I work at the intersection of Security, AI, and HCI. I study people’s safety concerns, decision-making behaviors,
and the role of power dynamics in innovation across the AI development lifecycle, addressing complex privacy and
safety challenges in AI as well as leveraging AI’s capabilities to solve long-standing privacy issues.
More Recently, I examine the question of:
How can we design secure systems that improve the quality of human interaction and human data authenticity in digital ecosystems?
Some main lines of research:
Usable Security and Privacy
Designing mechanisms to support people with different backgrounds and characteristics to protect their privacy and security
Visual Privacy in GenAI (ASSETS 2025) ·
Youth Safety in GenAI (IEEE S&P 2025) ·
Data Minimization (USENIX 2024) ·
Ad Privacy (PETS 2025)
PRAC3 Risk Framework for AudioAI (AAAI AIES 2025) ·
Human-Centered AI
Designing Method to produce licensed dataset to support downstrem AI systems that are centered around human needs, values, and behavior.
BivPriv Obfuscation Support (CHI 2024) ·
BiVPriv Dataset (CHI 2023, IEEE/CVF 2025, IEEE/CVF 2026) ·
GuardLens (SOUPS 2023) ·
PriView ·
V.O.I.C.E Risk Data/Framework
Content Authenticity, Provenance, and Humanness
Designing and evaluating novel solutions for verifying humanness and developing context-aware provenance to combat platform abuse.
AIGC Content Labels (Preprint 2025) ·
Personhood Credential (USENIX PEPR 2025)
Computational AI Governance Developing computational governance mechanisms grounded in participatory, collective intelligence, and decentralized systems.
DAO-Based AI Governance (Nature Sci Report)
InclusiveAI (AAAI AIES 2025) ·
DAOs and Power Dynamics (IEEE ICBC 2024) ·
Digital Assets: Cybersecurity, Policy, National Security
iWallet (SOUPS 2023) ·
COINfused (ACM COMPASS 2025) ·
Risk in Stablecoin Ecosystems (IEEE S&P 2025) ·
Auditing Web3 Ecosystem (NDSS 2025)
Prospective Students:
I’m looking for PhD students and interns to join my group.
Please review the
Interested to Join Us
page, learn more about our
Ongoing Research
,
and email me your CV.
Selected Publications
(Google Scholar)
-
Democratic Governance Through DAO-Based Deliberation and Voting for Inclusive Decision Making In AI Model
-
Hierarchical Instance Tracking to Balance Privacy Preservation with Accessible Information
-
Signals of Provenance: Practices & Challenges of Navigating Indicators in AI-Generated Media for Sighted and Blind Individuals
-
Future of Algorithmic Organization: Large-Scale Analysis of Decentralized Autonomous Organizations (DAOs)
-
PRAC3 (Privacy, Reputation, Accountability, Consent, Credit, Compensation): Long Tailed Risks of Voice Actors in AI Data-Economy
-
Aligning AI with Public Values: Deliberation and Decision-Making for Governing Multimodal LLMs in Political Video Analysis
-
"Before, I Asked My Mom, Now I Ask ChatGPT": Visual Privacy Management with Generative AI for Blind and Low-Vision People
-
Verifying Humanness: Personhood Credentials for the Digital Identity Crisis2025 USENIX Conference on Privacy Engineering Practice and Respect (PEPR)
-
Exploring Parent-Child Perspectives on Safety in Generative AI: Concerns, Mitigation Strategies, and Design ImplicationsIEEE Symposium on Security and Privacy (S&P 2025)
-
BIV-Priv-Seg: Locating Private Content in Images Taken by People With Visual ImpairmentsIEEE/CVF Winter Conference on Applications of Computer Vision 2025
-
Privacy Perceptions and Behaviors Towards Targeted Advertising on Social Media: A Cross-Country Study25th Privacy Enhancing Technologies Symposium (PETs 2025)
-
Coinfused: Navigating the Current Practices and Perceived Risks among the Cryptocurrency UsersProceedings of the ACM Computing and Sustainable Societies (COMPASS2025)
-
Honey Trap or Romantic Utopia: A Case Study of Final Fantasy XIV Players PII Disclosure in Intimate Partner-Seeking Postss
-
