Year |
Citation |
Score |
2020 |
Hoyle R, Stark L, Ismail Q, Crandall D, Kapadia A, Anthony D. Privacy Norms and Preferences for Photos Posted Online Acm Transactions On Computer-Human Interaction. 27: 1-27. DOI: 10.1145/3380960 |
0.331 |
|
2019 |
Groggel A, Nilizadeh S, Ahn Y, Kapadia A, Rojas F. Race and the beauty premium: Mechanical Turk workers’ evaluations of Twitter accounts Information, Communication & Society. 22: 709-716. DOI: 10.1080/1369118X.2018.1543443 |
0.613 |
|
2015 |
Shin M, Cornelius C, Kapadia A, Triandopoulos N, Kotz D. Location Privacy for Mobile Crowd Sensing through Population Mapping. Sensors (Basel, Switzerland). 15: 15285-310. PMID 26131676 DOI: 10.3390/S150715285 |
0.34 |
|
2014 |
Nilizadeh S, Kapadia A, Ahn YY. Community-enhanced de-anonymization of online social networks Proceedings of the Acm Conference On Computer and Communications Security. 537-548. DOI: 10.1145/2660267.2660324 |
0.644 |
|
2014 |
Hutton L, Henderson T, Kapadia A. Short paper: "Here I am, now pay me!": Privacy concerns in incentivised location-sharing systems Wisec 2014 - Proceedings of the 7th Acm Conference On Security and Privacy in Wireless and Mobile Networks. 81-86. DOI: 10.1145/2627393.2627416 |
0.395 |
|
2014 |
Patil S, Schlegel R, Kapadia A, Lee AJ. Reflection or action?: How feedback and control affect location sharing decisions Conference On Human Factors in Computing Systems - Proceedings. 101-110. DOI: 10.1145/2556288.2557121 |
0.304 |
|
2014 |
Akavipat R, Al-Ameen MN, Kapadia A, Rahman Z, Schlegel R, Wright M. ReDS: A framework for reputation-enhanced DHTs Ieee Transactions On Parallel and Distributed Systems. 25: 321-331. DOI: 10.1109/Tpds.2013.231 |
0.351 |
|
2012 |
Patil S, Norcie G, Kapadia A, Lee AJ. Reasons, rewards, regrets: Privacy considerations in location sharing as an interactive practice Soups 2012 - Proceedings of the 8th Symposium On Usable Privacy and Security. DOI: 10.1145/2335356.2335363 |
0.371 |
|
2011 |
Nilizadeh S, Alam N, Husted N, Kapadia A. Pythia: A privacy aware, peer-to-peer network for social search Proceedings of the Acm Conference On Computer and Communications Security. 43-48. DOI: 10.1145/2046556.2046562 |
0.654 |
|
2011 |
Au MH, Tsang PP, Kapadia A. PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users Acm Transactions On Information and System Security. 14. DOI: 10.1145/2043628.2043630 |
0.316 |
|
2011 |
Tsang PP, Kapadia A, Cornelius C, Smith SW. Nymble: Blocking misbehaving users in anonymizing networks Ieee Transactions On Dependable and Secure Computing. 8: 256-269. DOI: 10.1109/Tdsc.2009.38 |
0.42 |
|
2010 |
Tsang PP, Au MH, Kapadia A, Smith SW. BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs Acm Transactions On Information and System Security. 13. DOI: 10.1145/1880022.1880033 |
0.312 |
|
2004 |
Hill R, Al-Muhtadi J, Campbell R, Kapadia A, Naldurg P, Ranganathan A. A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures Ieee Distributed Systems Online. 5: 1-1. DOI: 10.1109/Mdso.2004.21 |
0.341 |
|
Show low-probability matches. |