Daniel Smullen
Daniel Smullen
Applied Scientist, Amazon
Verified email at - Homepage
Cited by
Cited by
Maps: Scaling privacy compliance analysis to a million apps
S Zimmeck, P Story, D Smullen, A Ravichander, Z Wang, J Reidenberg, ...
Proceedings on Privacy Enhancing Technologies, 2019
Personalized privacy assistants for the internet of things: Providing users with notice and choice
A Das, M Degeling, D Smullen, N Sadeh
IEEE Pervasive Computing 17 (3), 35-46, 2018
Analyzing privacy policies at scale: From crowdsourcing to automated annotations
S Wilson, F Schaub, ...
ACM Transactions on the Web (TWEB) 13 (1), 1, 2018
Awareness, adoption, and misconceptions of web privacy tools
P Story, D Smullen, Y Yao, A Acquisti, LF Cranor, N Sadeh, F Schaub
Proceedings on Privacy Enhancing Technologies, 2021
The best of both worlds: Mitigating trade-offs between accuracy and user burden in capturing mobile app privacy preferences
D Smullen, Y Feng, SA Zhang, N Sadeh
Proceedings on Privacy Enhancing Technologies, 2020
Natural language processing for mobile app privacy compliance
P Story, S Zimmeck, A Ravichander, D Smullen, Z Wang, J Reidenberg, ...
AAAI spring symposium on privacy-enhancing artificial intelligence and …, 2019
Detecting repurposing and over-collection in multi-party privacy requirements specifications
TD Breaux, D Smullen, H Hibshi
2015 IEEE 23rd international requirements engineering conference (RE), 166-175, 2015
From intent to action: Nudging users towards secure mobile payments
P Story, D Smullen, A Acquisti, LF Cranor, N Sadeh, F Schaub
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 379-415, 2020
Privacy risk in cybersecurity data sharing
J Bhatia, TD Breaux, L Friedberg, H Hibshi, D Smullen
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
Genetic algorithm with self-adaptive mutation controlled by chromosome similarity
D Smullen, J Gillett, J Heron, S Rahnamayan
2014 IEEE Congress on Evolutionary Computation (CEC), 504-511, 2014
Increasing adoption of tor browser using informational and planning nudges
P Story, D Smullen, R Chen, Y Yao, A Acquisti, LF Cranor, N Sadeh, ...
Proceedings on Privacy Enhancing Technologies, 2022
Managing Potentially Intrusive Practices In The Browser: A User Centered Perspective
D Smullen, Y Yao, Y Feng, N Sadeh, A Edelstein, R Weiss
PoPETS, 2021
Modeling, analyzing, and consistency checking privacy requirements using eddy
D Smullen, TD Breaux
Proceedings of the Symposium and Bootcamp on the Science of Security, 118-120, 2016
A Privacy Assistant for the Internet of Things
N Sadeh, M Degeling, A Das, AS Zhang, A Acquisti, L Bauer, L Cranor, ...
13th Symposium on Usable Privacy and Security, 5, 2017
Integrated development environment for debugging policy-based applications in wireless sensor networks
N Qwasmi, D Smullen, R Liscano
Procedia Computer Science 21, 225-233, 2013
Informing the Design and Refinement of Privacy and Security Controls
D Smullen
Carnegie Mellon University, 2022
Apple Services Study
P Story, D Smullen
OSF, 2019
Improving Security in Software Acquisition and Runtime Integration With Data Retention Specifications
D Smullen, T Breaux
Acquisition Research Program, 2016
Towards Rapid Re-Certification Using Formal Analysis
D Smullen, T Breaux
Acquisiton Research Program, 2015
D Smullen, T Breaux
The system can't perform the operation now. Try again later.
Articles 1–20