Follow
Razieh Nokhbeh Zaeem
Razieh Nokhbeh Zaeem
Senior Software Engineer, Google
Verified email at utexas.edu - Homepage
Title
Cited by
Cited by
Year
The effect of the GDPR on privacy policies: Recent progress and future promise
RN Zaeem, KS Barber
ACM Transactions on Management Information Systems (TMIS) 12 (1), 1-20, 2020
2582020
Automated generation of oracles for testing user-interaction features of mobile apps
RN Zaeem, MR Prasad, S Khurshid
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
1342014
Privacycheck: Automatic summarization of privacy policies using data mining
RN Zaeem, RL German, KS Barber
ACM Transactions on Internet Technology (TOIT) 18 (4), 1-18, 2018
1292018
Modeling and analysis of identity threat behaviors through text mining of identity theft stories
RN Zaeem, M Manoharan, Y Yang, KS Barber
Computers & Security 65, 50-63, 2017
1032017
Automated test generation and mutation testing for Alloy
A Sullivan, K Wang, RN Zaeem, S Khurshid
2017 IEEE International Conference on Software Testing, Verification and …, 2017
602017
Improving the effectiveness of spectra-based fault localization using specifications
D Gopinath, RN Zaeem, S Khurshid
Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012
542012
An assessment of blockchain identity solutions: Minimizing risk and liability of authentication
R Rana, RN Zaeem, KS Barber
IEEE/WIC/ACM International Conference on Web Intelligence, 26-33, 2019
472019
Contract-based data structure repair using Alloy
R Nokhbeh Zaeem, S Khurshid
ECOOP 2010–Object-Oriented Programming: 24th European Conference, Maribor …, 2010
472010
On sentiment of online fake news
RN Zaeem, C Li, KS Barber
2020 IEEE/ACM International Conference on Advances in Social Networks …, 2020
462020
PrivacyCheck v2: A tool that recaps privacy policies for you
R Nokhbeh Zaeem, S Anya, A Issa, J Nimergood, I Rogers, V Shah, ...
Proceedings of the 29th ACM international conference on information …, 2020
432020
Identity threat assessment and prediction
J Zaiss, R Nokhbeh Zaeem, KS Barber
Journal of Consumer Affairs 53 (1), 58-70, 2019
422019
A large publicly available corpus of website privacy policies based on dmoz
R Nokhbeh Zaeem, KS Barber
Proceedings of the eleventh ACM conference on data and application security …, 2021
392021
A study of web privacy policies across industries
R Nokhbeh Zaeem, KS Barber
Journal of Information Privacy and Security 13 (4), 169-185, 2017
392017
Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes
RN Zaeem, S Budalakoti, KS Barber, M Rasheed, C Bajaj
2016 IEEE International Carnahan Conference on Security Technology (ICCST), 1-8, 2016
322016
Blockchain-based self-sovereign identity: Survey, requirements, use-cases, and comparative study
R Nokhbeh Zaeem, KC Chang, TC Huang, D Liau, W Song, A Tyagi, ...
IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent …, 2021
312021
It is an equal failing to trust everybody and to trust nobody: Stock price prediction using trust filters and enhanced user sentiment on Twitter
TC Huang, RN Zaeem, KS Barber
ACM Transactions on Internet Technology (TOIT) 19 (4), 1-20, 2019
282019
Towards a test automation framework for Alloy
A Sullivan, RN Zaeem, S Khurshid, D Marinov
Proceedings of the 2014 International SPIN Symposium on Model Checking of …, 2014
272014
Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups
R Nokhbeh Zaeem, M Manoharan, KS Barber
2016 European Intelligence and Security Informatics Conference (EISIC), 32-38, 2016
232016
Privacycheck v3: empowering users with higher-level understanding of privacy policies
R Nokhbeh Zaeem, A Ahbab, J Bestor, HH Djadi, S Kharel, V Lai, N Wang, ...
Proceedings of the Fifteenth ACM International Conference on Web Search and …, 2022
222022
History-aware data structure repair using SAT
R Nokhbeh Zaeem, D Gopinath, S Khurshid, KS McKinley
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
202012
The system can't perform the operation now. Try again later.
Articles 1–20