Publications
-
2025. Privacy perceptions of custom gpts by users and creators. In Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems (2025). , 1-18.
10.1145/3706598.3713540 -
2025. Channel Switching and Adaptive Behaviors in Multichannel Communication. In Proceedings of the ACM on Human-Computer Interaction (CSCW220). , 1 - 33.
10.1145/3757401 -
2025. Fluid Roles for Close-Knit Gaming: Households Playing Digital Games. In Proceedings of the ACM on Human-Computer Interaction (9). , 695-729.
10.1145/3748619 -
2025. ‘Don’t You Dare Go Hollow’: How Dark Souls Helps Players Cope with Depression, a Thematic Analysis of Reddit Discussions. In Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems (2025). , .
10.1145/3706598.3714075 -
2025. Understanding Users’ Privacy Perceptions Towards LLM’s RAG-based Memory. In HAIPS ’25: Proceedings of the 2025 Workshop on Human-Centered AI Privacy and Security (2025). , 10 - 19.
10.1145/3733816.3760750 -
2024. Privacy of Default Apps in Apple’s Mobile Ecosystem. In Proceedings of the CHI Conference on Human Factors in Computing Systems (2024). , 1-32.
10.1145/3613904.3642831 -
2024. Questions without Answers: Enjoyment of Irresolution in Mystery Player Experience. In Proceedings of the ACM on Human-Computer Interaction, Volume 8, Issue CHI PLAY (2024). , 1-28.
10.1145/3677100 -
2024. Swapping 5G for 3G: Motivations, Experiences, and Implications of Contemporary Dumbphone Adoption. In Proceedings of the ACM on Human-Computer Interaction (8, CSCW1). , .
10.1145/3637402 -
2024. From Disorientation to Harmony: Autoethnographic Insights into Transformative Videogame Experiences. In CHI ’24: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems (2024). , 1-20.
10.1145/3613904.3642543 -
2023. Privacy Is the Price: Player Views and Technical Evaluation of Data Practices in Online Games. In Proceedings of the ACM on Human-Computer Interaction (7 CHI PLAY). , 418:1136–418:1178.
10.1145/3544548.3580690 -
2023. When Browsing Gets Cluttered: Exploring and Modeling Interactions of Browsing Clutter, Browsing Habits, and Coping. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (2023). , 1-29.
10.1145/3544548.3580690 -
2019. Recruit Until It Fails: Exploring Performance Limits for Identification Systems.. In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (3). , 1 - 26.
10.1145/3351262 -
2019. Robust Performance Metrics for Authentication Systems.. In Proceedings of the Network and Distributed System Security Symposium (NDSS’19) (). , 1 - 26.
10.14722/ndss.2019.23351 -
2018. Forgetting of Passwords: Ecological Theory and Data. In Proceedings of the 27th USENIX Security Symposium (). , 221 - 238.
-
2017. Where Usability and Security Go Hand-in-Hand: Robust Gesture-Based Authentication for Mobile Systems. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI ’17) (2017). , 374 - 386.
10.1145/3025453.3025879 -
2017. Guessing Attacks on User-Generated Gesture Passwords. In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (1). , 1 - 24.
10.1145/3053331 -
2017. How Busy Are You?: Predicting the Interruptibility Intensity of Mobile Users. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI ’17) (2017). , 1 - 24.
10.1145/3025453.3025946 -
2016. Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Users and Non-Users. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI ’16) (). , 3722 - 3735.
10.1145/2858036.2858049 -
2016. Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns. In IEEE International Conference on Pervasive Computing and Communications (PerCom) (). , 1-9.
10.1109/PERCOM.2016.7456514 -
2016. Free-Form Gesture Authentication in the Wild. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI ’16) (). , 3722 - 3735.
10.1145/2858036.2858270 -
2015. Engineering Gesture-Based Authentication Systems. In IEEE Pervasive Computing (14). , 18-25.
10.1109/MPRV.2015.6 -
2015. Is secure and usable smartphone authentication asking too much?. In Computer (48). , 64-68.
10.1109/MC.2015.134 -
2015. Understanding Motivations for Using Grocery Shopping Applications. In IEEE Pervasive Computing (14). , 38-44.
10.1109/MPRV.2015.65 -
2014. A Field Study of Run-Time Location Access Disclosures on Android Smartphones. In Proceedings of NDSS workshops: Usable Security (USEC 2014) (14). , 1-10.
10.14722/usec.2014.23044 -
2014. Elastic pathing: your speed is enough to track you. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp ’14) (14). , 975-986.
10.1145/2632048.2632077 -
2014. User-generated free-form gestures for authentication: security and memorability. In Proceedings of the 12th annual international conference on Mobile systems, applications, and services (MobiSys ’14) (14). , 176-189.
10.1145/2594368.2594375 -
2014. The motivations and experiences of the on-demand mobile workforce. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (CSCW ’14) (14). , 236-247.
10.1145/2531602.2531680 -
2012. Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp ’12) (). , 501-510.
10.1145/2370216.2370290 -
2012. Distinguishing users with capacitive touch communication. In Distinguishing users with capacitive touch communication. In Proceedings of the 18th annual international conference on Mobile computing and networking (Mobicom ’12) (). , 197 - 208.
10.1145/2348543.2348569 -
2011. Caché: caching location-enhanced content to improve user privacy. In Proceedings of the 9th international conference on Mobile systems, applications, and services (MobiSys ’11) (). , 197-210.
10.1145/1999995.2000015 -
2011. Undistracted driving: a mobile phone that doesn’t distract.. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications (HotMobile ’11) (). , 70-75.
10.1145/2184489.2184504 -
2011. I’m the mayor of my house: examining why people use foursquare - a social-driven location sharing application. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’11) (). , 2409-2418.
10.1145/1978942.1979295 -
2009. Privacy-preserving 802.11 access-point discovery. In Proceedings of the second ACM conference on Wireless network security (WiSec ’09) (). , 123-130.
10.1145/1514274.1514293 -
2008. Chattering Laptops. In Proceedings of the 8th international symposium on Privacy Enhancing Technologies (PETS ’08) (). , 167-186.
10.1007/978-3-540-70630-4_11