Yang Wang



Google Scholar



Privacy and Security


*T. Sharma, L. Kyi, Y. Wang, A. Biega. ``I'm not convinced that they don't collect more than is necessary'': User-Controlled Data Minimization Design in Search Engines. Proceedings of the USENIX Security Symposium (USENIX Security2024). [Conference paper]


*Y. Yu, T. Sharma, S. Das, Y. Wang. ``Don't put all your eggs in one basket'': How Cryptocurrency Users Choose and Secure Their Wallets. Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2024). [Conference paper]


*T. Sharma, V. Nair, H. Wang, Y. Wang, D. Song. ``I Can't Believe It's Not Custodial!'': Usable Trustless Decentralized Key Management. Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2024). [Conference paper]


Z. Yu, H. Namkung, J. Guo, H. Milner, J. Goldfoot, Y. Wang, V. Sekar. SEAM-EZ: Simplifying Stateful Analytics through Visual Programming. Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2024). [Conference paper]


L. Zhang, A. Stangl, T. Sharma, Y. Tseng, I. Xu, D. Gurari, Y. Wang, L. Findlater. Designing Accessible Obfuscation Support for Blind Individuals' Visual Privacy Management. Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2024). [Conference paper]


N. Bosch, A. Chan, J. Davis, R. Gutiérrez, J. He, K. Karahalios, S. Koyejo, M. Loui, R. Mendenhall, M. Sanfilippo, H. Tong, L. Varshney, Y. Wang. Artificial Intelligence, Social Responsibility, and the Roles of the University. To appear in the Communications of the ACM (2024). [Journal paper]


T. Sharma, Y. Kwon, K. Pongmala, H. Wang, A. Miller, D. Song, Y. Wang. Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice. To appear in Proceedings of IEEE International Conference on Blockchain and Cryptocurrency (ICBC2024). [Conference paper]


T. Sharma, Z. Zhou, A. Miller, Y. Wang. A Mixed-Methods Study of Security Practices of Smart Contract Developers. Proceedings of the USENIX Security Symposium (USENIX Security2023). [Conference paper]


Z. Zhou, T. Sharma, L. Emano, S. Das, Y. Wang. Iterative Design of An Accessible Crypto Wallet for Blind Users. Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2023. [Conference paper]


Z. Zhang, S. Kaushik, J. Seo, H. Yuan, S. Das, L. Findlater, D. Gurari, A. Stangl, Y. Wang. ImageAlly: A Human-AI Hybrid Approach to Support Blind People in Detecting and Redacting Private Image Content. Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2023. [Conference paper]


S. Kaushik, N. Barbosa, Y. Yu, T. Sharma, Z. Kilhoffer, J. Seo, S. Das, Y. Wang. GuardLens: Supporting Safer Online Browsing for People with Visual Impairments. Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2023. [Conference paper]


T. Sharma, A. Stangl, L. Zhang, Y. Tseng, I. Xu, L. Findlater, D. Gurari, Y. Wang. Disability-First Design and Creation of A Dataset Showing Private Visual Information Collected With People Who Are Blind. To appear in the ACM Conference on Human Factors in Computer Systems (CHI2023). [Conference paper]


T. Sharma, S. Kaushik, Y. Yu, I. Ahmed, Y. Wang. User Perceptions and Experiences of Targeted Ads on Social Media Platforms: Learning from Bangladesh and India. To appear in the ACM Conference on Human Factors in Computer Systems (CHI2023). [Conference paper]


Z. Kilhoffer, Z. Zhou, F. Wang, F. Tamton, Y. Huang, P. Kim, Tom Yeh, Y. Wang. ``How technical do you get? I'm an English teacher'': Teaching and Learning Cybersecurity and AI Ethics in High School. To appear in the IEEE Symposium on Security and Privacy (S&P2023). [Conference paper]


Y. Yu, S. Ashok, S. Kaushik, Y. Wang, G. Wang. Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments. To appear in the IEEE Symposium on Security and Privacy (S&P2023). [Conference paper]


H.P. Lee, J. Logas, S. Yang, Z. Li, N. Barbosa, Y. Wang, S. Das. When and Why Do People Want Ad Targeting Explanations? Evidence from a Four-Week, Mixed-Methods Field Study. To appear in the IEEE Symposium on Security and Privacy (S&P2023). [Conference paper]


M. Ashraf, G. Patterson, Z. Kilhoffer, X. Han, N. Brady, A. Rahn, N. Atluri, V. Oliver, Y. Huang, Y. Wang, P. Kim, T. Yeh. Using fNIRS To Understand Adults' Empathy for Children in AI and Cybersecurity Scenarios. Proceedings of the ACM Interaction Design and Children Conference (IDC2023). [Conference paper]


A. Stangl, E. Sadjo, P. Emami-Naeini, Y. Wang, D. Gurari, L. Findlater. Blind People's Expectations for Visual Privacy in Visual Assistance Technologies. Proceedings of the International Web for All Conference (W4A2023). [Conference paper]


T. Sharma, Z. Zhou, Y. Huang, Y. Wang. "It's A Blessing and A Curse": Unpacking Creators' Practices with Non-Fungible Tokens (NFTs) and Their Communities. To appear in Crypto Economics Security Conference (CESC2022).


N. Barbosa, J. Hayes, S. Kaushik, Y. Wang. ``Every Website Is A Puzzle!'': Facilitating Access to Common Website Features for People with Visual Impairments. To appear in ACM Transactions on Accessible Computing (TACCESS). [Journal paper]


J. Mink, L. Luo, N. Barbosa, O. Figueira, Y. Wang, G. Wang. DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks. Proceedings of the 31th USENIX Security Symposium (USENIX Security2022). [Conference paper]


Y. Wang and C. Price. Accessible Privacy. In ``Modern Socio-Technical Perspectives on Privacy'' Edited by Knijnenburg et al. Springer (2022) [Book chapter].


N. Barbosa, G. Wang, B. Ur, Y. Wang. Who Am I? A Design Probe Exploring Real-Time Transparency About Online and Offline User Profiling Underlying Targeted Ads. The Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). Oral presentation at UbiComp2021 [Journal paper]


H. Hu, S. Jan, Y. Wang, G. Wang. Assessing Browser-Level Defense against IDN-Based Phishing. Proceedings of the 30th USENIX Security Symposium (USENIX Security2021). [Conference paper]


Z. Zhang, Z. Zhang, H. Yuan, N. Barbosa, S. Das, Y. Wang. WebAlly: Making Visual Task-based CAPTCHAs Transferable for People with Visual Impairments. Proceedings of the Symposium on Usable Privacy and Security (SOUPS2021). [Conference paper]


S. Kaushik, Y. Yao, P. Dewitte, Y. Wang. ``How I Know For Sure'': People's Perspectives on Solely Automated Decision-Making (SADM). Proceedings of the Symposium on Usable Privacy and Security (SOUPS2021). [Conference paper, IAPP SOUPS Privacy Award]


N. Barbosa, Z. Zhang, Y. Wang. Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption. Proceedings of the Symposium on Usable Privacy and Security (SOUPS2020). [Conference paper]


J. Hayes, S. Kaushik, C. Price, Y. Wang. Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies. Proceedings of the Symposium on Usable Privacy and Security (SOUPS2019). [Conference paper, IAPP SOUPS Privacy Award]


Y. Yao, J. Basdeo, O. McDonough, Y. Wang. Privacy Perceptions and Designs of Bystanders in Smart Homes. To appear in the Proceedings of the ACM (PACM): Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW2019). [Journal paper]


N. Barbosa, Y. Yao, J. Park, Y. Wang. ``What if?'' Predicting Individual Users' Smart Home Privacy Preferences and Their Changes. To appear in Proceedings on Privacy Enhancing Technologies (PETS2019). [Journal paper]


Y. Yao, S. Kaushik, J. Basdeo, Y. Wang. Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes. To appear in Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2019). [Conference paper]


Y. Yao, Y. Huang, Y. Wang. Unpacking People's Understandings of Bluetooth Beacon Systems - A Location-Based IoT Technology. To appear in Proceedings of the Hawaii International Conference on System Sciences (HICSS2019). [Conference paper, best paper nomination]


C. Jackson, Y. Wang. Addressing Privacy Discrepancy through Personalized Notifications. To appear in the Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (Oral presentation at UbiComp2018). [Journal paper]


H. Xia, Y. Wang, Y. Huang, A. Shah. ``Our Privacy Needs To Be Protected At All Costs'': Crowd Workers' Privacy Experiences on Mechanical Turk To appear in the Proceedings of the ACM (PACM): Human-Computer Interaction: Volume 1: Issue 1: Computer-Supported Cooperative Work and Social Computing (Oral presentation at CSCW2018). [Journal paper]


Y. Yao, Y. Huang, Y. Wang. Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders To appear in Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2017). [Conference paper]


Y. Yao, H. Xia, Y. Huang, Y. Wang. Free to Fly in Public Spaces: Drone Controllers' Privacy Perceptions and Practices To appear in Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2017). [Conference paper]


