-
-
Secure Machine Learning
-
How Do Vulnerable Patients Understand Data Privacy as It Pertains to mHealth Interventions?
-
Keystone: An Open Framework for Architecting TEEs
-
Law Enforcement Access to Digital Data: Understanding the Everyday Processes
-
Measuring and Defending Against New Trends in Nation-State Surveillance of Dissidents
-
Novel Metrics for Robust Machine Learning
-
Obscuring Authorship: Neural Methods for Adversarial Stylometry and Text-Based Differential Privacy
-
Secure Authentication in Blockchain Environments
-
Cybersecurity Toolkits for/of the Future: A Human-Centered Computing and Design Research Approach
-
Designing a Privacy Curriculum for the Elderly
-
Using Multidisciplinary Design to Improve AI/ML Cybersecurity Scenarios
-
Detecting Images Generated by Neural Networks
-
The Cybersecurity of “Smart” Infrastructure Systems
-
Examining The Third-Party Tracking Ecosystem
-
Privacy-preserving and Decentralized Federated Learning
-
Towards Efficient Data Economics: Decentralized Data Marketplace and Smart Pricing Models
-
Privacy for Always-Listening Devices
-
Hackers vs. Testers: Understanding Software Vulnerability Discovery Processes
-
Engaging Expert Stakeholders about the Future of Menstrual Biosensing Technology
-
Factors Affecting Trust Among Vulnerable Populations
-
Re-imagining Password Management for Low-Technology Proficiency Users
-
Coordinated Entry System Research and Development for Alameda County’s Continuum of Care
-
A Cryptographic Study of Data Protection Laws
-
An Open Research Privacy Toolkit
-
Crafting Public Policy for Reinforcement Learning Applications
-
Cybersecurity for Non-Primary and Primary Users of Always-On Internet of Things Devices: An Ethnographic, Participatory, and Multidisciplinary Design Approach
-
The Cybersecurity of “Smart Infrastructure”
-
Deep Fairness in Public Policy
-
Learning Photo Forensics
-
Privacy Localism Conference Travel Grant Proposal
-
Probing the Ambivalence of Facial Recognition Technologies in China: An Ethnographic Study of Megvii
-
Repercussions of Cyber-Security Measures in U.S. High Schools
-
Responding to Emerging Protection Threats in Cyberspace
-
Ride Free or Die: Overcoming Collective Action Problems in Autonomous Driving Governance
-
rIoT: Quantifying IoT Costs and Harms