Yang Wang

Orcid: 0000-0003-3641-8241

Affiliations:
  • University of Illinois at Urbana-Champaign, Champaign, IL, USA
  • Syracuse University, School of Information Studies, NY, USA (former)
  • Carnegie Mellon University, CyLab, Pittsburgh, PA, USA (former)
  • University of California, Irvine, CA, USA (former)


According to our database1, Yang Wang authored at least 88 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Evaluating the Privacy Valuation of Personal Data on Smartphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., August, 2024

Inclusive Privacy and Security.
IEEE Secur. Priv., 2024

BIV-Priv-Seg: Locating Private Content in Images Taken by People With Visual Impairments.
CoRR, 2024

Exploring Parent-Child Perceptions on Safety in Generative AI: Concerns, Mitigation Strategies, and Design Implications.
CoRR, 2024

"I'm not convinced that they don't collect more than is necessary": User-Controlled Data Minimization Design in Search Engines.
Proceedings of the 33rd USENIX Security Symposium, 2024

Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

Designing Accessible Obfuscation Support for Blind Individuals' Visual Privacy Management.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

"Don't put all your eggs in one basket": How Cryptocurrency Users Choose and Secure Their Wallets.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

SEAM-EZ: Simplifying Stateful Analytics through Visual Programming.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

"I Can't Believe It's Not Custodial!": Usable Trustless Decentralized Key Management.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

Cross-Country Examination of People's Experience with Targeted Advertising on Social Media.
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024

2023
Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice.
CoRR, 2023

"Dump it, Destroy it, Send it to Data Heaven": Blind People's Expectations for Visual Privacy in Visual Assistance Technologies.
Proceedings of the 20th International Web for All Conference, 2023

A Mixed-Methods Study of Security Practices of Smart Contract Developers.
Proceedings of the 32nd USENIX Security Symposium, 2023

Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

When and Why Do People Want Ad Targeting Explanations? Evidence from a Four-Week, Mixed-Methods Field Study.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

"How technical do you get? I'm an English teacher": Teaching and Learning Cybersecurity and AI Ethics in High School.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Iterative Design of An Accessible Crypto Wallet for Blind Users.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

ImageAlly: A Human-AI Hybrid Approach to Support Blind People in Detecting and Redacting Private Image Content.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

GuardLens: Supporting Safer Online Browsing for People with Visual Impairments.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

Disability-First Design and Creation of A Dataset Showing Private Visual Information Collected With People Who Are Blind.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

User Perceptions and Experiences of Targeted Ads on Social Media Platforms: Learning from Bangladesh and India.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Using fNIRS To Understand Adults' Empathy for Children in AI and Cybersecurity Scenarios.
Proceedings of the 22nd Annual ACM Interaction Design and Children Conference, 2023

2022
<i>"Every Website Is a Puzzle!"</i>: Facilitating Access to Common Website Features for People with Visual Impairments.
ACM Trans. Access. Comput., 2022

Exploring Security Practices of Smart Contract Developers.
CoRR, 2022

"It's A Blessing and A Curse": Unpacking Creators' Practices with Non-Fungible Tokens (NFTs) and Their Communities.
CoRR, 2022

DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Who Am I?: A Design Probe Exploring Real-Time Transparency about Online and Offline User Profiling Underlying Targeted Ads.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Assessing Browser-level Defense against IDN-based Phishing.
Proceedings of the 30th USENIX Security Symposium, 2021

WebAlly: Making Visual Task-based CAPTCHAs Transferable for People with Visual Impairments.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

"How I Know For Sure": People's Perspectives on Solely Automated Decision-Making (SADM).
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

2020
Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

2019
"What if?" Predicting Individual Users' Smart Home Privacy Preferences and Their Changes.
Proc. Priv. Enhancing Technol., 2019

Privacy Perceptions and Designs of Bystanders in Smart Homes.
Proc. ACM Hum. Comput. Interact., 2019

Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Unpacking People's Understandings of Bluetooth Beacon Systems - A Location-Based IoT Technology.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Ubiquitous Privacy: Research and Design for Mobile and IoT Platforms.
Proceedings of the Companion Publication of the 2019 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2019

Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Toward Accessible Authentication: Learning from People with Visual Impairments.
IEEE Internet Comput., 2018

Addressing The Privacy Paradox through Personalized Privacy Notifications.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Privacy in Context: Critically Engaging with Theory to Guide Privacy Research and Design.
Proceedings of the Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2018

2017
"Our Privacy Needs to be Protected at All Costs": Crowd Workers' Privacy Experiences on Amazon Mechanical Turk.
Proc. ACM Hum. Comput. Interact., 2017

