ACCessory: Password Inference using Accelerometers on Smartphones E Owusu, J Han, S Das, A Perrig, J Zhang | 506 | 2012 |
Self-Censorship on Facebook S Das, A Kramer ICWSM, 2013 | 353 | 2013 |
The post that wasn't: exploring self-censorship on facebook M Sleeper, R Balebako, S Das, AL McConahy, J Wiese, LF Cranor Proceedings of the 2013 conference on Computer supported cooperative work …, 2013 | 296 | 2013 |
Accomplice: Location inference using accelerometers on smartphones J Han, E Owusu, LT Nguyen, S Das, A Perrig, J Zhang 2012 Fourth International Conference on Communication Systems and Networks …, 2012 | 245 | 2012 |
Casa: context-aware scalable authentication E Hayashi, S Das, S Amini, J Hong, I Oakley Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-10, 2013 | 213 | 2013 |
Toward supporting stories with procedurally generated game worlds K Hartsook, A Zook, S Das, MO Riedl 2011 IEEE Conference on Computational Intelligence and Games (CIG'11), 297-304, 2011 | 156 | 2011 |
The effect of social influence on security sensitivity S Das, THJ Kim, LA Dabbish, JI Hong 10th Symposium On Usable Privacy and Security (SOUPS 2014), 143-157, 2014 | 153 | 2014 |
Increasing security sensitivity with social proof: A large-scale experimental confirmation S Das, ADI Kramer, LA Dabbish, JI Hong 🎖️ Proceedings of the 2014 ACM SIGSAC conference on computer and …, 2014 | 112 | 2014 |
The role of social influence in security feature adoption S Das, ADI Kramer, LA Dabbish, JI Hong Proceedings of the 18th ACM conference on computer supported cooperative …, 2015 | 108 | 2015 |
Detecting user activities using the accelerometer on Android smartphones S Das, L Green, B Perez, M Murphy, A Perrig | 97* | 2010 |
Expert and {Non-Expert} attitudes towards (secure) instant messaging A De Luca, S Das, M Ortlieb, I Ion, B Laurie Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 147-157, 2016 | 75 | 2016 |
A typology of perceived triggers for {End-User} security and privacy behaviors S Das, LA Dabbish, JI Hong Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 97-115, 2019 | 61 | 2019 |
Breaking! A Typology of Security and Privacy News and How It’s Shared S Das, J Lo, L Dabbish, JI Hong Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2, 2018 | 57 | 2018 |
Exploring Capturable Everyday Memory for Autobiographical Authentication S Das, E Hayashi, J Hong 🏆 UbiComp, 2013 | 50 | 2013 |
Naturalistic language recordings reveal “hypervocal” infants at high familial risk for autism MR Swanson, MD Shen, JJ Wolff, B Boyd, M Clements, J Rehg, JT Elison, ... Child development 89 (2), e60-e73, 2018 | 41 | 2018 |
Thumprint: Socially-inclusive local group authentication through shared secret knocks S Das, G Laput, C Harrison, JI Hong 🎖️ Proceedings of the 2017 CHI Conference on Human Factors in Computing …, 2017 | 41 | 2017 |
Blind and Human: Exploring More Usable Audio CAPTCHA Designs V Fanelle, S Karimi, A Shah, B Subramanian, S Das 🏆 Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020), 111-125, 2020 | 40 | 2020 |
Individually vulnerable, collectively safe: The security and privacy practices of households with older adults S Murthy, KS Bhat, S Das, N Kumar Proceedings of the ACM on Human-Computer Interaction 5 (CSCW1), 1-24, 2021 | 39 | 2021 |
"We Hold Each Other Accountable": Unpacking How Social Groups Approach Cybersecurity and Privacy Together H Watson, E Moju-Igbene, A Kumari, S Das 🎖️Proceedings of the 2020 CHI Conference on Human Factors in Computing …, 2020 | 39 | 2020 |
Evolving the ecosystem of personal behavioral data J Wiese, S Das, JI Hong, J Zimmerman Human–Computer Interaction 32 (5-6), 447-510, 2017 | 36 | 2017 |