications, p. 597-605 9 p. (Proceedings of the 17th SIAM International Conference on Data Mining, SDM 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    18 Scopus citations
  • Keynote: Privacy in today's world

    Wright, R. N., Oct 30 2017, CyberW 2017 - Proceedings of the 2017 Workshop on Women in Cyber Security, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 7-10 4 p. (CyberW 2017 - Proceedings of the 2017 Workshop on Women in Cyber Security, co-located with CCS 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2016

    Differentially private online active learning with applications to anomaly detection

    Ghassemi, M., Sarwate, A. D. & Wright, R. N., Oct 28 2016, AISec 2016 - Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2016. Association for Computing Machinery, Inc, p. 117-128 12 p. (AISec 2016 - Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Meaningful and meaningless statements using metrics for the border condition

    Roberts, F. S., Sep 14 2016, 2016 IEEE Symposium on Technologies for Homeland Security, HST 2016. Institute of Electrical and Electronics Engineers Inc., 7568936. (2016 IEEE Symposium on Technologies for Homeland Security, HST 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The little-known challenge of maritime cyber security

    Direnzo, J., Goward, D. A. & Roberts, F. S., Jan 20 2016, IISA 2015 - 6th International Conference on Information, Intelligence, Systems and Applications. Institute of Electrical and Electronics Engineers Inc., 7388071. (IISA 2015 - 6th International Conference on Information, Intelligence, Systems and Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • 2015

    Experimental designs for testing metal detectors at a large sports stadium

    Nelson, C., Kantor, P., Nakamura, B., Ricks, B., Whytlaw, R., Egan, D., Matlin, A., Roberts, F., Tobia, M. & Young, M., Aug 26 2015, 2015 IEEE International Symposium on Technologies for Homeland Security, HST 2015. Institute of Electrical and Electronics Engineers Inc., 7225280. (2015 IEEE International Symposium on Technologies for Homeland Security, HST 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Highly efficient evaluation design (HEED) for comparing algorithms used to detect nuclear materials

    Kantor, P., Nelson, C., Roberts, F. & Pottenger, W. M., 2015, IIE Annual Conference and Expo 2015. Institute of Industrial Engineers, p. 1842-1851 10 p. (IIE Annual Conference and Expo 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Optimal US coast guard boat allocations with sharing

    Nakamura, B., Boros, E., Kantor, P., McGinity, C., Nelson, C., Oster, M., Ricks, B., Roberts, F., Yao, W., Ball, P., Conrad, C., Rader, T. & Hanson, K., 2015, IIE Annual Conference and Expo 2015. Institute of Industrial Engineers, p. 2049-2058 10 p. (IIE Annual Conference and Expo 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Scalable graph exploration and visualization: Sensemaking challenges and opportunities

    Pienta, R., Abello, J., Kahng, M. & Chau, D. H., Mar 30 2015, 2015 International Conference on Big Data and Smart Computing, BIGCOMP 2015. Institute of Electrical and Electronics Engineers Inc., p. 271-278 8 p. 7072812. (2015 International Conference on Big Data and Smart Computing, BIGCOMP 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    57 Scopus citations
  • Using data visualization to analyze grade crossing accidents

    Williams, T., Abello, J., Betak, J. & Desimone, D., 2015, 2015 Joint Rail Conference, JRC 2015. American Society of Mechanical Engineers, (2015 Joint Rail Conference, JRC 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2014

    ACCAM global optimization model for the USCG aviation air stations

    Nelson, C., Boros, E., Roberts, F., Rubio-Herrero, J., Kantor, P., McGinity, C., Nakamura, B., Ricks, B., Ball, P., Conrad, C., Hanson, K. & Rader, T., 2014, IIE Annual Conference and Expo 2014. Institute of Industrial Engineers, p. 2761-2770 10 p. (IIE Annual Conference and Expo 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Modeling the impact of patron screening at an NFL stadium

    Ricks, B. C., Nakamura, B., Almaz, A., DeMarco, R., Hui, C., Kantor, P., Matlin, A., Nelson, C., Powell, H., Roberts, F. & Thompson, B., 2014, IIE Annual Conference and Expo 2014. Institute of Industrial Engineers, p. 3086-3095 10 p. (IIE Annual Conference and Expo 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Open vs. closed systems for accountability

