"On the Internet, nobody knows you’re a dog": A Twitter Case Study of Anonymity in Social Networks ST Peddinti, KW Ross, J Cappos ACM Conference on Online Social Networks, 2014 | 119 | 2014 |
On the privacy of web search based on query obfuscation: A case study of trackmenot ST Peddinti, N Saxena Privacy Enhancing Technologies, 19-37, 2010 | 117 | 2010 |
Exploring decision making with {Android’s} runtime permission dialogs using in-context surveys B Bonné, ST Peddinti, I Bilogrevic, N Taft Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 195-210, 2017 | 83 | 2017 |
User anonymity on twitter ST Peddinti, KW Ross, J Cappos IEEE Security & Privacy 15 (3), 84-87, 2017 | 48 | 2017 |
Cloak and Swagger: Understanding Data Sensitivity Through the Lens of User Anonymity ST Peddinti, A Korolova, E Bursztein, G Sampemane 2014 IEEE Symposium on Security and Privacy, 493-508, 2014 | 46 | 2014 |
On the limitations of query obfuscation techniques for location privacy ST Peddinti, N Saxena International conference on Ubiquitous computing, 2011 | 46 | 2011 |
Analyzing user perspectives on mobile app privacy at scale P Nema, P Anthonysamy, N Taft, ST Peddinti Proceedings of the 44th International Conference on Software Engineering …, 2022 | 40 | 2022 |
Cover locations: availing location-based services without revealing the location ST Peddinti, A Dsouza, N Saxena Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011 | 40 | 2011 |
Web search query privacy: Evaluating query obfuscation and anonymizing networks ST Peddinti, N Saxena Journal of Computer Security 22 (1), 155-199, 2014 | 35 | 2014 |
Stalking Beijing from Timbuktu: a generic measurement approach for exploiting location-based social discovery Y Ding, ST Peddinti, KW Ross Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014 | 34 | 2014 |
A large scale study of user behavior, expectations and engagement with android permissions W Cao, C Xia, ST Peddinti, D Lie, N Taft, LM Austin 30th USENIX Security Symposium (USENIX Security 21), 803-820, 2021 | 32 | 2021 |
Reducing permission requests in mobile apps ST Peddinti, I Bilogrevic, N Taft, M Pelikan, Ú Erlingsson, P Anthonysamy, ... Proceedings of the internet measurement conference, 259-266, 2019 | 30 | 2019 |
On the effectiveness of anonymizing networks for web search privacy ST Peddinti, N Saxena Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 26 | 2011 |
Hark: A deep learning system for navigating privacy feedback at scale H Harkous, ST Peddinti, R Khandelwal, A Srivastava, N Taft 2022 IEEE Symposium on Security and Privacy (SP), 2469-2486, 2022 | 25 | 2022 |
Providing a fast, remote security service using hashlists of approved web objects J Cappos, N Memon, ST Peddinti, K Ross US Patent 9,246,929, 2016 | 15 | 2016 |
Mining anonymity: Identifying sensitive accounts on Twitter ST Peddinti, KW Ross, J Cappos arXiv preprint arXiv:1702.00164, 2017 | 14 | 2017 |
LLMs for Cyber Security: New Opportunities DM Divakaran, ST Peddinti arXiv preprint arXiv:2404.11338, 2024 | 9 | 2024 |
Prigen: Towards automated translation of android applications’ code to privacy captions V Jain, SD Gupta, S Ghanavati, ST Peddinti International Conference on Research Challenges in Information Science, 142-151, 2021 | 8 | 2021 |
Evaluating Privacy Perceptions, Experience, and Behavior of Software Development Teams M Prybylo, S Haghighi, ST Peddinti, S Ghanavati arXiv preprint arXiv:2404.01283, 2024 | 6 | 2024 |
Finding sensitive accounts on Twitter: an automated approach based on follower anonymity S Peddinti, K Ross, J Cappos Proceedings of the International AAAI Conference on Web and Social Media 10 …, 2016 | 5 | 2016 |