Jens Grossklags

Orcid: 0000-0003-1093-1282

Affiliations:
  • Technical University Munich, Germany
  • Pennsylvania State University, University Park, USA (former)


According to our database1, Jens Grossklags authored at least 168 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Vulnerabilities of Data Protection in Vertical Federated Learning Training and Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2024

"Good and Scary at the Same Time" - Exploring Citizens' Perceptions of a Prospective Metaverse.
IEEE Pervasive Comput., 2024

Metaverse Perspectives from Japan: A Participatory Speculative Design Case Study.
Proc. ACM Hum. Comput. Interact., 2024

Distributed Synthetic Time-Series Data Generation With Local Differentially Private Federated Learning.
IEEE Access, 2024

PoLLMgraph: Unraveling Hallucinations in Large Language Models via State Transition Dynamics.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024

Attitudes Toward Facial Analysis AI: A Cross-National Study Comparing Argentina, Kenya, Japan, and the USA.
Proceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency, 2024

How the Types of Consequences in Social Scoring Systems Shape People's Perceptions and Behavioral Reactions.
Proceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency, 2024

Mapping the Stakeholder Debate on Facial Recognition Technologies: Review and Stakeholder Workshop.
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024

Nuisance Letters? E-Mail Newsletters, Privacy, and the Market for Data.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

2023
Data Portability.
Bus. Inf. Syst. Eng., October, 2023

Distributed GAN-Based Privacy-Preserving Publication of Vertically-Partitioned Data.
Proc. Priv. Enhancing Technol., April, 2023

The Unsung Heroes of Facebook Groups Moderation: A Case Study of Moderation Practices and Tools.
Proc. ACM Hum. Comput. Interact., April, 2023

Breaking the Silence: Investigating Which Types of Moderation Reduce Negative Effects of Sexist Social Media Content.
Proc. ACM Hum. Comput. Interact., 2023

Generalized Hyperbolic Discounting in Security Games of Timing.
Games, 2023

Data Forensics in Diffusion Models: A Systematic Analysis of Membership Privacy.
CoRR, 2023

The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox.
Proceedings of the ACM Web Conference 2023, 2023

Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem.
Proceedings of the 32nd USENIX Security Symposium, 2023

Factors Influencing Perceived Legitimacy of Social Scoring Systems: Subjective Privacy Harms and the Moderating Role of Transparency.
Proceedings of the 44th International Conference on Information Systems, 2023

Exploring the Reflective Space of AI Narratives Through Speculative Design in Japan and Germany.
Proceedings of the 2023 ACM Conference on Information Technology for Social Good, 2023

A Reflection on How Cross-Cultural Perspectives on the Ethics of Facial Analysis AI Can Inform EU Policymaking.
Proceedings of the 2nd European Workshop on Algorithmic Fairness, 2023

The Effectiveness of Security Interventions on GitHub.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

E-government HCI in China: How Does the Government Communicate a New Regulation System to the Public?
Asian CHI, 2023

RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Work Experience as a Factor in Cyber-Security Risk Awareness: A Survey Study with University Students.
J. Cybersecur. Priv., June, 2022

SignDS-FL: Local Differentially Private Federated Learning with Sign-based Dimension Selection.
ACM Trans. Intell. Syst. Technol., 2022

Leave No Data Behind - Empirical Insights into Data Erasure from Online Services.
Proc. Priv. Enhancing Technol., 2022

Comprehensive Analysis of Privacy Leakage in Vertical Federated Learning During Prediction.
Proc. Priv. Enhancing Technol., 2022

Privacy-Preserving High-dimensional Data Collection with Federated Generative Autoencoder.
Proc. Priv. Enhancing Technol., 2022

A Multi-Region Investigation of the Perceptions and Use of Smart Home Devices.
Proc. Priv. Enhancing Technol., 2022

Nudging Software Developers Toward Secure Code.
IEEE Secur. Priv., 2022

A Hierarchical Macroeconomic Copula Model for Cyber Damages Based on Current Cyber Insurance Prices.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Online Service Switching Intentions and Attitudes towards Data Portability - The Role of Technology-related Attitudes and Privacy.
Proceedings of the MuC '22: Mensch und Computer 2022, Darmstadt Germany, September 4, 2022

Closing Pandora's Box on Naver: Toward Ending Cyber Harassment.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

What People Think AI Should Infer From Faces.
Proceedings of the FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21, 2022

AI-Competent Individuals and Laypeople Tend to Oppose Facial Analysis AI.
Proceedings of the Equity and Access in Algorithms, Mechanisms, and Optimization, 2022

Social Media Profiling Continues to Partake in the Development of Formalistic Self-Concepts. Social Media Users Think So, Too.
Proceedings of the AIES '22: AAAI/ACM Conference on AI, Ethics, and Society, Oxford, United Kingdom, May 19, 2022

Ordinary People as Moral Heroes and Foes: Digital Role Model Narratives Propagate Social Norms in China's Social Credit System.
Proceedings of the AIES '22: AAAI/ACM Conference on AI, Ethics, and Society, Oxford, United Kingdom, May 19, 2022

2021
IntRepair: Informed Repairing of Integer Overflows.
IEEE Trans. Software Eng., 2021

Data Portability between Online Services: An Empirical Analysis on the Effectiveness of GDPR Art. 20.
Proc. Priv. Enhancing Technol., 2021

Won't You Think of Others?: Interdependent Privacy in Smartphone App Permissions.
Proc. ACM Hum. Comput. Interact., 2021

Erratum to: The Right to Data Portability: conception, status quo, and future directions.
Inform. Spektrum, 2021

The Right to Data Portability: conception, status quo, and future directions.
Inform. Spektrum, 2021

Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education.
IEEE Secur. Priv., 2021

Exponential discounting in security games of timing.
J. Cybersecur., 2021

Method Confusion Attack on Bluetooth Pairing.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

iTOP: Automating Counterfeit Object-Oriented Programming Attacks.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

DeepMemory: Model-based Memorization Analysis of Deep Neural Language Models.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

The Transparency of the Chinese Social Credit System from the Perspective of German Organizations.
Proceedings of the 29th European Conference on Information Systems, 2021

The Effect of Google Search on Software Security: Unobtrusive Security Interventions via Content Re-ranking.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Blacklists and Redlists in the Chinese Social Credit System: Diversity, Flexibility, and Comprehensiveness.
Proceedings of the AIES '21: AAAI/ACM Conference on AI, 2021

2020
An Analysis of the Current State of the Consumer Credit Reporting System in China.
Proc. Priv. Enhancing Technol., 2020

Assessing the current state of information security policies in academic organizations.
Inf. Comput. Secur., 2020

Should users participate in governing social media? Philosophical and technical considerations of democratic social media.
First Monday, 2020

An Empirical Study of Android Security Bulletins in Different Vendors.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Challenges in IT Security Processes and Solution Approaches with Process Mining.
Proceedings of the Security and Trust Management - 16th International Workshop, 2020

Security onboarding: an interview study on security training for temporary employees.
Proceedings of the Mensch und Computer 2020 - Tagungsband, 2020

Responding to KRACK: Wi-Fi Security Awareness in Private Households.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

Nothing Standard About It: An Analysis of Minimum Security Standards in Organizations.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Analysis of Darknet Market Activity as a Country-Specific, Socio-Economic and Technological Phenomenon.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
On Sharing Intentions, and Personal and Interdependent Privacy Considerations for Genetic Data: A Vignette Study.
IEEE ACM Trans. Comput. Biol. Bioinform., 2019

A game-theoretic model for users' participation in ephemeral social vehicular networks.
Int. J. Commun. Syst., 2019

The Positive Impact of Task Familiarity, Risk Propensity, and Need For Cognition on Observed Timing Decisions in a Security Game.
Games, 2019

Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnerabilities.
CoRR, 2019

EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs.
Proceedings of the 28th USENIX Security Symposium, 2019

Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography.
Proceedings of the 28th USENIX Security Symposium, 2019

Setting the Stage: Towards Principles for Reasonable Image Inferences.
Proceedings of the Adjunct Publication of the 27th Conference on User Modeling, 2019

Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

How reliable is the crowdsourced knowledge of security implementation?
Proceedings of the 41st International Conference on Software Engineering, 2019

Time-Dependent Strategies in Games of Timing.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Clear Sanctions, Vague Rewards: How China's Social Credit System Currently Defines "Good" and "Bad" Behavior.
Proceedings of the Conference on Fairness, Accountability, and Transparency, 2019

The Differences in Data Sensitivity Perceptions among Private and Workplace Health Apps: A Delphi Study.
Proceedings of the 9th International Conference on Digital Public Health, 2019

Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

The Acceptable State: an Analysis of the current State of Acceptable Use Policies in Academic Institutions.
Proceedings of the 27th European Conference on Information Systems, 2019

Analyzing control flow integrity with LLVM-CFI.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
On the Assessment of Systematic Risk in Networked Systems.
ACM Trans. Internet Techn., 2018

Special Issue on the Economics of Security and Privacy: Guest Editors' Introduction.
ACM Trans. Internet Techn., 2018

VaultIME: Regaining User Control for Password Managers through Auto-correction.
EAI Endorsed Trans. Security Safety, 2018

Regulating Access to System Sensors in Cooperating Programs.
CoRR, 2018

IntRepair: Informed Fixing of Integer Overflows.
CoRR, 2018

An Options Approach to Cybersecurity Investment.
IEEE Access, 2018

τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Sharing is Caring: Collaborative Analysis and Real-Time Enquiry for Security Analytics.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Economic Analyses of Security Investments on Cryptocurrency Exchanges.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

The Rules of Engagement for Bug Bounty Programs.
Proceedings of the Financial Cryptography and Data Security, 2018

An Economic Study of the Effect of Android Platform Fragmentation on Security Updates.
Proceedings of the Financial Cryptography and Data Security, 2018

CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM.
Proceedings of the Computer Security, 2018

A Democracy Called Facebook? Participation as a Privacy Strategy on Social Media.
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018

Take It or Leave It: A Survey Study on Operating System Upgrade Practices.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs.
J. Cybersecur., 2017

Practical Integer Overflow Prevention.
CoRR, 2017

Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution.
CoRR, 2017

When to Invest in Security? Empirical Evidence and a Game-Theoretic Approach for Time-Based Security.
CoRR, 2017

AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.
Proceedings of the 26th USENIX Security Symposium, 2017

Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data Matter?
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

On the Economics of Ransomware.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

"Hello. This is the IRS calling.": A case study on scams, extortion, impersonation, and phone spoofing.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Towards a Model on the Factors Influencing Social App Users' Valuation of Interdependent Privacy.
Proc. Priv. Enhancing Technol., 2016

Human-Computer Interaction and International Public Policymaking: A Framework for Understanding and Taking Future Actions.
Found. Trends Hum. Comput. Interact., 2016

Aware: Controlling App Access to I/O Devices on Mobile Platforms.
CoRR, 2016

FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms.
Proceedings of the Computer Security - ESORICS 2016, 2016

When cybercrimes strike undergraduates.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016

Sharing Is Caring, or Callous?
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Adaptive Steganography and Steganalysis with Fixed-Size Embedding.
Trans. Data Hiding Multim. Secur., 2015

Using Conjoint Analysis to Investigate the Value of Interdependent Privacy in Social App Adoption Scenarios.
Proceedings of the International Conference on Information Systems, 2015

Games of Timing for Security in Dynamic Environments.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools.
Proceedings of the Financial Cryptography and Data Security, 2015

A Short Paper on the Incentives to Share Private Information for Population Estimates.
Proceedings of the Financial Cryptography and Data Security, 2015

Should Cyber-Insurance Providers Invest in Software Security?
Proceedings of the Computer Security - ESORICS 2015, 2015

A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

An Empirical Study of Web Vulnerability Discovery Ecosystems.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Secure Team Composition to Thwart Insider Threats and Cyber-Espionage.
ACM Trans. Internet Techn., 2014

Social Status and the Demand for Security and Privacy.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Estimating Systematic Risk in Real-World Networks.
Proceedings of the Financial Cryptography and Data Security, 2014

Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools.
Proceedings of the Financial Cryptography and Data Security, 2014

An Online Experiment on Consumers' susceptibility to Fall for Post-Transaction Marketing Scams.
Proceedings of the 22st European Conference on Information Systems, 2014

The Complexity of Estimating Systematic Risk in Networks.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

How Task Familiarity and Cognitive Predispositions Impact Behavior in a Security Game of Timing.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Designing the default privacy settings for facebook applications.
Proceedings of the Computer Supported Cooperative Work, 2014

An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program.
Proceedings of the 2014 ACM Workshop on Security Information Workers, 2014

How many down?: toward understanding systematic risk in networks.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks.
Proceedings of the Web and Internet Economics - 9th International Conference, 2013

Trading Agent Kills Market Information - Evidence from Online Social Lending.
Proceedings of the Web and Internet Economics - 9th International Conference, 2013

Bitspotting: Detecting Optimal Adaptive Steganography.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

A game-theoretic analysis of content-adaptive steganography with independent embedding.
Proceedings of the 21st European Signal Processing Conference, 2013

Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
Proceedings of the Computer Security - ESORICS 2013, 2013

An online experiment of privacy authorization dialogues for social applications.
Proceedings of the Computer Supported Cooperative Work, 2013

Ad-Blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
Young adults' online participation behaviors: An exploratory study of web 2.0 use for political engagement.
Inf. Polity, 2012

Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Privacy by ReDesign: Alleviating Privacy Concerns for Third-Party Apps.
Proceedings of the International Conference on Information Systems, 2012

Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012

2011
The security cost of cheap user interaction.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

Security Games with Market Insurance.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents.
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011

It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice.
Proceedings of the Financial Cryptography and Data Security, 2011

Young adults and online political participation: search strategies and the role of social media.
Proceedings of the 12th Annual International Conference on Digital Government Research, 2011

2010
Nudge: intermediaries' role in interdependent network security.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Uncertainty in Interdependent Security Games.
Proceedings of the Decision and Game Theory for Security, 2010

When Information Improves Information Security.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information.
Proceedings of the Computer Security, 2010

2009
The Price of Uncertainty in Security Games.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

Uncertainty in the weakest-link security game.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

Blue versus Red: Towards a Model of Distributed Security Attacks.
Proceedings of the Financial Cryptography and Data Security, 2009

2008
Secure or insure?: a game-theoretic analysis of information security games.
Proceedings of the 17th International Conference on World Wide Web, 2008

Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Security and insurance management in networks with heterogeneous agents.
Proceedings of the Proceedings 9th ACM Conference on Electronic Commerce (EC-2008), 2008

Predicted and Observed User Behavior in the Weakest-link Security Game.
Proceedings of the Usability, Psychology, and Security, 2008

2007
When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers.
Proceedings of the Financial Cryptography and Data Security, 2007

Experimental economics and experimental computer science: a survey.
Proceedings of the Workshop on Experimental Computer Science, 2007

Noticing notice: a large-scale experiment on the timing of software license agreements.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

2006
Software agents and market (in) efficiency: a human trader experiment.
IEEE Trans. Syst. Man Cybern. Part C, 2006

2005
Privacy and Rationality in Individual Decision Making.
IEEE Secur. Priv., 2005

Uncertainty, Ambiguity and Privacy.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

Stopping spyware at the gate: a user study of privacy, notice and spyware.
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005

2004
Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic Discounting.
Proceedings of the Economics of Information Security, 2004

Near Rationality and Competitive Equilibria in Networked Systems
CoRR, 2004

2003
Resilient Data-Centric Storage in Wireless Sensor Networks.
IEEE Distributed Syst. Online, 2003

Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks.
Proceedings of the Mobile Data Management, 4th International Conference, MDM 2003, 2003

Artificial Software Agents on Thin Double Auction Markets - A Human Trader Experiment.
Proceedings of the 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 2003

2001
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior.
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001


  Loading...