1 code implementation • 15 Sep 2023 • Jun Zhang, Jue Wang, Huan Li, Lidan Shou, Ke Chen, Gang Chen, Sharad Mehrotra
This approach is characterized by a two-stage process: drafting and verification.
no code implementations • 2 Feb 2023 • Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Shanshan Han, Shantanu Sharma, Chaoyang He, Sharad Mehrotra, Salman Avestimehr
Federated analytics (FA) is a privacy-preserving framework for computing data analytics over multiple remote parties (e. g., mobile devices) or silo-ed institutional entities (e. g., hospitals, banks) without sharing the data among parties.
no code implementations • 7 Apr 2021 • Yin Li, Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma
This paper proposes Prism, a secret sharing based approach to compute private set operations (i. e., intersection and union), as well as aggregates over outsourced databases belonging to multiple owners.
no code implementations • 10 Feb 2021 • Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang
This paper proposes a system, entitled Concealer that allows sharing time-varying spatial data (e. g., as produced by sensors) in encrypted form to an untrusted third-party service provider to provide location-based applications (involving aggregation queries over selected regions over time windows) to users.
no code implementations • 13 May 2020 • Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Dhrubajyoti Ghosh, Peeyush Gupta
We, first, provide a new security definition, entitled partitioned data security for guaranteeing that the joint processing of non-sensitive data (in cleartext) and sensitive data (in encrypted form) does not lead to any leakage.
no code implementations • 5 May 2020 • Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang
In this paper, we introduce Quest, a system that empowers organizations to observe individuals and spaces to implement policies for social distancing and contact tracing using WiFi connectivity data in a passive and privacy-preserving manner.
no code implementations • 27 Apr 2020 • Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee
Despite exciting progress on cryptography, secure and efficient query processing over outsourced data remains an open challenge.
1 code implementation • 16 Apr 2020 • Primal Pappachan, Roberto Yus, Sharad Mehrotra, Johann-Christoph Freytag
We present Sieve, a layered approach of implementing FGAC in existing database systems, that exploits a variety of it's features such as UDFs, index usage hints, query explain; to scale to large number of policies.
Databases
no code implementations • 8 Apr 2020 • Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian
Specifically, the paper focuses on inferring the user's activities -- which may, in turn, lead to the user's privacy -- via inferences through device activities and network traffic analysis.
no code implementations • 23 Oct 2019 • Huang Zhenhua, Wang Zhenyu, Zhang Rui, Zhao Yangyang, Xie Xiaohui, Sharad Mehrotra
Complex networks represented as node adjacency matrices constrains the application of machine learning and parallel algorithms.
no code implementations • 27 Aug 2019 • Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems.
no code implementations • 8 Apr 2019 • Jue Wang, Ke Chen, Lidan Shou, Sai Wu, Sharad Mehrotra
In this paper, we redefine the problem as question-answer extraction, and present SAMIE: Self-Asking Model for Information Ixtraction, a semi-supervised model which dually learns to ask and to answer questions by itself.
no code implementations • 24 Jan 2019 • Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian
This paper focuses on the new challenges of privacy that arise in IoT in the context of smart homes.
Cryptography and Security Networking and Internet Architecture
no code implementations • 20 Dec 2018 • Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Anurag Mishra
Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge.