Elie Bursztein
Orcid: 0000-0003-0316-6906Affiliations:
According to our database1,
Elie Bursztein
authored at least 70 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on elie.net
-
on twitter.com
On csauthors.net:
Bibliography
2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Facade: High-Precision Insider Threat Detection Using Deep Contextual Anomaly Detection.
CoRR, 2024
Supporting Human Raters with the Detection of Harmful Content using Large Language Models.
CoRR, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Leveraging Virtual Reality to Enhance Diversity, Equity and Inclusion training at Google.
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Found. Trends Priv. Secur., 2023
CoRR, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
"It's common and a part of being a content creator": Understanding How Creators Experience and Cope with Hate and Harassment Online.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
2020
Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the IEEE Conference on Computational Intelligence and Games, 2016
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
2015
IEEE Secur. Priv., 2015
Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google.
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 ACM Internet Measurement Conference, 2015
2014
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2012
Proceedings of the 21st World Wide Web Conference 2012, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the 4th USENIX Workshop on Offensive Technologies, 2010
Proceedings of the 3rd Workshop on Cyber Security Experimentation and Test, 2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Computer Security, 2010
2009
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008
Proceedings of the Automated Technology for Verification and Analysis, 2008
2007
Proceedings of the Advances in Computer Science, 2007