default search action
Mudhakar Srivatsa
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c122]Apoorve Mohan, Mengmei Ye, Hubertus Franke, Mudhakar Srivatsa, Zhuoran Liu, Nelson Mimura Gonzalez:
Securing AI Inference in the Cloud: Is CPU-GPU Confidential Computing Ready? CLOUD 2024: 164-175 - [c121]Pranjal Gupta, Prateeti Mohapatra, Debanjana Kar, Seema Nagar, Jae-wook Ahn, Amit M. Paradkar, Mudhakar Srivatsa:
Decoding Logs for Automatic Metric Identification. CLOUD 2024: 336-343 - [i16]Adnan Hoque, Less Wright, Chih-Chieh Yang, Mudhakar Srivatsa, Raghu K. Ganti:
Accelerating a Triton Fused Kernel for W4A16 Quantized Inference with SplitK work decomposition. CoRR abs/2402.00025 (2024) - [i15]Tianshi Wang, Jinyang Li, Ruijie Wang, Denizhan Kara, Shengzhong Liu, Davis Wertheimer, Antoni Viros-i-Martin, Raghu K. Ganti, Mudhakar Srivatsa, Tarek F. Abdelzaher:
SudokuSens: Enhancing Deep Learning Robustness for IoT Sensing Applications using a Generative Approach. CoRR abs/2402.02275 (2024) - [i14]Adnan Hoque, Mudhakar Srivatsa, Chih-Chieh Yang, Raghu K. Ganti:
TP-Aware Dequantization. CoRR abs/2402.04925 (2024) - [i13]Davis Wertheimer, Joshua Rosenkranz, Thomas P. Parnell, Sahil Suneja, Pavithra Ranganathan, Raghu K. Ganti, Mudhakar Srivatsa:
Accelerating Production LLMs with Combined Token/Embedding Speculators. CoRR abs/2404.19124 (2024) - 2023
- [c120]Tianshi Wang, Jinyang Li, Ruijie Wang, Denizhan Kara, Shengzhong Liu, Davis Wertheimer, Antoni Viros-i-Martin, Raghu K. Ganti, Mudhakar Srivatsa, Tarek F. Abdelzaher:
SudokuSens: Enhancing Deep Learning Robustness for IoT Sensing Applications using a Generative Approach. SenSys 2023: 15-27 - 2022
- [c119]Franck Le, Mudhakar Srivatsa, Raghu K. Ganti, Vyas Sekar:
Rethinking data-driven networking with foundation models: challenges and opportunities. HotNets 2022: 188-197 - [c118]Pengrui Quan, Wei-Han Lee, Mudhakar Srivatsa, Mani B. Srivastava:
Enhancing Robustness in Federated Learning by Supervised Anomaly Detection. ICPR 2022: 996-1003 - [c117]Mudhakar Srivatsa:
ScaDL 2022 Invited Talk 2: AI/ML Pipelines using CodeFlare. IPDPS Workshops 2022: 1040 - [p1]Tuan M. Hoang Trong, Mudhakar Srivatsa, Dinesh C. Verma:
A Privacy-preserving Product Recommender System. Federated Learning 2022: 509-522 - [i12]Franck Le, Mudhakar Srivatsa, Raghu K. Ganti, Vyas Sekar:
Rethinking Data-driven Networking with Foundation Models: Challenges and Opportunities. CoRR abs/2211.06494 (2022) - 2021
- [j29]Yuan Hong, Valérie Issarny, Surya Nepal, Mudhakar Srivatsa:
Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems. IEEE Trans. Dependable Secur. Comput. 18(4): 1511-1512 (2021) - [j28]Yuan Hong, Valérie Issarny, Surya Nepal, Mudhakar Srivatsa:
Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems. IEEE Trans. Emerg. Top. Comput. 9(3): 1328-1329 (2021) - [c116]Cai Davies, James R. Ashford, Luis Espinosa Anke, Alun D. Preece, Liam D. Turner, Roger M. Whitaker, Mudhakar Srivatsa, Diane Felmlee:
Multi-Scale User Migration on Reddit. ICWSM Workshops 2021 - [e4]Nimanthi L. Atukorala, Carl K. Chang, Ernesto Damiani, Min Fu, George Spanoudakis, Mudhakar Srivatsa, Zhongjie Wang, Jia Zhang:
IEEE International Conference on Smart Data Services, SMDS 2021, Chicago, IL, USA, September 5-10, 2021. IEEE 2021, ISBN 978-1-6654-0058-9 [contents] - 2020
- [c115]Ziyao Zhang, Liang Ma, Kin K. Leung, Konstantinos Poularakis, Mudhakar Srivatsa:
State Action Separable Reinforcement Learning. IEEE BigData 2020: 123-132 - [c114]Xuanzhe Liu, Mudhakar Srivatsa, Tao Sun:
IEEE International Conference on Edge Computing (EDGE 2020) Message from the Chairs. EDGE 2020: 1 - [c113]Franck Le, Mudhakar Srivatsa:
