
-
-
The Role of Private Ordering in Cybersecurity: Towards A Cybersecurity License
-
Secure Internet of Things for Senior Users
-
Security Implications of 5G Networks
-
Statistical Foundations to Advance Provably Private Algorithms
-
Data Privacy: Foundations and Applications
-
Uncovering the Risk Networks of Third-Party Data Sharing in Chinas Social Credit System
-
The Mice that Roar: Small States and the Pursuit of National Defense in Cyberspace
-
Everyone Can Code? Race, Gender, and the American Learn to Code Discourse
-
New Frontiers in Encryption Technologies: Removing CentralAuthorities from Advanced Encryption Systems
-
Menstrual Biosensing Survival Guide
-
Smart Home Surveillance of Domestic Employees
-
Speculating “Smart City” Cybersecurity with the Heart Sounds Bench: Détourning Data and Surveillance in Public Space
-
Deep Fairness in Public Policy
-
Learning Photo Forensics
-
Privacy Localism Conference Travel Grant Proposal
-
Probing the Ambivalence of Facial Recognition Technologies in China: An Ethnographic Study of Megvii
-
Cybersecurity Awareness for Vulnerable Populations
-
Cybersecurity for Urban Infrastructure
-
Enhancing Security Using Deep Learning Techniques
-
Human-Centric Research on Mobile Sensing and Co-Robotics: Developing Cybersecurity Awareness and Curricular Materials
-
Sharing Personal Information with Humanlike Machines: The Role of Human Cues in Anthropomorphism and Trust in Machines
-
Malpractice, Malice, and Accountability in Machine Learning
-
Strengthening Cybersecurity in Human Rights Investigations
-
Model Agnostic Estimation of Threat Probabilities
-
Toward One-Step, Three-Factor Authentication Using Custom-Fit Ear EEG
-
Post and Re-trauma: Enhancing the Cybersecurity of Sexual Assault Victims on Facebook
-
When to Avoid Digital Control: A Cybersecurity Case Study for Advanced Nuclear Reactors
-
Privacy Analysis at Scale: A Study of COPPA Compliance
-
Zero Knowledge Proofs for Privacy-Preserving Cryptocurrencies
-
Actuarial Justice in the 21st Century
-
I Regret to Inform You that Your Private Information Has Been Compromised
-
Mapping Sites of Politics: Values at Stake in Mitigating Toxic News
-
Preparing for Blockchain: Policy Implications and Challenges for the Financial Industry
-
Tools and Methods for Inferring Demographic Bias in Social Media datasets
-
Advanced Encryption Technologies for the Internet of Things and Data Storage Systems