What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yaxing Yao
Google Scholar
18
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
"What are they gonna do with my data?": Privacy Expectations, Concerns, and Behaviors in Virtual Reality.
Abhinaya S. B.
Abhishri Agrawal
Yaxing Yao
Yixin Zou
Anupam Das
2025
conf/sp
Teaching Data Science Students to Sketch Privacy Designs Through Heuristics.
Jinhe Wen
Yingxi Zhao
Wenqian Xu
Yaxing Yao
Haojian Jin
2025
conf/sp
Supporting Family Discussions About Digital Privacy Through Perspective-Taking: An Empirical Investigation.
Zikai Wen
Lanjing Liu
Yaxing Yao
2024
journals/popets
Exploring Design Opportunities for Family-Based Privacy Education in Informal Learning Spaces.
Lanjing Liu
Lan Gao
Nikita Soni
Yaxing Yao
2024
conf/uss
Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants.
Yuanyuan Feng
Abhilasha Ravichander
Yaxing Yao
Shikun Zhang
Rex Chen
Shomir Wilson
Norman Sadeh
2024
conf/soups
Well-intended but half-hearted: Hosts' consideration of guests' privacy using smart devices on rental properties.
Sunyup Park
Weijia He
Elmira Deldari
Pardis Emami Naeini
Danny Yuxing Huang
Jessica Vitak
Yaxing Yao
Michael Zimmer
2023
conf/uss
"If sighted people know, I should be able to know: " Privacy Perceptions of Bystanders with Visual Impairments around Camera-based Technology.
Yuhang Zhao
Yaxing Yao
Jiaru Fu
Nihan Zhou
2023
conf/uss
Exploring Tenants' Preferences of Privacy Negotiation in Airbnb.
Zixin Wang
Danny Yuxing Huang
Yaxing Yao
2023
conf/fc
DeFi Auditing: Mechanisms, Effectiveness, and User Perceptions.
Ding Feng
Rupert Hitsch
Kaihua Qin
Arthur Gervais
Roger Wattenhofer
Yaxing Yao
Ye Wang
2023
conf/soups
An Investigation of Teenager Experiences in Social Virtual Reality from Teenagers', Parents', and Bystanders' Perspectives.
Elmira Deldari
Diana Freed
Julio Poveda
Yaxing Yao
2023
conf/eurosp
Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States.
Tu Le
Alan Wang
Yaxing Yao
Yuanyuan Feng
Arsalan Heydarian
Norman M. Sadeh
Yuan Tian
2022
journals/popets
How Usable Are iOS App Privacy Labels?
Shikun Zhang
Yuanyuan Feng
Yaxing Yao
Lorrie Faith Cranor
Norman Sadeh
2022
journals/popets
Increasing Adoption of Tor Browser Using Informational and Planning Nudges.
Peter Story
Daniel Smullen
Rex Chen
Yaxing Yao
Alessandro Acquisti
Lorrie Faith Cranor
Norman M. Sadeh
Florian Schaub
2021
journals/popets
Managing Potentially Intrusive Practices in the Browser: A User-Centered Perspective.
Daniel Smullen
Yaxing Yao
Yuanyuan Feng
Norman M. Sadeh
Arthur Edelstein
Rebecca Weiss
2021
journals/popets
Awareness, Adoption, and Misconceptions of Web Privacy Tools.
Peter Story
Daniel Smullen
Yaxing Yao
Alessandro Acquisti
Lorrie Faith Cranor
Norman M. Sadeh
Florian Schaub
2021
conf/soups
"How I Know For Sure": People's Perspectives on Solely Automated Decision-Making (SADM).
Smirity Kaushik
Yaxing Yao
Pierre Dewitte
Yang Wang
2019
journals/popets
"What if?" Predicting Individual Users' Smart Home Privacy Preferences and Their Changes.
Natã Miccael Barbosa
Joon S. Park
Yaxing Yao
Yang Wang
2016
journals/popets
Flying Eyes and Hidden Controllers: A Qualitative Study of People's Privacy Perceptions of Civilian Drones in The US.
Yang Wang
Huichuan Xia
Yaxing Yao
Yun Huang
Coauthors
Abhilasha Ravichander
(1)
Abhinaya S. B.
(1)
Abhishri Agrawal
(1)
Alan Wang
(1)
Alessandro Acquisti
(2)
Anupam Das
(1)
Arsalan Heydarian
(1)
Arthur Edelstein
(1)
Arthur Gervais
(1)
Daniel Smullen
(3)
Danny Yuxing Huang
(2)
Diana Freed
(1)
Ding Feng
(1)
Elmira Deldari
(2)
Florian Schaub
(2)
Haojian Jin
(1)
Huichuan Xia
(1)
Jessica Vitak
(1)
Jiaru Fu
(1)
Jinhe Wen
(1)
Joon S. Park
(1)
Julio Poveda
(1)
Kaihua Qin
(1)
Lan Gao
(1)
Lanjing Liu
(2)
Lorrie Faith Cranor
(3)
Michael Zimmer
(1)
Natã Miccael Barbosa
(1)
Nihan Zhou
(1)
Nikita Soni
(1)
Norman M. Sadeh
(4)
Norman Sadeh
(2)
Pardis Emami Naeini
(1)
Peter Story
(2)
Pierre Dewitte
(1)
Rebecca Weiss
(1)
Rex Chen
(2)
Roger Wattenhofer
(1)
Rupert Hitsch
(1)
Shikun Zhang
(2)
Shomir Wilson
(1)
Smirity Kaushik
(1)
Sunyup Park
(1)
Tu Le
(1)
Weijia He
(1)
Wenqian Xu
(1)
Yang Wang
(3)
Yaxing Yao
(18)
Ye Wang
(1)
Yingxi Zhao
(1)
Yixin Zou
(1)
Yuan Tian
(1)
Yuanyuan Feng
(4)
Yuhang Zhao
(1)
Yun Huang
(1)
Zikai Wen
(1)
Zixin Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to