Deriving Interpretable Rules for IoT Discovery Through Attention. ICIOT 2020: 32-44 - [c112]Wei-Han Lee, Steve Millman, Nirmit Desai, Mudhakar Srivatsa, Changchang Liu:
NeuralFP: Out-of-distribution Detection using Fingerprints of Neural Networks. ICPR 2020: 9561-9568 - [c111]Oytun Ulutan, Swati Rallapalli, Mudhakar Srivatsa, Carlos Torres, B. S. Manjunath:
Actor Conditioned Attention Maps for Video Action Detection. WACV 2020: 516-525 - [i11]Liang Ma, Ziyao Zhang, Mudhakar Srivatsa:
Neural Network Tomography. CoRR abs/2001.02942 (2020) - [i10]Ziyao Zhang, Liang Ma, Kin K. Leung, Konstantinos Poularakis, Mudhakar Srivatsa:
State Action Separable Reinforcement Learning. CoRR abs/2006.03713 (2020)
2010 – 2019
- 2019
- [j27]Dakshi Agrawal, Raghu K. Ganti, Jeff Jonas, Mudhakar Srivatsa:
STB: space time boxes. CCF Trans. Pervasive Comput. Interact. 1(2): 114-124 (2019) - [j26]Chris Simpkin, Ian J. Taylor, Graham A. Bent, Geeth de Mel, Swati Rallapalli, Liang Ma, Mudhakar Srivatsa:
Constructing distributed time-critical applications using cognitive enabled services. Future Gener. Comput. Syst. 100: 70-85 (2019) - [j25]Liang Ma, Mudhakar Srivatsa, Derya Cansever, Xifeng Yan, Sue Kase, Michelle Vanni:
Performance Bounds of Decentralized Search in Expert Networks for Query Answering. ACM Trans. Knowl. Discov. Data 13(2): 18:1-18:23 (2019) - [j24]Kisung Lee, Ling Liu, Raghu K. Ganti, Mudhakar Srivatsa, Qi Zhang, Yang Zhou, Qingyang Wang:
Lightweight Indexing and Querying Services for Big Spatial Data. IEEE Trans. Serv. Comput. 12(3): 343-355 (2019) - [c110]Swati Rallapalli, Liang Ma, Mudhakar Srivatsa, Ananthram Swami, Heesung Kwon, Graham A. Bent, Christopher Simpkin:
SENSE: Semantically Enhanced Node Sequence Embedding. IEEE BigData 2019: 665-670 - [c109]Dinesh C. Verma, Seraphin B. Calo, Elisa Bertino, Geeth de Mel, Mudhakar Srivatsa:
Generating Client Side Policies for Cyber-Physical Safety. ICCCN 2019: 1-8 - [c108]Linsong Chu, Ramya Raghavendra, Mudhakar Srivatsa, Alun D. Preece, Daniel Harborne:
Feature Importance Identification through Bottleneck Reconstruction. ICCC 2019: 64-66 - [c107]Franck Le, Mudhakar Srivatsa, Krishna Kesari Reddy, Kaushik Roy:
Using Graphical Models as Explanations in Deep Neural Networks. MASS 2019: 283-289 - [c106]Pranita Dewan, Raghu K. Ganti, Mudhakar Srivatsa, Sebastian Stein:
NN-SAR: A Neural Network Approach for Spatial AutoRegression. PerCom Workshops 2019: 783-789 - [i9]Nirmit Desai, Linsong Chu, Raghu K. Ganti, Sebastian Stein, Mudhakar Srivatsa:
neuralRank: Searching and ranking ANN-based model repositories. CoRR abs/1903.00711 (2019) - [i8]Swati Rallapalli, Liang Ma, Mudhakar Srivatsa, Ananthram Swami, Heesung Kwon, Graham A. Bent, Christopher Simpkin:
SENSE: Semantically Enhanced Node Sequence Embedding. CoRR abs/1911.02970 (2019) - 2018
- [c105]Yeon-Sup Lim, Mudhakar Srivatsa, Supriyo Chakraborty, Ian J. Taylor:
Learning Light-Weight Edge-Deployable Privacy Models. IEEE BigData 2018: 1290-1295 - [c104]Christopher Streiffer, Ramya Raghavendra, Theophilus Benson, Mudhakar Srivatsa:
Learning to Simplify Distributed Systems Management. IEEE BigData 2018: 1837-1845 - [c103]ShreeRanjani SrirangamSridharan, Mudhakar Srivatsa, Raghu K. Ganti, Christopher Simpkin:
Doc2Img: A New Approach to Vectorization of Documents. FUSION 2018: 2172-2178 - [c102]Nirmit Desai, Raghu K. Ganti, Heesung Kwon, Ian J. Taylor, Mudhakar Srivatsa:
Unsupervised Estimation of Domain Applicability of Models. MILCOM 2018: 34-39 - [i7]ShreeRanjani SrirangamSridharan, Oytun Ulutan, Shehzad Noor Taus Priyo, Swati Rallapalli, Mudhakar Srivatsa:
Object Localization and Size Estimation from RGB-D Images. CoRR abs/1808.00641 (2018) - [i6]Oytun Ulutan, Swati Rallapalli, Mudhakar Srivatsa, B. S. Manjunath:
Actor Conditioned Attention Maps for Video Action Detection. CoRR abs/1812.11631 (2018) - 2017
- [j23]Anthony Etuk, Timothy J. Norman, Murat Sensoy, Mudhakar Srivatsa:
How to trust a few among many. Auton. Agents Multi Agent Syst. 31(3): 531-560 (2017) - [j22]Saritha Arunkumar, Berker Soyluoglu, Murat Sensoy, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
Location attestation and access control for mobile devices using GeoXACML. J. Netw. Comput. Appl. 80: 181-188 (2017) - [c101]Yiran Zhao, Shuochao Yao, Shaohan Hu, Shiyu Chang, Raghu K. Ganti, Mudhakar Srivatsa, Shen Li, Tarek F. Abdelzaher:
On the improvement of classifying EEG recordings using neural networks. IEEE BigData 2017: 1709-1711 - [c100]Antara Palit, Mudhakar Srivatsa, Raghu K. Ganti, Christopher Simpkin:
Identifying sensor accesses from service descriptions. IEEE BigData 2017: 3006-3011 - [c99]Shen Li, Md. Tanvir Al Amin, Raghu K. Ganti, Mudhakar Srivatsa, Shanhao Hu, Yiran Zhao, Tarek F. Abdelzaher:
Stark: Optimizing In-Memory Computing for Dynamic Dataset Collections. ICDCS 2017: 103-114 - [c98]Mudhakar Srivatsa, Raghu K. Ganti, Prasant Mohapatra:
On the Limits of Subsampling of Location Traces. ICDCS 2017: 1032-1041 - [c97]Pranita Dewan, Raghu K. Ganti, Mudhakar Srivatsa:
SOM-TC: Self-Organizing Map for Hierarchical Trajectory Clustering. ICDCS 2017: 1042-1052 - [c96]Christopher Streiffer, Ramya Raghavendra, Theophilus Benson, Mudhakar Srivatsa:
Darnet: a deep learning solution for distracted driving detection. Middleware Industry 2017: 22-28 - [c95]Saritha Arunkumar, Mudhakar Srivatsa, Elisa Bertino:
Learning information release policies for preventing intersection attacks. MILCOM 2017: 794-799 - [c94]Archith J. Bency, Swati Rallapalli, Raghu K. Ganti, Mudhakar Srivatsa, B. S. Manjunath:
Beyond Spatial Auto-Regressive Models: Predicting Housing Prices with Satellite Imagery. WACV 2017: 320-329 - 2016
- [j21]Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong Duan, Wencai Du:
IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications. Int. J. Networked Distributed Comput. 4(2): 116-126 (2016) - [j20]Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, Raheem A. Beyah:
General Graph Data De-Anonymization: From Mobility Traces to Social Networks. ACM Trans. Inf. Syst. Secur. 18(4): 12:1-12:29 (2016) - [j19]Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah:
Structural Data De-Anonymization: Theory and Practice. IEEE/ACM Trans. Netw. 24(6): 3523-3536 (2016) - [c93]Liang Ma, Mudhakar Srivatsa, Derya Cansever, Xifeng Yan, Sue Kase, Michelle Vanni:
Query Answering Efficiency in Expert Networks Under Decentralized Search. CIKM 2016: 2119-2124 - [c92]Semih Yavuz, Izzeddin Gur, Yu Su, Mudhakar Srivatsa, Xifeng Yan:
Improving Semantic Parsing via Answer Type Inference. EMNLP 2016: 149-159 - [c91]Yu Su, Huan Sun, Brian M. Sadler, Mudhakar Srivatsa, Izzeddin Gur, Zenghui Yan, Xifeng Yan:
On Generating Characteristic-rich Question Sets for QA Evaluation. EMNLP 2016: 562-572 - [c90]Dajung Lee, Roger Moussalli, Sameh W. Asaad, Mudhakar Srivatsa:
Spatial Predicates Evaluation in the Geohash Domain Using Reconfigurable Hardware. FCCM 2016: 176-183 - [c89]Raghu K. Ganti, Mudhakar Srivatsa, B. S. Manjunath:
Entity reconciliation in a multi-camera network. ICDCN 2016: 41:1-41:6 - [c88]Liang Ma, Mudhakar Srivatsa, Derya Cansever, Xifeng Yan, Sue Kase, Michelle Vanni:
On the Efficiency of Decentralized Search in Expert Networks. ICDCS 2016: 733-734 - [c87]Liang Ma, Mudhakar Srivatsa, Derya Cansever, Xifeng Yan, Sue Kase, Michelle Vanni:
Decentralized search in expert networks: Generic models and performance bounds. ICNP 2016: 1-10 - [c86]Raghu K. Ganti, Mudhakar Srivatsa, Dakshi Agrawal, Petros Zerfos, Jorge Ortiz:
MP-trie: Fast Spatial Queries on Moving Objects. Middleware Industry 2016: 1 - [c85]Ramya Raghavendra, Pranita Dewan, Mudhakar Srivatsa:
Unifying HDFS and GPFS: Enabling Analytics on Software-Defined Storage. Middleware 2016: 3 - [c84]Saritha Arunkumar, Mudhakar Srivatsa, Berker Soyluoglu, Murat Sensoy, Federico Cerutti:
Privacy enforcement through policy extension. MILCOM 2016: 1096-1100 - [c83]Palanivel A. Kodeswaran, Ravi Kokku, Sayandeep Sen, Mudhakar Srivatsa:
Idea: A System for Efficient Failure Management in Smart IoT Environments. MobiSys 2016: 43-56 - [c82]Fangqiu Han, Shulong Tan, Huan Sun, Mudhakar Srivatsa, Deng Cai, Xifeng Yan:
Distributed Representations of Expertise. SDM 2016: 531-539 - [i5]Arlei Silva, Ramya Raghavendra, Mudhakar Srivatsa, Ambuj K. Singh:
Prediction-based Online Trajectory Compression. CoRR abs/1601.06316 (2016) - [i4]Archith J. Bency, Swati Rallapalli, Raghu K. Ganti, Mudhakar Srivatsa, B. S. Manjunath:
Beyond Spatial Auto-Regressive Models: Predicting Housing Prices with Satellite Imagery. CoRR abs/1610.04805 (2016) - 2015
- [j18]Saritha Arunkumar, Murat Sensoy, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
Reasoning with streamed uncertain information from unreliable sources. Expert Syst. Appl. 42(22): 8381-8392 (2015) - [j17]Saritha Arunkumar, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
A review paper on preserving privacy in mobile environments. J. Netw. Comput. Appl. 53: 74-90 (2015) - [j16]Ziyu Guan, Shengqi Yang, Huan Sun, Mudhakar Srivatsa, Xifeng Yan:
Fine-Grained Knowledge Sharing in Collaborative Environments. IEEE Trans. Knowl. Data Eng. 27(8): 2163-2174 (2015) - [c81]M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa:
Picking vs. Guessing Secrets: A Game-Theoretic Analysis. CSF 2015: 243-257 - [c80]Roger Moussalli, Mudhakar Srivatsa, Sameh W. Asaad:
Fast and Flexible Conversion of Geohash Codes to and from Latitude/Longitude Coordinates. FCCM 2015: 179-186 - [c79]Md. Tanvir Al Amin, Shen Li, Muntasir Raihan Rahman, Panindra Tumkur Seetharamu, Shiguang Wang, Tarek F. Abdelzaher, Indranil Gupta, Mudhakar Srivatsa, Raghu K. Ganti, Reaz Ahmed, Hieu Khac Le:
Social Trove: A Self-Summarizing Storage Service for Social Sensing. ICAC 2015: 41-50 - [c78]Yaoping Ruan, Nikos Anerousis, Mudhakar Srivatsa, Jin Xiao, R. Todd Christner, Luis Farrolas, John Short:
Measuring enterprise network usage pattern & deploying passive optical LANs. IM 2015: 890-893 - [c77]Yu Su, Shengqi Yang, Huan Sun, Mudhakar Srivatsa, Sue Kase, Michelle Vanni, Xifeng Yan:
Exploiting Relevance Feedback in Knowledge Graph Search. KDD 2015: 1135-1144 - [c76]Saritha Arunkumar, Mudhakar Srivatsa, Murat Sensoy, Muttukrishnan Rajarajan:
Global attestation of location in mobile devices. MILCOM 2015: 1612-1617 - [c75]Shen Li, Shaohan Hu, Raghu K. Ganti, Mudhakar Srivatsa, Tarek F. Abdelzaher:
Pyro: A Spatial-Temporal Big-Data Storage System. USENIX ATC 2015: 97-109 - [e3]Jing Tian, Jiwu Jing, Mudhakar Srivatsa:
International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 152, Springer 2015, ISBN 978-3-319-23828-9 [contents] - [e2]Jing Tian, Jiwu Jing, Mudhakar Srivatsa:
International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 153, Springer 2015, ISBN 978-3-319-23801-2 [contents] - [i3]M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa:
Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report). CoRR abs/1505.02325 (2015) - [i2]Mohammad Hosseini, Nooreddin Naghibolhosseini, Amotz Barnoy, Peter Terlecky, Hengchang Liu, Shaohan Hu, Shiguang Wang, Md. Tanvir Al Amin, Lu Su, Dong Wang, Ramesh Govindan, Raghu K. Ganti, Mudhakar Srivatsa, Charu C. Aggarwal, Tarek F. Abdelzaher, Siyu Gu, Chenji Pan:
Joint Source Selection and Data Extrapolation in Social Sensing for Disaster Response. CoRR abs/1512.00500 (2015) - 2014
- [j15]Elisa Bertino, Dimitrios Georgakopoulos, Surya Nepal, Mudhakar Srivatsa, Alessandro Vinciarelli:
Guest Editorial: Selected Papers from IEEE IEEE/EAI CollaborateCom 2013. EAI Endorsed Trans. Collab. Comput. 1(1): e2 (2014) - [j14]Wei Gao, Guohong Cao, Arun Iyengar, Mudhakar Srivatsa:
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks. IEEE Trans. Mob. Comput. 13(3): 611-625 (2014) - [c74]Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah:
Structural Data De-anonymization: Quantification, Practice, and Implications. CCS 2014: 1040-1053 - [c73]Siyu Gu, Chenji Pan, Hengchang Liu, Shen Li, Shaohan Hu, Lu Su, Shiguang Wang, Dong Wang, Md. Tanvir Al Amin, Ramesh Govindan, Charu C. Aggarwal, Raghu K. Ganti, Mudhakar Srivatsa, Amotz Barnoy, Peter Terlecky, Tarek F. Abdelzaher:
Data Extrapolation in Social Sensing for Disaster Response. DCOSS 2014: 119-126 - [c72]Kisung Lee, Raghu K. Ganti, Mudhakar Srivatsa, Ling Liu:
Efficient spatial query processing for big data. SIGSPATIAL/GIS 2014: 469-472 - [c71]Raghu K. Ganti, Mudhakar Srivatsa, Tarek F. Abdelzaher:
On Limits of Travel Time Predictions: Insights from a New York City Case Study. ICDCS 2014: 166-175 - [c70]Bo Zong, Ramya Raghavendra, Mudhakar Srivatsa, Xifeng Yan, Ambuj K. Singh, Kang-Won Lee:
Cloud service placement via subgraph matching. ICDE 2014: 832-843 - [c69]Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, Raheem A. Beyah:
Structure Based Data De-Anonymization of Social Networks and Mobility Traces. ISC 2014: 237-254 - [c68]Huan Sun, Mudhakar Srivatsa, Shulong Tan, Yang Li, Lance M. Kaplan, Shu Tao, Xifeng Yan:
Analyzing expert behaviors in collaborative networks. KDD 2014: 1486-1495 - [c67]Jing Zhao, Xiaomei Zhang, Guohong Cao, Mudhakar Srivatsa, Xifeng Yan:
Expertise-Based Data Access in Content-Centric Mobile Opportunistic Networks. MASS 2014: 199-207 - [c66]Dong-Anh Nguyen, Tarek F. Abdelzaher, Steven A. Borbash, Xuan-Hong Dang, Raghu K. Ganti, Ambuj K. Singh, Mudhakar Srivatsa:
On Critical Event Observability Using Social Networks: A Disaster Monitoring Perspective. MILCOM 2014: 1633-1638 - [c65]Saritha Arunkumar, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
Location Security - Where to Enforce? MILCOM 2014: 1651-1656 - [c64]Kisung Lee, Raghu K. Ganti, Mudhakar Srivatsa, Ling Liu:
When twitter meets foursquare: tweet location prediction using foursquare. MobiQuitous 2014: 198-207 - [c63]Mudhakar Srivatsa, Raghu K. Ganti, Steven A. Borbash, Dakshi Agrawal:
A BSP approach to composite network analysis. PerCom Workshops 2014: 407-412 - 2013
- [j13]Petros Zerfos, Mudhakar Srivatsa, Hao Yu, D. Dennerline, Hubertus Franke, Dakshi Agrawal:
Platform and applications for massive-scale streaming network analytics. IBM J. Res. Dev. 57(3/4): 11 (2013) - [j12]Piotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivatsa:
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation. J. Comput. Secur. 21(4): 463-532 (2013) - [j11]Yinghui Wu, Shengqi Yang, Mudhakar Srivatsa, Arun Iyengar, Xifeng Yan:
Summarizing Answer Graphs Induced by Keyword Queries. Proc. VLDB Endow. 6(14): 1774-1785 (2013) - [c62]Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa:
Result Integrity Check for MapReduce Computation on Hybrid Clouds. IEEE CLOUD 2013: 847-854 - [c61]Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong Duan, Wencai Du:
IntegrityMR: Integrity assurance framework for big data analytics and management applications. IEEE BigData 2013: 33-40 - [c60]Saritha Arunkumar, Mudhakar Srivatsa, David Braines, Murat Sensoy:
Assessing trust over uncertain rules and streaming data. FUSION 2013: 922-929 - [c59]Anthony Etuk, Timothy J. Norman, Murat Sensoy, Chatschik Bisdikian, Mudhakar Srivatsa:
TIDY: A trust-based approach to information fusion through diversity. FUSION 2013: 1188-1195 - [c58]Mudhakar Srivatsa, Raghu K. Ganti, Jingjing Wang, Vinay Kolar:
Map matching: facts and myths. SIGSPATIAL/GIS 2013: 474-477 - [c57]M. Zubair Shafiq, Franck Le, Mudhakar Srivatsa, Alex X. Liu:
Cross-path inference attacks on multipath TCP. HotNets 2013: 15:1-15:7 - [c56]Raghu K. Ganti, Mudhakar Srivatsa, Anand Ranganathan, Jiawei Han:
Inferring human mobility patterns from taxicab location traces. UbiComp 2013: 459-468 - [c55]Raghu K. Ganti, Mudhakar Srivatsa, Hengchang Liu, Tarek F. Abdelzaher:
Spatio-temporal Spread of Events in Social Networks: A Gas Shortage Case Study. MILCOM 2013: 713-718 - [c54]Anthony Etuk, Timothy J. Norman, Chatschik Bisdikian, Mudhakar Srivatsa:
TAF: A trust assessment framework for inferencing with uncertain streaming information. PerCom Workshops 2013: 475-480 - [c53]Kisung Lee, Raghu K. Ganti, Mudhakar Srivatsa, Prasant Mohapatra:
Spatio-temporal provenance: Identifying location information from unstructured text. PerCom Workshops 2013: 499-504 - [c52]Xin Chen, Harshal Patankar, Sencun Zhu, Mudhakar Srivatsa, Jeff Opper:
Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks. SECON 2013: 131-139 - [e1]Elisa Bertino, Dimitrios Georgakopoulos, Mudhakar Srivatsa, Surya Nepal, Alessandro Vinciarelli:
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013. ICST / IEEE 2013, ISBN 978-1-936968-92-3 [contents] - 2012
- [j10]Murtaza Zafer, Dakshi Agrawal, Mudhakar Srivatsa:
Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary. IEEE/ACM Trans. Netw. 20(5): 1440-1451 (2012) - [c51]Vivek Natarajan, Sencun Zhu, Mudhakar Srivatsa, Jeff Opper:
Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-hoc Networks. AINA 2012: 376-383 - [c50]Mudhakar Srivatsa, Michael Hicks:
Deanonymizing mobility traces: using social network as a side-channel. CCS 2012: 628-637 - [c49]Wei Gao, Guohong Cao, Mudhakar Srivatsa, Arun Iyengar:
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks. ICDCS 2012: 132-141 - [c48]Franck Le, Mudhakar Srivatsa, Arun Iyengar:
Byte Caching in Wireless Networks. ICDCS 2012: 265-274 - [c47]Mudhakar Srivatsa, Sihyung Lee, Tarek F. Abdelzaher:
Mining diverse opinions. MILCOM 2012: 1-7 - [c46]Mudhakar Srivatsa, Vikas Kawadia, Shengqi Yang:
Distributed graph query processing in dynamic networks. PerCom Workshops 2012: 20-25 - [c45]Piotr Mardziel, Michael Hicks, Jonathan Katz, Mudhakar Srivatsa:
Knowledge-oriented secure multiparty computation. PLAS 2012: 2 - [c44]Ting Wang, Mudhakar Srivatsa, Ling Liu:
Fine-grained access control of personal data. SACMAT 2012: 145-156 - [c43]Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu:
Microscopic Social Influence. SDM 2012: 129-140 - [c42]Murat Sensoy, Jeff Z. Pan, Achille Fokoue, Mudhakar Srivatsa, Felipe Meneguzzi:
Using Subjective Logic to Handle Uncertainty and Conflicts. TrustCom 2012: 1323-1326 - 2011
- [j9]Mudhakar Srivatsa, Ling Liu, Arun Iyengar:
EventGuard: A System Architecture for Securing Publish-Subscribe Networks. ACM Trans. Comput. Syst. 29(4): 10:1-10:40 (2011) - [j8]Mudhakar Srivatsa, Arun Iyengar, Ling Liu, Hongbo Jiang:
Privacy in VoIP Networks: Flow Analysis Attacks and Defense. IEEE Trans. Parallel Distributed Syst. 22(4): 621-633 (2011) - [c41]Ji Zhu, Mudhakar Srivatsa:
Poster: on quantitative information flow metrics. CCS 2011: 877-880 - [c40]Piotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivatsa:
