Nalini Venkatasubramanian

Nalini Venkatasubramanian
University of California, Irvine | UCI · Department of Computer Science

About

384
Publications
30,494
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,400
Citations
Additional affiliations
July 1998 - December 2012
University of California, Irvine
July 1991 - July 1998
Hewlett-Packard, HP Labs
Position
  • Software Engineer, Research Staff Member

Publications

Publications (384)
Article
Full-text available
Most modern organizations today support network infrastructure to provide ubiquitous network coverage at their premises. Such a network infrastructure consisting of a set of access points deployed at different locations in buildings can be used to support coarse-level localization of individuals, who connect to the infrastructure using their mobile...
Article
Full-text available
Smart space administration and application development is challenging in part due to the semantic gap that exists between the high-level requirements of users and the low-level capabilities of IoT devices. The stakeholders in a smart space are required to deal with communicating with specific IoT devices, capturing data, processing it, and abstract...
Article
Full-text available
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced—IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of individu...
Article
Wastewater treatment processes are inherently dynamic due to the large variations in influent wastewater flow rate, weather conditions, concentration,and composition. The utilization of trace clustering techniques in process mining research field is an excellent way to analyze both the execution and confirm the compliance of wastewater treatment pr...
Chapter
Machine Learning models, and more recently Deep Learning models have gained popularity for predictive process monitoring. Predicting the process outcome, remaining time to completion, or the next activity of a running process can be crucial to provide decision information and enable timely intervention by case managers. These models fundamentally a...
Article
Full-text available
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced-IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of individu...
Preprint
Full-text available
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced -- IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of indiv...
Article
Nowadays, many Internet-of-Things (IoT) devices with rich sensors and actuators are being deployed to monitor community spaces. The data generated by these devices are analyzed and turned into actionable information by analytics operators. In this article, we present a Resource Efficient Adaptive Monitoring (REAM) framework at the edge that adaptiv...
Article
Real-time event detection and targeted decision making for emerging mission-critical applications require systems that extract and process relevant data from IoT sources in smart spaces. Oftentimes, this data is heterogeneous in size, relevance, and urgency, which creates a challenge when considering that different groups of stakeholders (e.g., fir...
Article
WiFi connectivity events, generated when a mobile device connects to WiFi access points can serve as a robust, passive, (almost) zero-cost indoor localization technology. The challenge is the coarse level localization it offers that limits its usefulness. We recently developed a novel data cleaning based approach, LOCATER , that exploits patterns i...
Article
Surveillance videos in smart environments have become commodity nowadays, which enable many novel applications, including various video analytics that turn videos into semantic results. In addition to live feeds, the surveillance videos may be saved at a storage server for on-demand user-defined queries in the future. Different from on-demand video...
Conference Paper
Full-text available
This paper proposes a system, entitled Concealer that allows sharing time-varying spatial data (e.g., as produced by sensors) in encrypted form to an untrusted third-party service provider to provide location-based applications (involving aggregation queries over selected regions over time windows) to users. Concealer exploits carefully selected en...
Preprint
Full-text available
This paper proposes a system, entitled Concealer that allows sharing time-varying spatial data (e.g., as produced by sensors) in encrypted form to an untrusted third-party service provider to provide location-based applications (involving aggregation queries over selected regions over time windows) to users. Concealer exploits carefully selected en...
Article
Full-text available
This paper explores the data cleaning challenges that arise in using WiFi connectivity data to locate users to semantic indoor locations such as buildings, regions, rooms. WiFi connectivity data consists of sporadic connections between devices and nearby WiFi access points (APs), each of which may cover a relatively large area within a building. Ou...
Article
Full-text available
This paper describes the collaborative effort between privacy and security researchers at nine different institutions along with researchers at the Naval Information Warfare Center to deploy, test, and demonstrate privacy-preserving technologies in creating sensor-based awareness using the Internet of Things (IoT) aboard naval vessels in the contex...
Preprint
Full-text available
Contact tracing has emerged as one of the main mitigation strategies to prevent the spread of pandemics such as COVID-19. Recently, several efforts have been initiated to track individuals, their movements, and interactions using technologies, e.g., Bluetooth beacons, cellular data records, and smartphone applications. Such solutions are often intr...
Preprint
This paper explores the data cleaning challenges that arise in using WiFi connectivity data to locate users to semantic indoor locations such as floors, regions, rooms, etc. WiFi connectivity data consists of sporadic connections between devices and nearby WiFi access points (APs), each of which may cover a relatively large area within a building....
Article
Full-text available
This paper focuses on the new privacy challenges that arise in smart homes. Specifically, the paper focuses on inferring the user's activities-which may, in turn, lead to the user's privacy-via inferences through device activities and network traffic analysis. We develop techniques that are based on a cryptographically secure token circulation in a...
Preprint
Full-text available
This paper focuses on the new privacy challenges that arise in smart homes. Specifically, the paper focuses on inferring the user's activities -- which may, in turn, lead to the user's privacy -- via inferences through device activities and network traffic analysis. We develop techniques that are based on a cryptographically secure token circulatio...
Conference Paper
Full-text available
The growing deployment of Internet of Things (IoT) systems aims to ease the daily life of end-users by providing several value-added services. However, IoT systems may capture and store sensitive, personal data about individuals in the cloud, thereby jeopardizing user-privacy. Emerging legislation, such as California's CalOPPA and GDPR in Europe, s...
Preprint
Full-text available
