-
-
LLM-Powered Spear Phishing Detection Solution
-
From Policy To Pixels: Strategic UX Design and User Support for GDPR Implementation
-
LLM Canary Open-Source Security Benchmark Tool
-
SALUS: Streamlining Secure by Design
-
Recontextualizing Fairness for Indian Contexts
-
SBOM Escrow
-
Digital Fingerprinting to Protect Against Deepfakes
-
Synthetix
-
Evaluating Algorithmic Fairness in AI Recruiting Solutions
-
Towards a Security-Aware SBOM Framework
-
Understanding Governance, Values, and Identity in the Online Election Information Infrastructure
-
Transaction Costs of Cybersecurity Governance in Smart City Initiatives
-
The Tyranny of Relevancy: Investigating The Effects of Targeted Fertility Ads on Individuals Grappling with Infertility
-
Robust Object Classification via Part-Based Models
-
PrivGuard: Privacy Regulation Compliance Made Easier
-
Practical Pre-Constrained Cryptography (Or: Balancing Privacy and Traceability in Encrypted Systems)
-
Investigating the Compliance of Android App Developers with the California Consumer Privacy Act (CCPA)
-
Increasing the Usability of Multi-Factor Authentication (MFA) Recovery Mechanisms
-
Fairness in Cybersecurity Insurance Contract
-
Deadlines for International Cooperation in AI
-
Algorithmic Detection and Decentralised Moderation for Protecting Women from Online Abuse
-
Gamification of Cybersecurity Education
-
Activism Always: A Student Initiative for Data in the Social Impact Sector
-
Privacy Controls for Always-Listening Devices
-
A Comprehensive Investigation of Developers’ Remediation Practices
-
Are Password Managers Improving our Password Habits?
-
Assessing and Developing Online Election Information Infrastructure
-
Evaluating equity and bias in cybersecurity related job descriptions and the impact on the cyber talent pipeline
-
Evaluating The Digital Divide in The Usability of Privacy and Security Settings in Smartphones
-
Investigating the Compliance of Android App Developers with the California Consumer Privacy Act (CCPA)
-
Misinformation Corrections
-
Reverse Engineer and Counter Adversarial Attacks with Unsupervised Representation Learning
-
Robust Machine Learning via Random Transformation
-
Towards Bayesian Classifiers that are Robust Against Adversarial Attacks
-
Examining the Landscape of Digital Security and Privacy Assistance for Racial Minority Groups