Exploring User Perceptions of Security Auditing in the Web3 EcosystemNetwork and Distributed System Security (NDSS) Symposium 2025
-
Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency EcosystemIEEE Symposium on Security and Privacy (S&P 2025)
-
I'm not convinced that they don’t collect more than is necessary: User-Controlled Data Minimization Design in Search EnginesUsenix Security 2024
-
“I Can’t Believe It’s Not Custodial!”: Usable Trustless Decentralized Key Management.(CHI 2024) The ACM CHI Conference on Human Factors in Computing and Systems
-
Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice.(IEEE ICBC 2024) IEEE International Conference on Blockchain and Cryptocurrency
-
Designing Accessible Obfuscation Support for Blind People’s Visual Privacy(CHI 2024) The ACM CHI Conference on Human Factors in Computing Systems
-
"Don't put all your eggs in one basket": Understanding Crypto Users' Perceptions and Practices Towards Multi-Wallet Usage(CHI 2024) The ACM CHI Conference on Human Factors in Computing Systems
-
Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem(CHI 2024) The ACM CHI Conference on Human Factors in Computing Systems
-
Disability-first Design and Creation of a Dataset Showing Private Visual Information Collected with People Who are Blind(CHI 2023) The ACM CHI Conference on Human Factors in Computing Systems
-
User Perceptions and Experiences of Targeted Ads on Social Media Platforms: Learning from Bangladesh and India(CHI 2023) The ACM CHI Conference on Human Factors in Computing Systems
-
A Mixed-Methods Study of Security Practices of Smart Contract Developers(USENIX Security 23) 32nd USENIX Security Symposium
-
Iterative Design of An Accessible Crypto Wallet for Blind Users.(SOUPS 2023) Symposium on Usable Privacy and Security
-
Rethinking Data Minimization from a User-Centered Approach: A Paradigm.(USENIX PEPR 23) 2023 USENIX Conference on Privacy Engineering Practice and Respect
-
GuardLens: Supporting Safer Online Browsing for People with Visual Impairments(SOUPS 2023) Symposium on Usable Privacy and Security
-
Using ChatGPT in HCI Research—A Trioethnography(ACM CUI '23) Proceedings of the 5th International Conference on Conversational User Interfaces
-
A First Look into Software Security Practices in Bangladesh.(ACM COMPASS 23) ACM Journal on Computing and Sustainable Societies
-
“It's A Blessing and A Curse": Unpacking Creators' Practices with Non-Fungible Tokens (NFTs) and Their Communities.(CESC 22) Crypto Economics Security Conference (CESC 22)
-
Privacy during pandemic: A global view of privacy practices around COVID-19 apps(ACM COMPASS 21) ACM SIGCAS Conference on Computing and Sustainable.
-
Mapping risk assessment strategy for COVID-19 mobile apps’ vulnerabilities(Computing Conference 2021) Proceedings of the Computing Conference 2021.
-
Enabling user-centered privacy controls for mobile applications: COVID-19 perspective.(ACM TOIT 2021) ACM Transactions on Internet Technologies
-
Use of apps in the COVID-19 response and the loss of privacy protection.(Nature 2020) Nature Comment 2020
-
Towards inclusive privacy protections in the cloud(ACNS 20) In Applied Cryptography and Network Security.
-
Preserving Privacy in Cyber-Physical Social Systems: An Anonymity and Access Control Approach(IOT'20) Proceedings of International Conference on the Internet of Things 2019
-
Privacy apps for smartphones: An assessment of users’ preferences and limitations.(HCII 2020) In HCI for Cybersecurity, Privacy, and Trust.
-
A restful e-governance application framework for people identity verification in the cloud.(CLOUD 2018) In Cloud Computing–CLOUD 2018
-
PSO-NF-based vertical handoff decision for ubiquitous heterogeneous wireless network (UHWN).(IWCI 2016) In 2016 International Workshop on Computational Intelligence IWCI.
-
A dynamic data placement policy for heterogeneous Hadoop cluster.(ICAEE 2017) In 2017 4th International Conference on Advances in Electrical Engineering (ICAEE)