If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Data mining Engineering & Materials Science
Privacy Preserving Mathematics
Privacy Mathematics
Servers Engineering & Materials Science
Network protocols Engineering & Materials Science
Communication Engineering & Materials Science
Decision trees Engineering & Materials Science
Bayesian networks Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2007 2020

Research Output 1992 2018

1 Citation (Scopus)

From keys to databases-real-world applications of secure multi-party computation

Archer, D. W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J. I., Smart, N. P. & Wright, R., Dec 1 2018, In : Computer Journal. 61, 12, p. 1749-1771 23 p.

Rutgers, The State University

Research output: Contribution to journalArticle

Using Noisy Binary Search for Differentially Private Anomaly Detection

Bittner, D. M., Sarwate, A. & Wright, R., Jan 1 2018, Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Proceedings. Dinur, I., Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 20-37 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10879 LNCS).

Rutgers, The State University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary search
Anomaly Detection
Group Testing
Privacy
Anomalous
1 Citation (Scopus)

Differentially private noisy search with applications to anomaly detection

Bittner, D. M., Sarwate, A. & Wright, R., Nov 3 2017, AISec 2017 - Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2017. Association for Computing Machinery, Inc, 1 p. (AISec 2017 - Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2017).

Rutgers, The State University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Dynamics at the boundary of game theory and distributed computing

Jaggard, A. D., Lutz, N., Schapira, M. & Wright, R., Aug 1 2017, In : ACM Transactions on Economics and Computation. 5, 3, 15.

Rutgers, The State University

Research output: Contribution to journalArticle

Game theory
Distributed computer systems
Game Theory
Distributed Computing
Dynamic Games

Keynote: Privacy in today's world

Wright, R., Oct 30 2017, CyberW 2017 - Proceedings of the 2017 Workshop on Women in Cyber Security, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 7-10 4 p. (CyberW 2017 - Proceedings of the 2017 Workshop on Women in Cyber Security, co-located with CCS 2017; vol. 2017-January).

Rutgers, The State University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices