Yang Wang
Orcid: 0000-0003-3641-8241Affiliations:
- University of Illinois at Urbana-Champaign, Champaign, IL, USA
- Syracuse University, School of Information Studies, NY, USA (former)
- Carnegie Mellon University, CyLab, Pittsburgh, PA, USA (former)
- University of California, Irvine, CA, USA (former)
According to our database1,
Yang Wang
authored at least 90 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cs.cmu.edu
On csauthors.net:
Bibliography
2024
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., August, 2024
Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem.
IACR Cryptol. ePrint Arch., 2024
From Experts to the Public: Governing Multimodal Language Models in Politically Sensitive Video Analysis.
CoRR, 2024
BIV-Priv-Seg: Locating Private Content in Images Taken by People With Visual Impairments.
CoRR, 2024
Exploring Parent-Child Perceptions on Safety in Generative AI: Concerns, Mitigation Strategies, and Design Implications.
CoRR, 2024
"I'm not convinced that they don't collect more than is necessary": User-Controlled Data Minimization Design in Search Engines.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
Designing Accessible Obfuscation Support for Blind Individuals' Visual Privacy Management.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
"Don't put all your eggs in one basket": How Cryptocurrency Users Choose and Secure Their Wallets.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
"I Can't Believe It's Not Custodial!": Usable Trustless Decentralized Key Management.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
Cross-Country Examination of People's Experience with Targeted Advertising on Social Media.
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024
2023
CoRR, 2023
"Dump it, Destroy it, Send it to Data Heaven": Blind People's Expectations for Visual Privacy in Visual Assistance Technologies.
Proceedings of the 20th International Web for All Conference, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
When and Why Do People Want Ad Targeting Explanations? Evidence from a Four-Week, Mixed-Methods Field Study.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
"How technical do you get? I'm an English teacher": Teaching and Learning Cybersecurity and AI Ethics in High School.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
ImageAlly: A Human-AI Hybrid Approach to Support Blind People in Detecting and Redacting Private Image Content.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
Disability-First Design and Creation of A Dataset Showing Private Visual Information Collected With People Who Are Blind.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
User Perceptions and Experiences of Targeted Ads on Social Media Platforms: Learning from Bangladesh and India.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Using fNIRS To Understand Adults' Empathy for Children in AI and Cybersecurity Scenarios.
Proceedings of the 22nd Annual ACM Interaction Design and Children Conference, 2023
2022
<i>"Every Website Is a Puzzle!"</i>: Facilitating Access to Common Website Features for People with Visual Impairments.
ACM Trans. Access. Comput., 2022
"It's A Blessing and A Curse": Unpacking Creators' Practices with Non-Fungible Tokens (NFTs) and Their Communities.
CoRR, 2022
DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks.
Proceedings of the 31st USENIX Security Symposium, 2022
2021
Who Am I?: A Design Probe Exploring Real-Time Transparency about Online and Offline User Profiling Underlying Targeted Ads.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
WebAlly: Making Visual Task-based CAPTCHAs Transferable for People with Visual Impairments.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
"How I Know For Sure": People's Perspectives on Solely Automated Decision-Making (SADM).
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
2020
Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
2019
"What if?" Predicting Individual Users' Smart Home Privacy Preferences and Their Changes.
Proc. Priv. Enhancing Technol., 2019
Proc. ACM Hum. Comput. Interact., 2019
Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
Unpacking People's Understandings of Bluetooth Beacon Systems - A Location-Based IoT Technology.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the Companion Publication of the 2019 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2019
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
IEEE Internet Comput., 2018
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
Privacy in Context: Critically Engaging with Theory to Guide Privacy Research and Design.
Proceedings of the Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2018
2017
"Our Privacy Needs to be Protected at All Costs": Crowd Workers' Privacy Experiences on Amazon Mechanical Turk.
Proc. ACM Hum. Comput. Interact., 2017
A computational cognitive modeling approach to understand and design mobile crowdsourcing for campus safety reporting.
Int. J. Hum. Comput. Stud., 2017
ACM Comput. Surv., 2017
Victim Privacy in Crowdsourcing Based Public Safety Reporting: A Case Study of LiveSafe.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the 2017 New Security Paradigms Workshop, 2017
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017
In Whose Best Interest?: Exploring the Real, Potential, and Imagined Ethical Concerns in Privacy-Focused Agenda.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
"I Always Have to Think About It First": Authentication Experiences of People with Cognitive Impairments.
Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility, 2017
2016
Flying Eyes and Hidden Controllers: A Qualitative Study of People's Privacy Perceptions of Civilian Drones in The US.
Proc. Priv. Enhancing Technol., 2016
Lessons Learned from Designing and Evaluating Smart Device-based Authentication for Visually Impaired Users.
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Space Collapse: Reinforcing, Reconfiguring and Enhancing Chinese Social Practices through WeChat.
Proceedings of the Tenth International Conference on Web and Social Media, 2016
UniPass: design and evaluation of a smart device-based password manager for visually impaired users.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016
Municipal Police Departments on Facebook: What Are They Posting and Are People Engaging?
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016
Examining American and Chinese Internet Users¿ Contextual Privacy Preferences of Behavioral Advertising.
Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, 2016
2015
Proceedings of the 12th Web for All Conference, 2015
"I'm Stuck!": A Contextual Inquiry of People with Visual Impairments in Authentication.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Modeling Sharing Decision of Campus Safety Reports and Its Design Implications to Mobile Crowdsourcing for Safety.
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015
Emotion Map: A Location-based Mobile Social System for Improving Emotion Awareness and Regulation.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015
Dwelling and Fleeting Encounters: Exploring Why People Use WeChat - A Mobile Instant Messenger.
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, 2015
2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
2013
User Model. User Adapt. Interact., 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
What matters to users?: factors that affect users' willingness to share information with online advertisers.
Proceedings of the Symposium On Usable Privacy and Security, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
2012
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems.
User Model. User Adapt. Interact., 2012
Proceedings of the Symposium On Usable Privacy and Security, 2012
Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook.
Proceedings of the iConference 2012, Toronto, Ontario, Canada, February 7-10, 2012, 2012
Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
2011
Who Is Concerned about What? A Study of American, Chinese and Indian Users' Privacy Concerns on Social Network Sites - (Short Paper).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
"I regretted the minute I pressed share": a qualitative study of regrets on Facebook.
Proceedings of the Symposium On Usable Privacy and Security, 2011
2010
Proceedings of the Intelligent Information Privacy Management, 2010
2009
Proceedings of the User Modeling, 2009
Proceedings of the Software Product Lines, 13th International Conference, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the Human-Computer Interaction, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, 2008
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
2007
Proceedings of the User Modeling 2007, 11th International Conference, 2007
MAPGrid: A New Architecture for Empowering Mobile Data Placement in Grid Environments.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007
2006
Proceedings of the Software Product Lines, 10th International Conference, 2006
2005
Proceedings of the User Modeling 2005, 2005