All Publications
  1. (2025). Beyond PII: How Users Attempt to Estimate and Mitigate Implicit LLM Inference. arXiv.
  2. (2025). Large Language Models for Real-World IoT Device Identification. arXiv.
  3. (2025). LLM-Powered Analysis of IoT User Reviews: Tracking and Ranking Security and Privacy Concerns. ICWSM.
  4. (2025). "We are not Future-ready": Understanding AI Privacy Risks and Existing Mitigation Strategies from the Perspective of AI Developers in Europe. SOUPS.
  5. (2024). Large Language Models for Cybersecurity: New Opportunities. IEEE S&P.
  6. (2024). A decade of privacy-relevant Android app reviews: large scale trends. USENIX Security.
  7. (2024). Privacy Risks of General-Purpose AI Systems: A Foundation for Investigating Practitioner Perspectives. SUPA.
  8. (2024). Evaluating privacy perceptions, experience, and behavior of software development teams. SOUPS.
  9. (2024). Unveiling Privacy Perspectives about Mobile Health Apps on a Large Scale. PETS workshop: Privacy, Safety and Trust for Mobile Health Apps.
  10. (2023). Towards Fine-Grained Localization of Privacy Behaviors. EuroS&P.
  11. (2022). Hark: A Deep Learning System for Navigating Privacy Feedback at Scale. IEEE S&P.
  12. (2022). PAcT: Detecting and Classifying Privacy Behavior of Android Applications. ACM WiSec.
  13. (2022). Analyzing user perspectives on mobile app privacy at scale. ICSE.
  14. (2021). A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions. USENIX Security.
  15. (2021). PriGen: Towards Automated Translation of Android Applications' Code to Privacy Captions. RCIS.
  16. (2019). Reducing Permission Requests in Mobile Apps. ACM IMC.
  17. (2017). Exploring decision making with android's runtime permission dialogs using in-context surveys. USENIX SOUPS.
  18. (2017). User Anonymity on Twitter. IEEE S&P (Magazine).
  19. (2015). Perceived Frequency of Advertising Practices. SOUPS PPS.
  20. (2015). Understanding Sensitivity by Analyzing Anonymity. IEEE S&P (Magazine).
  21. (2014). Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity. IEEE S&P.
  22. (2008). From pilot to practice: creating multiple input multimedia content for real-world deployment. IUI4DR.