• 1886 Citations
  • 24 h-Index
1992 …2020
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Rebecca Wright is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Data mining Engineering & Materials Science
Privacy Preserving Mathematics
Privacy Mathematics
Servers Engineering & Materials Science
Communication Engineering & Materials Science
Network protocols Engineering & Materials Science
Secure multi-party Computation Mathematics
Secure Computation Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2007 2020

Finance
Supply chains
Learning systems
Logistics
Momentum
Planning
Health
Data privacy
Big data
Finance
Critical infrastructures
Multilayers
Internet
Telecommunication networks
student
research project
work force
robot
mentoring
computer science
learning
community
best practice

Research Output 1992 2019

Living-learning community for women in computer science at Rutgers

Wright, R., Nadler, S. J., Nguyen, T., Sanchez Gomez, C. N. & Wright, H. M., Feb 22 2019, SIGCSE 2019 - Proceedings of the 50th ACM Technical Symposium on Computer Science Education. Association for Computing Machinery, Inc, p. 286-292 7 p. (SIGCSE 2019 - Proceedings of the 50th ACM Technical Symposium on Computer Science Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

computer science
Computer science
learning
community
Group
4 Citations (Scopus)

From keys to databases-real-world applications of secure multi-party computation

Archer, D. W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J. I., Smart, N. P. & Wright, R., Dec 1 2018, In : Computer Journal. 61, 12, p. 1749-1771 23 p.

Research output: Contribution to journalArticle

Using Noisy Binary Search for Differentially Private Anomaly Detection

Bittner, D. M., Sarwate, A. & Wright, R., Jan 1 2018, Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Proceedings. Dinur, I., Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 20-37 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10879 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary search
Anomaly Detection
Group Testing
Privacy
Anomalous
1 Citation (Scopus)

Differentially private noisy search with applications to anomaly detection

Bittner, D. M., Sarwate, A. & Wright, R., Nov 3 2017, AISec 2017 - Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2017. Association for Computing Machinery, Inc, 1 p. (AISec 2017 - Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Dynamics at the boundary of game theory and distributed computing

Jaggard, A. D., Lutz, N., Schapira, M. & Wright, R., Aug 1 2017, In : ACM Transactions on Economics and Computation. 5, 3, 15.

Research output: Contribution to journalArticle

Game theory
Distributed computer systems
Game Theory
Distributed Computing
Dynamic Games