Kaustav Bhattacharjee

Kaustav Bhattacharjee
Verified
Kaustav verified their affiliation via an institutional email.
Verified
Kaustav verified their affiliation via an institutional email.
  • PhD
  • Post doc Research Associate at Pacific Northwest National Laboratory

About

14
Publications
2,562
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
49
Citations
Introduction
Kaustav Bhattacharjee is a Post-doc Research Associate with the Optimization & Control Group at PNNL. His research interests span visual analytics, data privacy, human-computer interaction, and explainable AI. Kaustav recently defended his PhD dissertation, which focused on developing interactive visual analytic workflows to mitigate uncertainty and privacy issues during the analytical process, particularly in domains such as the open data ecosystem.
Current institution
Pacific Northwest National Laboratory
Current position
  • Post doc Research Associate

Publications

Publications (14)
Conference Paper
Net load forecasting is crucial for energy planning and facilitating informed decision-making regarding trade and load distributions. However, evaluating forecasting models' performance against benchmark models remains challenging, thereby impeding experts' trust in the model's performance. In this context, there is a demand for technological inter...
Thesis
Full-text available
This dissertation takes a process-centric and stakeholder-first perspective for handling analytical uncertainty: the form of uncertainty that confronts data analysts' insight-generation processes in high-consequence decision-making scenarios. The cost of an incorrect decision when data is used for movie recommendations as opposed to when personal d...
Preprint
Full-text available
Net load forecasting is crucial for energy planning and facilitating informed decision-making regarding trade and load distributions. However, evaluating forecasting models' performance against benchmark models remains challenging, thereby impeding experts' trust in the model's performance. In this context, there is a demand for technological inter...
Conference Paper
Accurate net load forecasting is vital for energy planning, aiding decisions on trade and load distribution. However, assessing the performance of forecasting models across diverse input variables, like temperature and humidity, remains challenging, particularly for eliciting a high degree of trust in the model outcomes. In this context, there is a...
Article
Full-text available
Ranking schemes drive many real-world decisions, like, where to study, whom to hire, what to buy, etc. Many of these decisions often come with high consequences. For example, a university can be deemed less prestigious if not featured in a top-k list, and consumers might not even explore products that do not get recommended to buyers. At the heart...
Preprint
Full-text available
Ranking schemes drive many real-world decisions, like, where to study, whom to hire, what to buy, etc. Many of these decisions often come with high consequences. For example, a university can be deemed less prestigious if not featured in a top-k list, and consumers might not even explore products that do not get recommended to buyers. At the heart...
Conference Paper
The widespread adoption of open datasets across various domains has emphasized the significance of joining and computing their utility. However, the interplay between computation and human interaction is vital for informed decision-making. To address this issue, we first propose a utility metric to calibrate the usefulness of open datasets when joi...
Preprint
Full-text available
The open data ecosystem is susceptible to vulnerabilities due to disclosure risks. Though the datasets are anonymized during release, the prevalence of the release-and-forget model makes the data defenders blind to privacy issues arising after the dataset release. One such issue can be the disclosure risks in the presence of newly released datasets...
Conference Paper
The open data ecosystem is susceptible to vulnerabilities due to disclosure risks. Though the datasets are anonymized during release, the prevalence of the release-and-forget model makes the data defenders blind to privacy issues arising after the dataset release. One such issue can be the dis- closure risks in the presence of newly released datase...
Preprint
Full-text available
Open data sets that contain personal information are susceptible to adversarial attacks even when anonymized. By performing low-cost joins on multiple datasets with shared attributes, malicious users of open data portals might get access to information that violates individuals' privacy. However, open data sets are primarily published using a relea...
Conference Paper
Open data sets that contain personal information are susceptible to adversarial attacks even when anonymized. By performing low-cost joins on multiple datasets with shared attributes, malicious users of open data portals might get access to information that violates individuals' privacy. However, open data sets are primarily published using a relea...
Research Proposal
Government agencies collect citizens’ data, process them and release them online after de-identification so that this data can be used for research purposes. Recent studies have shown that a pair of these open datasets can be joined together to carry out linking attacks, hence data custodians lookout for the joinability risk between two datasets. H...
Article
Full-text available
Preservation of data privacy and protection of sensitive information from potential adversaries constitute a key socio‐technical challenge in the modern era of ubiquitous digital transformation. Addressing this challenge needs analysis of multiple factors: algorithmic choices for balancing privacy and loss of utility, potential attack scenarios tha...
Preprint
Full-text available
Preservation of data privacy and protection of sensitive information from potential adversaries constitute a key socio-technical challenge in the modern era of ubiquitous digital transformation. Addressing this challenge needs analysis of multiple factors: algorithmic choices for balancing privacy and loss of utility, potential attack scenarios tha...

Network

Cited By