Publications
☰
2024
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Matcha: An IDE Plugin for Creating Accurate Privacy Nutrition Labels
CONFERENCE
UbiComp 2024 -- ACM Transactions on Interactive, Mobile, Wearable Ubiquitous Technology (IMWUT), 2024
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Kirigami: Lightweight Speech Filtering for Privacy-Preserving Activity Recognition using Audio
CONFERENCE
UbiComp 2024 -- ACM Transactions on Interactive, Mobile, Wearable Ubiquitous Technology (IMWUT), 2024
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Is a Trustmark and QR Code Enough? The Effect of IoT Security and Privacy Label Information Complexity on Consumer Comprehension and Behavior
CONFERENCE
CHI 2024 -- SIGCHI Conference: Human Factors in Computing Systems, 2024
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Bring Privacy To The Table: Interactive Negotiation for Privacy Settings of Shared Sensing Devices
CONFERENCE
CHI 2024 -- SIGCHI Conference: Human Factors in Computing Systems, 2024
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Internet of Things Security and Privacy Labels Should Empower Consumers
JOURNAL
CACM 2024 -- Communication of the ACM, Magazine Article, Feb 2024
2023
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
TAO: Context Detection from Daily Activity Patterns Using Temporal Analysis and Ontology
CONFERENCE
UbiComp 2023 -- ACM Transactions on Interactive, Mobile, Wearable Ubiquitous Technology (IMWUT), 2023
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Mites: Design and Deployment of a General-Purpose Sensing Infrastructure for Buildings
Mike Czapik
,
Yang Zhang
,
Chris Harrison
,
CONFERENCE
UbiComp 2023 -- ACM Transactions on Interactive, Mobile, Wearable Ubiquitous Technology (IMWUT), 2023
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
VAX: Using Existing Video and Audio-based Activity Recognition Models to Bootstrap Privacy-Sensitive Sensors
CONFERENCE
UbiComp 2023 -- ACM Transactions on Interactive, Mobile, Wearable Ubiquitous Technology (IMWUT), 2023
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Are Consumers Willing to Pay for Security and Privacy of IoT Devices?
CONFERENCE
USENIX Security 2023 -- 32nd USENIX Security Symposium, 2023
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
"An Instructor is [already] able to keep track of 30 students": Students’ Perceptions of Smart Classrooms for Improving Teaching & Their Emergent Understandings of Teaching and Learning
Tricia J. Ngoon
,
David Kovalev
,
Chris Harrison
,
John Zimmerman
,
Amy Ogan
CONFERENCE
DIS 2023 -- The ACM SIGCHI Conference on Designing Interactive Systems, 2023
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
A First Look at Third-Party Service Dependencies of Web Services in Africa
CONFERENCE
PAM 2023 -- The Passive and Active Measurement (PAM) conference, 2023
2022
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
TEO: Ephemeral Ownership for IoT Devices to Provide Granular Data Control
CONFERENCE
MobiSys 2022 -- 20th ACM International Conference on Mobile Systems, Applications, and Services, 2022
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes
CONFERENCE
Oakland S&P 2022 -- The 43rd IEEE Symposium on Security and Privacy, 2022
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Protecting Smart Homes from Unintended Application Actions
CONFERENCE
ICCPS 2022 -- 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
![](/assets/static/play-button.524cd33.1c0100b494cb6c212284f3e96bfe0160.png)
Understanding Challenges for Developers to Create Accurate Privacy Nutrition Labels
CONFERENCE
CHI 2022 -- SIGCHI Conference: Human Factors in Computing Systems, 2022
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
![](/assets/static/play-button.524cd33.1c0100b494cb6c212284f3e96bfe0160.png)
Understanding iOS Privacy Nutrition Labels: An Exploratory Large-Scale Analysis of App Store Data
CONFERENCE
CHI 2022 -- SIGCHI Conference: Human Factors in Computing Systems, 2022
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
![](/assets/static/play-button.524cd33.1c0100b494cb6c212284f3e96bfe0160.png)
Exploring the Needs of Users for Supporting Privacy-protective Behavior in Smart Homes
Boyuan Guo
,
Rituparna Roychoudhury
,
Yaxing Yao
,
Swarun Kumar
,
Jason I. Hong
CONFERENCE
CHI 2022 -- SIGCHI Conference: Human Factors in Computing Systems, 2022
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
An Informative Security and Privacy "Nutrition" Label for Internet of Things Devices
CONFERENCE
IEEE S&P 2022 -- The IEEE Security & Privacy Magazine, March/April 2022
2021
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Marble: Collaborative Scheduling of Batteryless Sensors with Meta Reinforcement Learning
CONFERENCE
BuildSys 2021 -- ACM Conference on Embedded Systems For Energy-Efficient Built Environments (BuildSys), November 2021
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
![](/assets/static/play-button.524cd33.1c0100b494cb6c212284f3e96bfe0160.png)
Honeysuckle: Annotation-Guided Code Generation of In-App Privacy Notices
JOURNAL
Ubicomp 2021 -- ACM Transactions on Interactive, Mobile, Wearable Ubiquitous Technology (IMWUT 21), September, 2021
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Capture: Centralized Library Management for Heterogeneous IoT Devices
CONFERENCE
USENIX Security 2021 -- The 30th USENIX Security Symposium, 2021
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Optimizing Adaptation of Smart Traffic Lights with Resource Constraints
CONFERENCE
WFIoT 2021 -- IEEE 7th World Forum on Internet of Things, 2021
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
![](/assets/static/play-button.524cd33.1c0100b494cb6c212284f3e96bfe0160.png)
Which Privacy and Security Attributes Most Impact Consumers’ Risk Perception and Willingness to Purchase IoT Devices?
CONFERENCE
Oakland S&P 2021 -- The 42nd IEEE Symposium on Security and Privacy
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
What Makes People Install a COVID-19 Contact-Tracing App? Understanding the Influence of App Design and Individual Difference on Contact-Tracing App Adoption Intention
Camille Cobb
,
Jackie (Junrui) Yang
,
Sagar Baviskar
,
Beibei Li
,
Lujo Bauer
,
Jason I. Hong
JOURNAL
PMC 2021 -- Pervasive and Mobile Computing, 2021
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
MLIoT: An End-to-End Machine Learning System for the Internet-of-Things
CONFERENCE
IoTDI 2021 -- ACM/IEEE Conference on Internet of Things Design and Implementation, 2021.
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Classroom Digital Twins with Instrumentation-Free GazeTracking
Karan Ahuja
,
Deval Shah
,
Sujeath Pareddy
,
Franceska Xhakaj
,
Amy Ogan
,
Chris Harrison
CONFERENCE
CHI 2021 -- SIGCHI Conference: Human Factors in Computing Systems, 2021
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
The Design of the User Interfaces for Privacy Enhancements for Android
Jason I. Hong
,
Matt Fredrikson
,
Mike Czapik
,
Shawn Hanna
,
Swarup Sahoo
,
Judy Chun
,
Won-Woo Chung
,
Aniruddh Iyer
,
Ally Liu
,
Shen Lu
,
Rituparna Roychoudhury
,
Qian Wang
,
Shan Wang
,
Siqi Wang
,
Vida Zhang
,
Jessica Zhao
,
Yuan Jiang
,
Sam Kim
,
Evelyn Kuo
,
Jinping Liu
,
Yile Liu
,
Robert Zhang
PREPRINT
arXiv 2021 -- arXiv.org, CS, Technical Report: arXiv:2104.12032. April 2021
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
![](/assets/static/play-button.524cd33.1c0100b494cb6c212284f3e96bfe0160.png)
Netter: Probabilistic, Stateful Network Models
CONFERENCE
VMCAI 2021 -- The 22nd International Conference on Verification, Model Checking, and Abstract Interpretation
2020
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
![](/assets/static/play-button.524cd33.1c0100b494cb6c212284f3e96bfe0160.png)
Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?
CONFERENCE
IMC 2020 -- The Internet Measurement Conference
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Formalizing Tag-Based Metadata With the Brick Ontology
Gabe Fierro
,
Xiaolin Zang
,
Rajesh K. Gupta
,
David E. Culler
JOURNAL
Frontiers 2020 -- Frontiers in Built Environment-Structural Sensing
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
ACES: Automatic Configuration of Energy HarvestingSensors with Reinforcement Learning
JOURNAL
TOSN 2020 -- Transactions of Sensor Networks
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
![](/assets/static/play-button.524cd33.1c0100b494cb6c212284f3e96bfe0160.png)
Ask The Experts: What Should Be On An IoT Privacy And Security Label?
CONFERENCE
Oakland S&P 2020 -- The 41st IEEE Symposium on Security and Privacy
2019
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Who can Access What, and When? Understanding Minimal Access Requirements of Building Applications
CONFERENCE
BuildSys 2019 -- ACM Conference on Embedded Systems For Energy-Efficient Built Environments (BuildSys)
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Beyond a House of Sticks: Formalizing Metadata Tags with Brick
CONFERENCE
BuildSys 2019 -- ACM Conference on Embedded Systems For Energy-Efficient Built Environments (BuildSys)
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
MobiPurpose: Inferring the Purposes of Network Traffic in Mobile Apps
Minyi Liu
,
Kevan Dohia
,
Gaurav Kumar Srivastava
,
Matthew Fredrikson
,
Jason Hong
CONFERENCE
Ubicomp 2019 -- ACM Transactions on Interactive, Mobile, Wearable Ubiquitous Technology (IMWUT'18)
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
EduSense: Practical Classroom Sensing at Scale
Karan Ahuja
,
Franceska Xhakaj
,
Virag Varga
,
Anne Xie
,
Stanley Zhang
,
Jay Eric Townsend
,
Chris Harrison
,
Amy Ogan
,
CONFERENCE
Ubicomp 2019
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Coconut: An IDE Plugin for Developing Privacy-friendly Apps
CONFERENCE
Ubicomp 2019 -- ACM Transactions on Interactive, Mobile, Wearable Ubiquitous Technology (IMWUT'18)
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Exploring How Privacy and Security Factor into IoT Device Purchase Behavior
CONFERENCE
CHI 2019 -- SIGCHI Conference: Human Factors in Computing Systems, Glasgow, Scotland, 2019.
2018
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Pible: Battery-Free Mote for Perpetual Indoor BLE Applications
PREPRINT
Computing Research Repository, November 2018
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Brick: Metadata schema for portable smart building applications
Arka Bhattacharya
,
Gabriel Fierro
,
Jingkun Gao
,
Dezhi Hong
,
Aslak Johansen
,
Joern Ploennigs
,
Mario Bergés
,
David Culler
,
Rajesh K. Gupta
,
Mikkel Baun Kjærgaard
,
Mani Srivastava
,
Kamin Whitehouse
JOURNAL
Applied Energy
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Automated Extraction of Personal Knowledge from Smartphone Push Notifications
CONFERENCE
BigData 2018 -- IEEE International Conference on Big Data
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Oh, What a Fragile Web We Weave: Third-party Service Dependencies In Modern Webservices and Implications
PREPRINT
Computing Research Repository, June 2018
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
BuildingRules: A Trigger-Action–Based System to Manage Complex Commercial Buildings
Alessandro A. Nacci
,
Vincenzo Rana
,
Paola Spoletini
,
Rajesh Gupta
,
Donatella Sciuto
,
JOURNAL
ACM Transactions on Cyber-Physical Systems
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Scrabble: Transferrable semi-automated semantic metadata normalization using intermediate representation
CONFERENCE
BuildSys 2018 - Proceedings of the 5th Conference on Systems for Built Environments
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Plaster: An integration, benchmark, and development framework for metadata normalization methods
CONFERENCE
BuildSys 2018 - Proceedings of the 5th Conference on Systems for Built Environments
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Pible: Battery-free mote for perpetual indoor BLE applications
CONFERENCE
BuildSys 2018 - Proceedings of the 5th Conference on Systems for Built Environments
2017
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Transfer Learning for Performance Modeling of Configurable Systems: A Causal Analysis
PREPRINT
Computing Research Repository, September 2017
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
PrivacyStreams: Enabling Transparency in Personal Data Processing for Mobile Apps
Fanglin Chen
,
Toby Jia-Jun Li
,
Yao Guo
,
Gang Huang
,
Matthew Fredrikson
,
Jason I Hong
CONFERENCE
Ubicomp 2017 -- Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT 17)
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Does This App Really Need My Location?: Context-Aware Privacy Management for Smartphones
CONFERENCE
Ubicomp 2017 -- Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT 17)
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage
Gaurav Srivastava
,
Matt Fredrikson
,
Jason Hong
,
PREPRINT
Computing Research Repository, August 2017
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Understanding the Purpose of Permission Use in Mobile Apps
CONFERENCE
ACM Trans. Inf. Syst.
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Transfer Learning for Performance Modeling of Configurable Systems: An Exploratory Analysis
CONFERENCE
Proceedings of the 32Nd IEEE/ACM International Conference on Automated Software Engineering
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
CharIoT: An End-user Programming Environment for the IoT
CONFERENCE
Proceedings of the Seventh International Conference on the Internet of Things
2016
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Managing Commercial HVAC Systems: What do Building Operators Really Need?
PREPRINT
Computing Research Repository, December 2016
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Dynamic data center load response to variability in private and public electricity costs
CONFERENCE
2016 IEEE International Conference on Smart Grid Communications (SmartGridComm)
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Brick: Towards a Unified Metadata Schema For Buildings
Arka Bhattacharya
,
Gabriel Fierro
,
Jingkun Gao
,
Dezhi Hong
,
Aslak Johansen
,
Joern Ploennigs
,
Mario Bergés
,
David Culler
,
Rajesh K. Gupta
,
Mikkel Baun Kjærgaard
,
Mani Srivastava
,
Kamin Whitehouse
CONFERENCE
BuildSys '16 Proceedings of the 3rd ACM International Conference on Systems for Energy-Efficient Built Environments
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices
Florian Schaub
,
Amy Friedman
,
Hana Habib
,
Norman Sadeh
,
Lorrie Faith Cranor
,
CONFERENCE
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions
Bin Liu
,
Mads Schaarup Andersen
,
Florian Schaub
,
Hazim Almuhimedi
,
Shikun (Aerin) Zhang
,
Norman Sadeh
,
Alessandro Acquisti
CONFERENCE
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Toward Building a Safe, Secure, and Easy-to-Use Internet of Things Infrastructure
Anind Dey
JOURNAL
IEEE Computer 2016: IEEE Computer Society.
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Quiver: Using Control Perturbations to Increase the Observability of Sensor Data in Smart Buildings
PREPRINT
Computing Research Repository, January 2016
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Genie: A Longitudinal Study Comparing Physical and Software-augmented Thermostats in Office Buildings
PREPRINT
Computing Research Repository, January 2016
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
A Systematic Approach for Exploring Tradeoffs in Predictive HVAC Control Systems for Buildings
PREPRINT
Computing Research Repository, January 2016
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Genie: A Longitudinal Study Comparing Physical and Software Thermostats in Office Buildings
CONFERENCE
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing
2015
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things
WORKSHOP
HotNets 2015: Fourteenth ACM Workshop on Hot Topics in Networks.
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
HVACMeter: Apportionment of HVAC Power to Thermal Zones and Air Handler Units
PREPRINT
Computing Research Repository, September 2015
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Zodiac: Organizing Large Deployment of Sensors to Create Reusable Applications for Buildings
CONFERENCE
Proceedings of the 2Nd ACM International Conference on Embedded Systems for Energy-Efficient Built Environments
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Your location has been shared 5,398 times! A field study on mobile app privacy nudging
Hazim Almuhimedi
,
Florian Schaub
,
Norman Sadeh
,
Idris Adjerid
,
Alessandro Acquisti
,
Lorrie Cranor
,
CONFERENCE
Conference on Human Factors in Computing Systems - Proceedings
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Models, Abstractions, and Architectures: The Missing Links in Cyber-physical Systems
CONFERENCE
Proceedings of the 52Nd Annual Design Automation Conference
2014
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
WattShare: Detailed Energy Apportionment in Shared Living Spaces Within Commercial Buildings
CONFERENCE
Proceedings of the 1st ACM Conference on Embedded Systems for Energy-Efficient Buildings
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
EnergyLens: Combining Smartphones with Electricity Meter for Accurate Activity Detection and User Annotation
CONFERENCE
Proceedings of the 5th International Conference on Future Energy Systems
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
Data Driven Investigation of Faults in HVAC Systems with Model, Cluster and Compare (MCC)
CONFERENCE
Proceedings of the 1st ACM Conference on Embedded Systems for Energy-Efficient Buildings
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
BuildingSherlock: Fault Management Framework for HVAC Systems: Demo Abstract
CONFERENCE
Proceedings of the 1st ACM Conference on Embedded Systems for Energy-Efficient Buildings
2013
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
BuildingDepot 2.0: An Integrated Management System for Building Analysis and Control
CONFERENCE
BuildSys '13 Proceedings of the Fourth ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
ProtectMyPrivacy: Detecting and mitigating privacy leaks on iOS devices using crowdsourcing
CONFERENCE
MobiSys 2013 - Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services
2012
![](/assets/static/pdf.524cd33.2fc036eb0da0cb2ac62eaea28f94619f.png)
BuildingDepot: An Extensible and Distributed Architecture for Building Data Storage, Access and Sharing
CONFERENCE
BuildSys '12 Proceedings of the Fourth ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings