Sai Teja Peddinti

According to our database1, Sai Teja Peddinti authored at least 24 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy Risks of General-Purpose AI Systems: A Foundation for Investigating Practitioner Perspectives.
CoRR, 2024

LLMs for Cyber Security: New Opportunities.
CoRR, 2024

A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends.
Proceedings of the 33rd USENIX Security Symposium, 2024

Evaluating Privacy Perceptions, Experience, and Behavior of Software Development Teams.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024

2023
Towards Fine-Grained Localization of Privacy Behaviors.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
PAcT: Detecting and Classifying Privacy Behavior of Android Applications.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Hark: A Deep Learning System for Navigating Privacy Feedback at Scale.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Analyzing User Perspectives on Mobile App Privacy at Scale.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions.
Proceedings of the 30th USENIX Security Symposium, 2021

PriGen: Towards Automated Translation of Android Applications' Code to Privacy Captions.
Proceedings of the Research Challenges in Information Science, 2021

2019
Reducing Permission Requests in Mobile Apps.
Proceedings of the Internet Measurement Conference, 2019

2017
User Anonymity on Twitter.
IEEE Secur. Priv., 2017

Mining Anonymity: Identifying Sensitive Accounts on Twitter.
CoRR, 2017

Exploring decision making with Android's runtime permission dialogs using in-context surveys.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
Finding Sensitive Accounts on Twitter: An Automated Approach Based on Follower Anonymity.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

2015
Understanding Sensitivity by Analyzing Anonymity [Guest editor's introduction].
IEEE Secur. Priv., 2015

2014
Web search query privacy: Evaluating query obfuscation and anonymizing networks.
J. Comput. Secur., 2014

Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

"On the internet, nobody knows you're a dog": a twitter case study of anonymity in social networks.
Proceedings of the second ACM conference on Online social networks, 2014

Stalking Beijing from Timbuktu: A Generic Measurement Approach for Exploiting Location-Based Social Discovery.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

2011
Cover locations: availing location-based services without revealing the location.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

On the limitations of query obfuscation techniques for location privacy.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

On the effectiveness of anonymizing networks for web search privacy.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010


  Loading...