Sai Teja Peddinti
Sai Teja Peddinti
Verified email at - Homepage
Cited by
Cited by
On the privacy of web search based on query obfuscation: A case study of trackmenot
ST Peddinti, N Saxena
Privacy Enhancing Technologies, 19-37, 2010
"On the Internet, nobody knows you’re a dog": A Twitter Case Study of Anonymity in Social Networks
ST Peddinti, KW Ross, J Cappos
ACM Conference on Online Social Networks, 2014
Exploring decision making with Android’s runtime permission dialogs using in-context surveys
B Bonné, ST Peddinti, I Bilogrevic, N Taft
Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017), 195-210, 2017
On the limitations of query obfuscation techniques for location privacy
ST Peddinti, N Saxena
International conference on Ubiquitous computing, 2011
Cloak and Swagger: Understanding Data Sensitivity Through the Lens of User Anonymity
ST Peddinti, A Korolova, E Bursztein, G Sampemane
2014 IEEE Symposium on Security and Privacy, 493-508, 2014
Cover locations: Availing location-based services without revealing the location
ST Peddinti, A Dsouza, N Saxena
Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011
Stalking Beijing from Timbuktu: A generic measurement approach for exploiting location-based social discovery
Y Ding, ST Peddinti, KW Ross
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
Web search query privacy: Evaluating query obfuscation and anonymizing networks 1
ST Peddinti, N Saxena
Journal of Computer Security 22 (1), 155-199, 2014
On the effectiveness of anonymizing networks for web search privacy
ST Peddinti, N Saxena
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
User anonymity on twitter
ST Peddinti, KW Ross, J Cappos
IEEE Security & Privacy 15 (3), 84-87, 2017
Mining anonymity: identifying sensitive accounts on Twitter
ST Peddinti, KW Ross, J Cappos
arXiv preprint arXiv:1702.00164, 2017
Reducing permission requests in mobile apps
ST Peddinti, I Bilogrevic, N Taft, M Pelikan, Ú Erlingsson, P Anthonysamy, ...
Proceedings of the internet measurement conference, 259-266, 2019
From pilot to practice: creating multipleinput multimedia content for real-world deployment
J Pal, U Pawar, A Joshi, M Jain, SG Thota, P Sai Teja, S Anikar
Finding sensitive accounts on Twitter: an automated approach based on follower anonymity
ST Peddinti, KW Ross, J Cappos
Tenth International AAAI Conference on Web and Social Media, 2016
Perceived Frequency of Advertising Practices
ST Peddinti, A Collins, A Sedley, N Taft, A Turner, A Woodruff
Understanding Sensitivity by Analyzing Anonymity [Guest editor's introduction]
ST Peddinti, A Korolova, E Bursztein, G Sampemane
IEEE Security & Privacy 13 (2), 14-21, 2015
PriGen: Towards Automated Translation of Android Applications' Code to Privacy Captions
V Jain, SD Gupta, S Ghanavati, ST Peddinti
Providing a fast, remote security service using hashlists of approved web objects
J Cappos, N Memon, ST Peddinti, K Ross
US Patent 9,246,929, 2016
Evaluating privacy, anonymity, and sensitivity by analyzing crowds
ST Peddinti
Polytechnic Institute of New York University, 2015
A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions
W Cao, C Xia, ST Peddinti, D Lie, N Taft, LM Austin
The system can't perform the operation now. Try again later.
Articles 1–20