-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
executable file
·821 lines (814 loc) · 45 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
<!DOCTYPE html>
<html>
<head>
<!-- META -->
<title>Daniel Smullen</title>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<meta name="description" content="" />
<!-- CSS -->
<link rel="stylesheet" type="text/css" href="css/danielsmullen.css" media="all" />
<link rel="stylesheet" type="text/css" href="css/style.css" media="all" />
<link href="css/jquery.bxslider.css" rel="stylesheet" />
<!-- Javascript -->
<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js"></script>
<script type="text/javascript" src="js/start.js"></script>
<!-- bxSlider Javascript file -->
<script src="js/jquery.bxslider.min.js"></script>
<!-- bxSlider CSS file -->
<script src="https://kit.fontawesome.com/2599e8cb49.js" crossorigin="anonymous"></script>
<profile="http://www.w3.org/2005/10/profile"> <link rel="icon" type="image/png" href="./resources/favicon.png">
</head>
<body>
<div class="grid">
<!-- Header -->
<div class="col_12" style="margin-top:0px;">
<h1 class="center">
<p>
<span class="fa-stack fa-lg">
<i class="fa fa-square fa-stack-2x"></i>
<i class="fa fa-cogs fa-stack-1x fa-inverse"></i>
</span>
Daniel Smullen
</h1>
</div>
<!-- Tabs -->
<ul class="tabs left">
<li><a href="#aboutme"><i class="fa fa-user"></i> About Me</a></li>
<li><a href="#industryhistory"><i class="fa fa-briefcase"></i> Employment History</a></li>
<li><a href="#proj"><i class="fa fa-folder-open-o"></i> Projects </a></li>
<li>
<a href="#pub"></i><i class="fa fa-book"></i> Publications and Presentations</a>
</li>
</ul>
<!-- Tab Content -->
<!-- About Me Tab -->
<div id="aboutme" class="tab-content">
<center>
<img class="img-rounded" src="./img/daniel.png" width="300" height="300" />
<br>
<br>
<a href="https://mailhide.io/e/rfBDhFIm" target="_blank">
<button class="medium green"><i class="fa fa-envelope-o"></i> Email Me</button>
</a>
</a>
<a href="https://github.com/drspangle">
<button class="medium green"><i class="fa fa-github-square"></i> View my GitHub</button>
</a>
<a href="https://www.linkedin.com/in/daniel-r-smullen/">
<button class="medium green"><i class="fa-brands fa-linkedin"></i> Connect on LinkedIn</button>
</a>
<a href="./resources/Daniel_Smullen_CV.pdf">
<button class="medium blue"><i class="fa fa-graduation-cap"></i> Download my Full CV</button>
</a>
</center>
<p>
Dr. Daniel Smullen is currently a Principal Privacy Research Engineer at <a href="https://www.cablelabs.com">CableLabs</a>. Daniel specializes in usable privacy and security, using interdisciplinary methods to solve complex socio-technical problems impacting the global cable industry.
</p>
<br>
<h4><i class="fa fa-user"></i> About Me</h4>
<p>
I'm a proud alumni of Carnegie Mellon University Cylab, where I worked with the founders of the first (and only) Privacy Engineering academic program in the world as part of my doctoral and postdoctoral work. My unique academic training and R&D career has led to patents and a strong track record of publications in top-tier venues within the privacy engineering, PETs, ML/AI, NLP, and HCI domains. My work has given me the privilege of partnering with policymakers, regulators, government/military sponsors, and industry.
</p>
<p>
My daily duties require me to wear many hats; consultant, problem-solver, scientist, engineer, and thought leader. My work spans Usable Privacy and Security, incorporating mixed-methods methodologies seen in behavioral economics, user-centered design, requirements engineering, applied machine learning, and empirical software engineering. I solve social and technical problems using interdisciplinary research methods. My goal is to help the world develop more usable, secure, privacy-preserving, trustworthy software.
</p>
<p>
My main areas of interest include privacy, security, responsible AI, autonomous systems, software architecture, and the Internet of Things.
</p>
<p>
I speak, read, and write in English, German, and French.
