Richard Chow

According to our database1, Richard Chow authored at least 34 papers between 2008 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Democratizing the Edge: A Pervasive Edge Computing Framework.
CoRR, 2020

2018
The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios.
Proc. ACM Hum. Comput. Interact., 2018

IoT Service Store: A Web-based System for Privacy-aware IoT Service Discovery and Interaction.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Securing the visual channel: How my car saw the light and stopped learning.
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018

2017
The Last Mile for IoT Privacy.
IEEE Secur. Priv., 2017

A Machine Learning Approach to SDL.
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017

User Attitudes Towards Browsing Data Collection.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
What can i do here? IoT service discovery in smart cities.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Language-Based Hypervisors.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
IoT Privacy: Can We Regain Control?
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

HCI in Business: A Collaboration with Academia in IoT Privacy.
Proceedings of the HCI in Business - Second International Conference, 2015

Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Albatross: A Privacy-Preserving Location Sharing System.
Proceedings of the 10th ACM Symposium on Information, 2015

2013
Private proximity testing with an untrusted server.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Differential data analysis for recommender systems.
Proceedings of the Seventh ACM Conference on Recommender Systems, 2013

Recommendations-based location privacy control.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Data Handling in the Smart Grid: Do We Know Enough?
Proceedings of the Critical Infrastructure Protection VII, 2013

2012
The Future of Authentication.
IEEE Secur. Priv., 2012

Proactive Insider Threat Detection through Graph Learning and Psychological Context.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

A Practical System for Privacy-Preserving Collaborative Filtering.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

2011
Privacy settings from contextual attributes: A case study using Google Buzz.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Privacy-Preserving Aggregation of Time-Series Data.
Proceedings of the Network and Distributed System Security Symposium, 2011

2010
A framework for privacy-conducive recommendations.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Implicit Authentication through Learning User Behavior.
Proceedings of the Information Security - 13th International Conference, 2010

Authentication in the clouds: a framework and its application to mobile users.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

The Web as a Privacy Lab.
Proceedings of the Intelligent Information Privacy Management, 2010

2009
The Rules of Redaction: Identify, Protect, Review (and Repeat).
IEEE Secur. Priv., 2009

Faking contextual data for fun, profit, and privacy.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

Sanitization's slippery slope: the design and study of a text revision assistant.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Controlling data in the cloud: outsourcing computation without outsourcing control.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Making CAPTCHAs clickable.
Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, 2008

Testable commitments.
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, 2008

Detecting privacy leaks using corpus-based association rules.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008

Detecting reviewer bias through web-based association mining.
Proceedings of the 2nd ACM Workshop on Information Credibility on the Web, 2008


  Loading...