Ashwini Rao

Orcid: 0000-0003-4154-8614

According to our database1, Ashwini Rao authored at least 14 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models.
Proceedings of the 4th IEEE International Conference on Trust, 2022

2021
Distributed Deep Learning Using Volunteer Computing-Like Paradigm.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops, 2021

2020
Types of Privacy Expectations.
Frontiers Big Data, 2020

2019
Data Siphoning Across Borders: The Role of Internet Tracking.
Proceedings of the First IEEE International Conference on Trust, 2019

An Unsupervised Technique to Generate Summaries from Opinionated Review Documents.
Proceedings of the Progress in Advanced Computing and Intelligent Engineering, 2019

2018
Assessing the Impact of Data Practices on User Privacy.
PhD thesis, 2018

2016
Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

2015
What do they know about me? Contents and Concerns of Online Behavioral Profiles.
CoRR, 2015

Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

2014
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements.
Requir. Eng., 2014

Less is more?: investigating the role of examples in security studies using analogical transfer.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

2013
Formal analysis of privacy requirements specifications for multi-tier applications.
Proceedings of the 21st IEEE International Requirements Engineering Conference, 2013

Effect of grammar on security of long passwords.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns.
Proceedings of the Second IEEE International Workshop on Requirements Patterns, 2012


  Loading...