College of Information Sciences and Technology

  • United States

Research Output 1976 2020

2019

Metric learning on healthcare data with incomplete modalities

Suo, Q., Zhong, W., Ma, F., Yuan, Y., Gao, J. & Zhang, A., Jan 1 2019, Proceedings of the 28th International Joint Conference on Artificial Intelligence, IJCAI 2019. Kraus, S. (ed.). International Joint Conferences on Artificial Intelligence, p. 3534-3540 7 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 2019-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discriminators

MimosafTL: Adding secure and practical ransomware defense strategy to flash translation layer

Wang, P., Jia, S., Chen, B., Xia, L. & Liu, P., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 327-338 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Flash memory
Malware
Mobile computing
Computer operating systems
Electronic money

Minimizing Charging Delay for Directional Charging in Wireless Rechargeable Sensor Networks

Lin, C., Zhou, Y., Ma, F., Deng, J., Wang, L. & Wu, G., Apr 1 2019, INFOCOM 2019 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 1819-1827 9 p. 8737589. (Proceedings - IEEE INFOCOM; vol. 2019-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
Technology transfer
Sensors
Merging
Energy transfer

Modeling multi-stage healthcare systems with service interactions under blocking for bed allocation

Wu, X., Li, J. & Chu, C., Nov 1 2019, In : European Journal of Operational Research. 278, 3, p. 927-941 15 p.

Research output: Contribution to journalArticle

Healthcare
Blocking probability
Blocking Probability
Interaction
Modeling

MTD techniques for memory protection against zero-day attacks

chen, P., Hu, Z., Xu, J., Zhu, M., Erbacher, R., Jajodia, S. & Liu, P., Jan 1 2019, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 129-155 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11830 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

Attack
Data storage equipment
Zero
Methodology
Review
4 Citations (Scopus)

Multi-dimensional graph convolutional networks

Ma, Y., Wang, S., Aggarwal, C. C., Yin, D. & Tang, J., Jan 1 2019, SIAM International Conference on Data Mining, SDM 2019. Society for Industrial and Applied Mathematics Publications, p. 657-665 9 p. (SIAM International Conference on Data Mining, SDM 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neural networks
Experiments
2 Citations (Scopus)

Multivariate Sleep Stage Classification using Hybrid Self-Attentive Deep Learning Networks

Yuan, Y., Jia, K., Ma, F., Xun, G., Wang, Y., Su, L. & Zhang, A., Jan 21 2019, Proceedings - 2018 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2018. Schmidt, H., Griol, D., Wang, H., Baumbach, J., Zheng, H., Callejas, Z., Hu, X., Dickerson, J. & Zhang, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 963-968 6 p. 8621146. (Proceedings - 2018 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Polysomnography
Sleep Stages
Learning
Benchmarking
Informatics
1 Citation (Scopus)

Multi-view network embedding via graph factorization clustering and co-regularized multi-view agreement

Sun, Y., Bui, N., Hsieh, T. Y. & Honavar, V., Feb 7 2019, Proceedings - 18th IEEE International Conference on Data Mining Workshops, ICDMW 2018. Li, Z., Tong, H., Zhu, F. & Yu, J. (eds.). IEEE Computer Society, p. 1006-1013 8 p. 8637384. (IEEE International Conference on Data Mining Workshops, ICDMW; vol. 2018-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Factorization
Labeling
Labels
Experiments
1 Citation (Scopus)

Navigating ride-sharing regulations: How regulations changed the ‘gig’ of ride-sharing for drivers in Taiwan

Chen, A., Yuan, C. W., Ma, N. F., Hsu, C. Y. & Hanrahan, B. V., May 2 2019, CHI 2019 - Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network Spillovers and Neighborhood Crime: A Computational Statistics Analysis of Employment-Based Networks of Neighborhoods

Graif, C., Freelin, B. N., Kuo, Y. H., Wang, H., Li, Z. & Kifer, D., Jan 1 2019, In : Justice Quarterly.

Research output: Contribution to journalArticle

Crime
statistics
offense
community
Social Isolation

Never stop creating: A preliminary inquiry in older adults’ everyday innovations

Wang, X., Knearem, T. & Carroll, J., May 20 2019, Proceedings of the 13th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2019. Association for Computing Machinery, p. 111-118 8 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Innovation
Health
Aging of materials
1 Citation (Scopus)
privacy
criticism
Values

Notice after notice-and-consent

Susser, D., Jan 1 2019, In : Journal of Information Policy. 9, p. 132-157 26 p.

Research output: Contribution to journalArticle

privacy
criticism
Values
1 Citation (Scopus)

On convergence rates of game theoretic reinforcement learning algorithms

Hu, Z., Zhu, M., Chen, P. & Liu, P., Jun 2019, In : Automatica. 104, p. 90-101 12 p.

Research output: Contribution to journalArticle

Reinforcement learning
Learning algorithms

On how users edit computer-generated visual stories

Hsu, T. Y., Huang, T. H. K. & Hsu, Y. C., May 2 2019, CHI EA 2019 - Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, 3312965. (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Artificial intelligence

Online and scalable adaptive cyber defense

Priest, B. W., Cybenko, G., Singh, S., Albanese, M. & Liu, P., Jan 1 2019, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 232-261 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11830 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

Sketching
Scalability
Streaming Data
Moving Target
Concretes
2 Citations (Scopus)

Online hate ratings vary by extremes: A statistical analysis

Salminen, J., Almerekhi, H., Kamel, A. M., Jung, S. G. & Jansen, B. J., Mar 8 2019, CHIIR 2019 - Proceedings of the 2019 Conference on Human Information Interaction and Retrieval. Association for Computing Machinery, Inc, p. 213-217 5 p. (CHIIR 2019 - Proceedings of the 2019 Conference on Human Information Interaction and Retrieval).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Statistical methods
Learning systems
Processing

Opening the blackbox of virustotal: Analyzing online phishing scan engines

Peng, P., Yang, L., Song, L. & Wang, G., Oct 21 2019, IMC 2019 - Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery, p. 478-485 8 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Labels
Websites
Engines
Scanning
Labeling
2 Citations (Scopus)

Opinion dynamics in the presence of increasing agreement pressure

Semonsen, J., Griffin, C., Squicciarini, A. & Rajtmajer, S., Apr 1 2019, In : IEEE Transactions on Cybernetics. 49, 4, p. 1270-1278 9 p., 8291046.

Research output: Contribution to journalArticle

Complex networks
1 Citation (Scopus)

Optimizing Peer Referrals for Public Awareness using Contextual Bandits

Mothilal, R. K., Yadav, A. & Sharma, A., Jul 3 2019, COMPASS 2019 - Proceedings of the 2019 Conference on Computing and Sustainable Societies. Association for Computing Machinery, Inc, p. 74-85 12 p. (COMPASS 2019 - Proceedings of the 2019 Conference on Computing and Sustainable Societies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs

Optimizing the wisdom of the crowd: Inference, learning, and teaching

Zhou, Y., Ma, F., Gao, J. & He, J., Jul 25 2019, KDD 2019 - Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 3231-3232 2 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supervised learning
Teaching
Agglomeration
Feedback
Costs

Overview of Control and Game Theory in Adaptive Cyber Defenses

Cybenko, G., Wellman, M., Liu, P. & Zhu, M., Jan 1 2019, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 1-11 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11830 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

Game theory
Game Theory
Control theory
Control Theory
Moving Target

Participatory asymmetry: Theorizing media objects and media flows in a framework of participatory production

Grace, R. & Fonseca, F., Jan 1 2019, In : First Monday. 24, 10, p. 1 1 p.

Research output: Contribution to journalArticle

Feedback
2 Citations (Scopus)

Participatory data collection and management in low-resource contexts: A field trial with urban refugees

Xu, Y. & Maitland, C. F., Jan 4 2019, Proceedings of the 10th International Conference on Information and Communication Technologies and Development, ICTD 2019. Association for Computing Machinery, a18. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information management
Education
Systems analysis
Testing

PbFG: Physique-based fuzzy granular modeling for non-invasive blood glucose monitoring

Liu, W., Huang, A., Wang, P. & Chu, C., Sep 1 2019, In : Information Sciences. 497, p. 56-76 21 p.

Research output: Contribution to journalArticle

Glucose
Blood
Monitoring
Modeling
Individual Differences

Personas changing over time: Analyzing variations of data-driven personas during a two-year period

Jung, S. G., Jansen, B. J. & Salminen, J., May 2 2019, CHI EA 2019 - Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, 3312955. (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Persona Transparency: Analyzing the Impact of Explanations on Perceptions of Data-Driven Personas

Salminen, J., Santos, J. M., Jung, S. G., Eslami, M. & Jansen, B. J., Jan 1 2019, (Accepted/In press) In : International Journal of Human-Computer Interaction.

Research output: Contribution to journalArticle

Transparency
transparency
Facades
empathy
credibility

PlacentaNet: Automatic morphological characterization of placenta photos with deep learning

Chen, Y., Wu, C., Zhang, Z., Goldstein, J. A., Gernand, A. D. & Wang, J. Z., Jan 1 2019, Medical Image Computing and Computer Assisted Intervention – MICCAI 2019 - 22nd International Conference, Proceedings. Shen, D., Yap, P-T., Liu, T., Peters, T. M., Khan, A., Staib, L. H., Essert, C. & Zhou, S. (eds.). Springer, p. 487-495 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11764 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Placenta
Health risks
Pathology
Image segmentation
Encoder
2 Citations (Scopus)

Presslight: Learning Max pressure control to coordinate traffic signals in arterial network

Wei, H., Chen, C., Zheng, G., Wu, K., Gayah, V., Xu, K. & Li, Z., Jul 25 2019, KDD 2019 - Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 1290-1298 9 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Traffic signals
Pressure control
Reinforcement learning
Travel time
Throughput

Privacy-enhancing artificial intelligence and language technologies (PAL 2019): Preface to the proceedings

Wilson, S., Ghanavati, S., Ghazinour, K. & Sadeh, N., Jan 1 2019, In : CEUR Workshop Proceedings. 2335

Research output: Contribution to journalEditorial

Artificial intelligence

Privacy in Health Disparity Research

Xu, H. & Zhang, N., Jun 1 2019, In : Medical care. 57, p. S172-S175

Research output: Contribution to journalArticle

Privacy
Health
Research
Public Health
Patient Protection and Affordable Care Act

Privacy preserving text representation learning

Beigi, G., Shu, K., Guo, R., Wang, S. & Liu, H., Sep 12 2019, HT 2019 - Proceedings of the 30th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, Inc, p. 275-276 2 p. (HT 2019 - Proceedings of the 30th ACM Conference on Hypertext and Social Media).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Semantics
Industry
2 Citations (Scopus)

Probabilistic Multigraph Modeling for Improving the Quality of Crowdsourced Affective Data

Ye, J., Li, J., Newman, M. G., Adams, R. B. & Wang, J. Z., Jan 1 2019, In : IEEE Transactions on Affective Computing. 10, 1, p. 115-128 14 p., 7872458.

Research output: Contribution to journalArticle

Labels
Experiments
Concretes
Testing
Statistical Models

Probability model transforming encoders against encoding attacks

Cheng, H., Zheng, Z., Li, W., Wang, P. & Chu, C. H., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1573-1590 18 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encoding (symbols)
Cryptography

Protecting mobile devices from physical memory attacks with targeted encryption

Guan, L., Cao, C., Zhu, S., Lin, J., Liu, P., Xia, Y. & Luo, B., May 15 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 34-44 11 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Dynamic random access storage
Mobile devices
Cryptography
Data storage equipment
Random access storage

PTrix: Efficient hardware-assisted fuzzing for COTS binary

Chen, Y., Mu, D., Xu, J., Sun, Z., Shen, W., Xing, X., Lu, L. & Mao, B., Jul 2 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 633-645 13 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback
Hardware
Defects
Program processors
Testing

Rating mechanisms for sustainability of crowdsourcing platforms

Qiu, C., Squicciarini, A. & Rajtmajer, S., Nov 3 2019, CIKM 2019 - Proceedings of the 28th ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, p. 2003-2012 10 p. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Rating
Sustainability
Amazon
Health
Leverage

Reinforcement learning for adaptive cyber defense against zero-day attacks

Hu, Z., Chen, P., Zhu, M. & Liu, P., Jan 1 2019, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 54-93 40 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11830 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

Reinforcement learning
Reinforcement Learning
Attack
Zero
Control theory

Relational social recommendation: Application to the academic domain

Amal, S., Tsai, C-H., Brusilovsky, P., Kuflik, T. & Minkov, E., Jun 15 2019, In : Expert Systems With Applications. 124, p. 182-195 14 p.

Research output: Contribution to journalArticle

Feedback
Information use
Recommender systems

Reports of the AAAI 2019 spring symposium series

Baldini, I., Barrett, C., Chella, A., Cinelli, C., Gamez, D., Gilpin, L. H., Hinkelmann, K., Holmes, D., Kido, T., Kocaoglu, M., Lawless, W. F., Lomuscio, A., Macbeth, J. C., Martin, A., Mittu, R., Patterson, E., Sofge, D., Tadepalli, P., Takadama, K. & Wilson, S., Jan 1 2019, In : AI Magazine. 40, 3, p. 59-66 8 p.

Research output: Contribution to journalArticle

Learning systems
Economics
Finance
Medicine
Railroad cars

Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks

Choi, S. H., Shin, J. M., Liu, P. & Choi, Y. H., Jun 2019, 2019 IEEE Conference on Communications and Network Security, CNS 2019. Institute of Electrical and Electronics Engineers Inc., 8802809. (2019 IEEE Conference on Communications and Network Security, CNS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neural networks
Malware
Robustness analysis
Attack
Visualization
3 Citations (Scopus)

RRR: Rank-regret representative

Asudeh, A., Nazi, A., Zhang, N., Das, G. & Jagadish, H. V., Jun 25 2019, SIGMOD 2019 - Proceedings of the 2019 International Conference on Management of Data. Association for Computing Machinery, p. 263-280 18 p. (Proceedings of the ACM SIGMOD International Conference on Management of Data).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Approximation algorithms
Computational complexity
Geometry
Experiments
4 Citations (Scopus)

Screenomics: A Framework to Capture and Analyze Personal Life Experiences and the Ways that Technology Shapes Them

Reeves, B., Ram, N., Robinson, T. N., Cummings, J. J., Giles, C. L., Pan, J., Chiatti, A., Cho, M., Roehrick, K., Yang, X., Gagneja, A., Brinberg, M., Muise, D., Lu, Y., Luo, M., Fitzgerald, A. & Yeykelis, L., Jan 1 2019, In : Human-Computer Interaction.

Research output: Contribution to journalArticle

Digital storage
Life Change Events
Switches
Technology
Psychological Theory

Seeking common ground while reserving differences in gesture elicitation studies

Wu, H., Liu, J., Qiu, J. & Zhang, X., Jun 15 2019, In : Multimedia Tools and Applications. 78, 11, p. 14989-15010 22 p.

Research output: Contribution to journalArticle

Navigation

Slake: Facilitating slab manipulation for exploiting vulnerabilities in the linux kernel

Chen, Y. & Xing, X., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1707-1722 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Static analysis
Dynamic analysis
Linux

Smell Pittsburgh: Community-empowered mobile smell reporting system

Hsu, Y. C., Tasota, M., Cross, J., Dias, B., Dille, P., Sargent, R., Huang, T. H. & Nourbakhsh, I., Jan 1 2019, p. 65-79. 15 p.

Research output: Contribution to conferencePaper

Air quality
Odors
Pollution
Air pollution
Health

Spatio-temporal attentive RNN for node classification in temporal attributed graphs

Xu, D., Cheng, W., Luo, D., Liu, X. & Zhang, X., Jan 1 2019, Proceedings of the 28th International Joint Conference on Artificial Intelligence, IJCAI 2019. Kraus, S. (ed.). International Joint Conferences on Artificial Intelligence, p. 3947-3953 7 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 2019-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Labels
Topology
Sampling
Experiments
1 Citation (Scopus)

Stimulus-Response and Response-Effect Compatibility With Touchless Gestures and Moving Action Effects

Janczyk, M., Xiong, A. & Proctor, R. W., Dec 1 2019, In : Human Factors. 61, 8, p. 1297-1314 18 p.

Research output: Contribution to journalArticle

Gestures
stimulus
Display devices
Experiments
manipulation
5 Citations (Scopus)

Structure-Based Suggestive Exploration: A New Approach for Effective Exploration of Large Networks

Chen, W., Guo, F., Han, D., Pan, J., Nie, X., Xia, J. & Zhang, X., Jan 1 2019, In : IEEE Transactions on Visualization and Computer Graphics. 25, 1, p. 555-565 11 p., 8440813.

Research output: Contribution to journalArticle

Navigation

Summarizing Situational Tweets in Crisis Scenarios: An Extractive-Abstractive Approach

Rudra, K., Goyal, P., Ganguly, N., Imran, M. & Mitra, P., Oct 1 2019, In : IEEE Transactions on Computational Social Systems. 6, 5, p. 981-993 13 p., 8839735.

Research output: Contribution to journalArticle

Summarization
scenario
Scenarios
Linear programming
Disasters