Author of the publication

pQUANT: A User-Centered Privacy Risk Analysis Framework.

, , , and . CRiSIS, volume 12026 of Lecture Notes in Computer Science, page 3-16. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Study of the Effectiveness of a Privacy Policy Summarization Tool., , , and . ICISSP (Revised Selected Papers), volume 1221 of Communications in Computer and Information Science, page 186-206. Springer, (2019)Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool., , and . ICISSP, page 628-634. SCITEPRESS, (2021)Challenges in Detecting Privacy Revealing Information in Unstructured Text., , and . PrivOn@ISWC, volume 1750 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Explainable Machine Learning for Default Privacy Setting Prediction., , , and . IEEE Access, (2021)Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences., , , and . DPM/CBT@ESORICS, volume 10436 of Lecture Notes in Computer Science, page 107-123. Springer, (2017)PrivacyBot: Detecting Privacy Sensitive Information in Unstructured Texts., , and . SNAMS, page 53-60. IEEE, (2019)Easing the Burden of Setting Privacy Preferences: A Machine Learning Approach., , , and . ICISSP (Revised Selected Papers), volume 691 of Communications in Computer and Information Science, page 44-63. Springer, (2016)Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users., , , and . ICISSP, page 370-377. SciTePress, (2019)Effects of Explanatory Information on Privacy Policy Summarization Tool Perception., , , and . ICISSP (Revised Selected Papers), volume 1545 of Communications in Computer and Information Science, page 156-177. Springer, (2020)A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications., , , and . HICSS, page 1-10. ScholarSpace, (2019)