Skip to content
Grant
-
Recontextualizing Fairness for Indian Contexts
-
-
Digital Fingerprinting to Protect Against Deepfakes
-
-
Evaluating Algorithmic Fairness in AI Recruiting Solutions
-
Towards a Security-Aware SBOM Framework
-
Understanding Governance, Values, and Identity in the Online Election Information Infrastructure
-
Transaction Costs of Cybersecurity Governance in Smart City Initiatives
-
The Tyranny of Relevancy: Investigating The Effects of Targeted Fertility Ads on Individuals Grappling with Infertility
-
Robust Object Classification via Part-Based Models
-
PrivGuard: Privacy Regulation Compliance Made Easier
-
Practical Pre-Constrained Cryptography (Or: Balancing Privacy and Traceability in Encrypted Systems)
-
Investigating the Compliance of Android App Developers with the California Consumer Privacy Act (CCPA)
-
Increasing the Usability of Multi-Factor Authentication (MFA) Recovery Mechanisms
-
Fairness in Cybersecurity Insurance Contract
-
Deadlines for International Cooperation in AI
-
Algorithmic Detection and Decentralised Moderation for Protecting Women from Online Abuse
-
Gamification of Cybersecurity Education
-
Robust Machine Learning via Random Transformation
-
Towards Bayesian Classifiers that are Robust Against Adversarial Attacks
-
Examining the Landscape of Digital Security and Privacy Assistance for Racial Minority Groups
-
Leveraging the communicative, social and health benefits of drumming in early childhood
-
Activism Always: A Student Initiative for Data in the Social Impact Sector
-
Privacy Controls for Always-Listening Devices
-
A Comprehensive Investigation of Developers’ Remediation Practices
-
Are Password Managers Improving our Password Habits?
-
Assessing and Developing Online Election Information Infrastructure
-
Evaluating equity and bias in cybersecurity related job descriptions and the impact on the cyber talent pipeline
-
Evaluating The Digital Divide in The Usability of Privacy and Security Settings in Smartphones
-
Investigating the Compliance of Android App Developers with the California Consumer Privacy Act (CCPA)
-
Misinformation Corrections
-
Reverse Engineer and Counter Adversarial Attacks with Unsupervised Representation Learning
-
How Do Vulnerable Patients Understand Data Privacy as It Pertains to mHealth Interventions?
-
Keystone: An Open Framework for Architecting TEEs
-
Law Enforcement Access to Digital Data: Understanding the Everyday Processes
-
Measuring and Defending Against New Trends in Nation-State Surveillance of Dissidents
-
Novel Metrics for Robust Machine Learning
-
Obscuring Authorship: Neural Methods for Adversarial Stylometry and Text-Based Differential Privacy
-
Secure Authentication in Blockchain Environments
-
-
Towards Efficient Data Economics: Decentralized Data Marketplace and Smart Pricing Models
-
Privacy for Always-Listening Devices
-
Hackers vs. Testers: Understanding Software Vulnerability Discovery Processes
-
Engaging Expert Stakeholders about the Future of Menstrual Biosensing Technology
-
Factors Affecting Trust Among Vulnerable Populations
-
Re-imagining Password Management for Low-Technology Proficiency Users
-
Coordinated Entry System Research and Development for Alameda County’s Continuum of Care
-
A Cryptographic Study of Data Protection Laws
-
An Open Research Privacy Toolkit
-
Crafting Public Policy for Reinforcement Learning Applications
-
Cybersecurity for Non-Primary and Primary Users of Always-On Internet of Things Devices: An Ethnographic, Participatory, and Multidisciplinary Design Approach
-
The Cybersecurity of “Smart Infrastructure”
-
Cybersecurity Toolkits for/of the Future: A Human-Centered Computing and Design Research Approach
-
Designing a Privacy Curriculum for the Elderly
-
Using Multidisciplinary Design to Improve AI/ML Cybersecurity Scenarios
-
Detecting Images Generated by Neural Networks
-
The Cybersecurity of “Smart” Infrastructure Systems
-
Examining The Third-Party Tracking Ecosystem
-
Privacy-preserving and Decentralized Federated Learning
-
Repercussions of Cyber-Security Measures in U.S. High Schools
-
Responding to Emerging Protection Threats in Cyberspace
-
Ride Free or Die: Overcoming Collective Action Problems in Autonomous Driving Governance
-
rIoT: Quantifying IoT Costs and Harms
-
The Role of Private Ordering in Cybersecurity: Towards A Cybersecurity License
-
Secure Internet of Things for Senior Users
-
Security Implications of 5G Networks
-
Statistical Foundations to Advance Provably Private Algorithms
-
Data Privacy: Foundations and Applications
-
Uncovering the Risk Networks of Third-Party Data Sharing in Chinas Social Credit System
-
The Mice that Roar: Small States and the Pursuit of National Defense in Cyberspace
-
Everyone Can Code? Race, Gender, and the American Learn to Code Discourse
-
New Frontiers in Encryption Technologies: Removing CentralAuthorities from Advanced Encryption Systems
-
Menstrual Biosensing Survival Guide
-
Smart Home Surveillance of Domestic Employees
-
Speculating “Smart City” Cybersecurity with the Heart Sounds Bench: Détourning Data and Surveillance in Public Space
-
Deep Fairness in Public Policy
-
-
Privacy Localism Conference Travel Grant Proposal
-
Probing the Ambivalence of Facial Recognition Technologies in China: An Ethnographic Study of Megvii
-
Cybersecurity Awareness for Vulnerable Populations
-
Cybersecurity for Urban Infrastructure
-
Enhancing Security Using Deep Learning Techniques
-
Human-Centric Research on Mobile Sensing and Co-Robotics: Developing Cybersecurity Awareness and Curricular Materials
-
Sharing Personal Information with Humanlike Machines: The Role of Human Cues in Anthropomorphism and Trust in Machines
-
Malpractice, Malice, and Accountability in Machine Learning
-
Strengthening Cybersecurity in Human Rights Investigations
-
Model Agnostic Estimation of Threat Probabilities
-
Toward One-Step, Three-Factor Authentication Using Custom-Fit Ear EEG
-
Post and Re-trauma: Enhancing the Cybersecurity of Sexual Assault Victims on Facebook
-
When to Avoid Digital Control: A Cybersecurity Case Study for Advanced Nuclear Reactors
-
Privacy Analysis at Scale: A Study of COPPA Compliance
-
Zero Knowledge Proofs for Privacy-Preserving Cryptocurrencies
-
Actuarial Justice in the 21st Century
-
I Regret to Inform You that Your Private Information Has Been Compromised
-
Mapping Sites of Politics: Values at Stake in Mitigating Toxic News
-
Preparing for Blockchain: Policy Implications and Challenges for the Financial Industry
-
Tools and Methods for Inferring Demographic Bias in Social Media datasets
-
Advanced Encryption Technologies for the Internet of Things and Data Storage Systems
-
Building Decentralized Contract Systems with Strong Privacy