Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Governing Open Vocabulary Data Leaks Using an Edge LLM through Programming by Example
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 4Article No.: 179, Pages 1–31https://doi.org/10.1145/3699760A major concern with integrating large language model (LLM) services (e.g., ChatGPT) into workplaces is that employees may inadvertently leak sensitive information through their prompts. Since user prompts can involve arbitrary vocabularies, conventional ...
- research-articleNovember 2024
TreeQuestion: Assessing Conceptual Learning Outcomes with LLM-Generated Multiple-Choice Questions
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue CSCW2Article No.: 431, Pages 1–29https://doi.org/10.1145/3686970The advances of generative AI have posed a challenge for using open-ended questions to assess conceptual learning outcomes, as it is increasingly common for students to use tools like ChatGPT to generate long textual answers. However, teachers still have ...
- research-articleOctober 2024
Folk Models of Loot Boxes in Video Games
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue CHI PLAYArticle No.: 307, Pages 1–23https://doi.org/10.1145/3677072Regulations require video games to provide transparency regarding loot box odds to keep players informed, leading many games to disclose probabilities in various ways; yet, the extent of players' comprehension of loot box mechanics remains unclear. We ...
- research-articleMay 2024
Redesigning Privacy with User Feedback: The Case of Zoom Attendee Attention Tracking
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 237, Pages 1–14https://doi.org/10.1145/3613904.3642594Software engineers’ unawareness of user feedback in earlier stages of design contributes to privacy issues in many products. Although extensive research exists on gathering and analyzing user feedback, there is limited understanding about how developers ...
- research-articleMay 2024
On the Feasibility of Predicting Users' Privacy Concerns using Contextual Labels and Personal Preferences
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 792, Pages 1–20https://doi.org/10.1145/3613904.3642500Predicting users’ privacy concerns is challenging due to privacy’s subjective and complex nature. Previous research demonstrated that generic attitudes, such as those captured by Westin’s Privacy Segmentation Index, are inadequate predictors of context-...
-
- research-articleApril 2022
Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 449, Pages 1–19https://doi.org/10.1145/3491102.3517602In this paper, we studied people’s smart home privacy-protective behaviors (SH-PPBs), to gain a better understanding of their privacy management do’s and don’ts in this context. We first surveyed 159 participants and elicited 33 unique SH-PPB practices, ...
- research-articleNovember 2021
Software-defined cooking using a microwave oven
Despite widespread popularity, today's microwave ovens are limited in their cooking capabilities, given that they heat food blindly, resulting in a nonuniform and unpredictable heating distribution. We present software-defined cooking (SDC), a low-cost ...
- research-articleAugust 2021
- research-articleOctober 2020
'I Can't Even Buy Apples If I Don't Use Mobile Pay?': When Mobile Payments Become Infrastructural in China
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 4, Issue CSCW2Article No.: 170, Pages 1–26https://doi.org/10.1145/3415241Despite slow adoption in the US, mobile payments are thede facto solution for hundreds of millions of users in China for everything from paying bills to riding buses, from sending virtual "Red Packets'' to buying money-market funds. In this paper, we use ...
- research-articleOctober 2020
Designing Alternative Representations of Confusion Matrices to Support Non-Expert Public Understanding of Algorithm Performance
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 4, Issue CSCW2Article No.: 153, Pages 1–22https://doi.org/10.1145/3415224Ensuring effective public understanding of algorithmic decisions that are powered by machine learning techniques has become an urgent task with the increasing deployment of AI systems into our society. In this work, we present a concrete step toward this ...
- research-articleSeptember 2020
Providing architectural support for building privacy-sensitive smart home applications
UbiComp/ISWC '20 Adjunct: Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable ComputersPages 212–217https://doi.org/10.1145/3410530.3414328In this thesis, we plan to introduce a new IoT app development framework named Peekaboo, which aims to make it much easier for developers to get the granularity of data they actually need rather than always requesting raw data, while also offering ...
- research-articleMay 2020
Software-Defined Cooking Using a Microwave Oven
GetMobile: Mobile Computing and Communications (SIGMOBILE-GETMOBILE), Volume 23, Issue 4Pages 21–24https://doi.org/10.1145/3400713.3400718Since their introduction to the consumer market in the 1970s, microwaves have seen widespread adoption and, today, they are the third most popular domestic food heating method (after baking and grilling). Indeed, the original patents for the microwave ...
- research-articleSeptember 2020
RFID Tattoo: A Wireless Platform for Speech Recognition
- Jingxian Wang,
- Chengfeng Pan,
- Haojian Jin,
- Vaibhav Singh,
- Yash Jain,
- Jason I. Hong,
- Carmel Majidi,
- Swarun Kumar
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 3, Issue 4Article No.: 155, Pages 1–24https://doi.org/10.1145/3369812This paper presents an RF-based assistive technology for voice impairments (i.e., dysphonia), which occurs in an estimated 1% of the global population. We specifically focus on acquired voice disorders where users continue to be able to make facial and ...
- research-articleOctober 2019
Sozu: Self-Powered Radio Tags for Building-Scale Activity Sensing
UIST '19: Proceedings of the 32nd Annual ACM Symposium on User Interface Software and TechnologyPages 973–985https://doi.org/10.1145/3332165.3347952Robust, wide-area sensing of human environments has been a long-standing research goal. We present Sozu, a new low-cost sensing system that can detect a wide range of events wirelessly, through walls and without line of sight, at whole-building scale. ...
- research-articleOctober 2019
Software-Defined Cooking using a Microwave Oven
MobiCom '19: The 25th Annual International Conference on Mobile Computing and NetworkingArticle No.: 40, Pages 1–16https://doi.org/10.1145/3300061.3345441Despite widespread popularity, today's microwave ovens are limited in their cooking capabilities, given that they heat food blindly, resulting in a non-uniform and unpredictable heating distribution. We present SDC (software-defined cooking), a low-cost ...
- demonstrationOctober 2019
Software-Defined Cooking (SDC) using a Microwave Oven
MobiCom '19: The 25th Annual International Conference on Mobile Computing and NetworkingArticle No.: 64, Pages 1–3https://doi.org/10.1145/3300061.3343368We present a demonstration of SDC, a low-cost closed-loop microwave oven system that aims to heat the food in a software-defined thermal trajectory. SDC achieves this through a novel high-resolution heat sensing and actuation system that uses microwave-...
- ArticleFebruary 2019
Pushing the range limits of commercial passive RFIDs
NSDI'19: Proceedings of the 16th USENIX Conference on Networked Systems Design and ImplementationPages 301–315This paper asks: "Can we push the prevailing range limits of commercial passive RFIDs?". Today's commercial passive RFIDs report ranges of 5-15 meters at best. This constrains RFIDs to be detected only at specific checkpoints in warehouses, stores and ...
- research-articleDecember 2018
Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps
- Haojian Jin,
- Minyi Liu,
- Kevan Dodhia,
- Yuanchun Li,
- Gaurav Srivastava,
- Matthew Fredrikson,
- Yuvraj Agarwal,
- Jason I. Hong
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 2, Issue 4Article No.: 173, Pages 1–27https://doi.org/10.1145/3287051Many smartphone apps collect potentially sensitive personal data and send it to cloud servers. However, most mobile users have a poor understanding of why their data is being collected. We present MobiPurpose, a novel technique that can take a network ...
- demonstrationOctober 2018
RF-Wear: Towards Wearable Everyday Skeleton Tracking Using Passive RFIDs
UbiComp '18: Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable ComputersPages 369–372https://doi.org/10.1145/3267305.3267567We introduce RF-Wear1, a low-cost, washable and wearable solution to track movements of a user's body using passive RFIDs embedded in their clothing. RF-Wear processes wireless signals reflected off these tags to a compact single-antenna RFID reader in ...
- research-articleJune 2018
WiSh: Towards a Wireless Shape-aware World using Passive RFIDs
MobiSys '18: Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and ServicesPages 428–441https://doi.org/10.1145/3210240.3210328This paper presents WiSh, a solution that makes ordinary surfaces shape-aware, relaying their real-time geometry directly to a user's handheld device. WiSh achieves this using inexpensive, light-weight and battery-free RFID tags attached to these ...