    Feigenbaum, J., Jaggard, A. D. & Wright, R. N., 2014, Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014. Association for Computing Machinery, 4. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Practical and privacy-preserving policy compliance for outsourced data

    Di Crescenzo, G., Feigenbaum, J., Gupta, D., Panagos, E., Perry, J. & Wright, R. N., 2014, Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Revised Selected Papers. Brenner, M., Smith, M., Böhme, R. & Moore, T. (eds.). Springer Verlag, p. 181-194 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8438).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Privacy-preserving publish/subscribe: Efficient protocols in a distributed model

    Di Crescenzo, G., Coan, B., Schultz, J., Tsang, S. & Wright, R. N., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer Verlag, p. 114-132 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Systematizing secure computation for research and decision support

    Perry, J., Gupta, D., Feigenbaum, J. & Wright, R. N., 2014, Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings. Abdalla, M. & de Prisco, R. (eds.). Springer Verlag, p. 380-397 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Temporal multivariate networks

    Archambault, D., Abello, J., Kennedy, J., Kobourov, S., Ma, K. L., Miksch, S., Muelder, C. & Telea, A. C., 2014, Multivariate Network Visualization - Dagstuhl Seminar #13201, Revised Discussions. Springer Verlag, p. 151-174 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8380 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Scopus citations
  • 2013

    DP-WHERE: Differentially private modeling of human mobility

    Mir, D. J., Isaacman, S., Caceres, R., Martonosi, M. & Wright, R. N., 2013, Proceedings - 2013 IEEE International Conference on Big Data, Big Data 2013. IEEE Computer Society, p. 580-588 9 p. 6691626. (Proceedings - 2013 IEEE International Conference on Big Data, Big Data 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    84 Scopus citations
  • Efficient and private three-party publish/subscribe

    Di Crescenzo, G., Burns, J., Coan, B., Schultz, J., Stanton, J., Tsang, S. & Wright, R. N., 2013, Network and System Security - 7th International Conference, NSS 2013, Proceedings. p. 278-292 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7873 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Estimating violation risk for fisheries regulations

    Chalupsky, H., Demarco, R., Hovy, E. H., Kantor, P. B., Matlin, A., Mitra, P., Ozbas, B., Roberts, F. S., Wojtowicz, J. & Xie, M., 2013, Algorithmic Decision Theory - Third International Conference, ADT 2013, Proceedings. Springer Verlag, p. 297-308 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8176 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Fixed points of graph peeling

    Abello, J. & Queyroi, F., 2013, Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013. Association for Computing Machinery, p. 256-263 8 p. (Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • The design space of probing algorithms for network-performance measurement

    Jaggard, A. D., Kopparty, S., Ramachandran, V. & Wright, R. N., 2013, SIGMETRICS 2013 - Proceedings of the 2013 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 1 SPEC. ISS. ed. p. 105-116 12 p. (Performance Evaluation Review; vol. 41, no. 1 SPEC. ISS.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • 2012

    A differentially private estimator for the stochastic Kronecker graph model

    Mir, D. & Wright, R. N., 2012, Proceedings - Joint EDBT/ICDT Workshops 2012. p. 167-176 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Scopus citations
  • MSOL restricted contractibility to planar graphs

    Abello, J., Klavík, P., Kratochvíl, J. & Vyskočil, T., 2012, Parameterized and Exact Computation - 7th International Symposium, IPEC 2012, Proceedings. p. 194-205 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7535 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2011

    Accountability and deterrence in online life (extended abstract)

    Feigenbaum, J., Hendler, J. A., Jaggard, A. D., Weitzner, D. J. & Wright, R. N., 2011, Proceedings of the 3rd International Web Science Conference, WebSci 2011. Association for Computing Machinery, 7. (Proceedings of the 3rd International Web Science Conference, WebSci 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • A method for transferring probabilistic user models between environments

    Roberts, D. L. & Roberts, F., 2011, Interactive Storytelling - 4th International Conference on Interactive Digital Storytelling, ICIDS 2011, Proceedings. p. 43-54 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7069 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Distributed computing with rules of thumb

