2025
Shelving it rather than Ditching it: Dynamically Debloating DEX and Native Methods of Android Applications without APK Modification.
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, January, 2025
Neighborhood Disparities in Smart City Service Adoption.
CoRR, January, 2025
2024
Can Previews Mitigate the Effect of Interruptions? Findings from a Lab Experiment under Various Workloads.
Int. J. Hum. Comput. Interact., February, 2024
Improving Users' Passwords with DPAR: a Data-driven Password Recommendation System.
CoRR, 2024
Towards Speedy Permission-Based Debloating for Android Apps.
Proceedings of the IEEE/ACM 11th International Conference on Mobile Software Engineering and Systems, 2024
MiniMon: Minimizing Android Applications with Intelligent Monitoring-Based Debloating.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Strategies of Product Managers: Negotiating Social Values in Digital Product Design.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Evaluating organizational phishing awareness training on an enterprise scale.
Comput. Secur., September, 2023
How Mass surveillance Crowds Out Installations of COVID-19 Contact Tracing Applications.
Proc. ACM Hum. Comput. Interact., April, 2023
AutoDebloater: Automated Android App Debloating.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Social Support for Mobile Security: Comparing Close Connections and Community Volunteers in a Field Experiment.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Privacy-Preserving Transactions with Verifiable Local Differential Privacy.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023
2022
Evaluating package delivery crowdsourcing using location traces in different population densities.
Comput. Environ. Urban Syst., 2022
Synthesis of Longitudinal Human Location Sequences: Balancing Utility and Privacy.
ACM Trans. Knowl. Discov. Data, 2022
Crowd logistics: Understanding auction-based pricing and couriers' strategies in crowdsourcing package delivery.
J. Intell. Transp. Syst., 2022
Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
Valuation of Differential Privacy Budget in Data Trade: A Conjoint Analysis.
Proceedings of the Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30, 2022
Meerkat: A Social Community Support Application for Older Adults.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
User-Centered Privacy-by-Design: Evaluating the Appropriateness of Design Prototypes.
Int. J. Hum. Comput. Stud., 2021
How mass surveillance can crowd out installations of COVID-19 contact tracing apps.
CoRR, 2021
Nudging users towards online safety using gamified environments.
Comput. Secur., 2021
Website categorization via design attribute learning.
Comput. Secur., 2021
Between privacy and security: the factors that drive intentions to use cyber-security applications.
Behav. Inf. Technol., 2021
An Exploratory Study of Social Support Systems to Help Older Adults in Managing Mobile Safety.
Proceedings of the MobileHCI '21: 23rd International Conference on Mobile Human-Computer Interaction, Toulouse & Virtual Event, France, 27 September 2021, 2021
Detecting interruption events using EEG.
Proceedings of the 3rd IEEE Global Conference on Life Sciences and Technologies, 2021
2020
Can you Turn it Off?: The Spatial and Social Context of Mobile Disturbance.
Proc. ACM Hum. Comput. Interact., 2020
2019
Analyzing large-scale human mobility data: a survey of machine learning methods and applications.
Knowl. Inf. Syst., 2019
AppMoD: Helping Older Adults Manage Mobile Security with Online Social Help.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
My Mom was Getting this Popup: Understanding Motivations and Processes in Helping Older Relatives with Mobile Security and Privacy.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
Evaluating Users' Perceptions about a System's Privacy: Differentiating Social and Institutional Aspects.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
A/P(rivacy) Testing: Assessing Applications for Social and Institutional Privacy.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Privacy by designers: software developers' privacy mindset.
Empir. Softw. Eng., 2018
The Privacy Implications of Cyber Security Systems: A Technological Survey.
ACM Comput. Surv., 2018
Augmented-Genomics: Protecting Privacy for Clinical Genomics with Inferential Interfaces.
Proceedings of the 23rd International Conference on Intelligent User Interfaces Companion, 2018
Towards Behavioral Privacy: How to Understand AI's Privacy Threats in Ubiquitous Computing.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018
Crowdsourcing Privacy Design Critique: An Empirical Evaluation of Framing Effects.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Privacy in Context: Critically Engaging with Theory to Guide Privacy Research and Design.