A computational cognitive modeling approach to understand and design mobile crowdsourcing for campus safety reporting.
Int. J. Hum. Comput. Stud., 2017

Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online.
ACM Comput. Surv., 2017

Victim Privacy in Crowdsourcing Based Public Safety Reporting: A Case Study of LiveSafe.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

The Third Wave?: Inclusive Privacy and Security.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

Folk Models of Online Behavioral Advertising.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

In Whose Best Interest?: Exploring the Real, Potential, and Imagined Ethical Concerns in Privacy-Focused Agenda.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

Free to Fly in Public Spaces: Drone Controllers' Privacy Perceptions and Practices.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

"I Always Have to Think About It First": Authentication Experiences of People with Cognitive Impairments.
Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility, 2017

2016
Flying Eyes and Hidden Controllers: A Qualitative Study of People's Privacy Perceptions of Civilian Drones in The US.
Proc. Priv. Enhancing Technol., 2016

Lessons Learned from Designing and Evaluating Smart Device-based Authentication for Visually Impaired Users.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Space Collapse: Reinforcing, Reconfiguring and Enhancing Chinese Social Practices through WeChat.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

UniPass: design and evaluation of a smart device-based password manager for visually impaired users.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Municipal Police Departments on Facebook: What Are They Posting and Are People Engaging?
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

Examining American and Chinese Internet Users¿ Contextual Privacy Preferences of Behavioral Advertising.
Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, 2016

2015
CAN: composable accessibility infrastructure via data-driven crowdsourcing.
Proceedings of the 12th Web for All Conference, 2015

"I'm Stuck!": A Contextual Inquiry of People with Visual Impairments in Authentication.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Modeling Sharing Decision of Campus Safety Reports and Its Design Implications to Mobile Crowdsourcing for Safety.
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015

Emotion Map: A Location-based Mobile Social System for Improving Emotion Awareness and Regulation.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Dwelling and Fleeting Encounters: Exploring Why People Use WeChat - A Mobile Instant Messenger.
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, 2015

2014
Private Browsing: an Inquiry on Usability and Privacy Protection.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Designing a mobile system for public safety using open crime data and crowdsourcing.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

A field trial of privacy nudges for facebook.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
A PLA-based privacy-enhancing user modeling framework and its evaluation.
User Model. User Adapt. Interact., 2013

Privacy nudges for social media: an exploratory Facebook study.
Proceedings of the 22nd International World Wide Web Conference, 2013

A cross-cultural framework for protecting user privacy in online social media.
Proceedings of the 22nd International World Wide Web Conference, 2013

What matters to users?: factors that affect users' willingness to share information with online advertisers.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Towards a Framework for Privacy-Aware Mobile Crowdsourcing.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2012
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems.
User Model. User Adapt. Interact., 2012

Smart, useful, scary, creepy: perceptions of online behavioral advertising.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook.
Proceedings of the iConference 2012, Toronto, Ontario, Canada, February 7-10, 2012, 2012

Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Who Is Concerned about What? A Study of American, Chinese and Indian Users' Privacy Concerns on Social Network Sites - (Short Paper).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

"I regretted the minute I pressed share": a qualitative study of regrets on Facebook.
Proceedings of the Symposium On Usable Privacy and Security, 2011

2010
Privacy in Cross-System Personalization.
Proceedings of the Intelligent Information Privacy Management, 2010

2009
Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites.
Proceedings of the User Modeling, 2009

Modeling PLA variation of privacy-enhancing personalized systems.
Proceedings of the Software Product Lines, 13th International Conference, 2009

Serial hook-ups: a comparative usability study of secure device pairing methods.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Situating Productive Play: Online Gaming Practices and <i>Guanxi </i>in China.
Proceedings of the Human-Computer Interaction, 2009

Privacy in Online Social Networking at Workplace.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
A hybrid cultural ecology: world of warcraft in China.
Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, 2008

Human-Currency Interaction: learning from virtual currency use in China.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
Respecting Users' Individual Privacy Constraints in Web Personalization.
Proceedings of the User Modeling 2007, 11th International Conference, 2007

MAPGrid: A New Architecture for Empowering Mobile Data Placement in Grid Environments.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

2006
PLA-based Runtime Dynamism in Support of Privacy-Enhanced Web Personalization.
Proceedings of the Software Product Lines, 10th International Conference, 2006

2005
Constraint-Sensitive Privacy Management for Personalized Web-Based Systems.
Proceedings of the User Modeling 2005, 2005


  Loading...