Follow
Sruti Bhagavatula
Sruti Bhagavatula
Verified email at northwestern.edu - Homepage
Title
Cited by
Cited by
Year
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
M Sharif, S Bhagavatula, L Bauer, MK Reiter
Proceedings of the 2016 acm sigsac conference on computer and communications …, 2016
19752016
Privacy expectations and preferences in an {IoT} world
PE Naeini, S Bhagavatula, H Habib, M Degeling, L Bauer, LF Cranor, ...
Thirteenth symposium on usable privacy and security (SOUPS 2017), 399-412, 2017
3832017
A general framework for adversarial examples with objectives
M Sharif, S Bhagavatula, L Bauer, MK Reiter
ACM Transactions on Privacy and Security (TOPS) 22 (3), 1-30, 2019
2182019
Adversarial generative nets: Neural network attacks on state-of-the-art face recognition
M Sharif, S Bhagavatula, L Bauer, MK Reiter
arXiv preprint arXiv:1801.00349 2 (3), 139, 2017
1142017
Towards privacy-aware smart buildings: Capturing, communicating, and enforcing privacy policies and preferences
P Pappachan, M Degeling, R Yus, A Das, S Bhagavatula, W Melicher, ...
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
892017
Leveraging machine learning to improve unwanted resource filtering
S Bhagavatula, C Dunn, C Kanich, M Gupta, B Ziebart
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
622014
“I would have to evaluate their objections”: Privacy tensions between smart home device owners and incidental users
C Cobb, S Bhagavatula, KA Garrett, A Hoffman, V Rao, L Bauer
Proceedings on Privacy Enhancing Technologies, 2021
582021
Comparing hypothetical and realistic privacy valuations
J Tan, M Sharif, S Bhagavatula, M Beckerle, ML Mazurek, L Bauer
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 168-182, 2018
162018
" Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social Media
S Bhagavatula, L Bauer, A Kapadia
Proceedings of the ACM on Human-Computer Interaction 6 (CSCW2), 1-27, 2022
142022
(How) Do people change their passwords after a breach?
S Bhagavatula, L Bauer, A Kapadia
arXiv preprint arXiv:2010.09853, 2020
142020
What breach? Measuring online awareness of security incidents by studying real-world browsing behavior
S Bhagavatula, L Bauer, A Kapadia
Proceedings of the 2021 European Symposium on Usable Security, 180-199, 2021
102021
By the user, for the user: A user-centric approach to quantifying the privacy of websites
M Chairani, M Chevalley, A Lazraq, S Bhagavatula
arXiv preprint arXiv:1911.05798, 2019
32019
Privacy Expectations and Preferences in an IoT World
N PEmami, S Bhagavatula, H Habib, M Degeling, L Bauer, C LFaith, ...
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 2017
22017
Measuring and increasing the reach of security information through online media
S Bhagavatula
Carnegie Mellon University, 2021
2021
2021 Theses by Author
A AFZAL, S BHAGAVATULA, H HABIB, C KINNEER, D SMULLEN, ...
CMU-ISR-21-106 Measuring and increasing the reach of security information through online media
S Bhagavatula
The system can't perform the operation now. Try again later.
Articles 1–16