Proceedings of the Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2018
Moving Beyond a "one-size fits all": Exploring Individual Differences in Privacy.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
2017
Analyzing and Optimizing Access Control Choice Architectures in Online Social Networks.
ACM Trans. Intell. Syst. Technol., 2017
Not Even Past: Information Aging and Temporal Privacy in Online Social Networks.
Hum. Comput. Interact., 2017
Understanding the Valuation of Location Privacy: a Crowdsourcing-Based Approach.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Susceptibility to Social Influence of Privacy Behaviors: Peer versus Authoritative Sources.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017
How Developers Make Design Decisions about Users' Privacy: The Place of Professional Communities and Organizational Climate.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017
2016
Anonymizing mobility data using semantic cloaking.
Pervasive Mob. Comput., 2016
A methodology for estimating the value of privacy in information disclosure systems.
Comput. Hum. Behav., 2016
2015
Simplifying Data Disclosure Configurations in a Cloud Computing Environment.
ACM Trans. Intell. Syst. Technol., 2015
Let's Talk About Sex (Apps), CSCW.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015
2014
Crowdsourcing privacy preferences in context-aware applications.
Pers. Ubiquitous Comput., 2014
2013
Retrospective privacy: managing longitudinal privacy in online social networks.
Proceedings of the Symposium On Usable Privacy and Security, 2013
Locality and privacy in people-nearby applications.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013
The price is right?: economic value of location sharing.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013
2012
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems.
User Model. User Adapt. Interact., 2012
What can 'people-nearby' applications teach us about meeting new people?
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012
OPOSSUM: Indexing Techniques for an Order-of-Magnitude Improvement of Service Matchmaking Times.
Proceedings of the Semantic Web Services, Advancement through Evaluation, 2012
2011
Humans, semantic services and similarity: A user study of semantic Web services matching and composition.
J. Web Semant., 2011
Caché: caching location-enhanced content to improve user privacy.
Proceedings of the 9th International Conference on Mobile Systems, 2011
Improving Users' Consistency When Recalling Location Sharing Preferences.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011
Super-Ego: a framework for privacy-sensitive bounded context-awareness.
Proceedings of the CASEMANS@Ubicomp '11: The 5th ACM International workshop on context-awareness for self-managing systems, 2011
Who's your best friend?: targeted privacy attacks In location-sharing social networks.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011
2010
Caché: caching location-enhanced content to improve user privacy.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010
Empirical models of privacy in location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Locaccino: a privacy-centric location sharing application.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Bridging the gap between physical location and online social networks.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Generating default privacy policies for online social networks.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
2009
Context-Based Matching and Ranking of Web Services for Composition.
IEEE Trans. Serv. Comput., 2009
Analyzing use of privacy policy attributes in a location sharing application.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
2008
Generating and Optimizing Graphical User Interfaces for Semantic Service Compositions.
Proceedings of the Conceptual Modeling, 2008
2007
A semantic approach to approximate service retrieval.
ACM Trans. Internet Techn., 2007
Modeling Alternatives in Exception Executions.
Proceedings of the Business Process Management Workshops, 2007
2006
<i>OPOSSUM</i>: Bridging the Gap Between Web Services and the Semantic Web.
Proceedings of the Next Generation Information Technologies and Systems, 2006
2005
Automatically Grounding Semantically-Enriched Conceptual Models to Concrete Web Services.
Proceedings of the Conceptual Modeling, 2005
2004
QSIA - a Web-based environment for learning, assessing and knowledge sharing in communities.
Comput. Educ., 2004
Modeling Semantic Web Services with OPM/S A Human and Machine-Interpretable Language.
Proceedings of the Third International Workshop on Web Dynamics, 2004
OPCATeam - Collaborative Business Process Modeling with OPM.
Proceedings of the Business Process Management: Second International Conference, 2004