Razieh Nokhbeh Zaeem

Orcid: 0000-0002-0415-5814

Affiliations:
  • The University of Texas at Austin, TX, USA


According to our database1, Razieh Nokhbeh Zaeem authored at least 37 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Early Warning Identity Threat and Mitigation System.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

PrivacyCheck v3: Empowering Users with Higher-Level Understanding of Privacy Policies.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022

2021
The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise.
ACM Trans. Manag. Inf. Syst., 2021

Blockchain-Based Self-Sovereign Identity: Survey, Requirements, Use-Cases, and Comparative Study.
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14, 2021

Self-Sovereign Identity and User Control for Privacy-Preserving Contact Tracing.
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14, 2021

Enhancing constraint-based repair of data structure errors that recur using memoization.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Finding Trustworthy Users: Twitter Sentiment Towards US Presidential Candidates in 2016 and 2020.
Proceedings of the Intelligent Systems and Applications, 2021

Comparing Privacy Policies of Government Agencies and Companies: A Study using Machine-learning-based Privacy Policy Analysis Tools.
Proceedings of the 13th International Conference on Agents and Artificial Intelligence, 2021

A Large Publicly Available Corpus of Website Privacy Policies Based on DMOZ.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
PrivacyCheck's Machine Learning to Digest Privacy Policies: Competitor Analysis and Usage Patterns.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2020

A Survival Game Analysis to Personal Identity Protection Strategies.
Proceedings of the Second IEEE International Conference on Trust, 2020

Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable Information.
Proceedings of the Second IEEE International Conference on Trust, 2020

A Framework for Estimating Privacy Risk Scores of Mobile Apps.
Proceedings of the Information Security - 23rd International Conference, 2020

An Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach.
Proceedings of the 12th International Conference on Agents and Artificial Intelligence, 2020

PrivacyCheck v2: A Tool that Recaps Privacy Policies for You.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

How Much Identity Management with Blockchain Would Have Saved Us? A Longitudinal Study of Identity Theft.
Proceedings of the Business Information Systems Workshops, 2020

On Sentiment of Online Fake News.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

2019
It Is an Equal Failing to Trust Everybody and to Trust Nobody: Stock Price Prediction Using Trust Filters and Enhanced User Sentiment on Twitter.
ACM Trans. Internet Techn., 2019

An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication.
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019

Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Statistical Analysis of Identity Risk of Exposure and Cost Using the Ecosystem of Identity Attributes.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

2018
PrivacyCheck: Automatic Summarization of Privacy Policies Using Data Mining.
ACM Trans. Internet Techn., 2018

Enhancing and Evaluating Identity Privacy and Authentication Strength by Utilizing the Identity Ecosystem.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

US-Centric vs. International Personally Identifiable Information: A Comparison Using the UT CID Identity Ecosystem.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

Internet of Things: Securing the Identity by Analyzing Ecosystem Models of Devices and Organizations.
Proceedings of the 2018 AAAI Spring Symposia, 2018

2017
Modeling and analysis of identity threat behaviors through text mining of identity theft stories.
Comput. Secur., 2017

Automated Test Generation and Mutation Testing for Alloy.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

2016
Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2016

Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

2014
Towards a test automation framework for alloy.
Proceedings of the 2014 International Symposium on Model Checking of Software, 2014

Automated Generation of Oracles for Testing User-Interaction Features of Mobile Apps.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

2013
Repair Abstractions for More Efficient Data Structure Repair.
Proceedings of the Runtime Verification - 4th International Conference, 2013

2012
History-Aware Data Structure Repair Using SAT.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

Test input generation using dynamic programming.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

Improving the effectiveness of spectra-based fault localization using specifications.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

2010
Contract-Based Data Structure Repair Using Alloy.
Proceedings of the ECOOP 2010, 2010

Introducing Specification-Based Data Structure Repair Using Alloy.
Proceedings of the Abstract State Machines, 2010


  Loading...