Since GDPR went into effect in 2018, many other data protection and priv...
Privacy in apps is a topic of widespread interest because many apps coll...
Large models support great zero-shot and few-shot capabilities. However,...
Adapting model parameters to incoming streams of data is a crucial facto...
Inspired by recent work on neural subspaces and mode connectivity, we re...
Desktop browser extensions have long allowed users to improve their
expe...
Digital harms can manifest across any interface. Key problems in address...
Tracking is a highly privacy-invasive data collection practice that has ...
Recent exploration of the multi-agent backdoor attack demonstrated the
b...
Malicious agents in collaborative learning and outsourced data collectio...
Attack vectors that compromise machine learning pipelines in the physica...
Third-party tracking, the collection and sharing of behavioural data abo...
Digital harms are widespread in the mobile ecosystem. As these devices g...
As collaborative learning and the outsourcing of data collection become ...
While many studies have looked at privacy properties of the Android and
...
Parental control apps, which are mobile apps that allow parents to monit...
Third-party tracking allows companies to collect users' behavioural data...
Homomorphic encryption, secure multi-party computation, and differential...
The increasingly widespread use of 'smart' devices has raised multifario...
Beyond being the world's largest social network, Facebook is for many al...
Digital devices are widely used by children, and children nowadays are
s...
The age of children adopting digital technologies, such as tablets or
sm...
Many people struggle to control their use of digital devices. However, o...
Children under 11 are often regarded as too young to comprehend the
impl...
Tablet computers are widely used by young children. A report in 2016 sho...
Third party tracking allows companies to identify users and track their
...
Equating users' true needs and desires with behavioural measures of
'eng...
Third-party networks collect vast amounts of data about users via web si...
Data-driven decision-making consequential to individuals raises importan...
The internet has become a central medium through which `networked public...