Publications
(In Press). How Great is the Great Firewall? Measuring China's DNS Censorship.
Proceedings of the 30th USENIX Security Symposium.
(In Press). No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning.
Proceedings of 32nd USENIX Security Symposium.
(2023). Bioacoustic Event Detection with Self-Supervised Contrastive Learning.
bioRxiv.
(2023). Cyber and Information Security in the Bioeconomy.
Cyberbiosecurity. 17-36.
(2023). Elephants and Algorithms: A Review of the Current and Future Role of AI in Elephant Monitoring.
arXiv.
(2023). A Mathematical Model of Contextual Integrity.
ICSI Technical Report.
(2022). Balancing Power Dynamics in Smart Homes: Nannies’ Perspectives on How Cameras Reflect and Affect Relationships.
Symposium on Usable Privacy and Security.
(2022). Comparing Distributional and Curated Approaches for Cross-lingual Frame Alignment.
Workshop on Dimensions of Meaning: Distributional and Curated Semantics. 24-30.
(2022). Computation, perception, and mind.
Behavioral and Brain Sciences. 45,
(2022). The Death of Cryptocurrency: The Case for Regulation.
Yale Law School Information Society Project. Digital Future Whitepaper Series,
(2022). Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps.
Proceedings on Privacy Enhancing Technologies. 2022, 250-273.
(2022). A Fast Post-Training Pruning Framework for Transformers.
NeurIPS.
(2022). In-Home Smart Devices: Quantifying Bystander Privacy Experiences and Social Norms in Different Situations.
Symposium on Applications of Contextual Integrity. 4,
(2022). LSAR: Efficient Leverage Score Sampling Algorithm for the Analysis of Big Time Series Data.
Journal of Machine Learning Research. 23, 1-36.
(2022). NoisyMix: Boosting Robustness by Combining Data Augmentations, Stability Training, and Noise Injections.
arXiv.
(2022). Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration.
EuroUSEC. 117-130.
(2022). Runtime Permissions for Privacy in Proactive Intelligent Assistants.
Symposium on Usable Privacy and Security.
(2022). The Sky Above the Clouds: A Berkeley View on the Future of Cloud Computing.
arxiv.org.
(2022). Squeezeformer: An Efficient Transformer for Automatic Speech Recognition.
NeurIPS.
(2022). Users’ Expectations About and Use of Smartphone Privacy and Security Settings.
CHI Conference on Human Factors in Computing Systems.
(2021). Adversarially-Trained Deep Nets Transfer Better: Illustration on Image Classification.
International Conference on Learning Representations.
(2021). An application programming interface for multiscale shape-material modeling.
Advances in Engineering Software. 161,
(2021). Avoiding Disparity Amplification under Different Worldviews.
FAccT '21: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency. 273-283.
(2021). Blind In/On-Path Attacks and Applications to VPNs.
30th USENIX Security Symposium '21. 3129-3146.

]