Follow
Sauvik Das
Title
Cited by
Cited by
Year
ACCessory: Password Inference using Accelerometers on Smartphones
E Owusu, J Han, S Das, A Perrig, J Zhang
5172012
Self-Censorship on Facebook
S Das, A Kramer
ICWSM, 2013
3562013
The post that wasn't: exploring self-censorship on facebook
M Sleeper, R Balebako, S Das, AL McConahy, J Wiese, LF Cranor
Proceedings of the 2013 conference on Computer supported cooperative work …, 2013
2992013
Accomplice: Location inference using accelerometers on smartphones
J Han, E Owusu, LT Nguyen, S Das, A Perrig, J Zhang
2012 Fourth International Conference on Communication Systems and Networks …, 2012
2482012
Casa: context-aware scalable authentication
E Hayashi, S Das, S Amini, J Hong, I Oakley
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-10, 2013
2162013
The effect of social influence on security sensitivity
S Das, THJ Kim, LA Dabbish, JI Hong
10th Symposium On Usable Privacy and Security (SOUPS 2014), 143-157, 2014
1602014
Toward supporting stories with procedurally generated game worlds
K Hartsook, A Zook, S Das, MO Riedl
2011 IEEE Conference on Computational Intelligence and Games (CIG'11), 297-304, 2011
1582011
Increasing security sensitivity with social proof: A large-scale experimental confirmation
S Das, ADI Kramer, LA Dabbish, JI Hong
🎖️ Proceedings of the 2014 ACM SIGSAC conference on computer and …, 2014
1192014
The role of social influence in security feature adoption
S Das, ADI Kramer, LA Dabbish, JI Hong
Proceedings of the 18th ACM conference on computer supported cooperative …, 2015
1142015
Detecting user activities using the accelerometer on Android smartphones
S Das, L Green, B Perez, M Murphy, A Perrig
99*2010
Expert and {Non-Expert} attitudes towards (secure) instant messaging
A De Luca, S Das, M Ortlieb, I Ion, B Laurie
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 147-157, 2016
782016
A typology of perceived triggers for {End-User} security and privacy behaviors
S Das, LA Dabbish, JI Hong
Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 97-115, 2019
672019
Breaking! A Typology of Security and Privacy News and How It’s Shared
S Das, J Lo, L Dabbish, JI Hong
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2, 2018
592018
Exploring Capturable Everyday Memory for Autobiographical Authentication
S Das, E Hayashi, J Hong
🏆 UbiComp, 2013
512013
Thumprint: Socially-inclusive local group authentication through shared secret knocks
S Das, G Laput, C Harrison, JI Hong
🎖️ Proceedings of the 2017 CHI Conference on Human Factors in Computing …, 2017
442017
Blind and Human: Exploring More Usable Audio CAPTCHA Designs
V Fanelle, S Karimi, A Shah, B Subramanian, S Das
🏆 Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020), 111-125, 2020
432020
Individually vulnerable, collectively safe: The security and privacy practices of households with older adults
S Murthy, KS Bhat, S Das, N Kumar
Proceedings of the ACM on Human-Computer Interaction 5 (CSCW1), 1-24, 2021
422021
"We Hold Each Other Accountable": Unpacking How Social Groups Approach Cybersecurity and Privacy Together
H Watson, E Moju-Igbene, A Kumari, S Das
🎖️Proceedings of the 2020 CHI Conference on Human Factors in Computing …, 2020
422020
Naturalistic language recordings reveal “hypervocal” infants at high familial risk for autism
MR Swanson, MD Shen, JJ Wolff, B Boyd, M Clements, J Rehg, JT Elison, ...
Child development 89 (2), e60-e73, 2018
412018
Evolving the ecosystem of personal behavioral data
J Wiese, S Das, JI Hong, J Zimmerman
Human–Computer Interaction 32 (5-6), 447-510, 2017
382017
The system can't perform the operation now. Try again later.
Articles 1–20