关注
Sai Teja Peddinti
Sai Teja Peddinti
在 google.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
"On the Internet, nobody knows you’re a dog": A Twitter Case Study of Anonymity in Social Networks
ST Peddinti, KW Ross, J Cappos
ACM Conference on Online Social Networks, 2014
1192014
On the privacy of web search based on query obfuscation: A case study of trackmenot
ST Peddinti, N Saxena
Privacy Enhancing Technologies, 19-37, 2010
1172010
Exploring decision making with {Android’s} runtime permission dialogs using in-context surveys
B Bonné, ST Peddinti, I Bilogrevic, N Taft
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 195-210, 2017
832017
User anonymity on twitter
ST Peddinti, KW Ross, J Cappos
IEEE Security & Privacy 15 (3), 84-87, 2017
482017
Cloak and Swagger: Understanding Data Sensitivity Through the Lens of User Anonymity
ST Peddinti, A Korolova, E Bursztein, G Sampemane
2014 IEEE Symposium on Security and Privacy, 493-508, 2014
462014
On the limitations of query obfuscation techniques for location privacy
ST Peddinti, N Saxena
International conference on Ubiquitous computing, 2011
462011
Analyzing user perspectives on mobile app privacy at scale
P Nema, P Anthonysamy, N Taft, ST Peddinti
Proceedings of the 44th International Conference on Software Engineering …, 2022
402022
Cover locations: availing location-based services without revealing the location
ST Peddinti, A Dsouza, N Saxena
Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011
402011
Web search query privacy: Evaluating query obfuscation and anonymizing networks
ST Peddinti, N Saxena
Journal of Computer Security 22 (1), 155-199, 2014
352014
Stalking Beijing from Timbuktu: a generic measurement approach for exploiting location-based social discovery
Y Ding, ST Peddinti, KW Ross
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
342014
A large scale study of user behavior, expectations and engagement with android permissions
W Cao, C Xia, ST Peddinti, D Lie, N Taft, LM Austin
30th USENIX Security Symposium (USENIX Security 21), 803-820, 2021
322021
Reducing permission requests in mobile apps
ST Peddinti, I Bilogrevic, N Taft, M Pelikan, Ú Erlingsson, P Anthonysamy, ...
Proceedings of the internet measurement conference, 259-266, 2019
302019
On the effectiveness of anonymizing networks for web search privacy
ST Peddinti, N Saxena
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
262011
Hark: A deep learning system for navigating privacy feedback at scale
H Harkous, ST Peddinti, R Khandelwal, A Srivastava, N Taft
2022 IEEE Symposium on Security and Privacy (SP), 2469-2486, 2022
252022
Providing a fast, remote security service using hashlists of approved web objects
J Cappos, N Memon, ST Peddinti, K Ross
US Patent 9,246,929, 2016
152016
Mining anonymity: Identifying sensitive accounts on Twitter
ST Peddinti, KW Ross, J Cappos
arXiv preprint arXiv:1702.00164, 2017
142017
LLMs for Cyber Security: New Opportunities
DM Divakaran, ST Peddinti
arXiv preprint arXiv:2404.11338, 2024
92024
Prigen: Towards automated translation of android applications’ code to privacy captions
V Jain, SD Gupta, S Ghanavati, ST Peddinti
International Conference on Research Challenges in Information Science, 142-151, 2021
82021
Evaluating Privacy Perceptions, Experience, and Behavior of Software Development Teams
M Prybylo, S Haghighi, ST Peddinti, S Ghanavati
arXiv preprint arXiv:2404.01283, 2024
62024
Finding sensitive accounts on Twitter: an automated approach based on follower anonymity
S Peddinti, K Ross, J Cappos
Proceedings of the International AAAI Conference on Web and Social Media 10 …, 2016
52016
系统目前无法执行此操作,请稍后再试。
文章 1–20