Dynamic Enforcement of Knowledge-Based Security Policies. CSF 2011: 114-128 - [c39]Mudhakar Srivatsa, Wei Gao, Arun Iyengar:
Provenance-driven data dissemination in disruption tolerant networks. FUSION 2011: 1-8 - [c38]Steven Okamoto, Praveen Paruchuri, Yonghong Wang, Katia P. Sycara, Janusz Marecki, Mudhakar Srivatsa:
Multiagent Communication Security in Adversarial Settings. IAT 2011: 296-303 - [c37]Ji Zhu, Mudhakar Srivatsa:
Quantifying Information Leakage in Finite Order Deterministic Programs. ICC 2011: 1-6 - [c36]Wei Gao, Guohong Cao, Arun Iyengar, Mudhakar Srivatsa:
Supporting Cooperative Caching in Disruption Tolerant Networks. ICDCS 2011: 151-161 - [c35]Juan E. Tapiador, Mudhakar Srivatsa, John A. Clark, John A. McDermid:
Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing. Networking Workshops 2011: 207-218 - [c34]Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu:
Modeling data flow in socio-information networks: a risk estimation approach. SACMAT 2011: 113-122 - [c33]Achille Fokoue, Mudhakar Srivatsa, Robert Young:
Trust-Based Probabilistic Query Answering. WISE 2011: 57-71 - [r1]Mudhakar Srivatsa, Arun Iyengar:
Application-Level Denial of Service. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 42-44 - 2010
- [c32]Achille Fokoue, Mudhakar Srivatsa, Robert Young:
Assessing trust in uncertain information using Bayesian description logic. CCS 2010: 675-677 - [c31]Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu:
Spatio-temporal patterns in network events. CoNEXT 2010: 3 - [c30]Achille Fokoue, Mudhakar Srivatsa, Robert Young:
Assessing Trust in Uncertain Information. ISWC (1) 2010: 209-224 - [c29]Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakantham:
A Decision Theoretic Approach to Data Leakage Prevention. SocialCom/PASSAT 2010: 776-784 - [i1]Ji Zhu, Mudhakar Srivatsa:
Quantifying Information Leakage in Finite Order Deterministic Programs. CoRR abs/1009.3951 (2010)
2000 – 2009
- 2009
- [j7]Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu:
Scalable key management algorithms for location-based services. IEEE/ACM Trans. Netw. 17(5): 1399-1412 (2009) - [j6]Mudhakar Srivatsa, Ling Liu:
Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach. IEEE Trans. Parallel Distributed Syst. 20(4): 512-527 (2009) - [j5]Aameek Singh, Mudhakar Srivatsa, Ling Liu:
Search-as-a-service: Outsourced search over outsourced storage. ACM Trans. Web 3(4): 13:1-13:33 (2009) - [c28]Murtaza Zafer, Dakshi Agrawal, Mudhakar Srivatsa:
A note on information-theoretic secret key exchange over wireless channels. Allerton 2009: 754-761 - [c27]Steffen Reidt, Mudhakar Srivatsa, Shane Balfe:
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks. CCS 2009: 291-302 - [c26]Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt:
A metadata calculus for secure information sharing. CCS 2009: 488-499 - [c25]Mudhakar Srivatsa, Arun Iyengar, Ling Liu:
Privacy in VoIP Networks: A k-Anonymity Approach. INFOCOM 2009: 2856-2860 - [c24]Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu:
Learning, indexing, and diagnosing network faults. KDD 2009: 857-866 - [c23]Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi, Peter Wrobel, John Yesberg:
A decision support system for secure information sharing. SACMAT 2009: 105-114 - [c22]Dipyaman Banerjee, Venkateshwara Madduri, Mudhakar Srivatsa:
A Framework for Distributed Monitoring and Root Cause Analysis for Large IP Networks. SRDS 2009: 246-255 - 2008
- [j4]Mudhakar Srivatsa, Nithya Rajamani, Murthy V. Devarakonda:
A Policy Evaluation Tool for Multisite Resource Management. IEEE Trans. Parallel Distributed Syst. 19(10): 1352-1366 (2008) - [j3]Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu:
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. ACM Trans. Web 2(3): 15:1-15:49 (2008) - [c21]Mudhakar Srivatsa, Shane Balfe, Kenneth G. Paterson, Pankaj Rohatgi:
Trust management for secure information flows. CCS 2008: 175-188 - [c20]Vijay A. Balasubramaniyan, Arup Acharya, Mustaque Ahamad, Mudhakar Srivatsa, Italo Dacosta, Charles P. Wright:
SERvartuka: Dynamic Distribution of State to Improve SIP Server Scalability. ICDCS 2008: 562-572 - [c19]Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu:
A Scalable Method for Access Control in Location-Based Broadcast Services. INFOCOM 2008: 256-260 - [c18]Mudhakar Srivatsa, Pankaj Rohatgi, Shane Balfe, Steffen Reidt:
Securing information flows: A metadata framework. MASS 2008: 748-753 - [c17]Mudhakar Srivatsa, Ling Liu, Arun Iyengar:
Preserving Caller Anonymity in Voice-over-IP Networks. SP 2008: 50-63 - [c16]Mudhakar Srivatsa, Bong Jun Ko, Alina Beygelzimer, Venkateshwara Madduri:
Scalable Topology Discovery and Link State Detection Using Routing Events. SRDS 2008: 165-174 - 2007
- [c15]Mudhakar Srivatsa, Ling Liu:
Secure Event Dissemination in Publish-Subscribe Networks. ICDCS 2007: 22 - [c14]Bhuvan Bamba, Ling Liu, James Caverlee, Vaibhav Padliya, Mudhakar Srivatsa, Tushar Bansal, Mahesh Palekar, Joseph Patrao, Suiyang Li, Aameek Singh:
DSphere: A Source-Centric Approach to Crawling, Indexing and Searching the World Wide Web. ICDE 2007: 1515-1516 - [c13]Mudhakar Srivatsa, Arun Iyengar, Thomas A. Mikalsen, Isabelle Rouvellou, Jian Yin:
An Access Control System for Web Service Compositions. ICWS 2007: 1-8 - [c12]Aameek Singh, Mudhakar Srivatsa, Ling Liu:
Efficient and Secure Search of Enterprise File Systems. ICWS 2007: 18-25 - 2006
- [j2]Mudhakar Srivatsa, Ling Liu:
Securing decentralized reputation management using TrustGuard. J. Parallel Distributed Comput. 66(9): 1217-1232 (2006) - [j1]Mudhakar Srivatsa, Bugra Gedik, Ling Liu:
Large Scaling Unstructured Peer-to-Peer Networks with Heterogeneity-Aware Topology and Routing. IEEE Trans. Parallel Distributed Syst. 17(11): 1277-1293 (2006) - [c11]Mudhakar Srivatsa, Ling Liu:
Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems. ESORICS 2006: 347-361 - [c10]Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu:
A Middleware System for Protecting Against Application Level Denial of Service Attacks. Middleware 2006: 260-280 - [c9]Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu:
A Client-Transparent Approach to Defend Against Denial of Service Attacks. SRDS 2006: 61-70 - 2005
- [c8]Mudhakar Srivatsa, Ling Liu:
Securing publish-subscribe overlay services with EventGuard. CCS 2005: 289-298 - [c7]Sungkeun Park, Ling Liu, Calton Pu, Mudhakar Srivatsa, Jianjun Zhang:
Resilient Trust Management for Web Service Integration. ICWS 2005: 499-506 - [c6]Mudhakar Srivatsa, Li Xiong, Ling Liu:
ExchangeGuard: A Distributed Protocol for Electronic Fair-Exchange. IPDPS 2005 - [c5]Mudhakar Srivatsa, Ling Liu:
Countering Targeted File Attacks Using LocationGuard. USENIX Security Symposium 2005 - [c4]Mudhakar Srivatsa, Li Xiong, Ling Liu:
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. WWW 2005: 422-431 - 2004
- [c3]Mudhakar Srivatsa, Ling Liu:
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis. ACSAC 2004: 252-261 - [c2]Mudhakar Srivatsa, Bugra Gedik, Ling Liu:
Scaling Unstructured Peer-to-Peer Networks With Multi-Tier Capacity-Aware Overlay Topologies. ICPADS 2004: 17-24 - 2003
- [c1]Aameek Singh, Mudhakar Srivatsa, Ling Liu, Todd Miller:
Apoidea: A Decentralized Peer-to-Peer Architecture for Crawling the World Wide Web. Distributed Multimedia Information Retrieval 2003: 126-142
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint