Publications
 
 (In Press).  How Great is the Great Firewall? Measuring China's DNS Censorship.  
Proceedings of the 30th USENIX Security Symposium.  
 
 (In Press).  No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning.  
Proceedings of 32nd USENIX Security Symposium.  
 
 (2023).  Bioacoustic Event Detection with Self-Supervised Contrastive Learning.  
bioRxiv.  
 
 (2023).  Cyber and Information Security in the Bioeconomy.  
Cyberbiosecurity.  17-36.
 
 (2023).  Elephants and Algorithms: A Review of the Current and Future Role of AI in Elephant Monitoring.  
arXiv.  
 
 (2023).  A Mathematical Model of Contextual Integrity.  
ICSI Technical Report.  
 
 (2022).  Balancing Power Dynamics in Smart Homes: Nannies’ Perspectives on How Cameras Reflect and Affect Relationships.  
Symposium on Usable Privacy and Security.  
 
 (2022).  Comparing Distributional and Curated Approaches for Cross-lingual Frame Alignment.  
Workshop on Dimensions of Meaning: Distributional and Curated Semantics.  24-30.
 
 (2022).  Computation, perception, and mind.  
Behavioral and Brain Sciences. 45, 
 
 (2022).  The Death of Cryptocurrency: The Case for Regulation.  
Yale Law School Information Society Project. Digital Future Whitepaper Series, 
 
 (2022).  Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps.  
Proceedings on Privacy Enhancing Technologies. 2022, 250-273.
 
 (2022).  A Fast Post-Training Pruning Framework for Transformers.  
NeurIPS.  
 
 (2022).   In-Home Smart Devices: Quantifying Bystander Privacy Experiences and Social Norms in Different Situations.  
Symposium on Applications of Contextual Integrity. 4, 
 
 (2022).  LSAR: Efficient Leverage Score Sampling Algorithm for the Analysis of Big Time Series Data.  
Journal of Machine Learning Research. 23, 1-36.
 
 (2022).  NoisyMix: Boosting Robustness by Combining Data Augmentations, Stability Training, and Noise Injections.  
arXiv.  
 
 (2022).  Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration.  
EuroUSEC.  117-130.
 
 (2022).  Runtime Permissions for Privacy in Proactive Intelligent Assistants.  
Symposium on Usable Privacy and Security.  
 
 (2022).  The Sky Above the Clouds: A Berkeley View on the Future of Cloud Computing.  
arxiv.org.  
 
 (2022).  Squeezeformer: An Efficient Transformer for Automatic Speech Recognition.  
NeurIPS.  
 
 (2022).  Users’ Expectations About and Use of Smartphone Privacy and Security Settings.  
CHI Conference on Human Factors in Computing Systems.  
 
 (2021).  Adversarially-Trained Deep Nets Transfer Better: Illustration on Image Classification.  
International Conference on Learning Representations.  
 
 (2021).  An application programming interface for multiscale shape-material modeling.  
Advances in Engineering Software. 161, 
 
 (2021).  Avoiding Disparity Amplification under Different Worldviews.  
FAccT '21: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency.  273-283.
 
 (2021).  Blind In/On-Path Attacks and Applications to VPNs.  
30th USENIX Security Symposium '21.  3129-3146.

 ]
]