Sauvik Das

Orcid: 0000-0002-9073-8054

According to our database1, Sauvik Das authored at least 62 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Subversive AI Acceptance Scale (SAIA-8): A Scale to Measure User Acceptance of AI-Generated, Privacy-Enhancing Image Modifications.
Proc. ACM Hum. Comput. Interact., 2024

Granular Privacy Control for Geolocation with Vision Language Models.
CoRR, 2024

"I Don't Know If We're Doing Good. I Don't Know If We're Doing Bad": Investigating How Practitioners Scope, Motivate, and Conduct Privacy Work When Developing AI Products.
Proceedings of the 33rd USENIX Security Symposium, 2024

Manipulate to Obfuscate: A Privacy-Focused Intelligent Image Manipulation Tool for End-Users.
Proceedings of the Adjunct Proceedings of the 37th Annual ACM Symposium on User Interface Software and Technology, 2024

A Systematic Review of Biometric Monitoring in the Workplace: Analyzing Socio-technical Harms in Development, Deployment and Use.
Proceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency, 2024

C.A.L.Y.P.S.O.: Designing Gameplay Features for Improving Player's Cybersecurity Self-Efficacy.
Proceedings of the Companion Proceedings of the 2024 Annual Symposium on Computer-Human Interaction in Play, 2024

"It's a Fair Game", or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

"Don't put all your eggs in one basket": How Cryptocurrency Users Choose and Secure Their Wallets.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

Deepfakes, Phrenology, Surveillance, and More! A Taxonomy of AI Privacy Risks.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

Human-Centered Privacy Research in the Age of Large Language Models.
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024

Reducing Privacy Risks in Online Self-Disclosures with Language Models.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

2023
Privacy in the Age of AI.
Commun. ACM, November, 2023

Can Language Models be Instructed to Protect Personal Information?
CoRR, 2023

"It's a Fair Game", or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents.
CoRR, 2023

Powering for Privacy: Improving User Trust in Smart Speaker Microphones with Intentional Powering and Perceptible Assurance.
Proceedings of the 32nd USENIX Security Symposium, 2023

When and Why Do People Want Ad Targeting Explanations? Evidence from a Four-Week, Mixed-Methods Field Study.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Iterative Design of An Accessible Crypto Wallet for Blind Users.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

ImageAlly: A Human-AI Hybrid Approach to Support Blind People in Detecting and Redacting Private Image Content.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

GuardLens: Supporting Safer Online Browsing for People with Visual Impairments.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

The Slow Violence of Surveillance Capitalism: How Online Behavioral Advertising Harms People.
Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency, 2023

2022
Image DePO: Towards Gradual Decentralization of Online Social Networks using Decentralized Privacy Overlays.
Proc. ACM Hum. Comput. Interact., 2022

The Security & Privacy Acceptance Framework (SPAF).
Found. Trends Priv. Secur., 2022

"How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams.
Proceedings of the 31st USENIX Security Symposium, 2022

SoK: Social Cybersecurity.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

"A Reasonable Thing to Ask For": Towards a Unified Voice in Privacy Collective Action.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

To Self-Persuade or be Persuaded: Examining Interventions for Users' Privacy Setting Selection.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
Individually Vulnerable, Collectively Safe: The Security and Privacy Practices of Households with Older Adults.
Proc. ACM Hum. Comput. Interact., 2021

Exploring the Utility Versus Intrusiveness of Dynamic Audience Selection on Facebook.
Proc. ACM Hum. Comput. Interact., 2021

Smart Webcam Cover: Exploring the Design of an Intelligent Webcam Cover to Improve Usability and Trust.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Privacy for the People? Exploring Collective Action as a Mechanism to Shift Power to Consumers in End-User Privacy.
IEEE Secur. Priv., 2021

Bit Whisperer: Enabling Ad-hoc, Short-range, Walk-Up-and-Share Data Transmissions via Surface-restricted Acoustics.
Proceedings of the UIST '21: The 34th Annual ACM Symposium on User Interface Software and Technology, 2021

WebAlly: Making Visual Task-based CAPTCHAs Transferable for People with Visual Impairments.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Spidey Sense: Designing Wrist-Mounted Affective Haptics for Communicating Cybersecurity Warnings.
Proceedings of the DIS '21: Designing Interactive Systems Conference 2021, 2021

2020
Tensions between Access and Control in Makerspaces.
Proc. ACM Hum. Comput. Interact., 2020

Blind and Human: Exploring More Usable Audio CAPTCHA Designs.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

"We Hold Each Other Accountable": Unpacking How Social Groups Approach Cybersecurity and Privacy Together.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
The Memory Palace: Exploring Visual-Spatial Paths for Strong, Memorable, Infrequent Authentication.
Proceedings of the 32nd Annual ACM Symposium on User Interface Software and Technology, 2019

A Typology of Perceived Triggers for End-User Security and Privacy Behaviors.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

2018
Computer scientists in action: Sauvik Das, usable security & privacy.
XRDS, 2018

Breaking! A Typology of Security and Privacy News and How It's Shared.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior.
PhD thesis, 2017

Evolving the Ecosystem of Personal Behavioral Data.
Hum. Comput. Interact., 2017

Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Social cybersecurity: Understanding and leveraging social influence to increase security sensitivity.
it Inf. Technol., 2016

Expert and Non-Expert Attitudes towards (Secure) Instant Messaging.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Examining Visual-Spatial Paths for Mobile Authentication.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Epistenet: facilitating programmatic access & processing of semantically related mobile personal data.
Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2016

A Market in Your Social Network: The Effects of Extrinsic Rewards on Friendsourcing and Relationships.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
The Role of Social Influence in Security Feature Adoption.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Examining Game World Topology Personalization.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
The Effect of Social Influence on Security Sensitivity.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
CASA: context-aware scalable authentication.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Self-Censorship on Facebook.
Proceedings of the Seventh International Conference on Weblogs and Social Media, 2013

Exploring capturable everyday memory for autobiographical authentication.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

The post that wasn't: exploring self-censorship on facebook.
Proceedings of the Computer Supported Cooperative Work, 2013

2012
ACCessory: password inference using accelerometers on smartphones.
Proceedings of the 2012 Workshop on Mobile Computing Systems and Applications, 2012

2011
Toward supporting stories with procedurally generated game worlds.
Proceedings of the 2011 IEEE Conference on Computational Intelligence and Games, 2011

2010
Emotion clustering from stimulated electroencephalographic signals using a Duffing oscillator.
Int. J. Comput. Heal., 2010

Emotion Recognition from Facial Expression and Electroencephalographic Signals Using Vector Quantization and Support Vector Machines.
Proceedings of the 2010 International Conference on Artificial Intelligence, 2010

A new differential evolution with improved mutation strategy.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

2009
A Support Vector Machine Classifier of Emotion from Voice and Facial Expression Data.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009


  Loading...