    Jaggard, A. D., Schapira, M. & Wright, R. N., 2011, PODC'11 - Proceedings of the 2011 ACM Symposium Principles of Distributed Computing. p. 333-334 2 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Pan-private algorithms via statistics on sketches

    Mir, D., Muthukrishnan, S., Nikolov, A. & Wright, R. N., 2011, PODS'11 - Proceedings of the 30th Symposium on Principles of Database Systems. p. 37-48 12 p. (Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    53 Scopus citations
  • Towards a formal model of accountability

    Feigenbaum, J., Jaggard, A. D. & Wright, R. N., 2011, NSPW'11 - Proceedings of the 2011 New Security Paradigms Workshop. p. 45-55 11 p. (Proceedings New Security Paradigms Workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    51 Scopus citations
  • 2010

    Detecting novel discrepancies in communication networks

    Abello, J., Eliassi-Rad, T. & Devanur, N., 2010, Proceedings - 10th IEEE International Conference on Data Mining, ICDM 2010. p. 8-17 10 p. 5693954. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • 2009

    A differentially private graph estimator

    Mir, D. J. & Wright, R. N., 2009, ICDM Workshops 2009 - IEEE International Conference on Data Mining. p. 122-129 8 p. 5360515. (ICDM Workshops 2009 - IEEE International Conference on Data Mining).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Scopus citations
  • A practical differentially private random decision tree classifier

    Jagannathan, G., Pillaipakkamnatt, K. & Wright, R. N., 2009, ICDM Workshops 2009 - IEEE International Conference on Data Mining. p. 114-121 8 p. 5360518. (ICDM Workshops 2009 - IEEE International Conference on Data Mining).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    100 Scopus citations
  • Privacy-preserving evaluation of generalization error and its application to model and attribute selection

    Sakuma, J. & Wright, R. N., 2009, Advances in Machine Learning - First Asian Conference on Machine Learning, ACML 2009, Proceedings. p. 338-353 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5828 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • The impact of communication models on routing-algorithm convergence

    Jaggard, A. D., Ramachandran, V. & Wright, R. N., 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS, 09. p. 58-67 10 p. 5158409. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2008

    Privacy-preserving reinforcement learning

    Sakuma, J., Kobayashi, S. & Wright, R. N., 2008, Proceedings of the 25th International Conference on Machine Learning. Association for Computing Machinery (ACM), p. 864-871 8 p. (Proceedings of the 25th International Conference on Machine Learning).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Towards privacy-preserving model selection

    Yang, Z., Zhong, S. & Wright, R. N., 2008, Privacy, Security, and Trust in KDD - First ACM SIGKDD International Workshop, PinKDD 2007, Revised Selected Papers. p. 138-152 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4890 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2007

    Private inference control for aggregate database queries

    Jagannathan, G. & Wright, R. N., 2007, ICDM Workshops 2007 - Proceedings of the 17th IEEE International Conference on Data Mining Workshops. p. 711-716 6 p. 4476746. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Sequential decision making algorithms for port of entry inspection: Overcoming computational challenges

    Madigan, D., Mittal, S. & Roberts, F., 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. IEEE Computer Society, p. 1-7 7 p. 4258665. (ISI 2007: 2007 IEEE Intelligence and Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • 2006

    Experimental analysis of sequential decision making algorithms for port of entry inspection procedures

    Anand, S., Madigan, D., Mammone, R., Pathak, S. & Roberts, F., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer Verlag, p. 319-330 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • 2004

    Matrix zoom: A visual interface to semi-external graphs

    Abello, J. & Van Ham, F., 2004, Proceedings - IEEE Symposium on Information Visualization, INFO VIS 2004. Ward, M. & Munzner, T. (eds.). p. 183-190 8 p. (Proceedings - IEEE Symposium on Information Visualization, INFO VIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    83 Scopus citations
  • 1982

    PLANNING FOR ENERGY DISRUPTIONS.

    Roberts, F. S., 1982, Symposium Papers - Energy Modeling. Inst of Gas Technology, p. 1-13 13 p. (Symposium Papers - Energy Modeling).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations