-
-
Learning Photo Forensics
-
Privacy Localism Conference Travel Grant Proposal
-
Probing the Ambivalence of Facial Recognition Technologies in China: An Ethnographic Study of Megvii
-
Repercussions of Cyber-Security Measures in U.S. High Schools
-
Responding to Emerging Protection Threats in Cyberspace
-
Ride Free or Die: Overcoming Collective Action Problems in Autonomous Driving Governance
-
rIoT: Quantifying IoT Costs and Harms
-
The Role of Private Ordering in Cybersecurity: Towards A Cybersecurity License
-
Secure Internet of Things for Senior Users
-
Security Implications of 5G Networks
-
Statistical Foundations to Advance Provably Private Algorithms
-
Zero Knowledge Proofs for Privacy-Preserving Cryptocurrencies
-
Actuarial Justice in the 21st Century
-
I Regret to Inform You that Your Private Information Has Been Compromised
-
Mapping Sites of Politics: Values at Stake in Mitigating Toxic News
-
Preparing for Blockchain: Policy Implications and Challenges for the Financial Industry
-
Tools and Methods for Inferring Demographic Bias in Social Media datasets
-
Advanced Encryption Technologies for the Internet of Things and Data Storage Systems
-
Building Decentralized Contract Systems with Strong Privacy
-
Cybersecurity Awareness for Vulnerable Populations
-
Cybersecurity for Urban Infrastructure
-
Enhancing Security Using Deep Learning Techniques
-
Human-Centric Research on Mobile Sensing and Co-Robotics: Developing Cybersecurity Awareness and Curricular Materials
-
Sharing Personal Information with Humanlike Machines: The Role of Human Cues in Anthropomorphism and Trust in Machines
-
Malpractice, Malice, and Accountability in Machine Learning
-
Strengthening Cybersecurity in Human Rights Investigations
-
Model Agnostic Estimation of Threat Probabilities
-
Toward One-Step, Three-Factor Authentication Using Custom-Fit Ear EEG
-
Post and Re-trauma: Enhancing the Cybersecurity of Sexual Assault Victims on Facebook
-
When to Avoid Digital Control: A Cybersecurity Case Study for Advanced Nuclear Reactors
-
Privacy Analysis at Scale: A Study of COPPA Compliance
-
Computing on Encrypted Databases with No Information Leakage
-
Cyber-Infrastructures of the Personal Data Economy
-
Data Security Breach Notification in Singapore: The Role of the Data Privacy Officer in Enhancing Trust Relationships
-
Exploring Internet Balkanization Through the Lens of Regional Discrimination