default search action
Sai Teja Peddinti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2017
- [j3]Sai Teja Peddinti, Keith W. Ross, Justin Cappos:
User Anonymity on Twitter. IEEE Secur. Priv. 15(3): 84-87 (2017) - 2015
- [j2]Sai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane:
Understanding Sensitivity by Analyzing Anonymity [Guest editor's introduction]. IEEE Secur. Priv. 13(2): 14-21 (2015) - 2014
- [j1]Sai Teja Peddinti, Nitesh Saxena:
Web search query privacy: Evaluating query obfuscation and anonymizing networks. J. Comput. Secur. 22(1): 155-199 (2014)
Conference and Workshop Papers
- 2024
- [c18]Maxwell Prybylo, Sara Haghighi, Sai Teja Peddinti, Sepideh Ghanavati:
Evaluating Privacy Perceptions, Experience, and Behavior of Software Development Teams. SOUPS @ USENIX Security Symposium 2024: 101-120 - [c17]Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin:
A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends. USENIX Security Symposium 2024 - 2023
- [c16]Vijayanta Jain, Sepideh Ghanavati, Sai Teja Peddinti, Collin McMillan:
Towards Fine-Grained Localization of Privacy Behaviors. EuroS&P 2023: 258-277 - 2022
- [c15]Preksha Nema, Pauline Anthonysamy, Nina Taft, Sai Teja Peddinti:
Analyzing User Perspectives on Mobile App Privacy at Scale. ICSE 2022: 112-124 - [c14]Hamza Harkous, Sai Teja Peddinti, Rishabh Khandelwal, Animesh Srivastava, Nina Taft:
Hark: A Deep Learning System for Navigating Privacy Feedback at Scale. SP 2022: 2469-2486 - [c13]Vijayanta Jain, Sanonda Datta Gupta, Sepideh Ghanavati, Sai Teja Peddinti, Collin McMillan:
PAcT: Detecting and Classifying Privacy Behavior of Android Applications. WISEC 2022: 104-118 - 2021
- [c12]Vijayanta Jain, Sanonda Datta Gupta, Sepideh Ghanavati, Sai Teja Peddinti:
PriGen: Towards Automated Translation of Android Applications' Code to Privacy Captions. RCIS 2021: 142-151 - [c11]Weicheng Cao, Chunqiu Xia, Sai Teja Peddinti, David Lie, Nina Taft, Lisa M. Austin:
A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions. USENIX Security Symposium 2021: 803-820 - 2019
- [c10]Sai Teja Peddinti, Igor Bilogrevic, Nina Taft, Martin Pelikan, Úlfar Erlingsson, Pauline Anthonysamy, Giles Hogben:
Reducing Permission Requests in Mobile Apps. Internet Measurement Conference 2019: 259-266 - 2017
- [c9]Bram Bonné, Sai Teja Peddinti, Igor Bilogrevic, Nina Taft:
Exploring decision making with Android's runtime permission dialogs using in-context surveys. SOUPS 2017: 195-210 - 2016
- [c8]Sai Teja Peddinti, Keith W. Ross, Justin Cappos:
Finding Sensitive Accounts on Twitter: An Automated Approach Based on Follower Anonymity. ICWSM 2016: 655-658 - 2014
- [c7]Yuan Ding, Sai Teja Peddinti, Keith W. Ross:
Stalking Beijing from Timbuktu: A Generic Measurement Approach for Exploiting Location-Based Social Discovery. SPSM@CCS 2014: 75-80 - [c6]Sai Teja Peddinti, Keith W. Ross, Justin Cappos:
"On the internet, nobody knows you're a dog": a twitter case study of anonymity in social networks. COSN 2014: 83-94 - [c5]Sai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane:
Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity. IEEE Symposium on Security and Privacy 2014: 493-508 - 2011
- [c4]Sai Teja Peddinti, Nitesh Saxena:
On the effectiveness of anonymizing networks for web search privacy. AsiaCCS 2011: 483-489 - [c3]Sai Teja Peddinti, Nitesh Saxena:
On the limitations of query obfuscation techniques for location privacy. UbiComp 2011: 187-196 - [c2]Sai Teja Peddinti, Avis Dsouza, Nitesh Saxena:
Cover locations: availing location-based services without revealing the location. WPES 2011: 143-152 - 2010
- [c1]Sai Teja Peddinti, Nitesh Saxena:
On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot. Privacy Enhancing Technologies 2010: 19-37
Informal and Other Publications
- 2024
- [i7]Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin:
A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends. CoRR abs/2403.02292 (2024) - [i6]Maxwell Prybylo, Sara Haghighi, Sai Teja Peddinti, Sepideh Ghanavati:
Evaluating Privacy Perceptions, Experience, and Behavior of Software Development Teams. CoRR abs/2404.01283 (2024) - [i5]Dinil Mon Divakaran, Sai Teja Peddinti:
LLMs for Cyber Security: New Opportunities. CoRR abs/2404.11338 (2024) - [i4]Stephen Meisenbacher, Alexandra Klymenko, Patrick Gage Kelley, Sai Teja Peddinti, Kurt Thomas, Florian Matthes:
Privacy Risks of General-Purpose AI Systems: A Foundation for Investigating Practitioner Perspectives. CoRR abs/2407.02027 (2024) - 2023
- [i3]Vijayanta Jain, Sanonda Datta Gupta, Sepideh Ghanavati, Sai Teja Peddinti:
PriGen: Towards Automated Translation of Android Applications' Code to Privacy Captions. CoRR abs/2305.06509 (2023) - [i2]Vijayanta Jain, Sepideh Ghanavati, Sai Teja Peddinti, Collin McMillan:
Towards Fine-Grained Localization of Privacy Behaviors. CoRR abs/2305.15314 (2023) - 2017
- [i1]Sai Teja Peddinti, Keith W. Ross, Justin Cappos:
Mining Anonymity: Identifying Sensitive Accounts on Twitter. CoRR abs/1702.00164 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint