Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Governing Open Vocabulary Data Leaks Using an Edge LLM through Programming by Example
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 4Article No.: 179, Pages 1–31https://doi.org/10.1145/3699760A major concern with integrating large language model (LLM) services (e.g., ChatGPT) into workplaces is that employees may inadvertently leak sensitive information through their prompts. Since user prompts can involve arbitrary vocabularies, conventional ...
- research-articleSeptember 2024
PrivateGaze: Preserving User Privacy in Black-box Mobile Gaze Tracking Services
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 99, Pages 1–28https://doi.org/10.1145/3678595Eye gaze contains rich information about human attention and cognitive processes. This capability makes the underlying technology, known as gaze tracking, a critical enabler for many ubiquitous applications and has triggered the development of easy-to-...
- research-articleSeptember 2024
Empowering IoT Developers with Privacy-Preserving End-User Development Tools
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 90, Pages 1–47https://doi.org/10.1145/3678588Internet of Things applications (IoT) have the potential to derive sensitive user data, necessitating adherence to privacy and data protection laws. However, developers often struggle with privacy issues, resulting in personal data misuse. Despite the ...
- research-articleSeptember 2024
ShouldAR: Detecting Shoulder Surfing Attacks Using Multimodal Eye Tracking and Augmented Reality
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 97, Pages 1–23https://doi.org/10.1145/3678573Shoulder surfing attacks (SSAs) are a type of observation attack designed to illicitly gather sensitive data from "over the shoulder" of victims. This attack can be directed at mobile devices, desktop screens, Personal Identification Number (PIN) pads at ...
- research-articleSeptember 2024
Parent and Educator Concerns on the Pedagogical Use of AI-Equipped Social Robots
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 120, Pages 1–34https://doi.org/10.1145/3678556Social robots equipped with conversational artificial intelligence are becoming increasingly common in educational settings. However, the long-term consequences of such uses remain relatively unknown due to their novelty. To ensure children's safe use of ...
-
- research-articleSeptember 2024
End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 89, Pages 1–28https://doi.org/10.1145/3678517The Amazon Alexa marketplace has grown rapidly in recent years due to third-party developers creating large amounts of content and publishing directly to a skills store. Despite the growth of the Amazon Alexa skills store, there have been several ...
- research-articleSeptember 2024
Evaluating the Privacy Valuation of Personal Data on Smartphones
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 100, Pages 1–33https://doi.org/10.1145/3678509Smartphones hold a great variety of personal data during usage, which at the same time poses privacy risks. In this paper, we used the selling price to reflect users' privacy valuation of their personal data on smartphones. In a 7-day auction, they sold ...
- research-articleMarch 2024
AFace: Range-flexible Anti-spoofing Face Authentication via Smartphone Acoustic Sensing
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 1Article No.: 26, Pages 1–33https://doi.org/10.1145/3643510User authentication on smartphones needs to balance both security and convenience. Many image-based face authentication methods are vulnerable to spoofing and are plagued by privacy breaches, so models based on acoustic sensing have emerged to achieve ...
- research-articleJanuary 2024
DIPA2: An Image Dataset with Cross-cultural Privacy Perception Annotations
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 4Article No.: 192, Pages 1–30https://doi.org/10.1145/3631439The world today is increasingly visual. Many of the most popular online social networking services are largely powered by images, making image privacy protection a critical research topic in the fields of ubiquitous computing, usable security, and human-...
- research-articleJanuary 2024
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 4Article No.: 160, Pages 1–24https://doi.org/10.1145/3631432Unlawful wireless cameras are often hidden to secretly monitor private activities. However, existing methods to detect and localize these cameras are interactively complex or require expensive specialized hardware. In this paper, we present LocCams, an ...
- research-articleJanuary 2024
Aragorn: A Privacy-Enhancing System for Mobile Cameras
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 4Article No.: 181, Pages 1–31https://doi.org/10.1145/3631406Mobile app developers often rely on cameras to implement rich features. However, giving apps unfettered access to the mobile camera poses a privacy threat when camera frames capture sensitive information that is not needed for the app's functionality. To ...
- research-articleJune 2023
VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 2Article No.: 48, Pages 1–21https://doi.org/10.1145/3596266Faced with the threat of identity leakage during voice data publishing, users are engaged in a privacy-utility dilemma when enjoying the utility of voice services. Existing machine-centric studies employ direct modification or text-based re-synthesis to ...
- research-articleJune 2023
SeRaNDiP: Leveraging Inherent Sensor Random Noise for Differential Privacy Preservation in Wearable Community Sensing Applications
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 2Article No.: 61, Pages 1–38https://doi.org/10.1145/3596252Personal data collected from today's wearable sensors contain a rich amount of information that can reveal a user's identity. Differential privacy (DP) is a well-known technique for protecting the privacy of the sensor data being sent to community ...
- research-articleJune 2023
On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation
- Jun Ho Huh,
- Sungsu Kwag,
- Iljoo Kim,
- Alexandr Popov,
- Younghan Park,
- Geumhwan Cho,
- Juwon Lee,
- Hyoungshick Kim,
- Choong-Hoon Lee
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 2Article No.: 58, Pages 1–32https://doi.org/10.1145/3596236One of the main challenges in deploying a keystroke dynamics-based continuous authentication scheme on smartphones is ensuring low error rates over time. Unstable false rejection rates (FRRs) would lead to frequent phone locks during long-term use, and ...
- research-articleMarch 2023
IoTBeholder: A Privacy Snooping Attack on User Habitual Behaviors from Smart Home Wi-Fi Traffic
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 1Article No.: 43, Pages 1–26https://doi.org/10.1145/3580890With the deployment of a growing number of smart home IoT devices, privacy leakage has become a growing concern. Prior work on privacy-invasive device localization, classification, and activity identification have proven the existence of various privacy ...
- research-articleMarch 2023
PARROT: Interactive Privacy-Aware Internet of Things Application Design Tool
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 1Article No.: 1, Pages 1–37https://doi.org/10.1145/3580880Internet of Things (IoT) applications typically collect and analyse personal data that is categorised as sensitive or special category of personal data. These data are subject to a higher degree of protection under data privacy laws. Regardless of legal ...
- research-articleJanuary 2023
Not Only for Contact Tracing: Use of Belgium's Contact Tracing App among Young Adults
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 6, Issue 4Article No.: 202, Pages 1–26https://doi.org/10.1145/3570348Many countries developed and deployed contact tracing apps to reduce the spread of the COVID-19 coronavirus. Prior research explored people's intent to install these apps, which is necessary to ensure effectiveness. However, adopting contact tracing apps ...
- research-articleJanuary 2023
CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 6, Issue 4Article No.: 173, Pages 1–25https://doi.org/10.1145/3569505Hidden cameras in sensitive locations have become an increasing threat to personal privacy all over the world. Because the camera is small and camouflaged, it is difficult to detect the presence of the camera with naked eyes. Existing works on this ...
- research-articleJanuary 2023
Privacy-Enhancing Technology and Everyday Augmented Reality: Understanding Bystanders' Varying Needs for Awareness and Consent
- Joseph O'Hagan,
- Pejman Saeghe,
- Jan Gugenheimer,
- Daniel Medeiros,
- Karola Marky,
- Mohamed Khamis,
- Mark McGill
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 6, Issue 4Article No.: 177, Pages 1–35https://doi.org/10.1145/3569501Fundamental to Augmented Reality (AR) headsets is their capacity to visually and aurally sense the world around them, necessary to drive the positional tracking that makes rendering 3D spatial content possible. This requisite sensing also opens the door ...
- research-articleJanuary 2023
WristAcoustic: Through-Wrist Acoustic Response Based Authentication for Smartwatches
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 6, Issue 4Article No.: 167, Pages 1–34https://doi.org/10.1145/3569473PIN and pattern lock are difficult to accurately enter on small watch screens, and are vulnerable against guessing attacks. To address these problems, this paper proposes a novel implicit biometric scheme based on through-wrist acoustic responses. A cue ...