Weijia He
Weijia He
Verified email at - Homepage
Cited by
Cited by
Rethinking Access Control and Authentication for the Home Internet of Things (IoT)
W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur
27th USENIX Security Symposium (USENIX Security 18), 255-272, 2018
How users interpret bugs in trigger-action programming
W Brackenbury, A Deora, J Ritchey, J Vallee, W He, G Wang, ML Littman, ...
Proceedings of the 2019 CHI conference on human factors in computing systems …, 2019
Autotap: synthesizing and repairing trigger-action programs using ltl properties
L Zhang, W He, J Martinez, N Brackenbury, S Lu, B Ur
IEEE/ACM 41st International Conference on Software Engineering (ICSE), 281-291, 2019
When smart devices are stupid: negative experiences using home smart devices
W He, J Martinez, R Padhi, L Zhang, B Ur
2019 IEEE Security and Privacy Workshops (SPW), 150-155, 2019
Trace2tap: Synthesizing trigger-action programs from traces of behavior
L Zhang, W He, O Morkved, V Zhao, ML Littman, S Lu, B Ur
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
SoK: Context sensing for access control in the adversarial home IoT
W He, V Zhao, O Morkved, S Siddiqui, E Fernandes, J Hester, B Ur
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 37-53, 2021
Clap on, clap off: usability of authentication methods in the smart home
W He, J Hainline, R Padhi, B Ur
Proceedings of the Interactive Workshop on the Human Aspect of Smarthome …, 2018
The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson
D Anthony, CA Gunter, W He, M Khanafer, S Landau, R Mangar, ...
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 129-134, 2023
Making Interactions with Home IoT Devices More Secure, Private, and Usable
W He
The University of Chicago, 2022
The system can't perform the operation now. Try again later.
Articles 1–9