publications
publications by categories in reversed chronological order. generated by jekyll-scholar.
2026
2025
- Usenix SECMalicious LLM-Based Conversational AI Makes Users Reveal Personal InformationIn USENIX Security Symposium (SEC), 2025
- CHIPrivacy Perceptions of Custom GPTs by Users and CreatorsIn Proceedings of the Conference on Human Factors in Computing Systems (CHI), 2025
- "Living-Alone Girls’ Lives Matter": Exploring the Security and Safety Perceptions and Practices of Young Women Living Alone in ChinaIn Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2025
2024
- ACCORD: Constraint-driven Mediation of Multi-user Conflicts in Cloud ServicesIn Companion Proceedings of the ACM on Web Conference (WWW), 2024
- CSCWHealthcare Voice AI Assistants: Factors Influencing Trust and Intention to UseIn PACM on Human-Computer Interaction - ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW), 2024
- CSCWPreferences for AI Explanations Based on Cognitive Style and Socio-Cultural FactorsIn PACM on Human-Computer Interaction - ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW), 2024
- CSCWDifferences in the Toxic Language of Cross-Platform CommunitiesIn International AAAI Conference on Web and Social Media (ICWSM), 2024
- CSCWTransformer-Based Quantification of the Echo Chamber Effect in Online CommunitiesIn PACM on Human-Computer Interaction - ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW), 2024
- AAAIMoral Uncertainty and the Problem of FanaticismIn Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), 2024
2023
- TIFSMalProtect: Stateful Defense Against Adversarial Query Attacks in ML-Based Malware DetectionIEEE Transactions on Information Forensics and Security (TIFS), 2023
- COSEStratDef: Strategic defense against adversarial attacks in ML-based malware detectionComputers & Security, 2023
- Investigating the Legality of Bias Mitigation Methods in the United KingdomIEEE Technology and Society Magazine, 2023
- CHILegal Obligation and Ethical Best Practice: Towards Meaningful Verbal Consent for Voice AssistantsIn Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), 2023
- Diverse Migration Journeys and Security Practices: Engaging with Longitudinal Perspectives of Migration and (Digital) SecurityIn Extended Abstracts of the 2023 ACM CHI Conference on Human Factors in Computing Systems, 2023
- Who Are CUIs Really For? Representation and Accessibility in the Conversational User Interface LiteratureIn Proceedings of the 5th ACM International Conference on Conversational User Interfaces (CUI), 2023
- Why Are Conversational Assistants Still Black Boxes? The Case For TransparencyIn Proceedings of the 5th ACM International Conference on Conversational User Interfaces (CUI), 2023
- Misinformation in Third-Party Voice ApplicationsIn Proceedings of the 5th ACM International Conference on Conversational User Interfaces (CUI), 2023
- AI in the Gray: Exploring Moderation Policies in Dialogic Large Language Models vs. Human Answers in Controversial TopicsIn The Conference on Information and Knowledge Management (CIKM), 2023
- Not So Fair: The Impact of Presumably Fair Machine Learning ModelsIn Proceedings of the 2023 AAAI/ACM Conference on AI, Ethics, and Society (AIES), 2023
2022
- CUICan you meaningfully consent in eight seconds? Identifying Ethical Issues with Verbal Consent for Voice AssistantsIn ACM CUI 2022: 4th Conference on Conversational User Interfaces, 2022
- Consent on the Fly: Developing Ethical Verbal Consent for Voice AssistantsIn CHI’22 Workshop on the Ethics of Conversational User Interfaces, 2022
- AAAIIntegrating Quantitative and Qualitative Reasoning for Value AlignmentIn Multi-Agent Systems - 19th European Conference, EUMAS, 2022
- CUILeakage of Sensitive Information to Third-Party Voice ApplicationsIn ACM CUI 2022: 4th Conference on Conversational User Interfaces, 2022
- Supposedly Fair Classification Systems and Their ImpactsIn Proceedings of AIofAI: 2nd Workshop on Adverse Impacts and Collateral Effects of Artificial Intelligence Technologies at IJCAI, 2022
- CSCWIntersectional Experiences of Unfair Treatment Caused by Automated Computational SystemsIn PACM on Human-Computer Interaction - ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW), 2022
- An explainable assistant for multiuser privacyAutonomous Agents and Multi-Agent Systems (JAAMAS), 2022
- WWWMeasuring Alexa Skill Privacy Practices across Three YearsIn Proceedings of the ACM Web Conference (WWW), 2022
2021
- Attesting Digital Discrimination Using NormsInternational Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2021
- CSCWWhen Forcing Collaboration is the Most Sensible Choice: Desirability of Precautionary and Dissuasive Mechanisms to Manage Multiparty Privacy ConflictsIn PACM on Human-Computer Interaction - ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW), 2021
