Publications
The most recent publications are listed chronologically below. The publications are also broken out by topic area towards the bottom of the page.
, Abhiram Reddy, Jessica Ji, Ali Crawford, Mia Hoffmann, Colin Shea-Blymyer, and John Bansemer. "Harmonizing AI Guidance: Distilling Voluntary Standards and Best Practices into a Unified Framework". Center for Security and Emerging Technology (CSET 2025). https://cset.georgetown.edu/publication/harmonizing-ai-guidance-distilling-voluntary-standards-and-best-practices-into-a-unified-framework/.
Jin-Dong Dong, , Akira Yamada, Yukiko Sawaya, Lorrie Cranor, and Nicolas Christin. "Accurate, Generalizable, and Practical Behavioral Models to Identify Impending User Exposure to Malicious Websites". ACM Transactions on the Web (TWEB 2025). https://doi.org/10.1145/3768587.
, Nicolas Christin, and Lorrie Faith Cranor. "Rethinking Fingerprinting: An Assessment of Behavior-based Methods at Scale and Implications for Web Tracking". Privacy Enhancing Technologies Symposium (PETS 2025). https://doi.org/10.56553/popets-2025-0158.
, Abhiram Reddy, Jessica Ji, Ali Crawford, Mia Hoffmann, Colin Shea-Blymyer, and John Bansemer. "Harmonizing AI Guidance: Distilling Voluntary Standards and Best Practices into a Unified Framework". Center for Security and Emerging Technology (CSET 2025). https://cset.georgetown.edu/publication/harmonizing-ai-guidance-distilling-voluntary-standards-and-best-practices-into-a-unified-framework/.
, Jessica Ji, Kyle Miller, John Bansemer, Zachary Arnold, David Batz, Minwoo Choi, Marisa Decillis, Patricia Eke, Daniel M. Gerstein, Alex Leblang, Monty McGee, Greg Rattray, Luke Richards, and Alana Scott. "Securing Critical Infrastructure in the Age of AI". Center for Security and Emerging Technology (CSET 2024). https://cset.georgetown.edu/publication/securing-critical-infrastructure-in-the-age-of-ai/.
Helen Toner, John Bansemer, , Matthew Burtell, Thomas Woodside, Anat Lior, Andrew Lohn, Ashwin Acharya, Beba Cibralic, Chris Painter, Cullen O’Keefe, Iason Gabriel, Kathleen Fisher, Ketan Ramakrishnan, Krystal Jackson, Noam Kolt, Rebecca Crootof, and Samrat Chatterjee. "Through the Chat Window and Into the Real World: Preparing for AI Agents". Center for Security and Emerging Technology (CSET 2024). https://cset.georgetown.edu/publication/through-the-chat-window-and-into-the-real-world-preparing-for-ai-agents/.
Jin-Dong Dong, , Akira Yamada, Yukiko Sawaya, Lorrie Cranor, and Nicolas Christin. "Accurate, Generalizable, and Practical Behavioral Models to Identify Impending User Exposure to Malicious Websites". ACM Transactions on the Web (TWEB 2025). https://doi.org/10.1145/3768587.
, Nicolas Christin, and Lorrie Faith Cranor. "Rethinking Fingerprinting: An Assessment of Behavior-based Methods at Scale and Implications for Web Tracking". Privacy Enhancing Technologies Symposium (PETS 2025). https://doi.org/10.56553/popets-2025-0158.
. "Tracking User Web Browsing Behavior: Privacy Harms and Security Benefits". Carnegie Mellon University (2023). Thesis. https://doi.org/10.1184/R1/24268843.v1.
, John Krumm, and Siddharth Suri. "Inferring Sensitive Browsing Information from Online Advertising Profiles". In Submission.
, Nicolas Christin, and Lorrie Faith Cranor. "How Do Home Computer Users Browse the Web?". ACM Transactions on the Web, Volume 16, Issue 1, Article 3 (TWEB 2022). https://doi.org/10.1145/3473343.
Akira Yamada, , Yukiko Sawaya, Jin-Dong Dong, Sarah Pearman, Ayumu Kubota, and Nicolas Christin. "On Recruiting and Retaining Users for Security Sensitive Longitudinal Measurement Panels". Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022): 347–366. USENIX Association. https://www.usenix.org/conference/soups2022/presentation/yamada.
Akira Yamada, Yukiko Sawaya Shoma Tanaka, Ayumu Kubota, Nicolas Christin, , Jin-Dong Dong, Shun Umemoto, Jun Nakajima, So Matsuda, Reo Matsumura. "Security Behavior Observation for Smartphone: Longterm Monitoring of Smartphones Comparing Desktop Computers". Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). Extended Abstract. USENIX Association, USA. https://www.usenix.org/system/files/soups2020_poster_yamada.pdf.
Maggie Oates, , Lorrie Cranor, Storm Budwig, Erica J. L. Weston, Brigette M. Bernagozzi, and Julie Pagaduan. "Audio, video, chat, email, or survey: How much does online interview mode matter?". PLOS ONE, Volume 17, Issue 2 (2022). https://doi.org/10.1371/journal.pone.0263876.
, Jason Lee, and Meihan Li. "Incentives for Enabling Two-Factor Authentication in Online Gaming". Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). Extended Abstract. USENIX Association, USA. https://www.usenix.org/sites/default/files/soups2019posters-crichton.pdf.