An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of ...
This study assessed the value of a cursor pointer that allows remote collaborators to point to locations in a partner’s workspace via a shared video feed. We compared performanc...
Susan R. Fussell, Leslie D. Setlock, Elizabeth M. ...
We identify proximity breach as a privacy threat specific to numerical sensitive attributes in anonymized data publication. Such breach occurs when an adversary concludes with hig...
User privacy in location-based services has attracted great interest in the research community. We introduce a novel framework based on a decentralized architecture for privacy pr...
While previous works on privacy-preserving serial data publishing consider the scenario where sensitive values may persist over multiple data releases, we find that no previous wor...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, K...