Apu Kapadia

Orcid: 0000-0003-4142-8444

Affiliations:
  • Indiana University Bloomington, IN, USA


According to our database1, Apu Kapadia authored at least 112 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Drawback of Insight: Detailed Explanations Can Reduce Agreement with XAI.
CoRR, 2024

Sharenting on TikTok: Exploring Parental Sharing Behaviors and the Discourse Around Children's Online Privacy.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

2023
Addressing the harms of AI-generated inauthentic content.
Nat. Mac. Intell., July, 2023

Modeling User Characteristics Associated with Interdependent Privacy Perceptions on Social Media.
ACM Trans. Comput. Hum. Interact., 2023

User Preferences for Interdependent Privacy Preservation Strategies in Social Media.
Proc. ACM Hum. Comput. Interact., 2023

Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
IEEE Secur. Priv., 2023

Privacy-preserving and Privacy-attacking Approaches for Speech and Audio - A Survey.
CoRR, 2023

Bottom-up psychosocial interventions for interdependent privacy: Effectiveness based on individual and content differences.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Shared Privacy Concerns of the Visually Impaired and Sighted Bystanders with Camera-Based Assistive Technologies.
ACM Trans. Access. Comput., 2022

Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms.
Proc. ACM Hum. Comput. Interact., 2022

"Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social Media.
Proc. ACM Hum. Comput. Interact., 2022

Sharenting and Children's Privacy in the United States: Parenting Style, Practices, and Perspectives on Sharing Young Children's Photos on Social Media.
Proc. ACM Hum. Comput. Interact., 2022

Tangible Privacy for Smart Voice Assistants: Bystanders' Perceptions of Physical Device Controls.
Proc. ACM Hum. Comput. Interact., 2022

Preventing sensitive-word recognition using self-supervised learning to preserve user-privacy for automatic speech recognition.
Proceedings of the Interspeech 2022, 2022

The Impact of Viral Posts on Visibility and Behavior of Professionals: A Longitudinal Study of Scientists on Twitter.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

2021
Defending Against Microphone-Based Attacks with Personalized Noise.
Proc. Priv. Enhancing Technol., 2021

Does This Photo Make Me Look Good?: How Social Media Feedback on Photos Impacts Posters, Outsiders, and Friends.
Proc. ACM Hum. Comput. Interact., 2021

Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication.
Proceedings of the 30th USENIX Security Symposium, 2021

What breach? Measuring online awareness of security incidents by studying real-world browsing behavior.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

Your Photo is so Funny that I don't Mind Violating Your Privacy by Sharing it: Effects of Individual Humor Styles on Online Photo-sharing Behaviors.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Sharing Photos on Social Media: Visual Attention Affects Real-World Decision Making.
Proceedings of the Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity, 2021

2020
Privacy Norms and Preferences for Photos Posted Online.
ACM Trans. Comput. Hum. Interact., 2020

"It's easier than causing confrontation": Sanctioning Strategies to Maintain Social Norms and Privacy on Social Media.
Proc. ACM Hum. Comput. Interact., 2020

Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy.
Proc. ACM Hum. Comput. Interact., 2020

(How) Do people change their passwords after a breach?
CoRR, 2020

"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications.
Proceedings of the 29th USENIX Security Symposium, 2020

Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Visual Attention and Real-World Decision Making: Sharing Photos on Social Media.
Proceedings of the 42th Annual Meeting of the Cognitive Science Society, 2020

Privacy Considerations of the Visually Impaired with Camera Based Assistive Technologies: Misrepresentation, Impropriety, and Fairness.
Proceedings of the ASSETS '20: The 22nd International ACM SIGACCESS Conference on Computers and Accessibility, 2020

2019
Conveying Situational Information to People with Visual Impairments.
CoRR, 2019

Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Up to a Limit?: Privacy Concerns of Bystanders and Their Willingness to Share Additional Information with Visually Impaired Users of Assistive Technologies.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings.
Proc. Priv. Enhancing Technol., 2017

Challenges in Transitioning from Civil to Military Culture: Hyper-Selective Disclosure through ICTs.
Proc. ACM Hum. Comput. Interact., 2017

Understanding the Physical Safety, Security, and Privacy Concerns of People with Visual Impairments.
IEEE Internet Comput., 2017

Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

Was my message read?: Privacy and Signaling on Facebook Messenger.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Editor's Introduction.
Proc. Priv. Enhancing Technol., 2016

Editors' Introduction.
Proc. Priv. Enhancing Technol., 2016

Addressing Physical Safety, Security, and Privacy for People with Visual Impairments.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Twitter's Glass Ceiling: The Effect of Perceived Gender on Online Visibility.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Enhancing Lifelogging Privacy by Detecting Screens.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Location Privacy for Mobile Crowd Sensing through Population Mapping.
Sensors, 2015

Editors' Introduction.
Proc. Priv. Enhancing Technol., 2015

Beyond the lock icon: real-time detection of phishing websites using public key certificates.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015

Interrupt Now or Inform Later?: Comparing Immediate and Delayed Privacy Feedback.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Crowdsourced Exploration of Security Configurations.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Privacy Concerns and Behaviors of People with Visual Impairments.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
ReDS: A Framework for Reputation-Enhanced DHTs.
IEEE Trans. Parallel Distributed Syst., 2014

ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras.
CoRR, 2014

Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Reactive security: responding to visual stimuli from wearable cameras.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Privacy behaviors of lifeloggers using wearable cameras.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Defending against device theft with human notarization.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

Reflection or action?: how feedback and control affect location sharing decisions.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Community-Enhanced De-anonymization of Online Social Networks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Peer-produced privacy protection.
Proceedings of the Social Implications of Wearable Computing and Augmediated Reality in Everyday Life: 2013 IEEE International Symposium on Technology and Society, 2013

Attire: conveying information exposure through avatar apparel.
Proceedings of the Computer Supported Cooperative Work, 2013

2012
GANGRENE: Exploring the Mortality of Flash Memory.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice.
Proceedings of the Symposium On Usable Privacy and Security, 2012

PlexC: a policy language for exposure control.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

DECENT: A decentralized architecture for enforcing privacy in online social networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Pools, clubs and security: designing for a party not a person.
Proceedings of the New Security Paradigms Workshop, 2012

BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules.
Proceedings of the Financial Cryptography and Data Security, 2012

Are you exposed?: conveying information exposure.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, Seattle, WA, USA, February 11-15, 2012, 2012

Cachet: a decentralized architecture for privacy preserving social networking with caching.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

"Check out where I am!": location-sharing motivations, preferences, and practices.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

PERM: practical reputation-based blacklisting without TTPS.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users.
ACM Trans. Inf. Syst. Secur., 2011

Nymble: Blocking Misbehaving Users in Anonymizing Networks.
IEEE Trans. Dependable Secur. Comput., 2011

AnonySense: A system for anonymous opportunistic sensing.
Pervasive Mob. Comput., 2011

A Decentralized Architecture for Enforcing Privacy in Online Social Networks
CoRR, 2011

Pythia: a privacy aware, peer-to-peer network for social search.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Loose tweets: an analysis of privacy leaks on twitter.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Eyeing your exposure: quantifying and controlling information sharing for improved privacy.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
Proceedings of the Network and Distributed System Security Symposium, 2011

Toward securing sensor clouds.
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011

2010
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs.
ACM Trans. Inf. Syst. Secur., 2010

Towards Net-Centric Cyber Survivability for Ballistic Missile Defense.
Proceedings of the Architecting Critical Systems, First International Symposium, 2010

MeD-Lights: a usable metaphor for patient controlled access to electronic health records.
Proceedings of the ACM International Health Informatics Symposium, 2010

Secure cloud computing with brokered trusted sensor networks.
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010

ReDS: reputation for directory services in P2P systems.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

ReDS: reputation for directory services in P2P systems.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010

2008
TwoKind authentication: protecting private information in untrustworthy environments.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

AnonySense: Opportunistic and Privacy-Preserving Context Collection.
Proceedings of the Pervasive Computing, 2008

Halo: High-Assurance Locate for Distributed Hash Tables.
Proceedings of the Network and Distributed System Security Symposium, 2008

Anonysense: privacy-aware people-centric sensing.
Proceedings of the 6th International Conference on Mobile Systems, 2008

PEREA: towards practical TTP-free revocation in anonymous authentication.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
A Case (Study) For Usability in Secure Email Communication.
IEEE Secur. Priv., 2007

TwoKind authentication: usable authenticators for untrustworthy environments.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Nymble: Anonymous IP-Address Blocking.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Virtual Walls: Protecting Digital Privacy in Pervasive Environments.
Proceedings of the Pervasive Computing, 2007

Attribute-Based Publishing with Hidden Credentials and Hidden Policies.
Proceedings of the Network and Distributed System Security Symposium, 2007

Blacklistable anonymous credentials: blocking misbehaving users without ttps.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2005
Models for Privacy in Ubiquitous Computing Environments
PhD thesis, 2005

2004
A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures.
IEEE Distributed Syst. Online, 2004

Routing with Confidence: Supporting Discretionary Routing Requirements in Policy Based Networks.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

KNOW Why your access was denied: regulating feedback for usable security.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2002
Packet Spacing: An Enabling Mechanism for Delivering Multimedia Content in Computational Grids.
J. Supercomput., 2002

Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

GREEN: proactive queue management over a best-effort network.
Proceedings of the Global Telecommunications Conference, 2002

2001
The Effects of Inter-packet Spacing on the Delivery of Multimedia Content.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

2000
IRBAC 2000: Secure Interoperability Using Dynamic Role Translation.
Proceedings of the International Conference on Internet Computing, 2000


  Loading...