Sanchari Das

Orcid: 0000-0003-1299-7867

According to our database1, Sanchari Das authored at least 66 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The State of Lithium-Ion Battery Health Prognostics in the CPS Era.
CoRR, 2024

Closed Form Expression of Input Matching of a Wideband Single-Ended to Differential LNA.
Proceedings of the 37th International Conference on VLSI Design and 23rd International Conference on Embedded Systems, 2024

Evaluating the Security and Privacy Risk Postures of Virtual Assistants.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Evolution of Composition, Readability, and Structure of Privacy Policies over Two Decades.
Proc. Priv. Enhancing Technol., July, 2023

What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions.
Proc. ACM Hum. Comput. Interact., April, 2023

Cybersecurity, Safety, & Privacy Concerns of Student Support Structure for Information and Communication Technologies in Online Education.
Proc. ACM Hum. Comput. Interact., 2023

SoK: Analysis of User-Centered Studies Focusing on Healthcare Privacy & Security.
CoRR, 2023

Privacy, Security, and Usability Tradeoffs of Telehealth from Practitioners' Perspectives.
CoRR, 2023

SoK: Evaluating Privacy and Security Concerns of Using Web Services for the Disabled Population.
CoRR, 2023

A Transcontinental Analysis of Account Remediation Protocols of Popular Websites.
CoRR, 2023

Blockchain in Oil and Gas Supply Chain: A Literature Review from User Security and Privacy Perspective.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications.
Proceedings of the 2023 European Symposium on Usable Security, 2023

The Right To Be Forgotten and Educational Data Mining: Challenges and Paths Forward.
Proceedings of the 16th International Conference on Educational Data Mining, 2023

Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

A Proposal to Study Shoulder-Surfing Resistant Authentication for Augmented and Virtual Reality: Replication Study in the US.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

Accessibility Evaluation of IoT Android Mobile Companion Apps.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees' Current Practices.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review.
J. Cybersecur. Priv., May, 2022

Evaluating user susceptibility to phishing attacks.
Inf. Comput. Secur., 2022

Exploring gender biases in ML and AI academic research through systematic literature review.
Frontiers Artif. Intell., 2022

User Perception and Actions Through Risk Analysis Concerning Cookies.
CoRR, 2022

Privacy and Security Evaluation of Mobile Payment Applications Through User-Generated Reviews.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

Privacy Policy Analysis with Sentence Classification.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Understanding User Perspective in a University Setting to Improve Biometric Authentication Adoption.
Proceedings of the 9th Mexican International Conference on Human-Computer Interaction, 2022

Challenges and Future Directions in the Implementation of Quantum Authentication Protocols.
Proceedings of the Computational Science - ICCS 2022, 2022

A Call for a New Privacy & Security Regime for IoT Smart Toys.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Novel Challenges of Safety, Security and Privacy in Extended Reality.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Does This Photo Make Me Look Good?: How Social Media Feedback on Photos Impacts Posters, Outsiders, and Friends.
Proc. ACM Hum. Comput. Interact., 2021

Exploring evolution of augmented and virtual reality education space in 2020 through systematic literature review.
Comput. Animat. Virtual Worlds, 2021

Bayesian evaluation of privacy-preserving risk communication for user android app preferences.
Inf. Comput. Secur., 2021

Location Data and COVID-19 Contact Tracing: How Data Privacy Regulations and Cell Service Providers Work In Tandem.
CoRR, 2021

Panel: Humans and Technology for Inclusive Privacy and Security.
CoRR, 2021

Exploring The Security Issues in Home-Based IoT Devices Through Denial of Service Attacks.
Proceedings of the 2021 IEEE SmartWorld, 2021

SOK: Evaluating Privacy and Security Vulnerabilities of Patients' Data in Healthcare.
Proceedings of the Socio-Technical Aspects in Security - 11th International Workshop, 2021

Understanding the Rise of Twitter-based cyberbullying due to COVID-19 through comprehensive statistical evaluation.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Non-Inclusive Online Security: Older Adults' Experience with Two-Factor Authentication.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

A Literature Review on Virtual Reality Authentication.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption.
Proceedings of the Financial Cryptography and Data Security, 2021

SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures.
Proceedings of the Emerging Information Security and Applications, 2021

Parents, Educators, & Caregivers Cybersecurity & Privacy Concerns for Remote Learning During COVID-19.
Proceedings of the CHI Greece 2021: 1st International Conference of the ACM Greek SIGCHI Chapter, virtual Event / Athens, Greece, November 25, 2021

2020
Change-Point Analysis of Cyberbullying-Related Twitter Discussions During COVID-19.
CoRR, 2020

Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays.
CoRR, 2020

MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

User-Centered Risk Communication for Safer Browsing.
Proceedings of the Financial Cryptography and Data Security, 2020

Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend Analysis.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

Smart Storytelling: Video and Text Risk Communication to Increase MFA Acceptability.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020

Substituting Restorative Benefits of Being Outdoors through Interactive Augmented Spatial Soundscapes.
Proceedings of the ASSETS '20: The 22nd International ACM SIGACCESS Conference on Computers and Accessibility, 2020

2019
Evaluating User Perception of Multi-Factor Authentication: A Systematic Review.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

All About Phishing: Exploring User Research through a Systematic Literature Review.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

Overpowered and Underprotected Toys Empowering Parents with Tools to Protect Their Children.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Techies Against Facebook: Understanding Negative Sentiment Toward Facebook via User Generated Content.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Modularity is the Key A New Approach to Social Media Privacy Policies.
Proceedings of the 7th Mexican Conference on Human-Computer Interaction, 2018

Poster Abstract: Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

Understanding privacy concerns of whatsapp users in India: poster.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key.
Proceedings of the Financial Cryptography and Data Security, 2018

2017
A qualitative study on usability and acceptability of Yubico security key.
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, 2017

How Celebrities Feed Tweeples with Personal and Promotional Tweets: Celebrity Twitter Use and Audience Engagement.
Proceedings of the 8th International Conference on Social Media & Society, 2017

Dynamic Economic Emission Dispatch using self-adaptive multivariate distribution based modified Real Coded Genetic Algorithm.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

Discrete Wavelet Transform based V-I image fusion with Artificial Bee Colony Optimization.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017


  Loading...