For a more complete list, please see Google Scholar.

  1. S&P
    Is Cryptographic Deniability Sufficient? Non-Expert Perceptions of Deniability in Secure Messaging*
    44th IEEE Symposium on Security and Privacy
    [forthcoming] May 22-24, 2023
  2. Jurimetrics
    ε-Differential Privacy, and a Two Step*
    Jurimetrics: The Journal of Law, Science, and Technology
    [forthcoming] Vol. 63, 2023
  3. PETS
    ML-CB: Machine Learning Canvas Block*
    Privacy Enhancing Technologies Symposium
    July 12–16, 2021
    1. USENIX
      What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data
      29th USENIX Security Symposium
      August 12–14, 2020
    2. HTLJ
      Faces and Fingers: Authentication*
      Suffolk University Journal of High Technology Law
      2020
  4. STLR
    Privacy and Synthetic Datasets*
    Stanford Technology Law Review
    2019
    1. GLR
      Algorithmic Choice and Superior Responsibility: Closing the Gap Between Liability and Lethal Autonomy by Defining the Line Between Actors and Tools*
      Gonzaga Law Review
      2015
    2. JPTOS
      CAD's Parallel to Technical Drawings: Copyright in the Fabricated World*
      Journal of the Patent and Trademark Office Society
      2015