default search action
Sauvik Das
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Jacob Logas, Poojita Garg, Rosa I. Arriaga, Sauvik Das:
The Subversive AI Acceptance Scale (SAIA-8): A Scale to Measure User Acceptance of AI-Generated, Privacy-Enhancing Image Modifications. Proc. ACM Hum. Comput. Interact. 8(CSCW1): 1-43 (2024) - [c46]Yao Dou, Isadora Krsek, Tarek Naous, Anubha Kabra, Sauvik Das, Alan Ritter, Wei Xu:
Reducing Privacy Risks in Online Self-Disclosures with Language Models. ACL (1) 2024: 13732-13754 - [c45]Zhiping Zhang, Michelle Jia, Hao-Ping (Hank) Lee, Bingsheng Yao, Sauvik Das, Ada Lerner, Dakuo Wang, Tianshi Li:
"It's a Fair Game", or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents. CHI 2024: 156:1-156:26 - [c44]Yaman Yu, Tanusree Sharma, Sauvik Das, Yang Wang:
"Don't put all your eggs in one basket": How Cryptocurrency Users Choose and Secure Their Wallets. CHI 2024: 353:1-353:17 - [c43]Tianshi Li, Sauvik Das, Hao-Ping (Hank) Lee, Dakuo Wang, Bingsheng Yao, Zhiping Zhang:
Human-Centered Privacy Research in the Age of Large Language Models. CHI Extended Abstracts 2024: 581:1-581:4 - [c42]Hao-Ping (Hank) Lee, Yu-Ju Yang, Thomas Serban Von Davier, Jodi Forlizzi, Sauvik Das:
Deepfakes, Phrenology, Surveillance, and More! A Taxonomy of AI Privacy Risks. CHI 2024: 775:1-775:19 - [c41]Isadora Krsek, Shuyang Chen, Sauvik Das, Jason I. Hong, Laura Dabbish:
C.A.L.Y.P.S.O.: Designing Gameplay Features for Improving Player's Cybersecurity Self-Efficacy. CHI PLAY (Companion) 2024: 372-377 - [c40]Ethan Mendes, Yang Chen, James Hays, Sauvik Das, Wei Xu, Alan Ritter:
Granular Privacy Control for Geolocation with Vision Language Models. EMNLP 2024: 17240-17292 - [c39]Ezra Awumey, Sauvik Das, Jodi Forlizzi:
A Systematic Review of Biometric Monitoring in the Workplace: Analyzing Socio-technical Harms in Development, Deployment and Use. FAccT 2024: 920-932 - [c38]Kyzyl Monteiro, Yuchen Wu, Sauvik Das:
Manipulate to Obfuscate: A Privacy-Focused Intelligent Image Manipulation Tool for End-Users. UIST (Adjunct Volume) 2024: 50:1-50:3 - [c37]Hao-Ping (Hank) Lee, Lan Gao, Stephanie S. Yang, Jodi Forlizzi, Sauvik Das:
"I Don't Know If We're Doing Good. I Don't Know If We're Doing Bad": Investigating How Practitioners Scope, Motivate, and Conduct Privacy Work When Developing AI Products. USENIX Security Symposium 2024 - [i7]Tianshi Li, Sauvik Das, Hao-Ping Lee, Dakuo Wang, Bingsheng Yao, Zhiping Zhang:
Human-Centered Privacy Research in the Age of Large Language Models. CoRR abs/2402.01994 (2024) - [i6]Ethan Mendes, Yang Chen, James Hays, Sauvik Das, Wei Xu, Alan Ritter:
Granular Privacy Control for Geolocation with Vision Language Models. CoRR abs/2407.04952 (2024) - 2023
- [j12]Sauvik Das, Hao-Ping (Hank) Lee, Jodi Forlizzi:
Privacy in the Age of AI. Commun. ACM 66(11): 29-31 (2023) - [c36]Yuxi Wu, Sydney Bice, W. Keith Edwards, Sauvik Das:
The Slow Violence of Surveillance Capitalism: How Online Behavioral Advertising Harms People. FAccT 2023: 1826-1837 - [c35]Smirity Kaushik, Natã M. Barbosa, Yaman Yu, Tanusree Sharma, Zachary Kilhoffer, Jooyoung Seo, Sauvik Das, Yang Wang:
