Zobrazeno 1 - 10
of 84
pro vyhledávání: '"Kapadia, Apu"'
Voice Assistants (VAs) can assist users in various everyday tasks, but many users are reluctant to rely on VAs for intricate tasks like online shopping. This study aims to examine whether the vocal characteristics of VAs can serve as an effective too
Externí odkaz:
http://arxiv.org/abs/2405.04791
Autor:
Pias, Sabid Bin Habib, Freel, Alicia, Trammel, Timothy, Akter, Taslima, Williamson, Donald, Kapadia, Apu
With the emergence of Artificial Intelligence (AI)-based decision-making, explanations help increase new technology adoption through enhanced trust and reliability. However, our experimental study challenges the notion that every user universally val
Externí odkaz:
http://arxiv.org/abs/2404.19629
In contemporary society, voice-controlled devices, such as smartphones and home assistants, have become pervasive due to their advanced capabilities and functionality. The always-on nature of their microphones offers users the convenience of readily
Externí odkaz:
http://arxiv.org/abs/2309.15087
To protect against misuse of passwords compromised in a breach, consumers should promptly change affected passwords and any similar passwords on other accounts. Ideally, affected companies should strongly encourage this behavior and have mechanisms i
Externí odkaz:
http://arxiv.org/abs/2010.09853
Awareness about security and privacy risks is important for developing good security habits. Learning about real-world security incidents and data breaches can alert people to the ways in which their information is vulnerable online, thus playing a s
Externí odkaz:
http://arxiv.org/abs/2010.09843
Knowing who is in one's vicinity is key to managing privacy in everyday environments, but is challenging for people with visual impairments. Wearable cameras and other sensors may be able to detect such information, but how should this complex visual
Externí odkaz:
http://arxiv.org/abs/1904.06117
We live and work in environments that are inundated with cameras embedded in devices such as phones, tablets, laptops, and monitors. Newer wearable devices like Google Glass, Narrative Clip, and Autographer offer the ability to quietly log our lives
Externí odkaz:
http://arxiv.org/abs/1412.0008
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites. A new strain of sensor malware has been developing that leverag
Externí odkaz:
http://arxiv.org/abs/1209.5982
Autor:
Akavipat, Ruj, Al-Ameen, Mahdi N., Kapadia, Apu, Rahman, Zahid, Schlegel, Roman, Wright, Matthew
Publikováno v:
IEEE TPDS Special Issue on Trust, Security, and Privacy, Feb. 2014, Vol. 5, Issue 2
Distributed Hash Tables (DHTs) such as Chord and Kademlia offer an efficient solution for locating resources in peer-to-peer networks. Unfortunately, malicious nodes along a lookup path can easily subvert such queries. Several systems, including Halo
Externí odkaz:
http://arxiv.org/abs/1209.4867
A multitude of privacy breaches, both accidental and malicious, have prompted users to distrust centralized providers of online social networks (OSNs) and investigate decentralized solutions. We examine the design of a fully decentralized (peer-to-pe
Externí odkaz:
http://arxiv.org/abs/1111.5377