Skip to main content

Showing 1–12 of 12 results for author: Staples, M

.
  1. arXiv:2402.14544  [pdf, other

    cs.CR cs.SE

    {A New Hope}: Contextual Privacy Policies for Mobile Applications and An Approach Toward Automated Generation

    Authors: Shidong Pan, Zhen Tao, Thong Hoang, Dawen Zhang, Tianshi Li, Zhenchang Xing, Sherry Xu, Mark Staples, Thierry Rakotoarivelo, David Lo

    Abstract: Privacy policies have emerged as the predominant approach to conveying privacy notices to mobile application users. In an effort to enhance both readability and user engagement, the concept of contextual privacy policies (CPPs) has been proposed by researchers. The aim of CPPs is to fragment privacy policies into concise snippets, displaying them only within the corresponding contexts within the a… ▽ More

    Submitted 10 March, 2024; v1 submitted 22 February, 2024; originally announced February 2024.

    Comments: USENIX Security 2024. arXiv admin note: text overlap with arXiv:2307.01691

  2. arXiv:2311.18252  [pdf, other

    cs.SE cs.AI cs.CY cs.LG

    Navigating Privacy and Copyright Challenges Across the Data Lifecycle of Generative AI

    Authors: Dawen Zhang, Boming Xia, Yue Liu, Xiwei Xu, Thong Hoang, Zhenchang Xing, Mark Staples, Qinghua Lu, Liming Zhu

    Abstract: The advent of Generative AI has marked a significant milestone in artificial intelligence, demonstrating remarkable capabilities in generating realistic images, texts, and data patterns. However, these advancements come with heightened concerns over data privacy and copyright infringement, primarily due to the reliance on vast datasets for model training. Traditional approaches like differential p… ▽ More

    Submitted 10 January, 2024; v1 submitted 30 November, 2023; originally announced November 2023.

    Comments: Accepted by 2024 IEEE/ACM 3rd International Conference on AI Engineering - Software Engineering for AI (CAIN)

  3. arXiv:2310.07915  [pdf, other

    cs.NI cs.CY cs.SI

    Tag Your Fish in the Broken Net: A Responsible Web Framework for Protecting Online Privacy and Copyright

    Authors: Dawen Zhang, Boming Xia, Yue Liu, Xiwei Xu, Thong Hoang, Zhenchang Xing, Mark Staples, Qinghua Lu, Liming Zhu

    Abstract: The World Wide Web, a ubiquitous source of information, serves as a primary resource for countless individuals, amassing a vast amount of data from global internet users. However, this online data, when scraped, indexed, and utilized for activities like web crawling, search engine indexing, and, notably, AI model training, often diverges from the original intent of its contributors. The ascent of… ▽ More

    Submitted 5 November, 2023; v1 submitted 11 October, 2023; originally announced October 2023.

    Comments: added some information on how to deal with CDN in the design section; minor fixes on writing

  4. arXiv:2307.09885  [pdf, other

    cs.CY cs.AI cs.CL cs.HC

    Test-takers have a say: understanding the implications of the use of AI in language tests

    Authors: Dawen Zhang, Thong Hoang, Shidong Pan, Yongquan Hu, Zhenchang Xing, Mark Staples, Xiwei Xu, Qinghua Lu, Aaron Quigley

    Abstract: Language tests measure a person's ability to use a language in terms of listening, speaking, reading, or writing. Such tests play an integral role in academic, professional, and immigration domains, with entities such as educational institutions, professional accreditation bodies, and governments using them to assess candidate language proficiency. Recent advances in Artificial Intelligence (AI) a… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

  5. arXiv:2307.03941  [pdf, other

    cs.CY cs.AI cs.CL

    Right to be Forgotten in the Era of Large Language Models: Implications, Challenges, and Solutions

    Authors: Dawen Zhang, Pamela Finckenberg-Broman, Thong Hoang, Shidong Pan, Zhenchang Xing, Mark Staples, Xiwei Xu

    Abstract: The Right to be Forgotten (RTBF) was first established as the result of the ruling of Google Spain SL, Google Inc. v AEPD, Mario Costeja González, and was later included as the Right to Erasure under the General Data Protection Regulation (GDPR) of European Union to allow individuals the right to request personal data be deleted by organizations. Specifically for search engines, individuals can se… ▽ More

    Submitted 4 June, 2024; v1 submitted 8 July, 2023; originally announced July 2023.

    Comments: Revised the writing

  6. arXiv:2307.01691  [pdf, other

    cs.CR cs.SE

    SeePrivacy: Automated Contextual Privacy Policy Generation for Mobile Applications

    Authors: Shidong Pan, Zhen Tao, Thong Hoang, Dawen Zhang, Zhenchang Xing, Xiwei Xu, Mark Staples, David Lo

    Abstract: Privacy policies have become the most critical approach to safeguarding individuals' privacy and digital security. To enhance their presentation and readability, researchers propose the concept of contextual privacy policies (CPPs), aiming to fragment policies into shorter snippets and display them only in corresponding contexts. In this paper, we propose a novel multi-modal framework, namely SeeP… ▽ More

    Submitted 9 July, 2023; v1 submitted 4 July, 2023; originally announced July 2023.

  7. arXiv:2306.10923  [pdf, other

    cs.CR cs.SE

    Toward the Cure of Privacy Policy Reading Phobia: Automated Generation of Privacy Nutrition Labels From Privacy Policies

    Authors: Shidong Pan, Thong Hoang, Dawen Zhang, Zhenchang Xing, Xiwei Xu, Qinghua Lu, Mark Staples

    Abstract: Software applications have become an omnipresent part of modern society. The consequent privacy policies of these applications play a significant role in informing customers how their personal information is collected, stored, and used. However, customers rarely read and often fail to understand privacy policies because of the ``Privacy Policy Reading Phobia'' (PPRP). To tackle this emerging chall… ▽ More

    Submitted 19 June, 2023; originally announced June 2023.

  8. arXiv:2305.03271  [pdf, other

    cs.SE cs.CR

    Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile Apps

    Authors: Shidong Pan, Dawen Zhang, Mark Staples, Zhenchang Xing, Jieshan Chen, Xiwei Xu, James Hoang

    Abstract: Privacy regulations protect and promote the privacy of individuals by requiring mobile apps to provide a privacy policy that explains what personal information is collected and how these apps process this information. However, developers often do not have sufficient legal knowledge to create such privacy policies. Online Automated Privacy Policy Generators (APPGs) can create privacy policies, but… ▽ More

    Submitted 23 September, 2023; v1 submitted 5 May, 2023; originally announced May 2023.

    Comments: USENIX Security 2024

  9. To Be Forgotten or To Be Fair: Unveiling Fairness Implications of Machine Unlearning Methods

    Authors: Dawen Zhang, Shidong Pan, Thong Hoang, Zhenchang Xing, Mark Staples, Xiwei Xu, Lina Yao, Qinghua Lu, Liming Zhu

    Abstract: The right to be forgotten (RTBF) is motivated by the desire of people not to be perpetually disadvantaged by their past deeds. For this, data deletion needs to be deep and permanent, and should be removed from machine learning models. Researchers have proposed machine unlearning algorithms which aim to erase specific data from trained models more efficiently. However, these methods modify how data… ▽ More

    Submitted 10 January, 2024; v1 submitted 7 February, 2023; originally announced February 2023.

    Comments: Accepted by AAAI Spring Symposium on AI Trustworthiness Assessment 2023. Published in AI and Ethics Journal https://link.springer.com/article/10.1007/s43681-023-00398-y

  10. arXiv:2105.05460  [pdf, other

    cs.SE

    A Systematic Literature Review on Blockchain Governance

    Authors: Yue Liu, Qinghua Lu, Liming Zhu, Hye-Young Paik, Mark Staples

    Abstract: Blockchain has been increasingly used as a software component to enable decentralisation in software architecture for a variety of applications. Blockchain governance has received considerable attention to ensure the safe and appropriate use and evolution of blockchain, especially after the Ethereum DAO attack in 2016. However, there are no systematic efforts to analyse existing governance solutio… ▽ More

    Submitted 26 March, 2022; v1 submitted 12 May, 2021; originally announced May 2021.

    Comments: Submitted to Journal of Systems and Software

  11. Integrated Model-Driven Engineering of Blockchain Applications for Business Processes and Asset Management

    Authors: Qinghua Lu, An Binh Tran, Ingo Weber, Hugo O'Connor, Paul Rimba, Xiwei Xu, Mark Staples, Liming Zhu, Ross Jeffery

    Abstract: Blockchain has attracted broad interests to build decentralised applications. Blockchain has attracted broad interests to build decentralised applications. However, develo** such applications without introducing vulnerabilities is hard for developers, not the least because the deployed code is immutable and can be called by anyone with access to the network. Model-driven engineering (MDE) helps… ▽ More

    Submitted 22 October, 2020; v1 submitted 26 May, 2020; originally announced May 2020.

    Comments: to appear in Software: Practice and Experience (2020)

  12. arXiv:1704.03610  [pdf, other

    cs.SE

    Blockchains for Business Process Management - Challenges and Opportunities

    Authors: Jan Mendling, Ingo Weber, Wil van der Aalst, Jan vom Brocke, Cristina Cabanillas, Florian Daniel, Soren Debois, Claudio Di Ciccio, Marlon Dumas, Schahram Dustdar, Avigdor Gal, Luciano Garcia-Banuelos, Guido Governatori, Richard Hull, Marcello La Rosa, Henrik Leopold, Frank Leymann, Jan Recker, Manfred Reichert, Hajo A. Reijers, Stefanie Rinderle-Ma, Andreas Rogge-Solti, Michael Rosemann, Stefan Schulte, Munindar P. Singh , et al. (7 additional authors not shown)

    Abstract: Blockchain technology promises a sizable potential for executing inter-organizational business processes without requiring a central party serving as a single point of trust (and failure). This paper analyzes its impact on business process management (BPM). We structure the discussion using two BPM frameworks, namely the six BPM core capabilities and the BPM lifecycle. This paper provides research… ▽ More

    Submitted 31 January, 2018; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: Preprint for ACM TMIS