Justin Wu

According to our database1, Justin Wu authored at least 18 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Francis Bacon at SemEval-2023 Task 4: Ensembling BERT and GloVe for Value Identification in Arguments.
Proceedings of the The 17th International Workshop on Semantic Evaluation, 2023

2022
User Perceptions of Security and Privacy for Group Chat.
DTRAP, 2022

A Real-time Respiration Monitoring System Using WiFi-Based Radar Model.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2022

2021
Secure Messaging Authentication Ceremonies Are Broken.
IEEE Secur. Priv., 2021

2020
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
A Usability Study of Four Secure Email Tools Using Paired Participants.
ACM Trans. Priv. Secur., 2019

"Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

I Don't Even Have to Bother Them!: Using Social Media to Automate the Authentication Ceremony in Secure Messaging.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
When is a Tree Really a Truck? Exploring Mental Models of Encryption.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2017
Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
Social Authentication for End-to-End Encryption.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Crowd visualization on low bandwidth mobile devices based on video analysis.
Proceedings of the SIGGRAPH ASIA 2016, Macao, December 5-8, 2016, 2016

Condensing Steam: Distilling the Diversity of Gamer Behavior.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

"We're on the Same Page": A Usability Study of Secure Email Using Pairs of Novice Users.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Johnny and Jane: Analyzing Secure Email Using Two Novice Users.
CoRR, 2015

2013
Reflexivity, Raymond, and the success of open source software development: a SourceForge empirical study.
Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering, 2013


  Loading...