关注
Janne Lindqvist
Janne Lindqvist
Aalto University (Computer Science)
在 aalto.fi 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 501-510, 2012
6472012
I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application
J Lindqvist, J Cranshaw, J Wiese, J Hong, J Zimmerman
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
6102011
The motivations and experiences of the on-demand mobile workforce
R Teodoro, P Ozturk, M Naaman, W Mason, J Lindqvist
Proceedings of the 17th ACM conference on Computer supported cooperative …, 2014
1442014
User-generated free-form gestures for authentication: Security and memorability
M Sherman, G Clark, Y Yang, S Sugrim, A Modig, J Lindqvist, A Oulasvirta, ...
Proceedings of the 12th annual international conference on Mobile systems …, 2014
1422014
Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns
S Li, A Ashok, Y Zhang, C Xu, J Lindqvist, M Gruteser
2016 IEEE International Conference on Pervasive Computing and Communications …, 2016
1342016
Caché: caching location-enhanced content to improve user privacy
S Amini, J Lindqvist, J Hong, J Lin, E Toch, N Sadeh
Proceedings of the 9th international conference on Mobile systems …, 2011
1132011
Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Users and Non-Users
X Gao, GD Clark, J Lindqvist
101*
Elastic pathing: your speed is enough to track you
X Gao, B Firner, S Sugrim, V Kaiser-Pendergrast, Y Yang, J Lindqvist
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
1002014
An Ecological Investigation of the Emotional Context Surrounding Nonsuicidal Self‐Injurious Thoughts and Behaviors in Adolescents and Young Adults
A Kranzler, KB Fehling, J Lindqvist, J Brillante, F Yuan, X Gao, AL Miller, ...
Suicide and Life‐Threatening Behavior 48 (2), 149-159, 2018
912018
Distinguishing users with capacitive touch communication
T Vu, A Baid, S Gao, M Gruteser, R Howard, J Lindqvist, P Spasojevic, ...
Proceedings of the 18th annual international conference on Mobile computing …, 2012
822012
Securacy: An Empirical Investigation of Android Applications’ Network Usage, Privacy and Security
D Ferreira, V Kostakos, AR Beresford, J Lindqvist, AK Dey
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless …, 2015
752015
How Busy Are You?: Predicting the Interruptibility Intensity of Mobile Users
F Yuan, X Gao, J Lindqvist
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
722017
Anxious and overwhelming affects and repetitive negative thinking as ecological predictors of self-injurious thoughts and behaviors
CD Hughes, AM King, A Kranzler, K Fehling, A Miller, J Lindqvist, ...
Cognitive Therapy and Research 43, 88-101, 2019
702019
Practical defenses for evil twin attacks in 802.11
H Gonzales, K Bauer, J Lindqvist, D McCoy, D Sicker
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
702010
Free-form gesture authentication in the wild
Y Yang, GD Clark, J Lindqvist, A Oulasvirta
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
612016
Undistracted driving: a mobile phone that doesn't distract
J Lindqvist, J Hong
Proceedings of the 12th Workshop on Mobile Computing Systems and …, 2011
572011
Privacy-preserving 802.11 access-point discovery
J Lindqvist, T Aura, G Danezis, T Koponen, A Myllyniemi, J Mäki, M Roe
Proceedings of the second ACM conference on Wireless network security, 123-130, 2009
572009
A field study of run-time location access disclosures on Android smartphones
H Fu, Y Yang, N Shingte, J Lindqvist, M Gruteser
Proc. USEC 14, 2014
562014
Engineering gesture-based authentication systems
GD Clark, J Lindqvist
IEEE Pervasive Computing 14 (1), 18-25, 2015
552015
Should I Protect You? Understanding Developers’ Behavior to Privacy-Preserving APIs
S Jain, J Lindqvist
Workshop on Usable Security (USEC’14), 2014
542014
系统目前无法执行此操作,请稍后再试。
文章 1–20