Hark: A Deep Learning System for Navigating Privacy Feedback at Scale H Harkous, ST Peddinti, R Khandelwal, A Srivastava, N Taft 2022 IEEE Symposium on Security and Privacy (SP), 2469-2486, 2022 | 17 | 2022 |
Analyzing user perspectives on mobile app privacy at scale P Nema, P Anthonysamy, N Taft, ST Peddinti Proceedings of the 44th International Conference on Software Engineering …, 2022 | 26 | 2022 |
Balancing Privacy and Serendipity in CyberSpace M Satyanarayanan, N Davies, N Taft ACM HotMobile, 2022 | 2 | 2022 |
A Large Scale Study of Users Behaviors, Expectations and Engagement with Android Permissions W Cao, C Xia, ST Peddinti, D Lie, N Taft, L Austin USENIX Security Symposium, 2021 | 26 | 2021 |
" Shhh... be {quiet!}" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome I Bilogrevic, B Engedy, JL Porter III, N Taft, K Hasanbega, A Paseltiner, ... 30th USENIX Security Symposium (USENIX Security 21), 769-784, 2021 | 6 | 2021 |
Reducing Permission Requests in Mobile Apps ST Peddinti, I Bilogrevic, N Taft, M Pelikan, Ú Erlingsson, P Anthonysamy, ... Proceedings of the Internet Measurement Conference, 259-266, 2019 | 30 | 2019 |
Exploring decision making with Android’s runtime permission dialogs using in-context surveys B Bonné, ST Peddinti, I Bilogrevic, N Taft Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017), 2017 | 76 | 2017 |
Exploring decision making with Android s runtime permission dialogs using in-context surveys ST Peddinti, I Bilogrevic, N Taft | | 2017 |
Method and apparatus for obfuscating user demographics S Bhagat, U Weinsberg, S Ioannidis, N Taft US Patent App. 14/408,386, 2016 | 4 | 2016 |
Privacy mediators: helping IoT cross the chasm N Davies, N Taft, M Satyanarayanan, S Clinch, B Amos Proceedings of the 17th International Workshop on Mobile Computing Systems …, 2016 | 127 | 2016 |
Privacy-preserving ridge regression using partially homomorphic encryption and masks V Nikolaenko, U Weinsberg, S Ioannidis, M Joye, N Taft US Patent App. 14/767,568, 2016 | 8 | 2016 |
Method and system for privacy-preserving recommendation based on matrix factorization and ridge regression E Ioannidis, E Weinsberg, NA Taft, M Joye, V Nikolaenko US Patent App. 14/771,527, 2016 | 7 | 2016 |
Privacy-preserving ridge regression V Nikolaenko, U Weinsberg, S Ioannidis, M Joye, N Taft US Patent App. 14/771,771, 2016 | 7 | 2016 |
A METHOD AND SYSTEM FOR PRIVACY PRESERVING MATRIX FACTORIZATION E Ioannidis, E Weinsberg, NA Taft, M Joye, V Nikolaenko US Patent 20,160,004,874, 2016 | 49 | 2016 |
Privacy against inference attacks under mismatched prior N Fawaz, S Salamatian, F du Pin Calmon, SS Bhamidipati, PC Oliveira, ... US Patent App. 14/765,603, 2016 | 1 | 2016 |
Intuitions, Analytics, and Killing Ants: Inference Literacy of High School-educated Adults in the US J Warshaw, N Taft, A Woodruff Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016 | 43 | 2016 |
PRIVACY-PRESERVING RIDGE REGRESSION USING MASKS V Nikolaenko, U Weinsberg, S Ioannidis, M Joye, N Taft US Patent 20,150,381,349, 2015 | 15 | 2015 |
PRIVACY PROTECTION AGAINST CURIOUS RECOMMENDERS E Ioannidis, E Weinsberg, S Bhagat, N Fawaz, A Montanari, NA Taft US Patent 20,150,339,493, 2015 | 24 | 2015 |
Managing your private and public data: Bringing down inference attacks against your privacy S Salamatian, A Zhang, F du Pin Calmon, S Bhamidipati, N Fawaz, ... IEEE Journal of Selected Topics in Signal Processing 9 (7), 1240-1255, 2015 | 85 | 2015 |
GraphSC: Parallel secure computation made easy K Nayak, XS Wang, S Ioannidis, U Weinsberg, N Taft, E Shi 2015 IEEE Symposium on Security and Privacy, 377-394, 2015 | 181 | 2015 |