default search action
Hamza Harkous
Person information
- affiliation: Google, Zurich, Switzerland
- affiliation (PhD 2017): EPFL, Lausanne, Switzerland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Sebastian Zimmeck, Daniel Goldelman, Owen Kaplan, Logan Brown, Justin Casler, Judeley Jean-Charles, Joe Champeau, Hamza Harkous:
Website Data Transparency in the Browser. Proc. Priv. Enhancing Technol. 2024(2): 211-234 (2024) - [c16]Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin:
A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends. USENIX Security Symposium 2024 - [i11]Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin:
A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends. CoRR abs/2403.02292 (2024) - [i10]Wenjun Zeng, Yuchi Liu, Ryan Mullins, Ludovic Peran, Joe Fernandez, Hamza Harkous, Karthik Narasimhan, Drew Proud, Piyush Kumar, Bhaktipriya Radharapu, Olivia Sturman, Oscar Wahltinez:
ShieldGemma: Generative AI Content Moderation Based on Gemma. CoRR abs/2407.21772 (2024) - 2023
- [j4]Kavous Salehzadeh Niksirat, Diana Korka, Hamza Harkous, Kévin Huguenin, Mauro Cherubini:
On the Potential of Mediation Chatbots for Mitigating Multiparty Privacy Conflicts - A Wizard-of-Oz Study. Proc. ACM Hum. Comput. Interact. 7(CSCW1): 1-33 (2023) - [c15]Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz:
Automated Cookie Notice Analysis and Enforcement. USENIX Security Symposium 2023: 1109-1126 - 2022
- [c14]Hamza Harkous, Sai Teja Peddinti, Rishabh Khandelwal, Animesh Srivastava, Nina Taft:
Hark: A Deep Learning System for Navigating Privacy Feedback at Scale. SP 2022: 2469-2486 - [i9]Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz:
CookieEnforcer: Automated Cookie Notice Analysis and Enforcement. CoRR abs/2204.04221 (2022) - 2021
- [c13]Rishabh Khandelwal, Thomas Linden, Hamza Harkous, Kassem Fawaz:
PriSEC: A Privacy Settings Enforcement Controller. USENIX Security Symposium 2021: 465-482 - 2020
- [j3]Thomas Linden, Rishabh Khandelwal, Hamza Harkous, Kassem Fawaz:
The Privacy Policy Landscape After the GDPR. Proc. Priv. Enhancing Technol. 2020(1): 47-64 (2020) - [c12]Hamza Harkous, Isabel Groves, Amir Saffari:
Have Your Text and Use It Too! End-to-End Neural Data-to-Text Generation with Semantic Fidelity. COLING 2020: 2410-2424 - [i8]Hamza Harkous, Isabel Groves, Amir Saffari:
Have Your Text and Use It Too! End-to-End Neural Data-to-Text Generation with Semantic Fidelity. CoRR abs/2004.06577 (2020)
2010 – 2019
- 2019
- [c11]Kassem Fawaz, Thomas Linden, Hamza Harkous:
Invited Paper: The Applications of Machine Learning in Privacy Notice and Choice. COMSNETS 2019: 118-124 - 2018
- [c10]Amit Gupta, Rémi Lebret, Hamza Harkous, Karl Aberer:
280 Birds With One Stone: Inducing Multilingual Taxonomies From Wikipedia Using Character-Level Classification. AAAI 2018: 4824-4831 - [c9]Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer:
Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. USENIX Security Symposium 2018: 531-548 - [i7]Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer:
Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. CoRR abs/1802.02561 (2018) - [i6]Thomas Linden, Hamza Harkous, Kassem Fawaz:
The Privacy Policy Landscape After the GDPR. CoRR abs/1809.08396 (2018) - 2017
- [b1]Hamza Harkous:
Data-Driven, Personalized Usable Privacy. EPFL, Switzerland, 2017 - [c8]Amit Gupta, Rémi Lebret, Hamza Harkous, Karl Aberer:
Taxonomy Induction Using Hypernym Subsequences. CIKM 2017: 1329-1338 - [c7]Hamza Harkous, Karl Aberer:
"If You Can't Beat them, Join them": A Usability Approach to Interdependent Privacy in Cloud Apps. CODASPY 2017: 127-138 - [i5]Hamza Harkous, Karl Aberer:
"If You Can't Beat them, Join them": A Usability Approach to Interdependent Privacy in Cloud Apps. CoRR abs/1702.08234 (2017) - [i4]Amit Gupta, Rémi Lebret, Hamza Harkous, Karl Aberer:
280 Birds with One Stone: Inducing Multilingual Taxonomies from Wikipedia using Character-level Classification. CoRR abs/1704.07624 (2017) - [i3]Amit Gupta, Rémi Lebret, Hamza Harkous, Karl Aberer:
Taxonomy Induction using Hypernym Subsequences. CoRR abs/1704.07626 (2017) - 2016
- [j2]Hamza Harkous, Rameez Rahman, Bojan Karlas, Karl Aberer:
The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps. Proc. Priv. Enhancing Technol. 2016(4): 123-143 (2016) - [c6]Hamza Harkous, Kassem Fawaz, Kang G. Shin, Karl Aberer:
PriBots: Conversational Privacy with Chatbots. WSF@SOUPS 2016 - [c5]Hamza Harkous, Rameez Rahman, Karl Aberer:
Data-Driven Privacy Indicators. WPI@SOUPS 2016 - [i2]Hamza Harkous, Rameez Rahman, Bojan Karlas, Karl Aberer:
The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps. CoRR abs/1608.05661 (2016) - 2015
- [j1]Kassem Fawaz, Fadi A. Zaraket, Wes Masri, Hamza Harkous:
PBCOV: a property-based coverage criterion. Softw. Qual. J. 23(1): 171-202 (2015) - [c4]Raúl Gracia Tinedo, Yongchao Tian, Josep Sampé, Hamza Harkous, John Lenton, Pedro García López, Marc Sánchez Artigas, Marko Vukolic:
Dissecting UbuntuOne: Autopsy of a Global-scale Personal Cloud Back-end. Internet Measurement Conference 2015: 155-168 - 2014
- [c3]Hamza Harkous, Rameez Rahman, Karl Aberer:
C3P: Context-Aware Crowdsourced Cloud Privacy. Privacy Enhancing Technologies 2014: 102-122 - 2012
- [c2]Jad Makhlouta, Fadi A. Zaraket, Hamza Harkous:
Arabic Entity Graph Extraction Using Morphology, Finite State Machines, and Graph Transformations. CICLing (1) 2012: 297-310 - [c1]Sébastien Gambs, Rachid Guerraoui, Hamza Harkous, Florian Huc, Anne-Marie Kermarrec:
Scalable and Secure Polling in Dynamic Distributed Networks. SRDS 2012: 181-190 - 2011
- [i1]Sébastien Gambs, Rachid Guerraoui, Hamza Harkous, Florian Huc, Anne-Marie Kermarrec:
Scalable and Secure Aggregation in Distributed Networks. CoRR abs/1107.5419 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint