default search action
Tadayoshi Kohno
Person information
- affiliation: University of Washington, Seattle, Washington, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j43]Franziska Roesner, Tadayoshi Kohno:
Security and Privacy in the Metaverse. IEEE Secur. Priv. 22(1): 7-9 (2024) - [j42]Tadayoshi Kohno:
The Task Piper. IEEE Secur. Priv. 22(4): 7-12 (2024) - [j41]Rachel McAmis, Mattea Sim, Mia M. Bennett, Tadayoshi Kohno:
Over Fences and Into Yards: Privacy Threats and Concerns of Commercial Satellites. Proc. Priv. Enhancing Technol. 2024(1): 379-396 (2024) - [c124]Jaron Mink, Miranda Wei, Collins W. Munyendo, Kurt Hugenberg, Tadayoshi Kohno, Elissa M. Redmiles, Gang Wang:
It's Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias. CHI 2024: 778:1-778:20 - [c123]Ashish Hooda, Andrey Labunets, Tadayoshi Kohno, Earlence Fernandes:
Experimental Analyses of the Physical Surveillance Risks in Client-Side Content Scanning. NDSS 2024 - [c122]Natalie Grace Brigham, Miranda Wei, Tadayoshi Kohno, Elissa M. Redmiles:
"Violation of my body: " Perceptions of AI-generated non-consensual (intimate) imagery. SOUPS @ USENIX Security Symposium 2024: 373-392 - [c121]Kaiming Cheng, Arkaprabha Bhattacharya, Michelle Lin, Jaewook Lee, Aroosh Kumar, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner:
When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality. USENIX Security Symposium 2024 - [c120]Kabir Panahi, Shawn Robertson, Yasemin Acar, Alexandru G. Bardas, Tadayoshi Kohno, Lucy Simko:
"But they have overlooked a few things in Afghanistan: " An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections. USENIX Security Symposium 2024 - [c119]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, Rebecca Umbach:
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse. USENIX Security Symposium 2024 - [c118]Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner:
SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors. USENIX Security Symposium 2024 - [i43]Ryan W. Gardner, Tadayoshi Kohno, Alec Yasinsac:
Attacking the Diebold Signature Variant - RSA Signatures with Unverified High-order Padding. CoRR abs/2403.01048 (2024) - [i42]Yuhao Wu, Franziska Roesner, Tadayoshi Kohno, Ning Zhang, Umar Iqbal:
SecGPT: An Execution Isolation Architecture for LLM-Based Systems. CoRR abs/2403.04960 (2024) - [i41]Jimin Mun, Liwei Jiang, Jenny T. Liang, Inyoung Cheong, Nicole DeCario, Yejin Choi, Tadayoshi Kohno, Maarten Sap:
Particip-AI: A Democratic Surveying Framework for Anticipating Future AI Use Cases, Harms and Benefits. CoRR abs/2403.14791 (2024) - [i40]Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner:
SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors. CoRR abs/2404.10187 (2024) - [i39]Rachel Hong, William Agnew, Tadayoshi Kohno, Jamie Morgenstern:
Who's in and who's out? A case study of multimodal CLIP-filtering in DataComp. CoRR abs/2405.08209 (2024) - [i38]Natalie Grace Brigham, Miranda Wei, Tadayoshi Kohno, Elissa M. Redmiles:
"Violation of my body:" Perceptions of AI-generated non-consensual (intimate) imagery. CoRR abs/2406.05520 (2024) - [i37]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, Rebecca Umbach:
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse. CoRR abs/2406.12161 (2024) - [i36]Natalie Grace Brigham, Chongjiu Gao, Tadayoshi Kohno, Franziska Roesner, Niloofar Mireshghallah:
Breaking News: Case Studies of Generative AI's Use in Journalism. CoRR abs/2406.13706 (2024) - 2023
- [j40]Tadayoshi Kohno:
{In Earth} Until (Ready). IEEE Secur. Priv. 21(2): 7-8 (2023) - [j39]Carl E. Landwehr, Michael K. Reiter, Laurie A. Williams, Gene Tsudik, Trent Jaeger, Tadayoshi Kohno, Apu Kapadia:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Secur. Priv. 21(2): 32-42 (2023) - [j38]Elissa M. Redmiles, Mia M. Bennett, Tadayoshi Kohno:
Power in Computer Security and Privacy: A Critical Lens. IEEE Secur. Priv. 21(2): 48-52 (2023) - [j37]Tadayoshi Kohno:
In Your Eyes. IEEE Secur. Priv. 21(5): 4-5 (2023) - [j36]Lucy Simko, Harshini Sri Ramulu, Tadayoshi Kohno, Yasemin Acar:
The Use and Non-Use of Technology During Hurricanes. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-54 (2023) - [c117]Rachel Hong, Tadayoshi Kohno, Jamie Morgenstern:
Evaluation of targeted dataset collection on racial equity in face recognition. AIES 2023: 531-541 - [c116]Pardis Emami Naeini, Joseph Breda, Wei Dai, Tadayoshi Kohno, Kim Laine, Shwetak N. Patel, Franziska Roesner:
Understanding People's Concerns and Attitudes Toward Smart Cities. CHI 2023: 71:1-71:24 - [c115]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Franziska Roesner, Kurt Thomas:
"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment. CHI 2023: 190:1-190:17 - [c114]Jackson Stokes, Tal August, Robert A Marver, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, Katharina Reinecke:
How Language Formality in Security and Privacy Interfaces Impacts Intended Compliance. CHI 2023: 617:1-617:12 - [c113]Christina Yeung, Umar Iqbal, Tadayoshi Kohno, Franziska Roesner:
Gender Biases in Tone Analysis: A Case Study of a Commercial Wearable. EAAMO 2023: 21:1-21:12 - [c112]Mattea Sim, Kurt Hugenberg, Tadayoshi Kohno, Franziska Roesner:
A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design. NSPW 2023: 102-115 - [c111]Miranda Wei, Pardis Emami Naeini, Franziska Roesner, Tadayoshi Kohno:
Skilled or Gullibleƒ Gender Stereotypes Related to Computer Security and Privacy. SP 2023: 2050-2067 - [c110]Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner:
Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality. USENIX Security Symposium 2023: 911-928 - [c109]Rachel McAmis, Tadayoshi Kohno:
The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate. USENIX Security Symposium 2023: 2169-2186 - [c108]Tadayoshi Kohno, Yasemin Acar, Wulf Loh:
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. USENIX Security Symposium 2023: 5145-5162 - [c107]Christina Yeung, Umar Iqbal, Yekaterina Tsipenyuk O'Neil, Tadayoshi Kohno, Franziska Roesner:
Online Advertising in Ukraine and Russia During the 2022 Russian Invasion. WWW 2023: 2787-2796 - [i35]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Franziska Roesner, Kurt Thomas:
"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment. CoRR abs/2302.08057 (2023) - [i34]Tadayoshi Kohno, Yasemin Acar, Wulf Loh:
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. CoRR abs/2302.14326 (2023) - [i33]Inyoung Cheong, Aylin Caliskan, Tadayoshi Kohno:
Is the U.S. Legal System Ready for AI's Challenges to Human Values? CoRR abs/2308.15906 (2023) - [i32]Rock Yuren Pang, Dan Grossman, Tadayoshi Kohno, Katharina Reinecke:
The Case for Anticipating Undesirable Consequences of Computing Innovations Early, Often, and Across Computer Science. CoRR abs/2309.04456 (2023) - [i31]Umar Iqbal, Tadayoshi Kohno, Franziska Roesner:
LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins. CoRR abs/2309.10254 (2023) - 2022
- [j35]Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas:
Defensive Technology Use During the 2018-2019 Sudanese Revolution. IEEE Secur. Priv. 20(2): 40-48 (2022) - [j34]Tadayoshi Kohno:
Excerpts From the New Dictionary of Cybersecurity, 2036. IEEE Secur. Priv. 20(3): 8 (2022) - [j33]Tadayoshi Kohno:
Mx. President Has a Brain. IEEE Secur. Priv. 20(3): 9-11 (2022) - [j32]Tadayoshi Kohno, Camille Cobb, Ada Lerner, Michelle Lin, Adam Shostack:
The Buffet Overflow Café. IEEE Secur. Priv. 20(4): 4-7 (2022) - [j31]Tadayoshi Kohno:
The Schuhmacher. IEEE Secur. Priv. 20(5): 14-15 (2022) - [j30]Tadayoshi Kohno:
The Our Reality Privacy Policy. IEEE Secur. Priv. 20(6): 4-7 (2022) - [j29]Tadayoshi Kohno:
Welcome to the Latest "Off by One" Column. IEEE Secur. Priv. 20(6): 5 (2022) - [c106]Kentrell Owens, Johanna Gunawan, David R. Choffnes, Pardis Emami Naeini, Tadayoshi Kohno, Franziska Roesner:
Exploring Deceptive Design Patterns in Voice Interfaces. EuroUSEC 2022: 64-78 - [c105]Eric Zeng, Rachel McAmis, Tadayoshi Kohno, Franziska Roesner:
What factors affect targeting and bids in online advertising?: a field measurement study. IMC 2022: 210-229 - [c104]Miranda Wei, Eric Zeng, Tadayoshi Kohno, Franziska Roesner:
Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships. SOUPS @ USENIX Security Symposium 2022: 447-462 - [c103]Kentrell Owens, Anita Alem, Franziska Roesner, Tadayoshi Kohno:
Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives. USENIX Security Symposium 2022: 4077-4094 - [i30]Ashish Hooda, Andrey Labunets, Tadayoshi Kohno, Earlence Fernandes:
Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance. CoRR abs/2212.04107 (2022) - 2021
- [j28]Ivan Evtimov, Pascal Sturmfels, Tadayoshi Kohno:
FoggySight: A Scheme for Facial Lookup Privacy. Proc. Priv. Enhancing Technol. 2021(3): 204-226 (2021) - [j27]Peter Ney, Lee Organick, Jeff Nivala, Luis Ceze, Tadayoshi Kohno:
DNA Sequencing Flow Cells and the Security of the Molecular-Digital Interface. Proc. Priv. Enhancing Technol. 2021(3): 413-432 (2021) - [c102]Lucy Simko, Britnie Chin, Sungmin Na, Harkiran Kaur Saluja, Tian Qi Zhu, Tadayoshi Kohno, Alexis Hiniker, Jason C. Yip, Camille Cobb:
Would You Rather: A Focus Group Method for Eliciting and Discussing Formative Design Insights with Children. IDC 2021: 131-146 - [c101]Eric Zeng, Tadayoshi Kohno, Franziska Roesner:
What Makes a "Bad" Ad? User Perceptions of Problematic Online Advertising. CHI 2021: 361:1-361:24 - [c100]Eric Zeng, Miranda Wei, Theo Gregersen, Tadayoshi Kohno, Franziska Roesner:
Polls, clickbait, and commemorative $2 bills: problematic political advertising on news and media websites around the 2020 U.S. elections. Internet Measurement Conference 2021: 507-525 - [c99]Chunjong Park, Anas Awadalla, Tadayoshi Kohno, Shwetak N. Patel:
Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection. NeurIPS 2021: 3043-3056 - [c98]Pardis Emami Naeini, Tiona Francisco, Tadayoshi Kohno, Franziska Roesner:
Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic. SOUPS @ USENIX Security Symposium 2021: 695-714 - [c97]Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas:
Defensive Technology Use by Political Activists During the Sudanese Revolution. SP 2021: 372-390 - [i29]Pardis Emami Naeini, Tiona Francisco, Tadayoshi Kohno, Franziska Roesner:
Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic. CoRR abs/2106.05227 (2021) - [i28]Ivan Evtimov, Ian Covert, Aditya Kusupati, Tadayoshi Kohno:
Disrupting Model Training with Adversarial Shortcuts. CoRR abs/2106.06654 (2021) - [i27]Chunjong Park, Anas Awadalla, Tadayoshi Kohno, Shwetak N. Patel:
Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection. CoRR abs/2110.14019 (2021) - 2020
- [j26]Justin Chan, Landon P. Cox, Dean P. Foster, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham M. Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Puneet Sharma, Sudheesh Singanamalla, Jacob E. Sunshine, Stefano Tessaro:
PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing. IEEE Data Eng. Bull. 43(2): 15-35 (2020) - [j25]L. Jean Camp, Ryan Henry, Tadayoshi Kohno, Shrirang Mare, Steven A. Myers, Shwetak N. Patel, Joshua Streiff:
Toward a Secure Internet of Things: Directions for Research. IEEE Secur. Priv. 18(4): 28-37 (2020) - [j24]Shrirang Mare, Franziska Roesner, Tadayoshi Kohno:
Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proc. Priv. Enhancing Technol. 2020(2): 436-458 (2020) - [j23]Camille Cobb, Lucy Simko, Tadayoshi Kohno, Alexis Hiniker:
A Privacy-Focused Systematic Analysis of Online Status Indicators. Proc. Priv. Enhancing Technol. 2020(3): 384-403 (2020) - [c96]Camille Cobb, Lucy Simko, Tadayoshi Kohno, Alexis Hiniker:
User Experiences with Online Status Indicators. CHI 2020: 1-12 - [c95]Sudheesh Singanamalla, Esther Han Beol Jang, Richard J. Anderson, Tadayoshi Kohno, Kurtis Heimerl:
Accept the Risk and Continue: Measuring the Long Tail of Government https Adoption. Internet Measurement Conference 2020: 577-597 - [c94]Peter Ney, Luis Ceze, Tadayoshi Kohno:
Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference. NDSS 2020 - [i26]Justin Chan, Dean P. Foster, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham M. Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Sudheesh Singanamalla, Jacob E. Sunshine, Stefano Tessaro:
PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing. CoRR abs/2004.03544 (2020) - [i25]Lucy Simko, Ryan Calo, Franziska Roesner, Tadayoshi Kohno:
COVID-19 Contact Tracing and Privacy: Studying Opinion and Preferences. CoRR abs/2005.06056 (2020) - [i24]Ivan Evtimov, Weidong Cui, Ece Kamar, Emre Kiciman, Tadayoshi Kohno, Jerry Li:
Security and Machine Learning in the Real World. CoRR abs/2007.07205 (2020) - [i23]Kevin Fu, Tadayoshi Kohno, Daniel Lopresti, Elizabeth D. Mynatt, Klara Nahrstedt, Shwetak N. Patel, Debra J. Richardson, Benjamin G. Zorn:
Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things. CoRR abs/2008.00017 (2020) - [i22]Lucy Simko, Jack Lucas Chang, Maggie Jiang, Ryan Calo, Franziska Roesner, Tadayoshi Kohno:
COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion. CoRR abs/2012.01553 (2020) - [i21]Ivan Evtimov, Pascal Sturmfels, Tadayoshi Kohno:
FoggySight: A Scheme for Facial Lookup Privacy. CoRR abs/2012.08588 (2020)
2010 – 2019
- 2019
- [c93]Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Secure Multi-User Content Sharing for Augmented Reality Applications. USENIX Security Symposium 2019: 141-158 - [c92]Kiron Lebeck, Tadayoshi Kohno, Franziska Roesner:
Enabling Multiple Applications to Simultaneously Augment Reality: Challenges and Directions. HotMobile 2019: 81-86 - [c91]Shrirang Mare, Logan Girvin, Franziska Roesner, Tadayoshi Kohno:
Consumer Smart Homes: Where We Are and Where We Need to Go. HotMobile 2019: 117-122 - 2018
- [j22]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Arya: Operating System Support for Securely Augmenting Reality. IEEE Secur. Priv. 16(1): 44-53 (2018) - [j21]Lucy Simko, Luke Zettlemoyer, Tadayoshi Kohno:
Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution. Proc. Priv. Enhancing Technol. 2018(1): 127-144 (2018) - [c90]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, Dawn Song:
Robust Physical-World Attacks on Deep Learning Visual Classification. CVPR 2018: 1625-1634 - [c89]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users. IEEE Symposium on Security and Privacy 2018: 392-408 - [c88]Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, Tadayoshi Kohno:
Computer Security and Privacy for Refugees in the United States. IEEE Symposium on Security and Privacy 2018: 409-423 - [c87]Dawn Song, Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramèr, Atul Prakash, Tadayoshi Kohno:
Physical Adversarial Examples for Object Detectors. WOOT @ USENIX Security Symposium 2018 - [i20]Stefano Baldassi, Tadayoshi Kohno, Franziska Roesner, Moqian Tian:
Challenges and New Directions in Augmented Reality, Computer Security, and Neuroscience - Part 1: Risks to Sensation and Perception. CoRR abs/1806.10557 (2018) - [i19]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramèr, Atul Prakash, Tadayoshi Kohno, Dawn Song:
Physical Adversarial Examples for Object Detectors. CoRR abs/1807.07769 (2018) - [i18]Peter M. Ney, Luis Ceze, Tadayoshi Kohno:
Computer Security Risks of Distant Relative Matching in Consumer Genetic Databases. CoRR abs/1810.02895 (2018) - 2017
- [j20]Rajalakshmi Nandakumar, Alex Takakuwa, Tadayoshi Kohno, Shyamnath Gollakota:
CovertBand: Activity Information Leakage using Music. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(3): 87:1-87:24 (2017) - [j19]Peter Ney, Ian Smith, Gabriel Cadamuro, Tadayoshi Kohno:
SeaGlass: Enabling City-Wide IMSI-Catcher Detection. Proc. Priv. Enhancing Technol. 2017(3): 39 (2017) - [c86]Ada Lerner, Tadayoshi Kohno, Franziska Roesner:
Rewriting History: Changing the Archived Web from the Present. CCS 2017: 1741-1755 - [c85]Genevieve Gebhart, Tadayoshi Kohno:
Internet Censorship in Thailand: User Practices and Potential Threats. EuroS&P 2017: 417-432 - [c84]Anna Kornfeld Simpson, Franziska Roesner, Tadayoshi Kohno:
Securing vulnerable home IoT devices with an in-hub security manager. PerCom Workshops 2017: 551-556 - [c83]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Securing Augmented Reality Output. IEEE Symposium on Security and Privacy 2017: 320-337 - [c82]Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno:
Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More. USENIX Security Symposium 2017: 765-779 - [c81]Paul Vines, Franziska Roesner, Tadayoshi Kohno:
Exploring ADINT: Using Ad Targeting for Surveillance on a Budget - or - How Alice Can Buy Ads to Track Bob. WPES@CCS 2017: 153-164 - [c80]Camille Cobb, Tadayoshi Kohno:
How Public Is My Private Life?: Privacy in Online Dating. WWW 2017: 1231-1240 - [i17]Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, Dawn Song:
Robust Physical-World Attacks on Machine Learning Models. CoRR abs/1707.08945 (2017) - [i16]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Dawn Song, Tadayoshi Kohno, Amir Rahmati, Atul Prakash, Florian Tramèr:
Note on Attacking Object Detectors with Adversarial Stickers. CoRR abs/1712.08062 (2017) - 2016
- [j18]Miro Enev, Alex Takakuwa, Karl Koscher, Tadayoshi Kohno:
Automobile Driver Fingerprinting. Proc. Priv. Enhancing Technol. 2016(1): 34-50 (2016) - [j17]Jane Cleland-Huang, Tamara Denning, Tadayoshi Kohno, Forrest Shull, Samuel Weber:
Keeping Ahead of Our Adversaries. IEEE Softw. 33(3): 24-28 (2016) - [j16]Ada Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner:
Excavating Web Trackers Using Web Archaeology. login Usenix Mag. 41(4) (2016) - [c79]Alexis Hiniker, Sungsoo (Ray) Hong, Tadayoshi Kohno, Julie A. Kientz:
MyTime: Designing and Evaluating an Intervention for Smartphone Non-Use. CHI 2016: 4746-4757 - [c78]Alexis Hiniker, Shwetak N. Patel, Tadayoshi Kohno, Julie A. Kientz:
Why would you do that? predicting the uses and gratifications behind smartphone-usage behaviors. UbiComp 2016: 634-645 - [c77]Camille Cobb, Samuel Sudar, Nicholas Reiter, Richard J. Anderson, Franziska Roesner, Tadayoshi Kohno:
Computer Security for Data Collection Technologies. ICTD 2016: 2 - [c76]Will Scott, Thomas E. Anderson, Tadayoshi Kohno, Arvind Krishnamurthy:
Satellite: Joint Analysis of CDNs and Network-Level Interference. USENIX ATC 2016: 195-208 - [c75]Ada Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner:
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. USENIX Security Symposium 2016 - [c74]Kiron Lebeck, Tadayoshi Kohno, Franziska Roesner:
How to Safely Augment Reality: Challenges and Directions. HotMobile 2016: 45-50 - 2015
- [c73]Emily McReynolds, Adam Lerner, Will Scott, Franziska Roesner, Tadayoshi Kohno:
Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions. Financial Cryptography Workshops 2015: 94-111 - [c72]Tamara Bonaci, Junjie Yan, Jeffrey Herron, Tadayoshi Kohno, Howard Jay Chizeck:
Experimental analysis of denial-of-service attacks on teleoperated robotic systems. ICCPS 2015: 11-20 - [c71]Adam Lerner, Alisha Saxena, Kirk Ouimet, Ben Turley, Anthony Vance, Tadayoshi Kohno, Franziska Roesner:
Analyzing the Use of Quick Response Codes in the Wild. MobiSys 2015: 359-374 - [c70]Haitham Hassanieh, Jue Wang, Dina Katabi, Tadayoshi Kohno:
Securing RFIDs by Randomizing the Modulation and Channel. NSDI 2015: 235-249 - [c69]Karl Koscher, Tadayoshi Kohno, David Molnar:
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems. WOOT 2015 - [c68]Paul Vines, Tadayoshi Kohno:
Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform. WPES@CCS 2015: 75-84 - [i15]