Norman Sadeh

ORCID: 0000-0003-4829-5533
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • Scheduling and Optimization Algorithms
  • Privacy-Preserving Technologies in Data
  • Auction Theory and Applications
  • Mobile Crowdsensing and Crowdsourcing
  • Human Mobility and Location-Based Analysis
  • Service-Oriented Architecture and Web Services
  • Supply Chain and Inventory Management
  • Advanced Malware Detection Techniques
  • User Authentication and Security Systems
  • Mobile Agent-Based Network Management
  • Context-Aware Activity Recognition Systems
  • Constraint Satisfaction and Optimization
  • Multi-Agent Systems and Negotiation
  • Consumer Market Behavior and Pricing
  • Sharing Economy and Platforms
  • Sexuality, Behavior, and Technology
  • Advanced Manufacturing and Logistics Optimization
  • Business Process Modeling and Analysis
  • Semantic Web and Ontologies
  • Hate Speech and Cyberbullying Detection
  • Internet Traffic Analysis and Secure E-voting
  • Spam and Phishing Detection
  • Digital Platforms and Economics
  • Topic Modeling

Carnegie Mellon University
2016-2025

University of Maryland, Baltimore County
2021

Defense Advanced Research Projects Agency
2006

European Food Information Council
2000

European Commission
2000

University of Pittsburgh
1998

University of Toronto
1995

ABSTRACT A global economy and increase in customer expectations terms of cost services have put a premium on effective supply chain reengineering. It is essential to perform risk‐benefit analysis reengineering alternatives before making final decision. Simulation provides an pragmatic approach detailed evaluation design management alternatives. However, the utility this methodology hampered by time effort required develop models with sufficient fidelity actual interest. In paper, we describe...

10.1111/j.1540-5915.1998.tb01356.x article EN Decision Sciences 1998-07-01

Each month, more attacks are launched with the aim of making web users believe that they communicating a trusted entity for purpose stealing account information, logon credentials, and identity information in general. This attack method, commonly known as "phishing," is most initiated by sending out emails links to spoofed websites harvest information. We present method detecting these attacks, which its general form an application machine learning on feature set designed highlight...

10.1145/1242572.1242660 article EN 2007-05-08

Urban sensing, participatory and user activity recognition can provide rich contextual information for mobile applications such as social networking location-based services. However, continuously capturing this on devices consumes huge amount of energy. In paper, we present a novel design framework an Energy Efficient Mobile Sensing System (EEMSS). EEMSS uses hierarchical sensor management strategy to recognize states well detect state transitions. By powering only minimum set sensors using...

10.1145/1555816.1555835 article EN 2009-06-22

Smartphone security research has produced many useful tools to analyze the privacy-related behaviors of mobile apps. However, these automated cannot assess people's perceptions whether a given action is legitimate, or how that makes them feel with respect privacy. For example, might detect blackjack game and map app both use one's location information, but people would likely view map's data as more legitimate than game. Our work introduces new model for privacy, namely privacy expectations....

10.1145/2370216.2370290 article EN 2012-09-05

This paper examines the location traces of 489 users a sharing social network for relationships between users' mobility patterns and structural properties their underlying network. We introduce novel set location-based features analyzing context geographic region, including entropy, which measures diversity unique visitors location. Using these features, we provide model predicting friendship two by trails. Our achieves significant gains over simpler models based only on direct co-location...

10.1145/1864349.1864380 article EN 2010-09-26

User review is a crucial component of open mobile app markets such as the Google Play Store. How do we automatically summarize millions user reviews and make sense out them? Unfortunately, beyond simple summaries histograms ratings, there are few analytic tools that can provide insights into reviews. In this paper, propose Wiscom, system analyze tens ratings comments in at three different levels detail. Our able to (a) discover inconsistencies reviews; (b) identify reasons why users like or...

10.1145/2487575.2488202 article EN 2013-08-11

Studying the social dynamics of a city on large scale has tra- ditionally been challenging endeavor, requiring long hours observation and interviews, usually resulting in only par- tial depiction reality. At same time, boundaries municipal organizational units, such as neighborhoods districts, are largely statically defined by government do not always reflect character life these ar- eas. To address both difficulties, we introduce clustering model research methodology for studying structure...

10.1609/icwsm.v6i1.14278 article EN Proceedings of the International AAAI Conference on Web and Social Media 2021-08-03

Natural language inference (NLI) is the task of determining if a natural hypothesis can be inferred from given premise in justifiable manner. NLI was proposed as benchmark for understanding. Existing models perform well at standard datasets NLI, achieving impressive results across different genres text. However, extent to which these understand semantic content sentences unclear. In this work, we propose an evaluation methodology consisting automatically constructed "stress tests" that allow...

10.48550/arxiv.1806.00692 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Smartphone users are often unaware of the data collected by apps running on their devices. We report a study that evaluates benefits giving an app permission manager and sending them nudges intended to raise awareness apps. Our provides both qualitative quantitative evidence these approaches complementary can each play significant role in empowering more effectively control privacy. For instance, even after week with access manager, participants benefited from showing how some sensitive was...

10.1145/2702123.2702210 article EN 2015-04-17

Smartphones have unprecedented access to sensitive personal information. While users report having privacy concerns, they may not actively consider while downloading apps from smartphone application marketplaces. Currently, Android only the permissions display, which appears after selected an app download, help them understand how applications their We investigate and could play a more active role in app-selection decisions. designed short "Privacy Facts' we tested 20-participant lab study...

10.1145/2470654.2466466 article EN 2013-04-27

Fei Liu, Jeffrey Flanigan, Sam Thomson, Norman Sadeh, Noah A. Smith. Proceedings of the 2015 Conference North American Chapter Association for Computational Linguistics: Human Language Technologies. 2015.

10.3115/v1/n15-1114 article EN cc-by Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies 2015-01-01

Shomir Wilson, Florian Schaub, Aswarth Abhilash Dara, Frederick Liu, Sushain Cherivirala, Pedro Giovanni Leon, Mads Schaarup Andersen, Sebastian Zimmeck, Kanthashree Mysore Sathyendra, N. Cameron Russell, Thomas B. Norton, Eduard Hovy, Joel Reidenberg, Norman Sadeh. Proceedings of the 54th Annual Meeting Association for Computational Linguistics (Volume 1: Long Papers). 2016.

10.18653/v1/p16-1126 article EN cc-by Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers) 2016-01-01

Anecdotal evidence and scholarly research have shown that Internet users may regret some of their online disclosures. To help individuals avoid such regrets, we designed two modifications to the Facebook web interface nudge consider content audience disclosures more carefully. We implemented evaluated these nudges in a 6-week field trial with 28 users. analyzed participants' interactions nudges, posts, opinions collected through surveys. found reminders about posts can prevent unintended...

10.1145/2556288.2557413 article EN 2014-04-26

Abstract The app economy is largely reliant on data collection as its primary revenue model. To comply with legal requirements, developers are often obligated to notify users of their privacy practices in policies. However, prior research has suggested that many not accurately disclosing apps’ practices. Evaluating discrepancies between code and policies enables the identification potential compliance issues. In this study, we introduce Mobile App Privacy System (MAPS) for conducting an...

10.2478/popets-2019-0037 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2019-07-01

A model of decentralized problem solving, called distributed constrained heuristic search (DCHS), that provides both structure and focus in individual agent spaces to optimize decisions the global space, is presented. The achieves this by integrating constraint satisfaction search. It a formalism suitable for describing large set artificial intelligence problems. notion textures allow agents operate an asynchronous concurrent manner introduced. use coupled with backjumping, type...

10.1109/21.135688 article EN IEEE Transactions on Systems Man and Cybernetics 1991-01-01

Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, success online social networks and existing commercial mobile location sharing which do not incorporate feedback would seem to call importance into question. We investigated this issue context a system. Specifically, we report on findings field de-ployment Locyoution, In our study 56 users, one group was given form history requests, second no at...

10.1145/1518701.1519005 article EN 2009-04-04
Coming Soon ...