B. Dosono, J. Hayes, Y. Wang. Towards Accessible Authentication: Learning from People with Visual Impairments. IEEE Internet Computing. [Journal paper]


P. Leon, I. Adjerid, R. Balebako, L. Brandimarte, S. Komanduri, F. Schaub, M. Sleeper, Y. Wang, S. Wilson, A. Acquisti, L. Cranor, N. Sadeh. Nudges for Privacy and Security: Understanding and Assisting Users’ Choices Online. ACM Computing Surveys, 2017. [Journal paper]


Y. Huang, C. White, H. Xia, Y. Wang. A Computational Cognitive Modeling Approach to Understand and Design Mobile Crowdsourcing for Campus Safety Reporting. International Journal of Human-Computer Studies (IJHCS), Special Issue on Mobile and Situated Crowdsourcing, 2017. [Journal paper]


Y. Yao, D. Lo Re, Y. Wang. Folk Models of Online Behavioral Advertising. Proceedings of the ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2017). [Conference paper]


B. Dosono, J. Hayes, Y. Wang. "They Should Be Convenient and Strong": Password Perceptions and Practices of Visually Impaired Users. Proceedings of the iConference 2017. [Conference paper]


N. Barbosa, J. Hayes, Y. Wang. UniPass: Design and Evaluation of A Smart Device-Based Password Manager for Visually Impaired Users. Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2016). [Conference paper]


Y. Wang, H. Xia, Yaxing Yao, Y. Huang. Flying Eyes and Hidden Controllers: A Qualitative Study of People's Privacy Perceptions of Civilian Drones in the US. Proceedings on Privacy Enhancing Technologies (PoPETS). 2016 (3):1–19. [Journal paper]


Y. Wang, Y. Li, B. Semaan, J. Tang. Space Collapse: Reinforcing, Reconfiguring and Enhancing Chinese Social Practices through WeChat. Proceedings of AAAI Conference on Web and Social Media ﴾ICWSM 2016﴿. [Conference paper]


Y. Wang, H. Xia, Y. Huang. Examining American and Chinese Internet Users’ Contextual Privacy Preferences of Behavioral Advertising. Proceedings of the ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2016). [Conference paper]


N. Barbosa, Y. Wang. Lessons Learned from Designing and Evaluating Smart Device-based Authentication for Visually Impaired Users. SOUPS2016 Workshop on Who are you?! Adventures in Authentication (WAY2016). [Workshop paper]


B. Dosono, J. Hayes, Y. Wang. "Im Stuck!": A Contextual Inquiry of People with Visual Impairments in Authentication. Proceedings of the Symposium on Usable Privacy and Security (SOUPS2015). [Conference paper]


Y. Huang, C. White, H. Xia, Y. Wang. Modeling Sharing Decision of Campus Safety Reports and Its Design Implications to Mobile Crowdsourcing for Safety. International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI2015). [Conference paper]


Y. Wang, Y. Li, J. Tang. Dwelling and Fleeting Encounters: Exploring Why People Use WeChat - A Mobile Instant Messenger. ACM SIGCHI Conference on Human Factors in Computing Systems (CHI2015). [Work-in-Progress paper]


Y. Wang, P. Leon, A. Acquisti, L.F. Cranor, A. Forget, N. Sadeh. A Field Trial of Privacy Nudges for Facebook. ACM SIGCHI Conference on Human Factors in Computing Systems (CHI2014). [Conference paper]


Y. Wang. Universal Authentication: Towards Accessible Authentication for Everyone. SOUPS2014 Workshop on Who are you?! Adventures in Authentication (WAY2014). [Workshop paper]


Xianyi Gao, Yulong Yang, Huiqing Fu, Janne Lindqvist, Y. Wang. Private Browsing: an Inquiry on Usability and Privacy Protection Workshop on Privacy in the Electronic Society (WPES2014). [Workshop paper]


Y. Wang, Y. Huang, C. Louis. Towards A Framework for Privacy-Aware Mobile Crowdsourcing. ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2013). [Conference paper, acceptance rate: 9.6%]


Y. Wang, Y. Huang, C. Louis. Towards A Framework for Privacy-Aware Mobile Crowdsourcing. ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2013). [Conference paper, acceptance rate: 9.6%]


P.G. Leon, B. Ur, Y. Wang, M. Sleeper, R. Balebako, R. Shay, L. Bauer, M. Christodorescu, L. F. Cranor. What Matters to Users? Factors that Affect Users’ Willingness to Share Information with Online Advertisers. Symposium on Usable Privacy and Security (SOUPS2013). [Conference paper]


Y. Wang, P. G. Leon, K. Scott, X. Chen, A. Acquisti, L. F. Cranor. Privacy Nudges for Social Media: An Exploratory Facebook Study. WWW2013 Workshop on Privacy and Security on Online Social Media (PSOSM2013). [Workhop paper]


B. Ur, Y. Wang. A Cross-Cultural Framework for Protecting User Privacy in Social Media WWW2013 Workshop on Privacy and Security on Online Social Media (PSOSM2013). [Workhop paper]


B. Ur, P. G. Leon, L. F. Cranor, R. Shay, Y. Wang. Smart, Useful, Scary, Creepy: Perceptions of Online Behavioral Advertising Symposium on Usable Privacy and Security (SOUPS2012). [Conference paper, acceptance rate: 25%]


P.G. Leon, B. Ur, R. Shay, Y. Wang, R. Balebako, L.F. Cranor. “Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising International Conference on Human Factors in Computing Systems (CHI2012). [Conference paper, acceptance rate: 23%, Best Paper Honorable Mention, awarded top 5% of accepted papers]


B. Ur, Y. Wang. Online Social Networks in a Post-Soviet State: How Hungarians Protect and Share on Facebook iConference2012. [Conference paper]


Y. Wang, A. Kobsa. A PLA-Based Privacy-Enhancing User Modeling Framework and its Evaluation User Modeling and User-Adapted Interaction (UMUAI). [Journal paper]


Y. Wang, A. Aghasaryan, A. Shrihari, D. Pergament, G. Kamga, S. Betgé-Brezetz. Intelligent Reactive Access Control for Moving Personal Data In Proceedings of the 3rd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2011). [Conference paper, acceptance rate: 8%]


P.G. Leon, B. Ur, R. Balebako, L.F. Cranor, R. Shay and Y. Wang. “Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising CyLab Technical Report CMU-CyLab-11-017.


Y. Wang, S. Komanduri, P.G. Leon, G. Norcie, A. Acquisti, L.F. Cranor. “I regretted the minute I pressed share”: A Qualitative Study of Regrets on Facebook In Proceedings of the 7th Symposium on Usable Privacy and Security (SOUPS2011). [Conference paper, acceptance rate: 33%]


Y. Wang, G. Norcie, L.F. Cranor. Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Networking Sites In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST2011). [Conference paper, acceptance rate: TBA]


E. Toch, Y. Wang, L.F. Cranor. Personalization and Privacy: A Survey of Privacy Risks and Remedies in Personalization-Based Systems To appear in User Modeling and User-Adapted Interaction (UMUAI) 20th Anniversary Special Issue, 2012. [Journal paper]


Y. Wang, A. Kobsa. Privacy in Cross-System Personalization In Proceedings of AAAI Privacy 2010 Symposium (Privacy2010), Palo Alto, CA, 2010.


Y. Wang, A. Kobsa. Performance Evaluation of a Dynamic Privacy-Enhancing Framework for Personalized Websites In Proceedings of the 1st and 17th International Conference on User Modeling, Adaptation, and Personalization (UMAP09), Trento, Italy, pp. 78-89, 2009. [Conference paper, acceptance rate: 26%]


S. A. Hendrickson, Y. Wang, A. van der Hoek, R. N. Taylor, A. Kobsa Modeling PLA Variation of Privacy-Enhancing Personalized Systems In Proceedings of the 13th International Software Product Line Conference (SPLC09), San Francisco, CA, 2009. [Conference paper, acceptance rate: 36%]


A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun and Y. Wang (authors in alphabetical order) Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods In Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS09), Mountain View, CA, pp. 1-12, 2009. [Conference paper, acceptance rate: 30%]


Y. Wang, A. Kobsa. Privacy in Online Social Networking at Workplace In Proceedings of the IEEE SocialCom'09 Workshop on Security and Privacy in Online Social Networking (SPOSN09), Vancouver, Canada, 2009. [Workshop paper]


Y. Wang, A. Kobsa. Technical Solutions for Privacy-Enhanced Personalization In: Constantinos Mourlas and Panagiotis Germanakos, eds.: Intelligent User Interfaces: Adaptation and Personalization Systems and Technologies. Hershey, PA: IGI Global, 2009. [Book chapter]


Y. Wang, A. Kobsa. Privacy Enhancing Technology In: M. Gupta and R. Sharman, eds.: Handbook of Research on Social and Organizational Liabilities in Information Security. Hershey, PA: IGI Global, 2009. [Book chapter]