</p>
<br>
<br>
<div>
<!-- Awards Table -->
<h4><i class="fa fa-trophy"></i> Awards</h4>
<table class="sortable" cellspacing="0" cellpadding="0">
<thead>
<tr>
<th>Title</th>
<th>Institution</th>
<th>Year</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Distinguished Research Award</strong></td>
<td><i>13th Symposium On Usable Privacy and Security</i></td>
<td>2017</td>
</tr>
<tr>
<td><strong>Hima and Jive Fellowship in Computer Science for International Students</strong></td>
<td><i>Carnegie Mellon University</i></td>
<td>2017</td>
</tr>
<tr>
<td><strong>Ready-Set-Transfer Technology Transfer Competition Award</strong></td>
<td><i>23rd IEEE International Requirements Engineering Conference</i></td>
<td>2015</td>
</tr>
<tr>
<td><strong>ECSE Engineering Design Challenge Winner</strong></td>
<td><i>University of Ontario Institute of Technology</i></td>
<td>2014</td>
</tr>
<tr>
<td><strong>President’s Honours List</strong></td>
<td><i>University of Ontario Institute of Technology</i></td>
<td>2014</td>
</tr>
<tr>
<td><strong>NSERC Undergraduate Student Research Award</strong></td>
<td><i>University of Ontario Institute of Technology</i></td>
<td>2013</td>
</tr>
<tr>
<td><strong>President’s Honours List</strong></td>
<td><i>University of Ontario Institute of Technology</i></td>
<td>2013</td>
</tr>
<tr>
<td><strong>President’s Honours List</strong></td>
<td><i>University of Ontario Institute of Technology</i></td>
<td>2012</td>
</tr>
<tr>
<td><strong>Dean’s Honours List</strong></td>
<td><i>University of Ontario Institute of Technology</i></td>
<td>2011</td>
</tr>
<tr>
<td><strong>Engineers Without Borders Design Challenge Winner</strong></td>
<td><i>McMaster University</i></td>
<td>2008</td>
</tr>
<tr>
<td><strong>DaVinci Engineering Design Challenge Winner</strong></td>
<td><i>University of Toronto</i></td>
<td>2007</td>
</tr>
</tbody>
</table>
</div>
</div>
<!-- Employment History Tab -->
<div id="industryhistory" class="tab-content">
<h4><i class="fa fa-briefcase"></i> Employment History</h4>
<table>
<tr>
<div class="col_2">
<img class="align-left img-rounded" src="./img/cablelabs-logo.png" width="150" height="150" />
</div>
<div class="col_10">
<h4>Principal Privacy Research Engineer</h4>
<h5>CableLabs - Security and Privacy Technologies<br>
July 2024 to Present</h5>
<p>I specialize in usable privacy and security, using interdisciplinary methods to solve complex socio-technical problems impacting the global cable industry.
</p>
</div>
</tr>
<tr>
<div class="col_2">
<img class="align-left img-rounded" src="./img/amazon-logo.png" width="150" height="150" />
</div>
<div class="col_10">
<h4>Applied Scientist II</h4>
<h5>Amazon Lab126 - Alexa Sensitive Content Intelligence<br>
October 2023 to July 2024</h5>
<p>I developed AI-powered systems for large-scale customer feedback analysis and extraction of actionable insights.
Additionally, I led research efforts in building empirical models to assess, predict, and proactively mitigate risks to customer trust arising from customer interactions with Alexa.
By leveraging cutting-edge Large Language Models, innovative prompting methods, and a mixed-methods research approach, my work generates insights that contribute to a safer, more intelligent, and more trustworthy Alexa experience.
</p>
</div>
</tr>
<tr>
<div class="col_2">
<img class="align-left img-rounded" src="./img/amazon-logo.png" width="150" height="150" />
</div>
<div class="col_10">
<h4>Applied Scientist II</h4>
<h5>Amazon Lab126 - Devices & Services Trust and Privacy<br>
November 2021 to October 2023</h5>
<p>I worked on technical privacy and trust problems for a wide range of Amazon Devices.
My role extended beyond research and development (R&D) into privacy engineering, where I covered everything from Privacy by Design to establishing industry standards and best practices.
I was involved in designing and developing privacy-preserving software/systems architectures for products, compliance tools, processes, Privacy Enhancing Technologies (PETs), and privacy requirements engineering.
Leveraging my expertise in machine learning, generative AI, and privacy metrics, I became a trusted subject matter expert, providing technical education, mentorship, and thought leadership to product teams, people managers, leaders, and lawyers.
</p>
</div>
</tr>
<tr>
<div class="col_2">
<img class="align-left img-rounded" src="./img/isr.gif" width="150" height="150" />
</div>
<div class="col_10">
<h4>Postdoctoral Researcher</h4>
<h5>Carnegie Mellon University - Institute for Software Research<br>
September to November 2021</h5>
<p>I worked on solving a variety of privacy and security related problems. In particular, I studied controls for managing data practices which are embedded in web browsers (and on the web generally).</p>
</div>
</tr>
<tr>
<div class="col_2">
<img class="align-left img-rounded" src="./img/isr.gif" width="150" height="150" />
</div>
<div class="col_10">
<h4>Graduate Research Assistant</h4>
<h5>Carnegie Mellon University - Institute for Software Research<br>
September 2014 to September 2021</h5>
<p>
I focused my research on Usable Privacy and Security, employing a mixed-methods approach that combined qualitative and quantitative methodologies from behavioral economics, user-centered design, requirements engineering, machine learning, and empirical software engineering.
My thesis investigated a broad range of privacy and security decisions found in browsers and mobile apps.
I systematically assessed their effectiveness and manageability, explored standardization, discussed public policy issues, and considered generalizability to domains like the Internet of Things.
My work demonstrated that well-aligned settings with users' mental models allowed machine learning to leverage the predictive power of complex settings.
This, in turn, helped people manage their preferences more easily. This approach effectively mitigated the trade-offs between accuracy and increased user burden as settings became more numerous.
</p>
</div>
</tr>
<tr>
<div class="col_2">
<img class="align-left img-rounded" src="./img/nasa.gif" width="150" height="150" />
</div>
<div class="col_10">
<h4>334F Affiliate</h4>
<h5>NASA - Jet Propulsion Laboratory<br>
May to August 2015</h5>
<p>Developed a resolution-preserving image processing pipeline for interferometric synthetic aperture radar imagery. Engineered a cross-platform Python/C11 application that reduced processing time from weeks to minutes. Incorporated
multithreading using OpenMP and multiprocessing using MPI. Tested on a variety of workstations and high performance clusters. Currently used in production with the UAVSAR project in the radar science and instrument engineering section.
</p>
</div>
</tr>
<tr>
<div class="col_2">
<img class="align-left img-rounded" src="./img/sqrlab.jpg" width="150" height="150" />
</div>
<div class="col_10">
<h4>Researcher</h4>
<h5>UOIT - Software Quality Research Lab<br>
September 2013 to May 2014</h5>
<p>Investigated user privacy in metadata released unknowingly through Internet traffic, and perceptions thereof in an ethics board approved user study. Also conducted a novel investigation of the Software Testing Coupling Effect using a
variety of mutation testing tools and automation.</p>
</div>
</tr>
<tr>
<div class="col_2">
<img class="align-left img-rounded" src="./img/uoitlogo.png" width="150" height="150" />
</div>
<div class="col_10">
<h4>Researcher</h4>
<h5>UOIT - Software Engineering Lab<br>
April to September 2013</h5>
<p>Studied tinyOS based wireless sensor networks, applying policy-based programming to create a new development environment (Policy IDE). Server-based and console-based variants using IPv6 running on embedded systems were also created.
Published and presented at EUSPN-2013 (Elsevier). Poster presented at UOIT Student Research Showcase 2013. Research funded by NSERC Undergraduate Student Research Award</p>
</div>
</tr>
<tr>
<div class="col_2">
<img class="align-left img-rounded" src="./img/snclav.png" width="150" height="150" />
</div>
<div class="col_10">
<h4>Engineer-In-Training (Co-Op Position)</h4>
<h5>SNC-Lavalin, Global Information Technologies<br>
April to September 2012</h5>
<p>Conducted research on mission-critical datacenter systems, analyzing network traffic and file system logs toward better disaster recovery, and infrastructure improvement planning. Developed a novel workstation staging system, reducing
the time for new workstation deployments (from 160 minutes down to 20 minutes).</p>
</div>
</tr>
<tr>
<div class="col_2">
<img class="align-left img-rounded" src="./img/snclav.png" width="150" height="150" />
</div>
<div class="col_10">
<h4>Support Technician</h4>
<h5>SNC-Lavalin, Mining and Metallurgy<br>
April to September 2011</h5>
<p>Provided technical support for high value clients in engineering departments and senior management, performing computer forensics, data recovery, and system troubleshooting. Conducted seminars on security and system repair using open
source software.</p>
</div>
</tr>
<tr>
<div class="col_2">
<img class="align-left img-rounded" src="./img/dessau.png" width="150" height="150" />
</div>
<div class="col_10">
<h4>Systems Administrator</h4>
<h5>DESSAU (LVM-Technisol)<br>
June to December 2009</h5>
<p>Implemented information systems developed for JEGEL, managing sample logging and lab process queuing. Gained comprehensive field experience in geotechnical and QA testing for concrete and asphalt. Oversaw integration of computer
systems during the JEGEL/LVM merge.</p>
</div>
</tr>
<tr>
<div class="col_2">
<img class="align-left img-rounded" src="./img/jegel.png" width="150" height="150" />
</div>
<div class="col_10">
<h4>Systems Administrator</h4>
<h5>JEGEL<br>
April to June 2009</h5>
<p>Worked as assistant project manager, laboratory and office systems administrator. Worked with City of Toronto on special projects (Trans- Canada Highway Rehabilitation, Toronto 2009 Capital Works Program). Performed collaborative
development on an ISO certified laboratory sample management software. Designed and built a datacenter servicing the Toronto engineering team.</p>
</div>
</tr>
</table>
</div>
<!-- Projects And Publications Tab -->
<div id="proj" class="tab-content">
<h4><i class="fa fa-folder-open"></i> Projects</h4>
<table>
<tr>
<td>
<div class="col_2">
<img class="align-left img-rounded" src="./img/IoT-privacy-infrastructure.png" width="150" height="150" />
</div>
<div>
<h4>IoT Resource Registry</h4>
<h5><i>Summer 2017</i></h5>
<p>The IoT Resource Registry helps IoT service providers to connect with their users, offering a unified way for information and choice on IoT services and resources. This project is a part of the larger Personalized Privacy Assistant
project.</p>
<p>Supervisor: Dr. Norman Sadeh, Carnegie Mellon University</p>
<ul class="button-bar">
<li><a href="https://privacyassistant.org/index/"><i class="fa fa-external-link"></i> External Link</a></li>
</ul>
</div>
</td>
<td>
<div class="col_2">
<img class="align-left img-rounded" src="./img/eddy.png" width="150" height="150" />
</div>
<div>
<h4>Eddy: A Privacy Requirements Specification Language</h4>
<h5><i>Summer 2016</i></h5>
<p>Eddy is a privacy requirements specification language that privacy analysts can use to express requirements over acts to collect, use, transfer and retain personal and technical information. The language uses a simple SQL-like syntax
to express whether an action is permitted or prohibited, and to restrict those statements to particular data subjects and purposes. The Eddy specifications are compiled into Description Logic to automatically detect conflicting
requirements and to trace data flows within and across specifications. Each specification can describe an organization's data practices, or the data practices of specific components in a software architecure.</p>
<p>Supervisor: Dr. Travis Breaux, Carnegie Mellon University</p>
<ul class="button-bar">
<li><a href="https://gaius.isri.cmu.edu:8080/eddy/"><i class="fa fa-external-link"></i> Demonstration</a></li>
<li><a href="https://github.com/cmu-relab/eddy"><i class="fa fa-github-square"></i> View on GitHub</a></li>
</ul>
</div>
</td>
</tr>
<tr>
<td>
<div class="col_2">
<img class="align-left img-rounded" src="./img/uavsar.png" width="150" height="150" />
</div>
<div>
<h4>Non-Local Interferometric SAR Parameter Estimator</h4>
<h5><i>Summer 2015</i></h5>
<p>Synthetic aperture radar (SAR) or interferometric SAR (InSAR) images suffer from granular speckle noise, which must be removed a posteriori to make images suitable for analysis. We implemented several enhancements to Deledalle’s
InSAR denoising filter (NL-InSAR) to gain leverage over the algorithm's inherent speed tradeoffs. Our results show quantitative and qualitative advances over the canon, as well as promising new research directions for further
improvements. Our workstation- and supercluster-portable implementation allows high quality speckle noise reduction over full-sized UAVSAR images in a matter of minutes, versus weeks using the naïve algorithm.</p>
<p>Supervisor: Dr. Razi Ahmed, Jet Propulsion Laboratory</p>
</div>
</td>
<td>
<div class="col_2">
<img class="align-left img-rounded" src="./img/uavsar_pyr.png" width="150" height="150" />
</div>
<div>
<h4>NL-InSAR with Gaussian-Laplacian Pyramids</h4>
<h5><i>Summer 2015</i></h5>
<p>Non-local filters are particularly well-suited for reducing noise in interferometric Synthetic Aperture Radar (InSAR) images due to their ability to preserve fine structures in the images without compromising resolution. Great
strides have been made in improving non-local filtering techniques for InSAR images, but many of these techniques introduce an artifact known as the canvas effect. In this work, we implemented a novel method for eliminating the canvas
effect that is based on Gaussian-Laplacian image pyramids. In particular, we modify the NL-InSAR algorithm to include an image pyramiding step in order to improve the estimation of reflectivity, interferometric phase, and coherence.
</p>
<p>Supervisor: Dr. Razi Ahmed, Jet Propulsion Laboratory</p>
</div>
</td>
</tr>
<tr>
<td>
<div class="col_2">
<img class="align-left img-rounded" src="./img/IRIS.png" width="150" height="150" />
</div>
<div>
<h4>Incident Recognition and Intelligence System (IRIS)</h4>
<h5><i>Winter 2014</i></h5>
<p>IRIS is a fully integrated intelligence management system with a frontend that displays road conditions and captured incident videos, combined with a computer vision backend that performs autonomous, scalable highway surveillance and
statistical aggregation. IRIS won first place in the UOIT Capstone ECSE Engineering Design Challenge 2014.</p>
<p>Supervisor: Dr. Shahryar Rahnamayan, Associate Professor, UOIT</p>
<p>Special thanks to Dr. Baher Abdulhai and Asmus Georgi at University of Toronto, and Steve Spadafora at MTO for their funding and collaboration.</p>
<ul class="button-bar">
<li><a href="./resources/IRIS_Poster.pdf"><i class="fa fa-file-o"></i> Poster</a></li>
<li><a href="./resources/IRIS.ppsx"><i class="fa fa-file-o"></i> Presentation</a></li>
</ul>
</div>
</td>
<td>
<div class="col_2">
<img class="align-left img-rounded" src="./img/AMS.png" width="150" height="150" />
</div>
<div>
<h4>Automated Marking System (AMS)</h4>
<h5><i>Winter 2014</i></h5>
<p>AMS was built using Rails for UOIT as a means to quickly create, disseminate, and automatically mark introductory programming courses, providing automatic cheating detection and code quality metrics to students. The software
automatically compiles, executes, and evaluates students' submissions in a protected environment. AMS provides instant feedback to students and administrators on the quality of submissions after undergoing dynamic and static analysis,
and is integrated with an automatic testing framework for both evaluation and validation.</p>
<p>Supervisor: Dr. Kamran Sartipi, Associate Professor, UOIT</p>
<ul class="button-bar">
<li><a href="./resources/AMS.ppsx"><i class="fa fa-file-o"></i> Presentation</a></li>
</ul>
</div>
</td>
</tr>
<tr>
<td>
<div class="col_2">
<img class="align-left img-rounded" src="./img/policyide.png" width="150" height="150" />
</div>
<div>
<h4>Policy IDE, TOSServ, Finger2IPv6</h4>
<h5><i>Summer 2013</i></h5>
<p>These three projects were the culmination of work completed funded by an NSERC Undergraduate Research Award. All three are related to implementing and facilitating policy programming in wireless sensor networks based on TinyOS. They
were published and presented at EUSPN-2013, as well as posted on the Stanford TinyOS community Wiki. These projects are also available in branches on GitHub.</p>
<p>Supervisor: Dr. Ramiro Liscano, Associate Dean, UOIT</p>
<ul class="button-bar">
<li><a href="http://tinyos.stanford.edu/tinyos-wiki/index.php/Finger2IPv6"><i class="fa fa-external-link"></i>TinyOS Wiki</a></li>
<li><a href="https://github.com/drspangle/tinyos-main"><i class="fa fa-github-square"></i> View on GitHub</a></li>
</ul>
</div>
</td>
<td>
<div class="col_2">
<img class="align-left img-rounded" src="./img/militarylog.png" width="150" height="150" />
</div>
<div>
<h4>Military Logistics Management System (MLMS)</h4>
<h5><i>Spring 2013</i></h5>
<p>Military logistics management and large-scale visualization system for UOIT ENGR3700 (Data Management Systems) course. Delivers supply and personnel information via an agile web interface using ASP.NET. Provides secure access to
global logistics data at a glance through a Logistics Management View (LMV). Provides real-time battle space updates using Order of Battle (ORBAT) Imagery System.
</p>
<p>Supervisor: Dr. Eyhab Al-Masri, Senior Lecturer, UOIT</p>
<ul class="button-bar">
<li><a href="./resources/mlms_presentation.pdf"><i class="fa fa-file-o"></i> Presentation</a></li>
<li><a href="./resources/mlms_report.pdf"><i class=" fa fa-file-o"></i> Report</a></li>
</ul>
</div>
</td>
</tr>
<tr>
<td>
<div class="col_2">
<img class="align-left img-rounded" src="./img/sneakyfs.png" width="150" height="150" />
</div>
<div>
<h4>sneakyFS File System Design and Implementation</h4>
<h5><i>Winter 2012</i></h5>
<p>sneakyFS is a UNIX file system which operates on a simulated hard disk. It uses a hybrid indexed and linked allocation method to efficiently use disk space, support large disks, lengthy directory trees, and large file sizes. It
incorporates transparent encryption, journalling, and universal unique identifiers. It incorporates techniques which extend the functionality of the C language beyond its original scope of usage, including object oriented design
principles by re-purposing C data structures and pointers. The project won distinction as "Best Project" in the UOIT ENGR 3950 (Operating Systems) course.</p>
<p>Supervisor: Dr. Kamran Sartipi, Associate Professor, UOIT</p>
<ul class="button-bar">
<li><a href="http://faculty.uoit.ca/sartipi/courses/OS/f12/"><i class="fa fa-external-link"></i> External Link</a></li>
<li><a href="http://faculty.uoit.ca/sartipi/courses/OS/f12/3.LabProjects/Lab-3-UnixFileSys/8.Student-presentations/2012/SneakyFS-Docs/SneakyFS.pdf"><i class=" fa fa-file-o"></i> Presentation</a></li>
<li><a href="http://faculty.uoit.ca/sartipi/courses/OS/f12/3.LabProjects/Lab-3-UnixFileSys/8.Student-presentations/2012/SneakyFS-Docs/sneakyFS%20design%20brief.pdf"><i class=" fa fa-file-o"></i> Design Brief</a></li>
</ul>
</div>
</td>
<td>
<div class="col_2">
<img class="align-left img-rounded" src="./img/datacentersnc.png" width="150" height="150" />
</div>
<div>
<h4>Datacenter Utilization Research Study</h4>
<h5><i>Summer 2012</i></h5>
<p>Mission-critical datacenter utilization, availability, and performance assessment for SNC-Lavalin GIT risk management and infrastructure remediation. This study sought to determine the amount of work performed in dollars per hour on
each critical server asset in the datacenter located at the West Mall campus, and specify a plan for infrastructure improvements based on the findings.</p>
<p>Supervisor: M. Ross, Senior Vice-President, SNC-Lavalin Global Information Technologies</p>
</div>
</td>
</tr>
<tr>
<td>
<div class="col_2">
<img class="align-left img-rounded" src="./img/lims.png" width="150" height="150" />
</div>
<div>
<h4>Laboratory Information Management System (LIMS)</h4>
<h5><i>Spring 2009</i></h5>
<p>Collaborative development on an ISO 9000 certified laboratory sample management software. Manages sample logging, categorization, and process queuing. Used in active laboratory production.</p>
<p>Supervisor: Dr. John Emery, P.Eng., President, JEGEL</p>
</div>
</td>
<td>
<div class="col_2">
<img class="align-left img-rounded" src="./img/transcanadarehab.png" width="150" height="150" />
</div>
<div>
<h4>2009 Trans-Canada Highway Rehabilitation Geoinformatics</h4>
<h5><i>Summer 2009</i></h5>
<p>In order to facilitate a large scale asphalt rehabilitation on the Trans-Canada Highway, spanning the section surrounding Banff for over 300km, large scale geoinformatics were required. These drawings detailed probe-hole locations,
highway layout, and pavement remediation plans.</p>
<p>Supervisor: Alain Duclos, P.Eng., Senior Engineer, JEGEL</p>
</div>
</td>
</tr>
</table>
</div>
<!-- Publications List -->
<div id="pub" class="tab-content">
<h4><i class="fa fa-book"></i> Refereed Publications</h4>
<br>
<table cellspacing="0" cellpadding="0">
<thead>
<tr>
<th>Title</th>
<th>Publication</th>
<th>Links</th>
</tr>
</thead>
<tbody>
<tr>
<td>Increasing Adoption of Tor Browser Using Informational and Planning Nudges</td>
<td>Proceedings on Privacy Enhancing Technologies (PoPETs)</td>
<td>
<ul class="button-bar">
<li><a href="https://peterstory.me/publications/story_popets_2022.pdf"><i class="fa fa-file-o"></i> Paper</a></li>
<li><a href="https://petsymposium.org/2022/paperlist.php"><i class="fa fa-external-link"></i> Citation</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>Informing the Design and Refinement of Privacy and Security Controls</td>
<td>KiltHub: Carnegie Mellon University Research Repository (Dissertations)</td>
<td>
<ul class="button-bar">
<li><a href="https://www.daniel-smullen.com/resources/Daniel_Smullen___Dissertation.pdf"><i class="fa fa-file-o"></i> Paper</a></li>
<li><a href="https://www.cs.cmu.edu/calendar/fri-2021-09-24-1000/software-engineering-thesis-defense"><i class="fa fa-external-link"></i> Citation</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>Awareness, Adoption, and Misconceptions of Web Privacy Tools</td>
<td>Proceedings on Privacy Enhancing Technologies (PoPETs)</td>
<td>
<ul class="button-bar">
<li><a href="https://www.petsymposium.org/2021/files/papers/issue3/popets-2021-0049.pdf"><i class="fa fa-file-o"></i> Paper</a></li>
<li><a href="https://mdsoar.org/handle/11603/21389"><i class="fa fa-external-link"></i> Citation</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>Managing Potentially Intrusive Practices In The Browser: A User Centered Perspective</td>
<td>Proceedings on Privacy Enhancing Technologies (PoPETs)</td>
<td>
<ul class="button-bar">
<li><a href="https://sciendo.com/pdf/10.2478/popets-2021-0082"><i class="fa fa-file-o"></i> Paper</a></li>
<li><a href="https://sciendo.com/article/10.2478/popets-2021-0082"><i class="fa fa-external-link"></i> Citation</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>From Intent to Action: Nudging Users Towards Secure Mobile Payments</td>
<td>Sixteenth Symposium on Usable Privacy and Security (SOUPS)</td>
<td>
<ul class="button-bar">
<li><a href="https://www.usenix.org/system/files/soups2020-story.pdf"><i class="fa fa-file-o"></i> Paper</a></li>
<li><a href="https://www.usenix.org/conference/soups2020/presentation/story"><i class="fa fa-external-link"></i> Citation</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences</td>
<td>Proceedings on Privacy Enhancing Technologies (PoPETs)</td>
<td>
<ul class="button-bar">
<li><a href="https://sciendo.com/pdf/10.2478/popets-2020-0011"><i class="fa fa-file-o"></i> Paper</a></li>
<li><a href="https://sciendo.com/article/10.2478/popets-2020-0011"><i class="fa fa-external-link"></i> Citation</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>MAPS: Scaling Privacy Compliance Analysis to a Million Apps</td>
<td>Proceedings on Privacy Enhancing Technologies (PoPETs)</td>
<td>
<ul class="button-bar">
<li><a href="http://sebastianzimmeck.de/zimmeckEtAlMAPS2019.pdf"><i class="fa fa-file-o"></i> Paper</a></li>
<li><a href="https://petsymposium.org/2019/paperlist.php"><i class="fa fa-external-link"></i> Citation</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>Natural Language Processing for Mobile App Privacy Compliance</td>
<td>AAAI Spring Symposium on Privacy-Enhancing Artificial Intelligence and Language Technologies</td>
<td>
<ul class="button-bar">
<li><a href="http://ceur-ws.org/Vol-2335/1st_PAL_paper_6.pdf"><i class="fa fa-file-o"></i> Paper</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations</td>
<td>ACM Transactions on the Web</td>
<td>
<ul class="button-bar">
<li><a href="https://dl.acm.org/ft_gateway.cfm?id=3230665&ftid=2022710&dwn=1&CFID=85880908&CFTOKEN=feaa69a1a42c2321-0BE4D604-FB4A-4509-DE2CA08D525E9645"><i class="fa fa-file-o"></i> Paper</a></li>
<li><a href="https://dl.acm.org/citation.cfm?id=3230665&preflayout=tabs"><i class="fa fa-external-link"></i> Citation</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice</td>
<td>IEEE Pervasive Computing Journal</td>
<td>
<ul class="button-bar">
<li><a href="https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8490188"><i class="fa fa-file-o"></i> Paper</a></li>
<li><a href="https://doi.org/10.1109/MPRV.2018.03367733"><i class="fa fa-external-link"></i> Citation</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>Improving Security in Software Acquisition with Data Retention Specifications</td>
<td>US Navy Postgraduate School Acquisition Research Program Sponsored Report Series</td>
<td>
<ul class="button-bar">
<li><a href="https://calhoun.nps.edu/handle/10945/58892"><i class="fa fa-file-o"></i> Paper</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>Privacy Risk in Cybersecurity Data Sharing</td>
<td>ACM 3rd International Workshop on Information Sharing and Collaborative Security (WISCS)</td>
<td>
<ul class="button-bar">
<li><a href="https://www.cs.cmu.edu/~breaux/publications/jbhatia-wiscs16.pdf"><i class="fa fa-file-o"></i> Paper</a></li>
<li><a href="http://dl.acm.org/citation.cfm?id=2994541"><i class="fa fa-external-link"></i> Citation</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>Detecting Repurposing and Over-Collection in Multi-party Privacy Requirements Specifications</td>
<td>23rd IEEE International Requirements Engineering Conference</td>
<td>
<ul class="button-bar">
<li><a href="http://www.cs.cmu.edu/~breaux/publications/tdbreaux-re15.pdf"><i class="fa fa-file-o"></i> Paper</a></li>
<li><a href="http://scholar.google.com/scholar?q=Travis+D.+Breaux%2C+Daniel+Smullen%2C+and+Hanan+Hibshi+%22Detecting+Repurposing+and+Over-Collection+in+Multi-party+Privacy+Requirements+Specifications%22"><i
class="fa fa-external-link"></i> Citation</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>Toward Rapid Recertification Using Formal Analysis</td>
<td>US Navy Postgraduate School 12th Annual Acquisition Research Symposium</td>
<td>
<ul class="button-bar">
<li><a href="http://www.acquisitionresearch.net/files/FY2015/NPS-AM-15-005.pdf"><i class="fa fa-file-o"></i> Paper</a></li>
<li><a href="http://www.acquisitionresearch.net/publications/detail/1532/"><i class="fa fa-external-link"></i> Citation</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>Genetic Algorithm with Self-Adaptive Mutation Controlled by Chromosome Similarity</td>
<td>IEEE Congress on Evolutionary Computation (CEC 2014)</td>
<td>
<ul class="button-bar">
<li><a href="http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6900591"><i class="fa fa-file-o"></i> Paper</a></li>
<li><a href="http://ieeexplore.ieee.org/document/6900591/"><i class="fa fa-external-link"></i> Citation</a></li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>Integrated Development Environment for Debugging Policy-based Applications in Wireless Sensor Networks</td>
<td>Procedia Computer Science (Elsevier)</td>
<td>
<ul class="button-bar">
<li><a href="http://www.sciencedirect.com/science/article/pii/S1877050913008235/pdf?md5=0058dac98dc962a16d6b6bd8563ceb9c&pid=1-s2.0-S1877050913008235-main.pdf"><i class="fa fa-file-o"></i> Paper</a></li>
<li><a
href="http://www.sciencedirect.com/science?_ob=DownloadURL&_method=confirm&_eidkey=1-s2.0-S1877050913008235&count=1&_docType=FLA&zone=rightPane&_acct=C000228598&_version=1&_userid=10&md5=e3966712933ce04fe6a991c0ab9eef56&panel=biblioInfo"><i
class="fa fa-external-link"></i> Citation</a></li>
</ul>
</td>
</tr>
</tbody>
</table>
<br>
<!-- Conferences List -->
<h4><i class="fa fa-comments-o"></i> Posters & Talks</h4>
<br>
<table cellspacing="0" cellpadding="0">
<thead>
<tr>
<th>Title</th>
<th>Item</th>
<th>Conference</th>
<th>Links and Resources</th>
</tr>
</thead>
<tbody>
<tr>
<td>Personalized Privacy Assistant Project</td>
<td>Research Poster</td>
<td>US Federal Trade Commission PrivacyCon 2018</td>
<td>
<ul class="button-bar">
</ul>
</td>
</tr>
<tr>
<td>Assisting Users in a World Full of Cameras: A Privacy-aware Infrastructure for Computer Vision Applications</td>
<td>Research Poster</td>
<td>US Federal Trade Commission PrivacyCon 2017</td>
<td>
<ul class="button-bar">
</ul>
</td>
</tr>
<tr>
<td>A Privacy Assistant for the Internet of Things</td>
<td>Research Poster</td>
<td>13th Symposium On Usable Privacy and Security (SOUPS 2017)</td>
<td>
<ul class="button-bar">
<li><a href="./resources/SOUPS_2017_Poster_v3.pdf"><i class="fa fa-file-o"></i> Poster</a></li>
</ul>
</td>
</tr>
<tr>
<td>Detecting Repurposing and Over-Collection in Multi-party Privacy Requirements Specifications</td>
<td>Conference Talk</td>
<td>23rd IEEE International Requirements Engineering Conference (RE 2015)</td>
<td>
<ul class="button-bar">
<li><a href="./resources/re15.pdf"><i class="fa fa-file-o"></i> Presentation</a></li>
</ul>
</td>
</tr>
<tr>
<td>Towards Rapid Re-Certification Using Formal Analysis</td>
<td>Conference Talk</td>
<td>US Navy Postgraduate School 12th Annual Acquisition Research Symposium</td>
<td>
<ul class="button-bar">
<li><a href="http://www.acquisitionresearch.net/publications/detail/1541/"><i class="fa fa-file-o"></i> Presentation</a></li>
</ul>
</td>
</tr>
<tr>
<td>Genetic Algorithm with Self-Adaptive Mutation Controlled by Chromosome Similarity</td>
<td>Conference Talk</td>
<td>IEEE World Congress on Computational Intelligence (WCCI 2014), Evolutionary Computation Conference (CEC 2014)</td>
<td>
<ul class="button-bar">
<li><a href="./resources/GA_paper.ppsx"><i class="fa fa-file-o"></i> Presentation</a></li>
</ul>
</td>
</tr>
<tr>
<td>How Much Do We Reveal Through Metadata? An Assessment of Online Privacy</td>
<td>Preliminary Study Poster</td>
<td>IBM Consortium for Software Engineering Research (CSER 2013)</td>
<td>
<ul class="button-bar">
<li><a href="./resources/metadata_CSER.pdf"><i class="fa fa-file-o"></i> Poster</a></li>
</ul>
</td>
</tr>
<tr>
<td>Policy IDE... and lessons learned since.</td>
<td>Conference Talk</td>
<td>The 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013)</td>
<td>
<ul class="button-bar">
<li><a href="./resources/EUSPN2013_Presentation.pdf"><i class="fa fa-file-o"></i> Presentation</a></li>
</ul>
</td>
</tr>
<tr>
<td>Facilitating the Internet of Things with Policy Programming</td>
<td>Research Poster</td>
<td>UOIT Undergraduate Research Showcase 2013</td>
<td>
<ul class="button-bar">
<li><a href="./resources/UOITResearchShowcase2013.pdf"><i class="fa fa-file-o"></i> Poster</a></li>
<li><a href="https://www.youtube.com/watch?v=w8KUvdeL46A"><i class="fa fa-file-o"></i> Video</a></li>
</ul>
</td>
</tr>
</tbody>
</table>
</div>
</div>
<center>
<p>© Daniel Smullen -- all rights reserved.</p>
</center>
</body>
</html>