Yang Wang




Privacy and Security


C. Jackson, Y. Wang. Addressing Privacy Discrepancy through Personalized Notifications. To appear in the Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (Oral presentation at UbiComp2018). [Journal paper]


H. Xia, Y. Wang, Y. Huang, A. Shah. ``Our Privacy Needs To Be Protected At All Costs'': Crowd Workers' Privacy Experiences on Mechanical Turk To appear in the Proceedings of the ACM (PACM): Human-Computer Interaction: Volume 1: Issue 1: Computer-Supported Cooperative Work and Social Computing (Oral presentation at CSCW2018). [Journal paper]


Y. Yao, Y. Huang, Y. Wang. Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders To appear in Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2017). [Conference paper]


Y. Yao, H. Xia, Y. Huang, Y. Wang. Free to Fly in Public Spaces: Drone Controllers' Privacy Perceptions and Practices To appear in Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2017). [Conference paper]


B. Dosono, J. Hayes, Y. Wang. Towards Accessible Authentication: Learning from People with Visual Impairments. IEEE Internet Computing. [Journal paper]


P. Leon, I. Adjerid, R. Balebako, L. Brandimarte, S. Komanduri, F. Schaub, M. Sleeper, Y. Wang, S. Wilson, A. Acquisti, L. Cranor, N. Sadeh. Nudges for Privacy and Security: Understanding and Assisting Users’ Choices Online. ACM Computing Surveys, 2017. [Journal paper]


Y. Huang, C. White, H. Xia, Y. Wang. A Computational Cognitive Modeling Approach to Understand and Design Mobile Crowdsourcing for Campus Safety Reporting. International Journal of Human-Computer Studies (IJHCS), Special Issue on Mobile and Situated Crowdsourcing, 2017. [Journal paper]


Y. Yao, D. Lo Re, Y. Wang. Folk Models of Online Behavioral Advertising. Proceedings of the ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2017). [Conference paper]


B. Dosono, J. Hayes, Y. Wang. "They Should Be Convenient and Strong": Password Perceptions and Practices of Visually Impaired Users. Proceedings of the iConference 2017. [Conference paper]


N. Barbosa, J. Hayes, Y. Wang. UniPass: Design and Evaluation of A Smart Device-Based Password Manager for Visually Impaired Users. Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2016). [Conference paper]


Y. Wang, H. Xia, Yaxing Yao, Y. Huang. Flying Eyes and Hidden Controllers: A Qualitative Study of People's Privacy Perceptions of Civilian Drones in the US. Proceedings on Privacy Enhancing Technologies (PoPETS). 2016 (3):1–19. [Journal paper]


Y. Wang, Y. Li, B. Semaan, J. Tang. Space Collapse: Reinforcing, Reconfiguring and Enhancing Chinese Social Practices through WeChat. Proceedings of AAAI Conference on Web and Social Media ﴾ICWSM 2016﴿. [Conference paper]


Y. Wang, H. Xia, Y. Huang. Examining American and Chinese Internet Users’ Contextual Privacy Preferences of Behavioral Advertising. Proceedings of the ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2016). [Conference paper]


N. Barbosa, Y. Wang. Lessons Learned from Designing and Evaluating Smart Device-based Authentication for Visually Impaired Users. SOUPS2016 Workshop on Who are you?! Adventures in Authentication (WAY2016). [Workshop paper]


B. Dosono, J. Hayes, Y. Wang. "Im Stuck!": A Contextual Inquiry of People with Visual Impairments in Authentication. Proceedings of the Symposium on Usable Privacy and Security (SOUPS2015). [Conference paper]


Y. Huang, C. White, H. Xia, Y. Wang. Modeling Sharing Decision of Campus Safety Reports and Its Design Implications to Mobile Crowdsourcing for Safety. International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI2015). [Conference paper]


Y. Wang, Y. Li, J. Tang. Dwelling and Fleeting Encounters: Exploring Why People Use WeChat - A Mobile Instant Messenger. ACM SIGCHI Conference on Human Factors in Computing Systems (CHI2015). [Work-in-Progress paper]


Y. Wang, P. Leon, A. Acquisti, L.F. Cranor, A. Forget, N. Sadeh. A Field Trial of Privacy Nudges for Facebook. ACM SIGCHI Conference on Human Factors in Computing Systems (CHI2014). [Conference paper]


Y. Wang. Universal Authentication: Towards Accessible Authentication for Everyone. SOUPS2014 Workshop on Who are you?! Adventures in Authentication (WAY2014). [Workshop paper]


Xianyi Gao, Yulong Yang, Huiqing Fu, Janne Lindqvist, Y. Wang. Private Browsing: an Inquiry on Usability and Privacy Protection Workshop on Privacy in the Electronic Society (WPES2014). [Workshop paper]


Y. Wang, Y. Huang, C. Louis. Towards A Framework for Privacy-Aware Mobile Crowdsourcing. ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2013). [Conference paper, acceptance rate: 9.6%]


Y. Wang, Y. Huang, C. Louis. Towards A Framework for Privacy-Aware Mobile Crowdsourcing. ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2013). [Conference paper, acceptance rate: 9.6%]


P.G. Leon, B. Ur, Y. Wang, M. Sleeper, R. Balebako, R. Shay, L. Bauer, M. Christodorescu, L. F. Cranor. What Matters to Users? Factors that Affect Users’ Willingness to Share Information with Online Advertisers. Symposium on Usable Privacy and Security (SOUPS2013). [Conference paper]


Y. Wang, P. G. Leon, K. Scott, X. Chen, A. Acquisti, L. F. Cranor. Privacy Nudges for Social Media: An Exploratory Facebook Study. WWW2013 Workshop on Privacy and Security on Online Social Media (PSOSM2013). [Workhop paper]


B. Ur, Y. Wang. A Cross-Cultural Framework for Protecting User Privacy in Social Media WWW2013 Workshop on Privacy and Security on Online Social Media (PSOSM2013). [Workhop paper]


B. Ur, P. G. Leon, L. F. Cranor, R. Shay, Y. Wang. Smart, Useful, Scary, Creepy: Perceptions of Online Behavioral Advertising Symposium on Usable Privacy and Security (SOUPS2012). [Conference paper, acceptance rate: 25%]


P.G. Leon, B. Ur, R. Shay, Y. Wang, R. Balebako, L.F. Cranor. “Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising International Conference on Human Factors in Computing Systems (CHI2012). [Conference paper, acceptance rate: 23%, Best Paper Honorable Mention, awarded top 5% of accepted papers]


B. Ur, Y. Wang. Online Social Networks in a Post-Soviet State: How Hungarians Protect and Share on Facebook iConference2012. [Conference paper]


Y. Wang, A. Kobsa. A PLA-Based Privacy-Enhancing User Modeling Framework and its Evaluation User Modeling and User-Adapted Interaction (UMUAI). [Journal paper]


Y. Wang, A. Aghasaryan, A. Shrihari, D. Pergament, G. Kamga, S. Betgé-Brezetz. Intelligent Reactive Access Control for Moving Personal Data In Proceedings of the 3rd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2011). [Conference paper, acceptance rate: 8%]


P.G. Leon, B. Ur, R. Balebako, L.F. Cranor, R. Shay and Y. Wang. “Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising CyLab Technical Report CMU-CyLab-11-017.


Y. Wang, S. Komanduri, P.G. Leon, G. Norcie, A. Acquisti, L.F. Cranor. “I regretted the minute I pressed share”: A Qualitative Study of Regrets on Facebook In Proceedings of the 7th Symposium on Usable Privacy and Security (SOUPS2011). [Conference paper, acceptance rate: 33%]


Y. Wang, G. Norcie, L.F. Cranor. Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Networking Sites In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST2011). [Conference paper, acceptance rate: TBA]


E. Toch, Y. Wang, L.F. Cranor. Personalization and Privacy: A Survey of Privacy Risks and Remedies in Personalization-Based Systems To appear in User Modeling and User-Adapted Interaction (UMUAI) 20th Anniversary Special Issue, 2012. [Journal paper]


Y. Wang, A. Kobsa. Privacy in Cross-System Personalization In Proceedings of AAAI Privacy 2010 Symposium (Privacy2010), Palo Alto, CA, 2010.


Y. Wang, A. Kobsa. Performance Evaluation of a Dynamic Privacy-Enhancing Framework for Personalized Websites In Proceedings of the 1st and 17th International Conference on User Modeling, Adaptation, and Personalization (UMAP09), Trento, Italy, pp. 78-89, 2009. [Conference paper, acceptance rate: 26%]


S. A. Hendrickson, Y. Wang, A. van der Hoek, R. N. Taylor, A. Kobsa Modeling PLA Variation of Privacy-Enhancing Personalized Systems In Proceedings of the 13th International Software Product Line Conference (SPLC09), San Francisco, CA, 2009. [Conference paper, acceptance rate: 36%]


A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun and Y. Wang (authors in alphabetical order) Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods In Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS09), Mountain View, CA, pp. 1-12, 2009. [Conference paper, acceptance rate: 30%]


Y. Wang, A. Kobsa. Privacy in Online Social Networking at Workplace In Proceedings of the IEEE SocialCom'09 Workshop on Security and Privacy in Online Social Networking (SPOSN09), Vancouver, Canada, 2009. [Workshop paper]


Y. Wang, A. Kobsa. Technical Solutions for Privacy-Enhanced Personalization In: Constantinos Mourlas and Panagiotis Germanakos, eds.: Intelligent User Interfaces: Adaptation and Personalization Systems and Technologies. Hershey, PA: IGI Global, 2009. [Book chapter]


Y. Wang, A. Kobsa. Privacy Enhancing Technology In: M. Gupta and R. Sharman, eds.: Handbook of Research on Social and Organizational Liabilities in Information Security. Hershey, PA: IGI Global, 2009. [Book chapter]


Y. Wang, A. Kobsa. Respecting Users’ Individual Privacy Constraints in Web Personalization In Proceedings of the 11th International Conference on User Modeling (UM07), Corfu, Greece, pp.157-166 , 2007. [Conference paper, acceptance rate: 20%]


Y. Wang, A. Kobsa., A. van der Hoek, J. White. PLA-based Runtime Dynamism in Support of Privacy-Enhanced Web Personalization In Proceedings of the 10th International Software Product Line Conference (SPLC06), Baltimore, Maryland, USA, pp. 151-162, 2006. [Conference paper, acceptance rate: 32%]


Y. Wang, A. Kobsa. Impacts of Privacy Laws and Regulations on Personalized Systems In Proceedings of the CHI06 Workshop on Privacy-Enhanced Personalization, Montreal, Canada, 2006. [Workshop paper]


Y. Wang, A. Kobsa. A Software Product Line Approach for Handling Privacy Constraints in Web Personalization In Proceedings of the UM05 Workshop on Privacy-Enhanced Personalization, Edinburgh, UK, 2005. [Workshop paper]


Y. Wang Constraint-Sensitive Privacy Management for Personalized Web-based Systems In Proceedings of the 10th International Conference on User Modeling (UM05), Edinburgh, UK, 2005. [Doctoral consortium paper]





Social and Mobile Computing


Y. Huang, S. Huo, Y. Yao, C. Niu, Y. Wang, J. Grygiel, S. Sawyer. Municipal Police Departments on Facebook: What Are They Posting and Are People Engaging? In Proceedings of the 17th International Digital Government Research Conference (dg.o 2016). [Conference paper]


Y. Huang, B. Dobreski, B. Deo, J. Xin, N. Barbosa, Y. Wang, J. Bigham. CAN: Composable Accessibility Infrastructure via Data-Driven Crowdsourcing. In Proceedings of the 12th Web for All Conference (W4A 2015). [Conference paper]


Y. Huang, Y. Tang, Y. Wang. Emotion Map: A Location-Based Mobile Social System for Improving Emotion Awareness and Regulation. In Proceedings of ACM Conf. on Computer-Supported Cooperative Work and Social Computing (CSCW 2015). [Conference paper, acceptance rate: 28%]


Y. Wang, S. Mainwaring. Incentives in the Wild: Leveraging Virtual Currency to Sustain Online Community In Proceedings of iConference 2010, University of Illinois at Urbana-Champaign, USA, 2010. [Conference paper]


S. M. Lindtner, S. Mainwaring, P. Dourish, Y. Wang. Situating Productive Play: Online Gaming Practices and Guanxi in China In Proceedings of the 12th IFIP Conf. Human-Computer Interaction (INTERACT09), Uppsala, Sweden, pp. 328-341, 2009. [Conference paper, acceptance rate: 27%]


S. M. Lindtner, B. Nardi, Y. Wang, S. Mainwaring, J. He, W. Liang. A Hybrid Cultural Ecology: World of Warcraft in China In Proceedings of The 21th International Conference on Computer Supported Cooperative Work (CSCW08), San Diego, USA, pp. 371-382, 2008. [Conference paper, acceptance rate: 23%]


Y. Wang, S. Mainwaring. “Human-Currency Interaction”: Learning from Virtual Currency Use in China In Proceedings of The 26th International Conference on Human Factors in Computing Systems (CHI08), Florence, Italy, pp. 25-28, 2008. [Conference paper, acceptance rate: 18%]


Y. Wang, S. Mainwaring. Ethnography at Play: An Exploratory Case Study of Chinese Users’ Experience in Online Games In Proceedings of the CHI08 Workshop on Evaluating User Experiences in Games, Florence, Italy, 2008. [Workshop paper]


Y. Huang, N. Venkatasubramanian and Y. Wang. MAPGrid: A New Architecture for Empowering Mobile Data Placement in Grid Environments In Proceedings of the IEEE CCGrid07 Workshop on Context-Awareness and Mobility in Grid Computing, Rio de Janeiro, Brazil, 2007. [Workshop paper]


N. M. Su, Y. Wang, G. Mark, T. Aieylokun, T. Nakano. A Bosom Buddy Afar Brings a Distant Land Near: Are Bloggers a Global Community? In Proceedings of The 2nd International Conference on Communities & Technologies (C&T05), Milano, Italy, pp. 171-190, 2005. [Conference paper, acceptance rate: 23%]


N. M. Su, Y. Wang, G. Mark. Politics as Usual in the Blogosphere In Proceedings of Social Intelligence Design: The 4th International Workshop, Stanford, USA, 2005. [Workshop paper]




Last modified: Tuesday, March 15, 2012