
-
-
Evaluating equity and bias in cybersecurity related job descriptions and the impact on the cyber talent pipeline
-
Evaluating The Digital Divide in The Usability of Privacy and Security Settings in Smartphones
-
Investigating the Compliance of Android App Developers with the California Consumer Privacy Act (CCPA)
-
Misinformation Corrections
-
Reverse Engineer and Counter Adversarial Attacks with Unsupervised Representation Learning
-
How Do Vulnerable Patients Understand Data Privacy as It Pertains to mHealth Interventions?
-
Keystone: An Open Framework for Architecting TEEs
-
Law Enforcement Access to Digital Data: Understanding the Everyday Processes
-
Measuring and Defending Against New Trends in Nation-State Surveillance of Dissidents
-
Novel Metrics for Robust Machine Learning
-
Obscuring Authorship: Neural Methods for Adversarial Stylometry and Text-Based Differential Privacy
-
Secure Authentication in Blockchain Environments
-
Secure Machine Learning
-
Towards Efficient Data Economics: Decentralized Data Marketplace and Smart Pricing Models
-
Privacy for Always-Listening Devices
-
Hackers vs. Testers: Understanding Software Vulnerability Discovery Processes
-
Engaging Expert Stakeholders about the Future of Menstrual Biosensing Technology
-
Factors Affecting Trust Among Vulnerable Populations
-
Re-imagining Password Management for Low-Technology Proficiency Users
-
Coordinated Entry System Research and Development for Alameda County’s Continuum of Care
-
A Cryptographic Study of Data Protection Laws
-
An Open Research Privacy Toolkit
-
Crafting Public Policy for Reinforcement Learning Applications
-
Cybersecurity for Non-Primary and Primary Users of Always-On Internet of Things Devices: An Ethnographic, Participatory, and Multidisciplinary Design Approach
-
The Cybersecurity of “Smart Infrastructure”
-
Cybersecurity Toolkits for/of the Future: A Human-Centered Computing and Design Research Approach
-
Designing a Privacy Curriculum for the Elderly
-
Using Multidisciplinary Design to Improve AI/ML Cybersecurity Scenarios
-
Detecting Images Generated by Neural Networks
-
The Cybersecurity of “Smart” Infrastructure Systems
-
Examining The Third-Party Tracking Ecosystem
-
Privacy-preserving and Decentralized Federated Learning
-
Repercussions of Cyber-Security Measures in U.S. High Schools
-
Responding to Emerging Protection Threats in Cyberspace
-
Ride Free or Die: Overcoming Collective Action Problems in Autonomous Driving Governance