Ashwini Rao
Ashwini Rao
Eydle Inc.
Verified email at
Cited by
Cited by
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements
TD Breaux, H Hibshi, A Rao
Requirements Engineering 19, 281-307, 2014
Expecting the unexpected: Understanding mismatched privacy expectations online
A Rao, F Schaub, N Sadeh, A Acquisti, R Kang
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 77-96, 2016
What do they know about me? Contents and Concerns of Online Behavioral Profiles
A Rao, F Schaub, N Sadeh
PASSAT 2014: International Conference on Information Privacy, Security, Risk …, 2015
Effect of grammar on security of long passwords
A Rao, B Jha, G Kini
Proceedings of the third ACM conference on Data and application security and …, 2013
Formal analysis of privacy requirements specifications for multi-tier applications
TD Breaux, A Rao
2013 21st IEEE international requirements engineering conference (RE), 14-23, 2013
Privacy and behavioral advertising: Towards meeting users’ preferences
PG Leon, A Rao, F Schaub, A Marsh, LF Cranor, N Sadeh
Symposium on usable privacy and security (SOUPS), 22-24, 2015
Eliminating inter-domain vulnerabilities in cyber-physical systems: An analysis contracts approach
I Ruchkin, A Rao, D De Niz, S Chaki, D Garlan
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and …, 2015
Towards usable privacy policies: Semi-automatically extracting data practices from websites’ privacy policies
N Sadeh, A Acquisti, TD Breaux, LF Cranor, AM McDonald, J Reidenberg, ...
Poster Proceedings, SOUPS, 9-11, 2014
Why people are (un) willing to share information with online advertisers
PG Leon, A Rao, F Schaub, A Marsh, LF Cranor, N Sadeh
Sixth ASE International Conference on Privacy, Security, Risk and Trust, 2015
Smartphone fingerprint authentication versus pins: a usability study
S Karthikeyan, S Feng, A Rao, N Sadeh
ed: Carnegie Mellon University Technical Reports:, 14-012, 2014
Distributed deep learning using volunteer computing-like paradigm
M Atre, B Jha, A Rao
2021 IEEE International Parallel and Distributed Processing Symposium …, 2021
Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models
B Jha, M Atre, A Rao
2022 IEEE 4th International Conference on Trust, Privacy and Security in …, 2022
Less is more? investigating the role of examples in security studies using analogical transfer
A Rao, H Hibshi, T Breaux, JM Lehker, J Niu
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 1-12, 2014
Types of privacy expectations
A Rao, J Pfeffer
Frontiers in big Data 3, 7, 2020
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns
TD Breaux, H Hibshi, A Rao, JM Lehker
2012 Second IEEE International Workshop on Requirements Patterns (RePa), 41-47, 2012
Data siphoning across borders: The role of internet tracking
A Rao, J Pfeffer
2019 First IEEE International Conference on Trust, Privacy and Security in …, 2019
Assessing the impact of data practices on user privacy
A Rao
Technische Universität München, 2018
Managing Risk in Mobile Applications With Formal Security Policies
T Breaux, A Rao
Acquisition Research Program, 2013
Security Implications of Induced Earthquakes
A Rao, B Jha
2016 AGU Fall Meeting, 2016
Security Implications of Induced Earthquakes
B Jha, A Rao
AGU Fall Meeting Abstracts 2016, S31B-2768, 2016
The system can't perform the operation now. Try again later.
Articles 1–20