Sai Teja Peddinti
Sai Teja Peddinti
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
On the privacy of web search based on query obfuscation: A case study of trackmenot
ST Peddinti, N Saxena
Privacy Enhancing Technologies, 19-37, 2010
912010
"On the Internet, nobody knows you’re a dog": A Twitter Case Study of Anonymity in Social Networks
ST Peddinti, KW Ross, J Cappos
ACM Conference on Online Social Networks, 2014
652014
On the limitations of query obfuscation techniques for location privacy
ST Peddinti, N Saxena
International conference on Ubiquitous computing, 2011
352011
Cover locations: Availing location-based services without revealing the location
ST Peddinti, A Dsouza, N Saxena
Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011
342011
Exploring decision making with Android’s runtime permission dialogs using in-context surveys
B Bonné, ST Peddinti, I Bilogrevic, N Taft
Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017), 195-210, 2017
332017
Cloak and Swagger: Understanding Data Sensitivity Through the Lens of User Anonymity
ST Peddinti, A Korolova, E Bursztein, G Sampemane
2014 IEEE Symposium on Security and Privacy, 493-508, 2014
282014
Stalking beijing from timbuktu: a generic measurement approach for exploiting location-based social discovery
Y Ding, ST Peddinti, KW Ross
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
222014
Web search query privacy: Evaluating query obfuscation and anonymizing networks 1
ST Peddinti, N Saxena
Journal of Computer Security 22 (1), 155-199, 2014
202014
On the effectiveness of anonymizing networks for web search privacy
ST Peddinti, N Saxena
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
142011
Providing a fast, remote security service using hashlists of approved web objects
J Cappos, N Memon, ST Peddinti, K Ross
US Patent 9,246,929, 2016
122016
User anonymity on twitter
ST Peddinti, KW Ross, J Cappos
IEEE Security & Privacy 15 (3), 84-87, 2017
112017
Mining anonymity: identifying sensitive accounts on Twitter
ST Peddinti, KW Ross, J Cappos
arXiv preprint arXiv:1702.00164, 2017
102017
Reducing permission requests in mobile apps
ST Peddinti, I Bilogrevic, N Taft, M Pelikan, Ú Erlingsson, P Anthonysamy, ...
Proceedings of the Internet Measurement Conference, 259-266, 2019
42019
From pilot to practice: creating multipleinput multimedia content for real-world deployment
J Pal, U Pawar, A Joshi, M Jain, SG Thota, P Sai Teja, S Anikar
42008
Finding sensitive accounts on Twitter: an automated approach based on follower anonymity
S Peddinti, K Ross, J Cappos
Proceedings of the International AAAI Conference on Web and Social Media 10 (1), 2016
32016
Perceived Frequency of Advertising Practices
ST Peddinti, A Collins, A Sedley, N Taft, A Turner, A Woodruff
22015
Understanding Sensitivity by Analyzing Anonymity [Guest editor's introduction]
ST Peddinti, A Korolova, E Bursztein, G Sampemane
IEEE Security & Privacy 13 (2), 14-21, 2015
12015
Evaluating privacy, anonymity, and sensitivity by analyzing crowds
ST Peddinti
Polytechnic Institute of New York University, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–18