GuardLens: Supporting Safer Online Browsing for People with Visual Impairments. SOUPS 2023: 361-380 - [c34]Kyrie Zhixuan Zhou, Tanusree Sharma, Luke Emano, Sauvik Das, Yang Wang:
Iterative Design of An Accessible Crypto Wallet for Blind Users. SOUPS 2023: 381-398 - [c33]Zhuohao (Jerry) Zhang, Smirity Kaushik, Jooyoung Seo, Haolin Yuan, Sauvik Das, Leah Findlater, Danna Gurari, Abigale Stangl, Yang Wang:
ImageAlly: A Human-AI Hybrid Approach to Support Blind People in Detecting and Redacting Private Image Content. SOUPS 2023: 417-436 - [c32]Hao-Ping Hank Lee, Jacob Logas, Stephanie S. Yang, Zhouyu Li, Natã M. Barbosa, Yang Wang, Sauvik Das:
When and Why Do People Want Ad Targeting Explanations? Evidence from a Four-Week, Mixed-Methods Field Study. SP 2023: 2903-2920 - [c31]Youngwook Do, Nivedita Arora, Ali Mirzazadeh, Injoo Moon, Eryue Xu, Zhihan Zhang, Gregory D. Abowd, Sauvik Das:
Powering for Privacy: Improving User Trust in Smart Speaker Microphones with Intentional Powering and Perceptible Assurance. USENIX Security Symposium 2023: 2473-2490 - [i5]Kyrie Zhixuan Zhou, Tanusree Sharma, Luke Emano, Sauvik Das, Yang Wang:
Iterative Design of An Accessible Crypto Wallet for Blind Users. CoRR abs/2306.06261 (2023) - [i4]Zhiping Zhang, Michelle Jia, Hao-Ping Hank Lee, Bingsheng Yao, Sauvik Das, Ada Lerner, Dakuo Wang, Tianshi Li:
"It's a Fair Game", or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents. CoRR abs/2309.11653 (2023) - [i3]Yang Chen, Ethan Mendes, Sauvik Das, Wei Xu, Alan Ritter:
Can Language Models be Instructed to Protect Personal Information? CoRR abs/2310.02224 (2023) - [i2]Hao-Ping Lee, Yu-Ju Yang, Thomas Serban Von Davier, Jodi Forlizzi, Sauvik Das:
Deepfakes, Phrenology, Surveillance, and More! A Taxonomy of AI Privacy Risks. CoRR abs/2310.07879 (2023) - [i1]Yao Dou, Isadora Krsek, Tarek Naous, Anubha Kabra, Sauvik Das, Alan Ritter, Wei Xu:
Reducing Privacy Risks in Online Self-Disclosures with Language Models. CoRR abs/2311.09538 (2023) - 2022
- [j11]Sauvik Das, Cori Faklaris, Jason I. Hong, Laura A. Dabbish:
The Security & Privacy Acceptance Framework (SPAF). Found. Trends Priv. Secur. 5(1-2): 1-143 (2022) - [j10]Jacob Logas, Ari Schlesinger, Zhouyu Li, Sauvik Das:
Image DePO: Towards Gradual Decentralization of Online Social Networks using Decentralized Privacy Overlays. Proc. ACM Hum. Comput. Interact. 6(CSCW1): 60:1-60:28 (2022) - [c30]Yuxi Wu, W. Keith Edwards, Sauvik Das:
"A Reasonable Thing to Ask For": Towards a Unified Voice in Privacy Collective Action. CHI 2022: 32:1-32:17 - [c29]Isadora Krsek, Kimi Wenzel, Sauvik Das, Jason I. Hong, Laura Dabbish:
To Self-Persuade or be Persuaded: Examining Interventions for Users' Privacy Setting Selection. CHI 2022: 623:1-623:17 - [c28]Yuxi Wu, W. Keith Edwards, Sauvik Das:
SoK: Social Cybersecurity. SP 2022: 1863-1879 - [c27]Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das:
"How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams. USENIX Security Symposium 2022: 881-898 - 2021
- [j9]Sauvik Das, W. Keith Edwards, DeBrae Kennedy-Mayo, Peter Swire, Yuxi Wu:
Privacy for the People? Exploring Collective Action as a Mechanism to Shift Power to Consumers in End-User Privacy. IEEE Secur. Priv. 19(5): 66-70 (2021) - [j8]Youngwook Do, Jung Wook Park, Yuxi Wu, Avinandan Basu, Dingtian Zhang, Gregory D. Abowd, Sauvik Das:
Smart Webcam Cover: Exploring the Design of an Intelligent Webcam Cover to Improve Usability and Trust. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(4): 154:1-154:21 (2021) - [j7]Savanthi Murthy, Karthik S. Bhat, Sauvik Das, Neha Kumar:
Individually Vulnerable, Collectively Safe: The Security and Privacy Practices of Households with Older Adults. Proc. ACM Hum. Comput. Interact. 5(CSCW1): 138:1-138:24 (2021) - [j6]Sindhu Kiranmai Ernala, Stephanie S. Yang, Yuxi Wu, Rachel Chen, Kristen Wells, Sauvik Das:
Exploring the Utility Versus Intrusiveness of Dynamic Audience Selection on Facebook. Proc. ACM Hum. Comput. Interact. 5(CSCW2): 342:1-342:30 (2021) - [c26]Youngwook Do, Linh Thai Hoang, Jung Wook Park, Gregory D. Abowd, Sauvik Das:
Spidey Sense: Designing Wrist-Mounted Affective Haptics for Communicating Cybersecurity Warnings. Conference on Designing Interactive Systems 2021: 125-137 - [c25]Zhuohao Zhang, Zhilin Zhang, Haolin Yuan, Natã M. Barbosa, Sauvik Das, Yang Wang:
WebAlly: Making Visual Task-based CAPTCHAs Transferable for People with Visual Impairments. SOUPS @ USENIX Security Symposium 2021: 281-298 - [c24]Youngwook Do, Siddhant Singh, Zhouyu Li, Steven R. Craig, Phoebe J. Welch, Chengzhi Shi, Thad Starner, Gregory D. Abowd, Sauvik Das:
Bit Whisperer: Enabling Ad-hoc, Short-range, Walk-Up-and-Share Data Transmissions via Surface-restricted Acoustics. UIST 2021: 1345-1357 - 2020
- [j5]Jacob Logas, Ruican Zhong, Stephanie Almeida, Sauvik Das:
Tensions between Access and Control in Makerspaces. Proc. ACM Hum. Comput. Interact. 4(CSCW3): 1-33 (2020) - [c23]Hue Watson, Eyitemi Moju-Igbene, Akanksha Kumari, Sauvik Das:
"We Hold Each Other Accountable": Unpacking How Social Groups Approach Cybersecurity and Privacy Together. CHI 2020: 1-12 - [c22]Valerie Fanelle, Sepideh Karimi, Aditi Shah, Bharath Subramanian, Sauvik Das:
Blind and Human: Exploring More Usable Audio CAPTCHA Designs. SOUPS @ USENIX Security Symposium 2020: 111-125
2010 – 2019
- 2019
- [c21]Sauvik Das, Laura A. Dabbish, Jason I. Hong:
A Typology of Perceived Triggers for End-User Security and Privacy Behaviors. SOUPS @ USENIX Security Symposium 2019 - [c20]Sauvik Das, David Lu, Taehoon Lee, Joanne Lo, Jason I. Hong:
The Memory Palace: Exploring Visual-Spatial Paths for Strong, Memorable, Infrequent Authentication. UIST 2019: 1109-1121 - 2018
- [j4]Sauvik Das:
Computer scientists in action: Sauvik Das, usable security & privacy. XRDS 25(1): 61-62 (2018) - [c19]Sauvik Das, Joanne Lo, Laura Dabbish, Jason I. Hong:
Breaking! A Typology of Security and Privacy News and How It's Shared. CHI 2018: 1 - 2017
- [b1]Sauvik Das:
Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior. Carnegie Mellon University, USA, 2017 - [j3]Jason Wiese, Sauvik Das, Jason I. Hong, John Zimmerman:
Evolving the Ecosystem of Personal Behavioral Data. Hum. Comput. Interact. 32(5-6): 447-510 (2017) - [c18]Sauvik Das, Gierad Laput, Chris Harrison, Jason I. Hong:
Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks. CHI 2017: 3764-3774 - 2016
- [j2]Sauvik Das:
Social cybersecurity: Understanding and leveraging social influence to increase security sensitivity. it Inf. Technol. 58(5): 237-245 (2016) - [c17]Haiyi Zhu, Sauvik Das, Yiqun Cao, Shuang Yu, Aniket Kittur, Robert E. Kraut:
A Market in Your Social Network: The Effects of Extrinsic Rewards on Friendsourcing and Relationships. CHI 2016: 598-609 - [c16]Sauvik Das, Jason Wiese, Jason I. Hong:
Epistenet: facilitating programmatic access & processing of semantically related mobile personal data. MobileHCI 2016: 244-253 - [c15]David Lu, Taehoon Lee, Sauvik Das, Jason I. Hong:
Examining Visual-Spatial Paths for Mobile Authentication. WAY@SOUPS 2016 - [c14]Alexander De Luca, Sauvik Das, Martin Ortlieb, Iulia Ion, Ben Laurie:
Expert and Non-Expert Attitudes towards (Secure) Instant Messaging. SOUPS 2016: 147-157 - 2015
- [c13]Sauvik Das, Alexander Zook, Mark O. Riedl:
Examining Game World Topology Personalization. CHI 2015: 3731-3734 - [c12]Sauvik Das, Adam D. I. Kramer, Laura A. Dabbish, Jason I. Hong:
The Role of Social Influence in Security Feature Adoption. CSCW 2015: 1416-1426 - 2014
- [c11]Sauvik Das, Adam D. I. Kramer, Laura A. Dabbish, Jason I. Hong:
Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation. CCS 2014: 739-749 - [c10]Sauvik Das, Tiffany Hyun-Jin Kim, Laura A. Dabbish, Jason I. Hong:
The Effect of Social Influence on Security Sensitivity. SOUPS 2014: 143-157 - 2013
- [c9]Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, Lorrie Faith Cranor:
The post that wasn't: exploring self-censorship on facebook. CSCW 2013: 793-802 - [c8]Sauvik Das, Eiji Hayashi, Jason I. Hong:
Exploring capturable everyday memory for autobiographical authentication. UbiComp 2013: 211-220 - [c7]Sauvik Das, Adam D. I. Kramer:
Self-Censorship on Facebook. ICWSM 2013 - [c6]Eiji Hayashi, Sauvik Das, Shahriyar Amini, Jason I. Hong, Ian Oakley:
CASA: context-aware scalable authentication. SOUPS 2013: 3:1-3:10 - 2012
- [c5]Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, Joy Zhang:
ACCessory: password inference using accelerometers on smartphones. HotMobile 2012: 9 - 2011
- [c4]Ken Hartsook, Alexander Zook, Sauvik Das, Mark O. Riedl:
Toward supporting stories with procedurally generated game worlds. CIG 2011: 297-304 - 2010
- [j1]Pavel Bhowmik, Sauvik Das, Amit Konar, Dolphia Nandi, Aruna Chakraborty:
Emotion clustering from stimulated electroencephalographic signals using a Duffing oscillator. Int. J. Comput. Heal. 1(1): 66-85 (2010) - [c3]Pavel Bhowmik, Sauvik Das, Amit Konar, Swagatam Das, Atulya K. Nagar:
A new differential evolution with improved mutation strategy. IEEE Congress on Evolutionary Computation 2010: 1-8 - [c2]Sauvik Das, Pavel Bhowmik, Anisha Halder, Aruna Chakraborty, Amit Konar, Atulya Nagar:
Emotion Recognition from Facial Expression and Electroencephalographic Signals Using Vector Quantization and Support Vector Machines. IC-AI 2010: 710-715
2000 – 2009
- 2009
- [c1]Sauvik Das, Anisha Halder, Pavel Bhowmik, Aruna Chakraborty, Amit Konar, Ramadoss Janarthanan:
A Support Vector Machine Classifier of Emotion from Voice and Facial Expression Data. NaBIC 2009: 1010-1015
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint