Projects per year
Fingerprint
Dive into the research topics where Periklis Papakonstantinou is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
- 1 Similar Profiles
Collaborations and top research areas from the last five years
Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
Projects
- 2 Finished
-
RAPID: Privacy-Preserving Crowdsensing of COVID-19 and its Sociological and Epidemiological Implications
Vaidya, J. (PI), Singh, V. (CoPI), Papakonstantinou, P. (CoPI) & Shiau, S. (CoPI)
5/1/20 → 4/30/23
Project: Research project
-
IUCRC Phase I Rutgers, Newark: Center for Accelerated Real Time Analytics (CARTA)
Atluri, V. (PI), Adam, N. (CoPI), Vaidya, J. (CoPI), Shafiq, B. (CoPI) & Papakonstantinou, P. (CoPI)
6/1/18 → 12/31/21
Project: Research
-
Engravings, Secrets, and Interpretability of Neural Networks
Hobbs, N., Papakonstantinou, P. A. & Vaidya, J., 2024, In: IEEE Transactions on Emerging Topics in Computing. 12, 4, p. 1093-1104 12 p.Research output: Contribution to journal › Article › peer-review
-
Identifying Anomalies While Preserving Privacy
Asif, H., Vaidya, J. & Papakonstantinou, P. A., Dec 1 2023, In: IEEE Transactions on Knowledge and Data Engineering. 35, 12, p. 12264-12281 18 p.Research output: Contribution to journal › Article › peer-review
Open Access -
Intelligent Pandemic Surveillance via Privacy-Preserving Crowdsensing
Asif, H., Papakonstantinou, P. A., Shiau, S., Singh, V. & Vaidya, J., 2022, In: IEEE Intelligent Systems. 37, 4, p. 88-96 9 p.Research output: Contribution to journal › Article › peer-review
Open Access -
Depth reduction for composites
Chen, S. & Papakonstantinou, P. A., 2019, In: SIAM Journal on Computing. 48, 2, p. 668-686 19 p.Research output: Contribution to journal › Article › peer-review
-
How to accurately and privately identify anomalies
Asif, H., Papakonstantinou, P. A. & Vaidya, J., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 719-736 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access