


default search action
Razieh Nokhbeh Zaeem
Person information
- affiliation: The University of Texas at Austin, TX, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j6]Aditya Tyagi, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Early Warning Identity Threat and Mitigation System. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - [c32]Razieh Nokhbeh Zaeem, Ahmad Ahbab, Josh Bestor, Hussam H. Djadi, Sunny Kharel, Victor Lai, Nick Wang, K. Suzanne Barber:
PrivacyCheck v3: Empowering Users with Higher-Level Understanding of Privacy Policies. WSDM 2022: 1593-1596 - 2021
- [j5]Teng-Chieh Huang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Identifying Real-world Credible Experts in the Financial Domain. DTRAP 2(2): 17:1-17:14 (2021) - [j4]Razieh Nokhbeh Zaeem
, K. Suzanne Barber:
The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise. ACM Trans. Manag. Inf. Syst. 12(1): 2:1-2:20 (2021) - [c31]Razieh Nokhbeh Zaeem, K. Suzanne Barber:
A Large Publicly Available Corpus of Website Privacy Policies Based on DMOZ. CODASPY 2021: 143-148 - [c30]Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Comparing Privacy Policies of Government Agencies and Companies: A Study using Machine-learning-based Privacy Policy Analysis Tools. ICAART (2) 2021: 29-40 - [c29]Teng-Chieh Huang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Finding Trustworthy Users: Twitter Sentiment Towards US Presidential Candidates in 2016 and 2020. IntelliSys (2) 2021: 804-821 - [c28]Nima Dini, Razieh Nokhbeh Zaeem, Sarfraz Khurshid:
Enhancing constraint-based repair of data structure errors that recur using memoization. SAC 2021: 1823-1832 - [c27]Razieh Nokhbeh Zaeem, Kai Chih Chang, Teng-Chieh Huang, David Liau, Wenting Song, Aditya Tyagi, Manah M. Khalil, Michael R. Lamison, Siddharth Pandey, K. Suzanne Barber:
Blockchain-Based Self-Sovereign Identity: Survey, Requirements, Use-Cases, and Comparative Study. WI/IAT 2021: 128-135 - [c26]Wenting Song, Razieh Nokhbeh Zaeem, David Liau, Kai Chih Chang, Michael R. Lamison, Manah M. Khalil, K. Suzanne Barber:
Self-Sovereign Identity and User Control for Privacy-Preserving Contact Tracing. WI/IAT 2021: 438-445 - 2020
- [c25]Razieh Nokhbeh Zaeem, Chengjing Li, K. Suzanne Barber:
On Sentiment of Online Fake News. ASONAM 2020: 760-767 - [c24]Razieh Nokhbeh Zaeem
, K. Suzanne Barber:
How Much Identity Management with Blockchain Would Have Saved Us? A Longitudinal Study of Identity Theft. BIS (Workshops) 2020: 158-168 - [c23]Razieh Nokhbeh Zaeem, Safa Anya, Alex Issa, Jake Nimergood, Isabelle Rogers, Vinay Shah, Ayush Srivastava, K. Suzanne Barber:
PrivacyCheck v2: A Tool that Recaps Privacy Policies for You. CIKM 2020: 3441-3444 - [c22]David Liau, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
An Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach. ICAART (1) 2020: 136-143 - [c21]Kai Chih Chang
, Razieh Nokhbeh Zaeem
, K. Suzanne Barber
:
A Framework for Estimating Privacy Risk Scores of Mobile Apps. ISC 2020: 217-233 - [c20]David Liau, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
A Survival Game Analysis to Personal Identity Protection Strategies. TPS-ISA 2020: 209-217 - [c19]Kai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable Information. TPS-ISA 2020: 256-262 - [c18]Razieh Nokhbeh Zaeem, Safa Anya, Alex Issa, Jake Nimergood, Isabelle Rogers, Vinay Shah, Ayush Srivastava, K. Suzanne Barber:
PrivacyCheck's Machine Learning to Digest Privacy Policies: Competitor Analysis and Usage Patterns. WI/IAT 2020: 291-298
2010 – 2019
- 2019
- [j3]Teng-Chieh Huang, Razieh Nokhbeh Zaeem
, K. Suzanne Barber:
It Is an Equal Failing to Trust Everybody and to Trust Nobody: Stock Price Prediction Using Trust Filters and Enhanced User Sentiment on Twitter. ACM Trans. Internet Techn. 19(4): 48:1-48:20 (2019) - [c17]Chia-Ju Chen, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Statistical Analysis of Identity Risk of Exposure and Cost Using the Ecosystem of Identity Attributes. EISIC 2019: 32-39 - [c16]David Liau, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach. PST 2019: 1-3 - [c15]Rima Rana, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication. WI 2019: 26-33 - 2018
- [j2]Razieh Nokhbeh Zaeem, Rachel L. German, K. Suzanne Barber:
PrivacyCheck: Automatic Summarization of Privacy Policies Using Data Mining. ACM Trans. Internet Techn. 18(4): 53:1-53:18 (2018) - [c14]Kai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Internet of Things: Securing the Identity by Analyzing Ecosystem Models of Devices and Organizations. AAAI Spring Symposia 2018 - [c13]Rima Rana, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
US-Centric vs. International Personally Identifiable Information: A Comparison Using the UT CID Identity Ecosystem. ICCST 2018: 1-5 - [c12]Kai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Enhancing and Evaluating Identity Privacy and Authentication Strength by Utilizing the Identity Ecosystem. WPES@CCS 2018: 114-120 - 2017
- [j1]Razieh Nokhbeh Zaeem
, Monisha Manoharan, Yongpeng Yang, K. Suzanne Barber:
Modeling and analysis of identity threat behaviors through text mining of identity theft stories. Comput. Secur. 65: 50-63 (2017) - [c11]Allison Sullivan
, Kaiyuan Wang, Razieh Nokhbeh Zaeem, Sarfraz Khurshid:
Automated Test Generation and Mutation Testing for Alloy. ICST 2017: 264-275 - 2016
- [c10]Razieh Nokhbeh Zaeem, Monisha Manoharan, K. Suzanne Barber:
Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups. EISIC 2016: 32-38 - [c9]Razieh Nokhbeh Zaeem, Suratna Budalakoti, K. Suzanne Barber, Muhibur Rasheed, Chandrajit Bajaj:
Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes. ICCST 2016: 1-8 - 2014
- [c8]Razieh Nokhbeh Zaeem, Mukul R. Prasad, Sarfraz Khurshid:
Automated Generation of Oracles for Testing User-Interaction Features of Mobile Apps. ICST 2014: 183-192 - [c7]Allison Sullivan
, Razieh Nokhbeh Zaeem, Sarfraz Khurshid, Darko Marinov:
Towards a test automation framework for alloy. SPIN 2014: 113-116 - 2013
- [c6]Razieh Nokhbeh Zaeem, Muhammad Zubair Malik, Sarfraz Khurshid:
Repair Abstractions for More Efficient Data Structure Repair. RV 2013: 235-250 - 2012
- [c5]Divya Gopinath, Razieh Nokhbeh Zaeem, Sarfraz Khurshid:
Improving the effectiveness of spectra-based fault localization using specifications. ASE 2012: 40-49 - [c4]Razieh Nokhbeh Zaeem, Sarfraz Khurshid:
Test input generation using dynamic programming. SIGSOFT FSE 2012: 34 - [c3]Razieh Nokhbeh Zaeem, Divya Gopinath, Sarfraz Khurshid, Kathryn S. McKinley:
History-Aware Data Structure Repair Using SAT. TACAS 2012: 2-17 - 2010
- [c2]Razieh Nokhbeh Zaeem, Sarfraz Khurshid:
Introducing Specification-Based Data Structure Repair Using Alloy. ASM 2010: 398-399 - [c1]Razieh Nokhbeh Zaeem, Sarfraz Khurshid:
Contract-Based Data Structure Repair Using Alloy. ECOOP 2010: 577-598
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint