Mudhakar Srivatsa  Mudhakar Srivatsa photo       

contact information

Principal Research Staff Member and Manager (IoT Analytics)
Thomas J. Watson Research Center, Yorktown Heights, NY USA
  +1dash914dash945dash3766

links

Professional Associations

Professional Associations:  ACM  |  IEEE  |  USENIX: The Advanced Computing Systems Association


2017

Location attestation and access control for mobile devices using GeoXACML
Arunkumar, Saritha and Soyluoglu, Berker and Sensoy, Murat and Srivatsa, Mudhakar and Rajarajan, Muttukrishnan
Journal of Network and Computer Applications80, 181--188, Elsevier, 2017
Abstract

On the Limits of Subsampling of Location Traces
Mudhakar Srivatsa, Raghu Ganti, Prasant Mohapatra
IEEE ICDCS, 2017

SOM-TC: Self-Organizing Map for Hierarchical Trajectory Clustering
Pranita Dewan, Raghu Ganti, Mudhakar Srivatsa
IEEE ICDCS, 2017

Stark: Optimizing In-Memory Computing For Dynamic Dataset Collections
Shen Li, Md Tanvir Amin, Raghu Ganti, Mudhakar Srivatsa, Shaohan Hu, Yiran Zhao, Tarek Abdelzaher
IEEE ICDCS, 2017


2016

Query Answering Efficiency in Expert Networks Under Decentralized Search
Ma, Liang and Srivatsa, Mudhakar and Cansever, Derya and Yan, Xifeng and Kase, Sue and Vanni, Michelle
Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, pp. 2119--2124, 2016
Abstract

Spatial Predicates Evaluation in the Geohash Domain Using Reconfigurable Hardware
Dajung Lee, Roger Moussalli, Sameh Asaad, Mudhakar Srivatsa
24th Annual Int. IEEE Symp. on Field-Programmable Custom Computing Machines (FCCM 2016), 2016

Unifying HDFS and GPFS: Enabling Analytics on Software-Defined Storage
Raghavendra, Ramya and Dewan, Pranita and Srivatsa, Mudhakar
Proceedings of the 17th International Middleware Conference, pp. 3, 2016
Abstract

On the Efficiency of Decentralized Search in Expert Networks
Ma, Liang and Srivatsa, Mudhakar and Cansever, Derya and Yan, Xifeng and Kase, Sue and Vanni, Michelle
Distributed Computing Systems (ICDCS), 2016 IEEE 36th International Conference on, pp. 733--734
Abstract

Entity Reconciliation in a Multi-camera Network
Raghu Ganti, Mudhakar Srivatsa, and B. S. Manjunath
uSitu workshop, co-held with ICDCN, 2016

Idea: A system for efficient failure management in smart iot environments
Kodeswaran, Palanivel A and Kokku, Ravi and Sen, Sayandeep and Srivatsa, Mudhakar
Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, pp. 43--56, 2016
Abstract

MP-trie: Fast Spatial Queries on Moving Objects
Raghu Ganti, Mudhakar Srivatsa, Dakshi Agrawal, Petros Zerfos, Jorge Ortiz
Proceedings of the Industrial Track of the 17th International Middleware Conference, pp. 1:1--1:6, ACM, 2016


2015

Global attestation of location in mobile devices
Arunkumar, Saritha and Srivatsa, Mudhakar and Sensoy, Murat and Rajarajan, Muttukrishnan
Military Communications Conference, MILCOM 2015-2015 IEEE, pp. 1612--1617
Abstract

International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers
Tian, Jing and Jing, Jiwu and Srivatsa, Mudhakar
2015 - books.google.com, Springer
Abstract

GeoSpatial Access Control for Mobile Devices
Arunkumar, Saritha and Soyluoglu, Berker and Sensoy, Murat and Srivatsa, Mudhakar and Rajarajan, Muttukrishnan
Region 10 Symposium (TENSYMP), 2015 IEEE, pp. 86--89
Abstract

Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report)
Khouzani, MHR and Mardziel, Piotr and Cid, Carlos and Srivatsa, Mudhakar
arXiv preprint arXiv:1505.02325, 2015
Abstract

Fast and Flexible Conversion of Geohash Codes to and from Latitude/Longitude Coordinates
Roger Moussalli, Mudhakar Srivatsa, Sameh Asaad
23rd Annual Int. IEEE Symp. on Field-Programmable Custom Computing Machines (FCCM 2015)

