Seda Gurses

Affiliations:
  • TU Delft, The Netherlands
  • KU Leuven, Belgium (former)
  • Princeton University, Center for Information Technology and Policy, USA (former)
  • New York University, USA (former)


According to our database1, Seda Gurses authored at least 32 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom.
Proc. Priv. Enhancing Technol., April, 2023

Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

2022
We have to go back: A Historic IP Attribution Service for Network Measurement.
CoRR, 2022

Deploying decentralized, privacy-preserving proximity tracing.
Commun. ACM, 2022

2021
CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing.
Proc. Priv. Enhancing Technol., 2021

Exploring Data Pipelines through the Process Lens: a Reference Model forComputer Vision.
CoRR, 2021

Heads in the Clouds: Measuring the Implications of Universities Migrating to Public Clouds.
CoRR, 2021

Technology, equity and social justice roundtable.
Proceedings of the IEEE International Symposium on Technology and Society, 2021

2020
Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Eng. Bull., 2020

Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign.
CoRR, 2020

Decentralized Privacy-Preserving Proximity Tracing.
CoRR, 2020

On the Interplay between Requirements, Engineering, and Artificial Intelligence.
Proceedings of the Joint Proceedings of REFSQ-2020 Workshops, 2020

POTs: protective optimization technologies.
Proceedings of the FAT* '20: Conference on Fairness, 2020

2018
Questioning the assumptions behind fairness solutions.
CoRR, 2018

POTs: The revolution will not be optimized?
CoRR, 2018

The Odyssey: Modeling Privacy Threats in a Brave New World.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation: A Transatlantic Initiative.
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018

2017
Contextual Integrity through the Lens of Computer Science.
Found. Trends Priv. Secur., 2017

2016
Privacy Engineering: Shaping an Emerging Field of Research and Practice.
IEEE Secur. Priv., 2016

2014
Can you engineer privacy?
Commun. ACM, 2014

2013
Requirements engineering within a large-scale security-oriented research project: lessons learned.
Requir. Eng., 2013

FPDetective: dusting the web for fingerprinters.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2010
A comparison of security requirements engineering methods.
Requir. Eng., 2010

SNS and 3rd Party Applications Privacy Policies and their Construction of Privacy Concerns.
Proceedings of the 18th European Conference on Information Systems, 2010

PETs in the Surveillance Society: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm.
Proceedings of the Data Protection in a Profiled World, 2010

2008
Characterising the Next Generation of Mobile Applications Through a Privacy-Aware Geographic Knowledge Discovery Process.
Proceedings of the Mobility, Data Mining and Privacy - Geographic Knowledge Discovery, 2008

Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback.
Proceedings of the International Conference on Information Systems, 2008

2007
Location Services.
Proceedings of the Algorithms for Sensor and Ad Hoc Networks, 2007

Security.
Proceedings of the Algorithms for Sensor and Ad Hoc Networks, 2007

2006
Emerging Markets for RFID Traces
CoRR, 2006

Contextualizing Security Goals: A Method for Multilateral Security Requirements Elicitation.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

2005
Eliciting confidentiality requirements in practice.
Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative Research, 2005


  Loading...