Follow
Lucy Qin
Lucy Qin
Verified email at georgetown.edu - Homepage
Title
Cited by
Cited by
Year
Accessible privacy-preserving web-based data analysis for assessing and addressing economic inequalities
A Lapets, F Jansen, KD Albab, R Issa, L Qin, M Varia, A Bestavros
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable …, 2018
702018
Standardizing Automated DNA Assembly: Best Practices, Metrics, and Protocols Using Robots
DD David I. Walsh, III, Marilene Pavan, Luis Ortiz, Scott Wick, Johanna ...
SLAS Technology: Translating Life Sciences Innovation, 2019
502019
Callisto: A cryptographic approach to detecting serial perpetrators of sexual misconduct
A Rajan, L Qin, DW Archer, D Boneh, T Lepoint, M Varia
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable …, 2018
412018
From Usability to Secure Computing and Back Again
L Qin, A Lapets, F Jansen, P Flockhart, KD Albab, I Globus-Harris, ...
Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019), 2019
312019
Outside looking in: Approaches to content moderation in end-to-end encrypted systems
S Kamara, M Knodel, E Llansó, G Nojeim, L Qin, D Thakur, C Vogus
arXiv preprint arXiv:2202.04617, 2022
282022
A Decentralized and Encrypted National Gun Registry
S Kamara, T Moataz, A Park, L Qin
IEEE Symposium on Security and Privacy 2021, 2021
252021
Role-Based Ecosystem for the Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications
A Lapets, KD Albab, R Issa, L Qin, M Varia, A Bestavros, F Jansen
Proceedings of IEEE Secure Development 2019, 2019
132019
Tutorial: Deploying secure multi-party computation on the web using JIFF
KD Albab, R Issa, A Lapets, P Flockhart, L Qin, I Globus-Harris
2019 IEEE Cybersecurity Development (SecDev), 3-3, 2019
72019
"Did They F***ing Consent to That?": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse
L Qin, V Hamilton, S Wang, Y Aydinalp, M Scarlett, EM Redmiles
USENIX Security, 2024
5*2024
Tutorial: Deploying secure multi-party computation on the web using JIFF. In 2019 IEEE Cybersecurity Development (SecDev)
KD Albab, R Issa, A Lapets, P Flockhart, L Qin, I Globus-Harris
Tysons Corner, VA, USA, 3-3, 2019
52019
Toward Safer Intimate Futures: Recommendations for Tech Platforms to Reduce Image Based Sexual Abuse
L Qin, V Hamilton, Y Aydinalp, M Scarlett, S Wang, EM Redmiles
https://www.eswalliance.org …, 2023
42023
Attached to “The algorithm”: Making sense of algorithmic precarity on instagram
Y Register, L Qin, A Baughan, ES Spiro
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems …, 2023
42023
Secure account recovery for a privacy-preserving web service
R Little, L Qin, M Varia
Cryptology ePrint Archive, 2024
22024
Synq: Public Policy Analytics Over Encrypted Data
Z Espiritu, M George, S Kamara, L Qin
2024 IEEE Symposium on Security and Privacy (SP), 146-165, 2024
22024
You Still See Me: How Data Protection Supports the Architecture of ML Surveillance
RJ Yew, L Qin, S Venkatasubramanian
arXiv preprint arXiv:2402.06609, 2024
22024
(Mis)use of Nude Images in Machine Learning Research
A Arya, P Cintaqia, D Kumar, A McDonald, L Qin, EM Redmiles
EvalEval Workshop at NeurIPS 2024, 2024
2024
GOLDBAR: A Framework for Combinatorial Biological Design
N Roehner, J Roberts, A Lapets, D Gould, V Akavoor, L Qin, DB Gordon, ...
ACS Synthetic Biology 13 (9), 2899-2911, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–17