Picking vs. guessing secrets: A game-theoretic analysis
Khouzani, MHR and Mardziel, Piotr and Cid, Carlos and Srivatsa, Mudhakar
Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, pp. 243--257
Abstract

Exploiting relevance feedback in knowledge graph search
Su, Yu and Yang, Shengqi and Sun, Huan and Srivatsa, Mudhakar and Kase, Sue and Vanni, Michelle and Yan, Xifeng
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135--1144, 2015
Abstract

Fine-grained knowledge sharing in collaborative environments
Guan, Ziyu and Yang, Shengqi and Sun, Huan and Srivatsa, Mudhakar and Yan, Xifeng
IEEE Transactions on Knowledge and Data Engineering 27(8), 2163--2174, IEEE, 2015
Abstract

Social Trove: A Self-Summarizing Storage Service for Social Sensing
Md Tanvir Al Amin, Shen Li, Muntasir Raihan Rahman, Panindra Tumkur Seetharamu, Shiguang Wang, Tarek Abdelzaher, Indranil Gupta, Mudhakar Srivatsa, Raghu Ganti, Reaz Ahmed, others
Autonomic Computing (ICAC), 2015 IEEE International Conference on, pp. 41--50


2014

Structure based data de-anonymization of social networks and mobility traces
Ji, Shouling and Li, Weiqing and Srivatsa, Mudhakar and He, Jing Selena and Beyah, Raheem
International Conference on Information Security, pp. 237--254, 2014
Abstract

On Critical Event Observability Using Social Networks: A Disaster Monitoring Perspective
Dong-Anh Nguyen, Tarek Abdelzaher, Steven Borbash, Xuan-Hong Dang, Raghu Ganti, Ambuj Singh, Mudhakar Srivatsa
Proceedings of the 2014 IEEE Military Communications Conference, pp. 1633--1638, IEEE Computer Society

Location Security--Where to Enforce?
Arunkumar, Saritha and Srivatsa, Mudhakar and Rajarajan, Muttukrishnan
Military Communications Conference (MILCOM), 2014 IEEE, pp. 1651--1656
Abstract

Data extrapolation in social sensing for disaster response
Siyu Gu, Chenji Pan, Hengchang Liu, Shen Li, Shaohan Hu, Lu Su, Shiguang Wang, Dong Wang, Md Tanvir A Amin, Ramesh Govindan, Charu Aggarwal, Raghu Ganti, Mudhakar Srivatsa, Amotz Bar-Noy, Peter Terlecky, Tarek Abdelzaher
Distributed Computing in Sensor Systems (DCOSS), 2014 IEEE International Conference on, pp. 119--126
Abstract

Analyzing Expert Behaviors in Collaborative Networks
Huan Sun, Mudhakar Srivatsa, Shulong Tan, Yang Li, Lance M Kaplan, Shu Tao, Xifeng Yan
ACM KDD, 2014

Efficient Spatial Query Processing for Big Data
Kisung Lee, Raghu K. Ganti, Mudhakar Srivatsa, Ling Liu
Proceedings of the 22Nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 469--472, ACM, 2014

On limits of travel time predictions: Insights from a new york city case study
Ganti, Raghu and Srivatsa, Mudhakar and Abdelzaher, Tarek
Distributed Computing Systems (ICDCS), 2014 IEEE 34th International Conference on, pp. 166--175
Abstract

Structural data de-anonymization: Quantification, practice, and implications
Ji, Shouling and Li, Weiqing and Srivatsa, Mudhakar and Beyah, Raheem
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1040--1053
Abstract


2013

Inferring Human Mobility Patterns from Taxicab Location Traces
R. Ganti, M. Srivatsa, A. Ranganathan, and J. Han
UbiComp, 2013

Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks
Chen, Xin and Patankar, Harshal and Zhu, Sencun and Srivatsa, Mudhakar and Opper, Jeff
Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2013 10th Annual IEEE Communications Society Conference on, pp. 131--139
Abstract

Spatio-Temporal Spread of Events in Social Networks: A Gas Shortage Case Study
R. Ganti, M. Srivatsa, H. Liu, and T. Abdelzaher
MilCom, 2013

Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation
Mardziel, Piotr and Magill, Stephen and Hicks, Michael and Srivatsa, Mudhakar
Journal of Computer Security 21(4), 463--532, IOS Press, 2013
Abstract

Platform and applications for massive-scale streaming network analytics
Zerfos, Petros and Srivatsa, Mudhakar and Yu, Hao and Dennerline, D and Franke, Hubertus and Agrawal, Dakshi
IBM Journal of Research and Development 57(3/4), 11--1, IBM, 2013

Cross-path inference attacks on multipath TCP
M Zubair Shafiq, Franck Le, Mudhakar Srivatsa, Alex X Liu
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks (HotNets), pp. 15, 2013

IntegrityMR: Integrity assurance framework for big data analytics and management applications
Wang, Yongzhi and Wei, Jinpeng and Srivatsa, Mudhakar and Duan, Yucong and Du, Wencai
Big Data, 2013 IEEE International Conference on, pp. 33--40
Abstract

Map matching: facts and myths
Mudhakar Srivatsa, Raghu Ganti, Jingjing Wang, Vinay Kolar
Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 474--477, 2013

Spatio-Temporal Provenance: Identifying Location Information from Unstructured Text
K. Lee, R. Ganti, M. Srivatsa, and P. Mohapatra
IQ2S - Workshop at PerCom, 2013

Result integrity check for mapreduce computation on hybrid clouds
Wang, Yongzhi and Wei, Jinpeng and Srivatsa, Mudhakar
Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on, pp. 847--854
Abstract


2012

Mining diverse opinions
Srivatsa, Mudhakar and Lee, Sihyung and Abdelzaher, Tarek
Military Communications Conference, 2012-MILCOM 2012, pp. 1--7
Abstract

Microscopic Social Influence
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, and Ling Liu
Proceedings of the SIAM International Conference on Data Mining (SDM), 2012

Byte Caching in Wireless Networks
Franck Le, Mudhakar Srivatsa, Arun Iyengar
Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference on, pp. 265--274

Using Subjective Logic to Handle Uncertainty and Conflicts
M. Sensoy, J.Z. Pan, A. Fokoue, M. Srivatsa, F. Meneguzzi
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pp. 1323--1326

Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-hoc Networks
V. Natarajan, S. Zhu, M. Srivatsa, J. Opper
Advanced Information Networking and Applications (AINA), 2012 IEEE 26th International Conference on, pp. 376--383

Distributed graph query processing in dynamic networks
M. Srivatsa, V. Kawadia, S. Yang
Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on, pp. 20--25

Fine-grained access control of personal data
T. Wang, M. Srivatsa, L. Liu
Proceedings of the 17th ACM symposium on Access Control Models and Technologies, pp. 145--156, 2012

Knowledge-oriented secure multiparty computation
P. Mardziel, M. Hicks, J. Katz, M. Srivatsa
Proceedings of the 7th Workshop on Programming Languages and Analysis for Security, pp. 2, 2012


Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary
M. Zafer, D. Agrawal, M. Srivatsa
IEEE/ACM Transactions on Networking, IEEE, 2012

Deanonymizing mobility traces: using social network as a side-channel
M. Srivatsa, M. Hicks
Proceedings of the 2012 ACM conference on Computer and communications security, pp. 628--637

Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks
W. Gao, G. Cao, M. Srivatsa, A. Iyengar
Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference on, pp. 132--141


2011

Plenary speaker I: Networking and protocol layering—Legacy or clean slate
Shenoy, Nirmala and Srivatsa, Mudhakar and Sivalingam, Krishna M and Chandramouli, R and Chellappan, C and Naik, Sagar and Biju, Shoolapani and Kannan, A and Geetha, TV and Sunder, K Shyaam and others
Advanced Computing (ICoAC), 2011 Third International Conference on, pp. 1--12
Abstract

Application-level denial of service
Srivatsa, Mudhakar and Iyengar, Arun
Encyclopedia of Cryptography and Security, pp. 42--44, Springer, 2011
Abstract

Trust-based probabilistic query answering
A. Fokoue, M. Srivatsa, R. Young
Web Information System Engineering--WISE 2011, 57--71, Springer

Decorrelating WSN traffic patterns with maximally uninformative constrained routing
J. Tapiador, M. Srivatsa, J. Clark, J. McDermid
NETWORKING 2011 Workshops, pp. 207--218

Probabilistic Abox Abduction in Description Logics
M. Sensoy, A. Fokoue, M. Srivatsa, J.Z. Pan
7th International Workshop on Scalable Semantic Web Knowledge Base Systems (SSWS’11), 2011

Trust Inference and Query Answering over Uncertain Information
A. Fokoue, M. Srivatsa, R. Young
Web Information System Engineering--WISE 2011, 57--71, Technical Report RC25157, IBM Research