The growing deployment of Internet of Things (IoT) systems aims to ease the daily life of end-users by providing several value-added services. However, IoT systems may capture and store sensitive, personal data about individuals in the cloud, thereby jeopardizing user-privacy. Emerging legislation, such as California's CalOPPA and GDPR in Europe, s...
Conference Paper
Full-text available
Messaging and communication is a critical aspect of next generation Internet-of-Things (IoT) systems where interactions among devices, software systems/services and end-users is the expected mode of operation. Given the diverse and changing communication needs of entities, the data exchange interactions may assume different protocols (MQTT, CoAP, H...
Conference Paper
We present AquaSCALE, a framework for enabling middleware technologies and tools to model and explore the resilience and improved performance of urban infrastructures, e.g., water/power/natural gas distribution networks and transportation network. Today, detection of anomalous events (e.g., pipe breaks/leaks, contamination) in such complex distribu...
Conference Paper
Full-text available
Real-time event identification is critical in complex distributed infrastructures, e.g., water systems, where failures are difficult to isolate. We present AquaEIS, an event-based middleware tailored to the problem of locating sources of failure (e.g., contamination) in community water infrastructures. The inherent complexity of underground hydraul...
Conference Paper
Full-text available
This paper describes a middleware framework for IoT smart spaces, SemIoTic, that provides application developers and end-users with the semantic domain-relevant view of the smart space, hiding the complexity of having to deal with/understand lower-level information generated by sensors and actuators. SemIoTic uses a meta-model, based on the popular...
Poster
Full-text available
This demonstration showcases the SemIoTic middleware [2] which provides inhabitants of an IoT space, as well as developers of applications , with a semantic view of the space. Participants will have an opportunity to see how useful IoT applications can be easily developed focusing on describing what information is needed without having to deal with...
Conference Paper
Occupancy sensors are an integral part of many smart building applications, including energy and space optimizations. However, as more occupancy data is collected at an increasingly fine-grained level, possibilities of potential privacy breaches also increase. In this paper, we propose an attack in which the adversary associates an individual with...
Conference Paper
In this panel talk, we present our experiences regarding the development and deployment of an Internet of Things (IoT) based air quality monitoring system for developing cities. We consider the areas where widespread free WiFi is not prevalent; instead, the platform needs to rely on expensive and metered cellular data connections with limited data...
Conference Paper
Full-text available
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced-IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of individu...
Preprint
Full-text available
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced --- IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of indi...
Conference Paper
Full-text available
In this paper, we address issues in the design and operation of a Big Active Data Publish Subscribe (BAD Pub/Sub) systems to enable the next generation of enriched notification systems that can scale to societal levels. The proposed BAD Pub/Sub system will aim to ingest massive amounts of data from heterogeneous publishers and sources and deliver c...
Conference Paper
Full-text available
This paper considers the problem of dynamic evacuation routing in large smart buildings. We investigate a scalable routing approach which not only generates effective routes for evacuees but also quickly updates routes as the disaster status and building conditions could change during the evacuation time. We first design a flexible and scalable eva...
Conference Paper
Instrumenting water distribution networks with sensors for monitoring is critical to maintain adequate levels of water quality and quantity. Existing efforts to detect and localize adverse events in the network have explored either installing in-situ sensors on junctions or deploying a number of mobile sensors through pipes. These approaches have h...
Preprint
Full-text available
Smart homes are a special use-case of the Internet-of-Things (IoT) paradigm. Security and privacy are two prime concern in smart home networks. A threat-prone smart home can reveal lifestyle and behavior of the occupants, which may be a significant concern. This article shows security requirements and threats to a smart home and focuses on a privac...
Presentation
Full-text available
Advances in sensing, networking, and actuation technologies have resulted in the IoT wave that is expected to revolutionize all aspects of modern society. This paper focuses on the new challenges of privacy that arise in IoT in the context of smart homes. Specifically, the paper focuses on preventing the user's privacy via inferences through channe...
Article
The IoT revolution has provided a promising opportunity to build powerful perpetual awareness systems. Perpetual awareness systems are sensing systems characterized by continuous monitoring and ubiquitous sensing; they are essential to many safety and mission-critical applications, e.g. assisted living, healthcare and public safety. In this paper,...
Preprint
Full-text available
Advances in sensing, networking, and actuation technologies have resulted in the IoT wave that is expected to revolutionize all aspects of modern society. This paper focuses on the new challenges of privacy that arise in IoT in the context of smart homes. Specifically, the paper focuses on preventing the user's privacy via inferences through channe...
Poster
Full-text available
This poster presents our prototype implementation of FireDeX [1], a cross-layer middleware that supports timely delivery of mission-critical messages (i.e. events) over an IoT data exchange service. Emergency scenarios may challenge/congest the network infrastructure. FireDeX addresses these situations by prioritizing event delivery and by dropping...
Conference Paper
Full-text available
Real-time event detection and targeted decision making for emerging mission-critical applications, e.g. smart fire fighting, requires systems that extract and process relevant data from connected IoT devices in the environment. In this paper, we propose FireDeX, a cross-layer middleware that facilitates timely and effective exchange of data for coo...
Article
In this paper, we design and implement an Internet-of-Things (IoT) based platform for developing cities using environmental sensing as a driving application. Since ubiquitous and free WiFi access is not available in most developing cities, IoT deployments must leverage 3G cellular connections that are metered and expensive. In order to best utilize...
Conference Paper
Full-text available
We present a graphical model based approach for on-line state estimation of water distribution system failures during large-scale disasters. Water distribution systems often exhibit extreme fragilities during large-scale disasters (e.g., earthquakes) resulting in massive pipe breaks, water contamination, and disruption of service. To monitor and id...