default search action
Richard Chow
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [i3]Reza Tourani, Srikathyayani Srikanteswara, Satyajayant Misra, Richard Chow, Lily L. Yang, Xiruo Liu, Yi Zhang:
Democratizing the Edge: A Pervasive Edge Computing Framework. CoRR abs/2007.00641 (2020)
2010 – 2019
- 2018
- [j4]Pardis Emami Naeini, Martin Degeling, Lujo Bauer, Richard Chow, Lorrie Faith Cranor, Mohammad R. Haghighat, Heather M. Patterson:
The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios. Proc. ACM Hum. Comput. Interact. 2(CSCW): 48:1-48:26 (2018) - [c29]Richard Chow, Hsin-Mu Tsai:
Securing the visual channel: How my car saw the light and stopped learning. CISS 2018: 1-6 - [c28]Hosub Lee, Richard Chow, Mohammad R. Haghighat, Heather M. Patterson, Alfred Kobsa:
IoT Service Store: A Web-based System for Privacy-aware IoT Service Discovery and Interaction. PerCom Workshops 2018: 107-112 - 2017
- [j3]Richard Chow:
The Last Mile for IoT Privacy. IEEE Secur. Priv. 15(6): 73-76 (2017) - [c27]Linda Naeun Lee, Richard Chow, Al M. Rashid:
User Attitudes Towards Browsing Data Collection. CHI Extended Abstracts 2017: 1816-1823 - [c26]Raghudeep Kannavara, Gilad Gressel, Damilare Fagbemi, Richard Chow:
A Machine Learning Approach to SDL. SecDev 2017: 10-15 - [e3]Richard Chow, Gökay Saldamli:
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017. ACM 2017, ISBN 978-1-4503-4969-7 [contents] - 2016
- [c25]Enrico Budianto, Richard Chow, Jonathan Ding, Michael McCool:
Language-Based Hypervisors. CANS 2016: 731-736 - [c24]Edward Wang, Richard Chow:
What can i do here? IoT service discovery in smart cities. PerCom Workshops 2016: 1-6 - [e2]Richard Chow, Gökay Saldamli:
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS, Xi'an, China, May 30, 2016. ACM 2016, ISBN 978-1-4503-4283-4 [contents] - 2015
- [c23]Gökay Saldamli, Richard Chow, Hongxia Jin:
Albatross: A Privacy-Preserving Location Sharing System. AsiaCCS 2015: 663 - [c22]Serge Egelman, Raghudeep Kannavara, Richard Chow:
Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms. CHI 2015: 1669-1678 - [c21]Richard Chow, Serge Egelman, Raghudeep Kannavara, Hosub Lee, Suyash Misra, Edward Wang:
HCI in Business: A Collaboration with Academia in IoT Privacy. HCI (23) 2015: 679-687 - [c20]Richard Chow:
IoT Privacy: Can We Regain Control? IH&MMSec 2015: 3 - [e1]Richard Chow, Gökay Saldamli:
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS 2015, Singapore, Republic of Singapore, April 14, 2015. ACM 2015, ISBN 978-1-4503-3449-5 [contents] - [i2]Gökay Saldamli, Richard Chow, Hongxia Jin:
Albatross: a Privacy-Preserving Location Sharing System. CoRR abs/1502.03407 (2015) - 2013
- [c19]Richard Chow, Alvaro A. Cárdenas, Emiliano De Cristofaro:
Data Handling in the Smart Grid: Do We Know Enough? Critical Infrastructure Protection 2013: 21-32 - [c18]Hongxia Jin, Gökay Saldamli, Richard Chow, Bart P. Knijnenburg:
Recommendations-based location privacy control. PerCom Workshops 2013: 401-404 - [c17]Richard Chow, Hongxia Jin, Bart P. Knijnenburg, Gökay Saldamli:
Differential data analysis for recommender systems. RecSys 2013: 323-326 - [c16]Gökay Saldamli, Richard Chow, Hongxia Jin, Bart P. Knijnenburg:
Private proximity testing with an untrusted server. WISEC 2013: 113-118 - [i1]Richard Chow, Hongxia Jin, Bart P. Knijnenburg, Gökay Saldamli:
Differential Data Analysis for Recommender Systems. CoRR abs/1310.0894 (2013) - 2012
- [j2]Dirk Balfanz, Richard Chow, Ori Eisen, Markus Jakobsson, Steve Kirsch, Scott Matsumoto, Jesus Molina, Paul C. van Oorschot:
The Future of Authentication. IEEE Secur. Priv. 10(1): 22-27 (2012) - [c15]Richard Chow, Manas A. Pathak, Cong Wang:
A Practical System for Privacy-Preserving Collaborative Filtering. ICDM Workshops 2012: 547-554 - [c14]Oliver Brdiczka, Juan Liu, Bob Price, Jianqiang Shen, Akshay Patil, Richard Chow, Eugene Bart, Nicolas Ducheneaut:
Proactive Insider Threat Detection through Graph Learning and Psychological Context. IEEE Symposium on Security and Privacy Workshops 2012: 142-149 - 2011
- [c13]Elaine Shi, T.-H. Hubert Chan, Eleanor Gilbert Rieffel, Richard Chow, Dawn Song:
Privacy-Preserving Aggregation of Time-Series Data. NDSS 2011 - [c12]Daisuke Mashima, Prateek Sarkar, Elaine Shi, Chris Li, Richard Chow, Dawn Song:
Privacy settings from contextual attributes: A case study using Google Buzz. PerCom Workshops 2011: 257-262 - 2010
- [c11]Richard Chow, Ji Fang, Philippe Golle, Jessica Staddon:
The Web as a Privacy Lab. AAAI Spring Symposium: Intelligent Information Privacy Management 2010 - [c10]Richard Chow, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina, Yuan Niu, Elaine Shi, Zhexuan Song:
Authentication in the clouds: a framework and its application to mobile users. CCSW 2010: 1-6 - [c9]Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow:
Implicit Authentication through Learning User Behavior. ISC 2010: 99-113 - [c8]Richard Chow, Jessica Staddon:
A framework for privacy-conducive recommendations. WPES 2010: 105-108
2000 – 2009
- 2009
- [j1]Eric A. Bier, Richard Chow, Philippe Golle, Tracy Holloway King, Jessica Staddon:
The Rules of Redaction: Identify, Protect, Review (and Repeat). IEEE Secur. Priv. 7(6): 46-53 (2009) - [c7]Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina:
Controlling data in the cloud: outsourcing computation without outsourcing control. CCSW 2009: 85-90 - [c6]Richard Chow, Ian Oberst, Jessica Staddon:
Sanitization's slippery slope: the design and study of a text revision assistant. SOUPS 2009 - [c5]Richard Chow, Philippe Golle:
Faking contextual data for fun, profit, and privacy. WPES 2009: 105-108 - 2008
- [c4]Jessica Staddon, Richard Chow:
Detecting reviewer bias through web-based association mining. WICOW 2008: 5-10 - [c3]Richard Chow, Philippe Golle, Jessica Staddon:
Detecting privacy leaks using corpus-based association rules. KDD 2008: 893-901 - [c2]Philippe Golle, Richard Chow, Jessica Staddon:
Testable commitments. StorageSS 2008: 37-42 - [c1]Richard Chow, Philippe Golle, Markus Jakobsson, Lusha Wang, XiaoFeng Wang:
Making CAPTCHAs clickable. HotMobile 2008: 91-94
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint