Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Sneaky spy devices and defective detectors: the ecosystem of intimate partner surveillance with covert devices
R Ceccio, S Stephenson, V Chadha… - 32nd USENIX Security …, 2023 - usenix.org
Recent anecdotal evidence suggests that abusers have begun to use covert spy devices
such as nanny cameras, item trackers, and audio recorders to spy on and stalk their …
such as nanny cameras, item trackers, and audio recorders to spy on and stalk their …
" It's the Equivalent of Feeling Like You're in {Jail”}: Lessons from Firsthand and Secondhand Accounts of {IoT-Enabled} Intimate Partner Abuse
Victim-survivors of intimate partner violence (IPV) are facing a new technological threat:
Abusers are leveraging IoT devices such as smart thermostats, hidden cameras, and GPS …
Abusers are leveraging IoT devices such as smart thermostats, hidden cameras, and GPS …
Enabling Developers, Protecting Users: Investigating Harassment and Safety in {VR}
Virtual Reality (VR) has witnessed a rising issue of harassment, prompting the integration of
safety controls like muting and blocking in VR applications. However, the lack of …
safety controls like muting and blocking in VR applications. However, the lack of …
Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection
While designed to locate lost items, Bluetooth trackers are increasingly exploited for malign
purposes, such as unwanted location tracking. This study probes deeper into this issue …
purposes, such as unwanted location tracking. This study probes deeper into this issue …
Designing Human-centered Artificial Intelligence to Assist with Domestic Abuse Recovery: Mitigating Technology Enabled Coercive Control
CL Crooks, S Talwalkar, T Sharma, K Arora… - SoutheastCon …, 2024 - ieeexplore.ieee.org
Human-centered artificial intelligence (HAI) is at the forefront of current AI research efforts.
Although several known challenges related to the use of AI are discussed in the present …
Although several known challenges related to the use of AI are discussed in the present …
Contextualizing interpersonal data sharing in smart homes
A key feature of smart home devices is monitoring the environment and recording data.
These devices provide security via motion-detection video alerts, cost-savings via thermostat …
These devices provide security via motion-detection video alerts, cost-savings via thermostat …
A critical analysis of the prevalence of technology-facilitated abuse in us college students
The ubiquitous use of technology by college students makes them vulnerable to
harassment, harm, and intimidation via technological means. We evaluate the prevalence of …
harassment, harm, and intimidation via technological means. We evaluate the prevalence of …
" I Had Sort of a Sense that I Was Always Being Watched... Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications
Continuous location sharing (CLS) applications are widely used for safety and social
convenience. However, these applications have privacy concerns that can be used for …
convenience. However, these applications have privacy concerns that can be used for …
DeTagTive: Linking MACs to protect against malicious BLE trackers
Bluetooth Low Energy (BLE) location trackers are popular and useful for finding misplaced
keys, devices, and other items. However, they can also be used to track people and enable …
keys, devices, and other items. However, they can also be used to track people and enable …
The PET Paradox: How Amazon Instrumentalises PETs in Sidewalk to Entrench Its Infrastructural Power
Recent applications of Privacy Enhancing Technologies (PETs) reveal a paradox. PETs aim
to alleviate power asymmetries, but can actually entrench the infrastructural power of …
to alleviate power asymmetries, but can actually entrench the infrastructural power of …