Primal Wijesekera

Orcid: 0000-0002-8241-3102

According to our database1, Primal Wijesekera authored at least 23 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
QARMA-FL: Quality-Aware Robust Model Aggregation for Mobile Crowdsourcing.
IEEE Internet Things J., January, 2024

2023
Vaccination trials on hold: malicious and low credibility content on Twitter during the AstraZeneca COVID-19 vaccine development.
Comput. Math. Organ. Theory, September, 2023

Lessons in VCR Repair: Compliance of Android App Developers with the California Consumer Privacy Act (CCPA).
Proc. Priv. Enhancing Technol., July, 2023

Emotion Based Music Visualization with Fractal Arts.
Proceedings of the 3rd International Conference on Image Processing and Vision Engineering, 2023

2021
Malicious and Low Credibility URLs on Twitter during COVID-19.
CoRR, 2021

Malicious and Low Credibility URLs on Twitter During the AstraZeneca COVID-19 Vaccine Development.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2021

Music Emotion Visualization through Colour.
Proceedings of the International Conference on Electronics, Information, and Communication, 2021

Demo: Large Scale Analysis on Vulnerability Remediation in Open-source JavaScript Projects.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
The Price is (Not) Right: Comparing Privacy in Free and Paid Apps.
Proc. Priv. Enhancing Technol., 2020

COMONet: Community Mobile Network.
CoRR, 2020

"You've Got Your Nice List of Bugs, Now What?" Vulnerability Discovery and Management Processes in the Wild.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Fix that Fix Commit: A real-world remediation analysis of JavaScript projects.
Proceedings of the 20th IEEE International Working Conference on Source Code Analysis and Manipulation, 2020

Investigating MMM Ponzi Scheme on Bitcoin.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System.
login Usenix Mag., 2019

Privacy Attitudes of Smart Speaker Users.
Proc. Priv. Enhancing Technol., 2019

Investigating Users' Preferences and Expectations for Always-Listening Voice Assistants.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

2018
"Won't Somebody Think of the Children?" Examining COPPA Compliance at Scale.
Proc. Priv. Enhancing Technol., 2018

Dynamically Regulating Mobile Application Permissions.
IEEE Secur. Priv., 2018

Contextualizing Privacy Decisions for Better Prediction (and Protection).
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
Decoupling data-at-rest encryption and smartphone locking with wearable devices.
Pervasive Mob. Comput., 2016

2015
Android Permissions Remystified: A Field Study on Contextual Integrity.
Proceedings of the 24th USENIX Security Symposium, 2015


  Loading...