selectED publications

Can Liu, Gradeigh D. Clark, and Janne Lindqvist. 2017. Guessing Attacks on User-Generated Gesture Passwords. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 1, Article 3 (March 2017), 24 pages. DOI: https://doi.org/10.1145/3053331

Fengpeng Yuan, Xianyi Gao, and Janne Lindqvist. 2017. How Busy Are You?: Predicting the Interruptibility Intensity of Mobile Users. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 5346-5360. DOI: https://doi.org/10.1145/3025453.3025946

Can Liu, Gradeigh D. Clark, and Janne Lindqvist. 2017. Where Usability and Security Go Hand-in-Hand: Robust Gesture-Based Authentication for Mobile Systems. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 374-386. DOI: https://doi.org/10.1145/3025453.3025879


Yulong Yang, Gradeigh D. Clark, Janne Lindqvist, and Antti Oulasvirta. 2016. Free-Form Gesture Authentication in the Wild. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 3722-3735. DOI: https://doi.org/10.1145/2858036.2858270

Xianyi Gao, Gradeigh D. Clark, and Janne Lindqvist. 2016. Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Users and Non-Users. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 1656-1668. DOI: https://doi.org/10.1145/2858036.2858049

Sugang Li, Aswin Ashok, Yanyong Zhang, Chenren Xu, Janne Lindqvist and Marco Gruteser, Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns, 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom), Sydney, NSW, 2016, pp. 1-9.
doi: 10.1109/PERCOM.2016.7456514


Gradeigh D. Clark and Janne Lindqvist, Engineering Gesture-Based Authentication Systems, in IEEE Pervasive Computing, vol. 14, no. 1, pp. 18-25, Jan.-Mar. 2015.
doi: 10.1109/MPRV.2015.6

Pia Tukkinen and Janne Lindqvist, "Understanding Motivations for Using Grocery Shopping Applications," in IEEE Pervasive Computing, vol. 14, no. 4, pp. 38-44, Oct.-Dec. 2015.
doi: 10.1109/MPRV.2015.65

Alexander De Luca and Janne Lindqvist, "Is secure and usable smartphone authentication asking too much?," in Computer, vol. 48, no. 5, pp. 64-68, May 2015. doi: 10.1109/MC.2015.134


Xianyi Gao, Bernhard Firner, Shridatt Sugrim, Victor Kaiser-Pendergrast, Yulong Yang, and Janne Lindqvist. 2014. Elastic pathing: your speed is enough to track you. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '14). ACM, New York, NY, USA, 975-986. DOI: https://doi.org/10.1145/2632048.2632077

Rannie Teodoro, Pinar Ozturk, Mor Naaman, Winter Mason, and Janne Lindqvist. 2014. The motivations and experiences of the on-demand mobile workforce. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (CSCW '14). ACM, New York, NY, USA, 236-247. DOI: http://dx.doi.org/10.1145/2531602.2531680

Michael Sherman, Gradeigh Clark, Yulong Yang, Shridatt Sugrim, Arttu Modig, Janne Lindqvist, Antti Oulasvirta, and Teemu Roos. 2014. User-generated free-form gestures for authentication: security and memorability. In Proceedings of the 12th annual international conference on Mobile systems, applications, and services (MobiSys '14). ACM, New York, NY, USA, 176-189. DOI: http://dx.doi.org/10.1145/2594368.2594375

Huiqing Fu, Yulong Yang, Nileema Shingte, Janne Lindqvist and Marco Gruteser, A Field Study of Run-Time Location Access Disclosures on Android Smartphones. in Proceedings of NDSS workshops: Usable Security (USEC 2014). doi: http://dx.doi.org/10.14722/usec.2014.23044


Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Richard Howard, Janne Lindqvist, Predrag Spasojevic, and Jeffrey Walling. 2012. Distinguishing users with capacitive touch communication. In Proceedings of the 18th annual international conference on Mobile computing and networking (Mobicom '12). ACM, New York, NY, USA, 197-208. DOI: http://dx.doi.org/10.1145/2348543.2348569

Jialiu Lin, Shahriyar Amini, Jason I. Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp '12). ACM, New York, NY, USA, 501-510. DOI: http://dx.doi.org/10.1145/2370216.2370290


Janne Lindqvist, Justin Cranshaw, Jason Wiese, Jason Hong, and John Zimmerman. 2011. I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, USA, 2409-2418. DOI: https://dx.doi.org/10.1145/1978942.1979295

Shahriyar Amini, Janne Lindqvist, Jason Hong, Jialiu Lin, Eran Toch, and Norman Sadeh. 2011. Caché: caching location-enhanced content to improve user privacy. In Proceedings of the 9th international conference on Mobile systems, applications, and services (MobiSys '11). ACM, New York, NY, USA, 197-210. DOI: http://dx.doi.org/10.1145/1999995.2000015

Janne Lindqvist and Jason Hong. 2011. Undistracted driving: a mobile phone that doesn't distract. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications (HotMobile '11). ACM, New York, NY, USA, 70-75. DOI: http://dx.doi.org/10.1145/2184489.2184504


Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, and Michael Roe. 2009. Privacy-preserving 802.11 access-point discovery. In Proceedings of the second ACM conference on Wireless network security (WiSec '09). ACM, New York, NY, USA, 123-130. DOI: http://dx.doi.org/10.1145/1514274.1514293

Tuomas Aura, Janne Lindqvist, Michael Roe, and Anish Mohammed. 2008. Chattering Laptops. In Proceedings of the 8th international symposium on Privacy Enhancing Technologies (PETS '08), Nikita Borisov and Ian Goldberg (Eds.). Springer-Verlag, Berlin, Heidelberg, 167-186. DOI: http://dx.doi.org/10.1007/978-3-540-70630-4_11