Y. Wang, A. Kobsa. Respecting Users’ Individual Privacy Constraints in Web Personalization In Proceedings of the 11th International Conference on User Modeling (UM07), Corfu, Greece, pp.157-166 , 2007. [Conference paper, acceptance rate: 20%]


Y. Wang, A. Kobsa., A. van der Hoek, J. White. PLA-based Runtime Dynamism in Support of Privacy-Enhanced Web Personalization In Proceedings of the 10th International Software Product Line Conference (SPLC06), Baltimore, Maryland, USA, pp. 151-162, 2006. [Conference paper, acceptance rate: 32%]


Y. Wang, A. Kobsa. Impacts of Privacy Laws and Regulations on Personalized Systems In Proceedings of the CHI06 Workshop on Privacy-Enhanced Personalization, Montreal, Canada, 2006. [Workshop paper]


Y. Wang, A. Kobsa. A Software Product Line Approach for Handling Privacy Constraints in Web Personalization In Proceedings of the UM05 Workshop on Privacy-Enhanced Personalization, Edinburgh, UK, 2005. [Workshop paper]


Y. Wang Constraint-Sensitive Privacy Management for Personalized Web-based Systems In Proceedings of the 10th International Conference on User Modeling (UM05), Edinburgh, UK, 2005. [Doctoral consortium paper]





Social and Mobile Computing


Y. Huang, S. Huo, Y. Yao, C. Niu, Y. Wang, J. Grygiel, S. Sawyer. Municipal Police Departments on Facebook: What Are They Posting and Are People Engaging? In Proceedings of the 17th International Digital Government Research Conference (dg.o 2016). [Conference paper]


Y. Huang, B. Dobreski, B. Deo, J. Xin, N. Barbosa, Y. Wang, J. Bigham. CAN: Composable Accessibility Infrastructure via Data-Driven Crowdsourcing. In Proceedings of the 12th Web for All Conference (W4A 2015). [Conference paper]


Y. Huang, Y. Tang, Y. Wang. Emotion Map: A Location-Based Mobile Social System for Improving Emotion Awareness and Regulation. In Proceedings of ACM Conf. on Computer-Supported Cooperative Work and Social Computing (CSCW 2015). [Conference paper, acceptance rate: 28%]


Y. Wang, S. Mainwaring. Incentives in the Wild: Leveraging Virtual Currency to Sustain Online Community In Proceedings of iConference 2010, University of Illinois at Urbana-Champaign, USA, 2010. [Conference paper]


S. M. Lindtner, S. Mainwaring, P. Dourish, Y. Wang. Situating Productive Play: Online Gaming Practices and Guanxi in China In Proceedings of the 12th IFIP Conf. Human-Computer Interaction (INTERACT09), Uppsala, Sweden, pp. 328-341, 2009. [Conference paper, acceptance rate: 27%]


S. M. Lindtner, B. Nardi, Y. Wang, S. Mainwaring, J. He, W. Liang. A Hybrid Cultural Ecology: World of Warcraft in China In Proceedings of The 21th International Conference on Computer Supported Cooperative Work (CSCW08), San Diego, USA, pp. 371-382, 2008. [Conference paper, acceptance rate: 23%]


Y. Wang, S. Mainwaring. “Human-Currency Interaction”: Learning from Virtual Currency Use in China In Proceedings of The 26th International Conference on Human Factors in Computing Systems (CHI08), Florence, Italy, pp. 25-28, 2008. [Conference paper, acceptance rate: 18%]


Y. Wang, S. Mainwaring. Ethnography at Play: An Exploratory Case Study of Chinese Users’ Experience in Online Games In Proceedings of the CHI08 Workshop on Evaluating User Experiences in Games, Florence, Italy, 2008. [Workshop paper]


Y. Huang, N. Venkatasubramanian and Y. Wang. MAPGrid: A New Architecture for Empowering Mobile Data Placement in Grid Environments In Proceedings of the IEEE CCGrid07 Workshop on Context-Awareness and Mobility in Grid Computing, Rio de Janeiro, Brazil, 2007. [Workshop paper]


N. M. Su, Y. Wang, G. Mark, T. Aieylokun, T. Nakano. A Bosom Buddy Afar Brings a Distant Land Near: Are Bloggers a Global Community? In Proceedings of The 2nd International Conference on Communities & Technologies (C&T05), Milano, Italy, pp. 171-190, 2005. [Conference paper, acceptance rate: 23%]


N. M. Su, Y. Wang, G. Mark. Politics as Usual in the Blogosphere In Proceedings of Social Intelligence Design: The 4th International Workshop, Stanford, USA, 2005. [Workshop paper]




Last modified: 2021