- CSURSmart Home Personal Assistants: A Security and Privacy ReviewACM Computing Surveys (CSUR), 2021
2020
- A Normative approach to Attest Digital DiscriminationIn Advancing Towards the SDGS Artificial Intelligence for a Fair, Just and Equitable World Workshop of the 24th European Conference on Artificial Intelligence (ECAI), 2020
- Agent EXPRI: Licence to ExplainIn Explainable, Transparent Autonomous Agents and Multi-Agent Systems - Second International Workshop, EXTRAAMAS, 2020
- Towards a Value-driven Explainable Agent for Collective PrivacyIn Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, AAMAS, 2020
- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-ModeIn Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, DIMVA, 2020
- Understanding the Role of Values and Norms in Practical ReasoningIn European Conference on Multi-Agent Systems (EUMAS), 2020
- Vision: Why Johnny Can’t Configure Smart Home? A Behavioural Framework for Smart Home Privacy ConfigurationIn EuroUSEC - IEEE European Symposium on Security and Privacy Workshops, EuroS&P, 2020
- Explainable AI for Cultural MindsIn Workshop on Dialogue, Explanation and Argumentation for Human-Agent Interaction , DEXAHAI, 2020
2019
- Understanding security requirements for industrial control system supply chainsIn Proceedings of the 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems, SEsCPS@ICSE 2019, 2019
- Value-driven collaborative privacy decision makingIn Proceedings of the AAAI Symposium on Privacy-Enhancing Artificial Intelligence and Language Technologies (PAL), 2019
- Attesting biases and discrimination using language semanticsIn AAMAS Responsible Artificial Intelligence Agents, 2019
- Digital DiscriminationIn Algorithmic Regulation, 2019
2018
2017
-
- SoSharP: Recommending Sharing Policies in Multiuser Privacy ScenariosIEEE Internet Computing, 2017
- A Privacy Assessment of Social Media AggregatorsIn 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2017
- React: Recommending access control decisions to social media usersIn Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, 2017
- Exploring the viability of tie strength and tags in access controls for photo sharingIn Proceedings of the Symposium on Applied Computing (SAC), 2017
2016
- IJCAISelective Norm Monitoring.In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI), 2016
- TKDEResolving multi-party privacy conflicts in social mediaIEEE Transactions on Knowledge and Data Engineering (TKDE), 2016
- Non-sharing communities? an empirical study of community detection for access control decisionsIn 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2016
- IMPROVE-Identifying Minimal PROfile VEctors for similarity based access controlIn IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom), 2016
- Assured deletion in the cloud: requirements, challenges and future directionsIn Proceedings of the ACM Cloud Computing Security Workshop (CCSW), 2016
- Composite Vulnerabilities in Cyber-Physical SystemsIn International Workshop on Security and Resilience of Cyber-Physical Systems (SERECIN), 2016
- Intelligent Cybersecurity AgentsIEEE Intelligent Systems, 2016
-
2015
- Open Challenges in Relationship-Based Privacy Mechanisms for Social Network ServicesInt. J. Hum. Comput. Interact., 2015
- INS
- Assurance techniques for industrial control systems (ics)In Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015
-
- Towards implicit contextual integrityIn Second International Workshop on Agents and CyberSecurity (ACySE), 2015
- Argumentation for multi-party privacy managementIn Second International Workshop on Agents and CyberSecurity (ACySE), 2015
2014
- BFF: A tool for eliciting tie strength and user communities in social networking servicesInformation Systems Frontiers, 2014
- Strategies for avoiding preference profiling in agent-based e-commerce environmentsApplied intelligence, 2014
- Adaptive conflict resolution mechanism for multi-party privacy management in social mediaIn Proceedings of the 13th Workshop on Privacy in the Electronic Society (WPES), 2014
2013
- Magentix2: A privacy-enhancing agent platformEngineering Applications of Artificial Intelligence, 2013
- Automated buyer profiling control based on human privacy attitudesElectronic Commerce Research and Applications, 2013
- Attacks and vulnerabilities of trust and reputation modelsIn Agreement Technologies, 2013
2012
- Self-disclosure Decision Making based on Intimacy and PrivacyInformation Sciences, 2012
- Enhancing privacy in Multi-agent SystemsAI Communications, 2012
2011
- A Group-oriented Secure Multiagent PlatformSoftware: Practice and Experience, 2011
- Partial Identities as a foundation for Trust and ReputationEngineering Applications of Artificial Intelligence, 2011
- Enhancing Privacy in Multi-agent SystemsDepartament de Sistemes Informàtics i Computació, Universitat Politècnica de València, 2011