Multiagent communication security in adversarial settings
S. Okamoto, P. Paruchuri, Y. Wang, K. Sycara, J. Marecki, M. Srivatsa
Web Intelligence and Intelligent Agent Technology (WI-IAT), 2011 IEEE/WIC/ACM International Conference on, pp. 296--303

Provenance-driven data dissemination in disruption tolerant networks
M. Srivatsa, W. Gao, A. Iyengar
Information Fusion (FUSION), 2011 Proceedings of the 14th International Conference on, pp. 1--8

Modeling Data Flow in Socio-Information Networks: A Risk Estimation Approach
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu
Proceeding of the 16th ACM symposium on Access control models and technologies, pp. 113--122, ACM, 2011

Dynamic enforcement of knowledge-based security policies
P. Mardziel, S. Magill, M. Hicks, M. Srivatsa
Computer Security Foundations Symposium (CSF), 2011 IEEE 24th, pp. 114--128

EventGuard: A System Architecture for Securing Publish-Subscribe Networks
M Srivatsa, L Liu, A Iyengar
ACM Transactions on Computer Systems (to appear) 29(4), 10, ACM, 2011

Poster: on quantitative information flow metrics
J. Zhu, M. Srivatsa
Proceedings of the 18th ACM conference on Computer and communications security, pp. 877--880, 2011

Privacy in VoIP Networks: Flow Analysis Attacks and Defense
M. Srivatsa, A. Iyengar, L. Liu, H. Jiang
Parallel and Distributed Systems, IEEE Transactions on 22(4), 621--633, IEEE, 2011

Supporting cooperative caching in disruption tolerant networks
W Gao, G Cao, A Iyengar, M Srivatsa
Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pp. 151--161


2010

Spatio-Temporal Patterns in Network Events
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, and Ling Liu
The 6th ACM International Conference on Emerging Networking Experiments and Technologies (ACM CoNEXT), 2010

A decision theoretic approach to data leakage prevention
Marecki, Janusz and Srivatsa, Mudhakar and Varakantham, Pradeep
Social Computing (SocialCom), 2010 IEEE Second International Conference on, pp. 776--784
Abstract


Assessing trust in uncertain information
A Fokoue, M Srivatsa, R Young
The Semantic Web--ISWC 2010, 209--224, Springer

Assessing trust in uncertain information using Bayesian description logic
A Fokoue, M Srivatsa, R Young
Proceedings of the 17th ACM conference on Computer and communications security, pp. 675--677, ACM, 2010


2009

A Note on Information-theoretic Secret Key Exchange over Wireless Channels
M. Zafer, D. Agrawal, and M. Srivatsa
47th Annual Allerton Conference on Communication, Control and Computing, 2009

A metadata calculus for secure information sharing
M Srivatsa, D Agrawal, S Reidt
Proceedings of the 16th ACM conference on Computer and communications security, pp. 488--499, 2009

Scalable key management algorithms for location-based services
M Srivatsa, A Iyengar, J Yin, L Liu
Networking, IEEE/ACM Transactions on 17(5), 1399--1412, IEEE, 2009

A framework for distributed monitoring and root cause analysis for large ip networks
D Banerjee, V Madduri, M Srivatsa
2009 28th IEEE International Symposium on Reliable Distributed Systems, pp. 246--255

The fable of the bees: incentivizing robust revocation decision making in ad hoc networks
Steffen Reidt, Mudhakar Srivatsa, Shane Balfe
Proceedings of the 16th ACM conference on Computer and communications security, pp. 291--302, ACM, 2009
Abstract

A Framework for Distributed Monitoring and Root Cause Analysis for IP Networks
D. Banerjee, V. Madduri, M. Srivatsa
IEEE Symposium on Reliable and Distributed Systems (SRDS) (winner of the best paper award), 2009

Search-as-a-service: Outsourced search over outsourced storage
A Singh, M Srivatsa, L Liu
ACM Transactions on the Web (TWEB) 3(4), 13, ACM, 2009

Learning, indexing, and diagnosing network faults
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 857--866, ACM, 2009


Scalable Key Management Algorithms for Location Based Services
M Srivatsa, A Iyengar, J Yin, L Liu
IEEE/ACM Transactions on Networking, 2009

A decision support system for secure information sharing
Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi, Peter Wrobel, John Yesberg
Proceedings of the 14th ACM symposium on Access control models and technologies, pp. 105--114, 2009

Privacy in VoIP networks: A k-anonymity approach
M Srivatsa, A Iyengar, L Liu
Proceedings of 28th IEEE International Conference on Computer Communications (INFOCOM), 2009


2008

An economic model for securing cross-domain information flows
M Srivatsa, P Rohatgi, S Balfe, KG Paterson
Submitted AC-ITA, 2008

Bootstrapping Coalition MANETs
M Srivatsa, D Agrawal, S Balfe
IBM Research Report RC24588, 2008


Scalable Topology Discovery and Link State Detection Using Routing Events
M Srivatsa, B J Ko, A Beygelzimer, V Madduri
Proceedings of the 2008 Symposium on Reliable Distributed Systems, pp. 165--174

A Policy Evaluation Tool for Multisite Resource Management
M. Srivatsa, N. Rajamani, M. Devarakonda
Parallel and Distributed Systems, IEEE Transactions on 19(10), 1352--1366, IEEE, 2008

SERvartuka: Dynamic Distribution of State to Improve SIP Server Scalability
V A Balasubramaniyan, A Acharya, M Ahamad, M Srivatsa, I Dacosta, C P Wright
Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems-Volume 00, pp. 562--572

Who is Listening? Security in Wireless Networks
M Srivatsa
Proc. of IEEE ICSCN, 167--172, 2008

Securing information flows: A metadata framework
M Srivatsa, P Rohatgi, S Balfe, S Reidt
Proceedings of 1st IEEE Workshop on Quality of Information for Sensor Networks (QoISN), 2008

Securing information flows: A quantitative risk analysis approach
M Srivatsa, P Rohatgi, S Balfe
Proceedings of 27th IEEE Conference on Military Communications (MILCOM), 2008

A metadata calculus for securing information flows
M Srivatsa, D Agrawal, S Balfe
Proceedings of 26th Army Science Conference (ASC 2008)

Trust management for secure information flows
M Srivatsa, S Balfe, K G Paterson, P Rohatgi
Proceedings of the 15th ACM conference on Computer and communications security, pp. 175--188, 2008


2007

Secure event dissemination in publish-subscribe networks
M Srivatsa, L Liu
2007 - computer.org, IEEE Computer Society

DSphere: A source-centric approach to crawling, indexing and searching the world wide web
B Bamba, L Liu, J Caverlee, V Padliya, M Srivatsa, T Bansal, M Palekar, J Patrao, S Li, A Singh
IEEE 23rd International Conference on Data Engineering, 2007, pp. 1515--1516

An access control system for web service compositions
M Srivatsa, A Iyengar, T Mikalsen, I Rouvellou, J Yin
Proceedings of the IEEE International Conference on Web Services, pp. 1--8, IEEE Computer Society, 2007


2006

Large scaling unstructured peer-to-peer networks with heterogeneity-aware topology and routing
M Srivatsa, B Gedik, L Liu
IEEE Transactions on Parallel and Distributed Systems 17(11), 1277, THE IEEE, INC., 2006

Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems
M Srivatsa, L Liu
Lecture Notes in Computer Science4189, 347, Springer, 2006

A client-transparent approach to defend against denial of service attacks
M Srivatsa, A Iyengar, J Yin, L Liu
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems, pp. 61--70, 2006



2005

Countering targeted file attacks using locationguard
M Srivatsa, L Liu
USENIX Security Symposium, 2005

Exchangeguard: A distributed protocol for electronic fair-exchange
M Srivatsa, L Xiong, L Liu
19th International Parallel and Distributed Processing Symposium (IPDPS 2005)

Resilient trust management for web service integration
S Park, L Liu, C Pu, M Srivatsa, J Zhang
IEEE International Conference on Web Services, 2005

Method and apparatus for performance and policy analysis in distributed computing systems
M V Devarakonda, N Rajamani, M Srivatsa
US Patent App. 11/258,435, 2005 - Google Patents, Google Patents
US Patent App. 11/258,435

Securing publish-subscribe overlay services with eventguard
M Srivatsa, L Liu
Proceedings of the 12th ACM conference on Computer and communications security, pp. 298, 2005

TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
M Srivatsa, L Xiong, L Liu
Proceedings of the 14th international conference on World Wide Web, pp. 431, 2005


2004



Year Unknown



A Judgment Mechanism for Key Revocation
S Reidt, M Srivatsa, S Balfe
usukita.org, 0

Multi-Site Resource Management: Policy Performance Analysis
M Srivatsa, N Rajamani, M Devarakonda
IBM Research Report\# RC23497, Yorktown Heights, NY, 0

Securing Information Flows: A Metadata Model
M Srivatsa, P Rohatgi, S Balfe, S Reidt
1st Int’l Workshop on Quality of Information for Sensor Networks (QoISN 2008)