Follow
Jaspreet Bhatia
Title
Cited by
Cited by
Year
Toward a Framework for Detecting Privacy Policy Violation in Android Application Code
R Slavin, X Wang, MB Hosseini, W Hester, R Krishnan, J Bhatia, ...
International Conference on Software Engineering, 25-36, 2016
1522016
Ambiguity in privacy policies and the impact of regulation
JR Reidenberg, J Bhatia, TD Breaux, TB Norton
The Journal of Legal Studies 45 (S2), S163-S190, 2016
772016
A Theory of Vagueness and Privacy Risk Perception
J Bhatia, T Breaux, JR Reidenberg, TB Norton
24th International Requirements Engineering Conference, 10, 2016
592016
Towards an information type lexicon for privacy policies
J Bhatia, TD Breaux
2015 IEEE eighth international workshop on requirements engineering and law …, 2015
432015
Mining privacy goals from privacy policies using hybridized task recomposition
J Bhatia, TD Breaux, F Schaub
ACM Transactions on Software Engineering and Methodology (TOSEM) 25 (3), 1-24, 2016
372016
Empirical Measurement of Perceived Privacy Risk
J Bhatia, TD Breaux
Accepted to ACM Transaction on Computer-Human Interaction (TOCHI), 2018
302018
An evaluation of constituency-based hyponymy extraction from privacy policies
MC Evans, J Bhatia, S Wadkar, TD Breaux
2017 IEEE 25th International Requirements Engineering Conference (RE), 312-321, 2017
302017
Privacy risk in cybersecurity data sharing
J Bhatia, TD Breaux, L Friedberg, H Hibshi, D Smullen
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
292016
Semantic incompleteness in privacy policy goals
J Bhatia, TD Breaux
2018 IEEE 26th International Requirements Engineering Conference (RE), 159-169, 2018
252018
Automated Extraction of Regulated Information Types using Hyponymy Relations
J Bhatia, M Evans, S Wadkar, TD Breaux
3rd International Workshop on Artificial Intelligence for Requirements …, 2016
242016
Using grammatical knowledge patterns for structuring requirements specifications
J Bhatia, R Sharma, KK Biswas, S Ghaisas
2013 3rd International Workshop on Requirements Patterns (RePa), 31-34, 2013
172013
A data purpose case study of privacy policies
J Bhatia, TD Breaux
2017 IEEE 25th International Requirements Engineering Conference (RE), 394-399, 2017
162017
PVDetector: a detector of privacy-policy violations for Android apps
R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ...
2016 IEEE/ACM International Conference on Mobile Software Engineering and …, 2016
142016
Identifying incompleteness in privacy policy goals using semantic frames
J Bhatia, MC Evans, TD Breaux
Requirements Engineering 24 (3), 291-313, 2019
112019
Automated identification of business rules in requirements documents
R Sharma, J Bhatia, KK Biswas
2014 IEEE International Advance Computing Conference (IACC), 1442-1447, 2014
102014
Privacy goal mining through hybridized task re-composition
J Bhatia, TD Breaux, F Schaub
ACM Trans. Soft. Engr. Method 25 (3), 22, 2016
72016
Improved cyber threat indicator sharing by scoring privacy risk
DM Best, J Bhatia, ES Peterson, TD Breaux
2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017
62017
Machine learning for constituency test of coordinating conjunctions in requirements specifications
R Sharma, J Bhatia, KK Biswas
Proceedings of the 3rd International Workshop on Realizing Artificial …, 2014
62014
Comparative study of Open Source Software reliability assessment models
K Yadav, E Jain, J Bhatia
2011 3rd International Conference on Computer Research and Development 1 …, 2011
52011
The 6th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE'19)
J Bhatia, PK Murukannaiah, N Niu, F Dalpiaz
2019 IEEE 27th International Requirements Engineering Conference Workshops …, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20