College of Information Sciences and Technology

  • United States

Research Output 1976 2020

3 Citations (Scopus)

A note on the Estrada-Hatano communicability algorithm for detecting community structure in complex networks

Michele Rajtmajer, S. & Vukičević, D., Dec 1 2010, In : Applied Mathematics and Computation. 217, 7, p. 3516-3521 6 p.

Research output: Contribution to journalArticle

Community Structure
Complex networks
Complex Networks
Clique
Graph in graph theory
11 Citations (Scopus)

A novel channel-aware attention framework for multi-channel EEG seizure detection via multi-view deep learning

Yuan, Y., Xun, G., Ma, F., Suo, Q., Xue, H., Jia, K. & Zhang, A., Apr 6 2018, 2018 IEEE EMBS International Conference on Biomedical and Health Informatics, BHI 2018. Institute of Electrical and Electronics Engineers Inc., p. 206-209 4 p. (2018 IEEE EMBS International Conference on Biomedical and Health Informatics, BHI 2018; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electroencephalography
Seizures
Learning
Epilepsy
Scalp
5 Citations (Scopus)

A novel distributed algorithm for redundant reader elimination in RFID networks

Ma, M., Wang, P. & Chu, C. H., Dec 1 2013, 2013 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2013. 6694501. (2013 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio frequency identification (RFID)
Parallel algorithms
radio
coverage
system development
7 Citations (Scopus)

An Overview of veryIDX - A privacy-preserving digital identity management system for mobile devices

Paci, F., Bertino, E., Kerr, S., Squicciarini, A. & Woo, J., Sep 1 2009, In : Journal of Software. 4, 7, p. 696-706 11 p.

Research output: Contribution to journalArticle

Mobile devices
Bluetooth
Viruses
Authentication
Industry
2 Citations (Scopus)

Answering complex queries in an online community network

Nazi, A., Thirumuruganathan, S., Hristidis, V., Zhang, N. & Das, G., Jan 1 2015, Proceedings of the 9th International Conference on Web and Social Media, ICWSM 2015. AAAI press, p. 662-665 4 p. (Proceedings of the 9th International Conference on Web and Social Media, ICWSM 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stars
Experiments
28 Citations (Scopus)

Answering queries using views with arithmetic comparisons

Afrati, F., Li, C. & Mitra, P., 2002, Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. p. 209-220 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
Risk analysis
graduate
industry
Industry
career
3 Citations (Scopus)

An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content

Rajtmajer, S., Squicciarini, A., Such, J. M., Semonsen, J. & Belmonte, A., Jan 1 2017, Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Proceedings. Kiekintveld, C., Schauer, S., An, B., Rass, S. & Fang, F. (eds.). Springer Verlag, p. 112-130 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10575 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Privacy
Internet
Game
Sharing
36 Citations (Scopus)

An unsupervised learning approach to content-based image retrieval

Chen, Y., Wang, J. & Krovetz, R., Jan 1 2003, Proceedings - 7th International Symposium on Signal Processing and Its Applications, ISSPA 2003. IEEE Computer Society, p. 197-200 4 p. 1224674. (Proceedings - 7th International Symposium on Signal Processing and Its Applications, ISSPA 2003; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unsupervised learning
Image retrieval
Semantics
1 Citation (Scopus)

Anything you can do, I can do better: Finding expert teams by CrewScout

Hassan, N., Feng, H., Venkataraman, R., Das, G., Li, C. & Zhang, N., Jan 1 2014, CIKM 2014 - Proceedings of the 2014 ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, Inc, p. 2030-2032 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

User interfaces
Demonstrations
Expert finding
1 Citation (Scopus)

A personal information management scheme using shared labels and implication links

Dubey, G. & Zhang, X., Dec 1 2012, In : Proceedings of the ASIST Annual Meeting. 49, 1

Research output: Contribution to journalArticle

information management
Information management
Labels
fragmentation
management
10 Citations (Scopus)

A picture is worth a thousand alerts

Giacobe, N. A., Dec 13 2013, Proceedings of the Human Factors and Ergonomics Society Annual Meeting, HFES 2013. p. 172-176 5 p. (Proceedings of the Human Factors and Ergonomics Society).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Design of experiments
Simulators
Industry
Experiments
8 Citations (Scopus)

A policy-based accountability tool for grid computing systems

Squicciarini, A. C., Lee, W., Bertino, E. & Song, C. X., Jan 1 2008, Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008. IEEE Computer Society, p. 95-100 6 p. 4780658. (Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Grid computing
Availability
2 Citations (Scopus)

A policy-centric approach to protecting OS kernel from vulnerable LKMs

Tian, D., Xiong, X., Hu, C. & Liu, P., Jun 2018, In : Software - Practice and Experience. 48, 6, p. 1269-1284 16 p.

Research output: Contribution to journalArticle

Open Access
Static analysis
Computer hardware
Hardware
Data storage equipment
Costs
15 Citations (Scopus)

A polynomial time incremental algorithm for learning DFA

Parekh, R., Nichitiu, C. & Honavar, V., Jan 1 1998, Grammatical Inference - 4th International Colloquium, ICGI 1998, Proceedings. Honavar, V. & Slutzki, G. (eds.). Springer Verlag, p. 37-49 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1433).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Incremental Algorithm
Polynomial-time Algorithm
Polynomials
Query
Space Complexity
12 Citations (Scopus)

Application-level isolation to cope with malicious database users

Jajodia, S., Liu, P. & McCollum, C. D., Jan 1 1998, Proceedings - 14th Annual Computer Security Applications Conference, ACSAC 1998. Association for Computing Machinery, p. 73-82 10 p. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Access control
Availability
24 Citations (Scopus)

Application of the JDL data fusion process model for cyber security

Giacobe, N. A., Jul 23 2010, Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2010. 77100R. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 7710).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

multisensor fusion
Data Fusion
Data fusion
Process Model
Fusion
2 Citations (Scopus)

Applications of computational intelligence for design and operations decisions in manufacturing

Chiang, W. C., Chu, C. H. & Urban, T. L., Jan 1 2012, In : International Journal of Production Research. 50, 1, p. 1-3 3 p.

Research output: Contribution to journalEditorial

Artificial intelligence
Manufacturing
Computational intelligence
4 Citations (Scopus)

Application-specific digital forensics investigative model in internet of things (IoT)

Zia, T., Liu, P. & Han, W., Aug 29 2017, ARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security. Association for Computing Machinery, a55. (ACM International Conference Proceeding Series; vol. Part F130521).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet of things
Digital forensics
Acoustic waves
Industry

Applied Cognitive Science Laboratory at the Pennsylvania State University

Inguscio, L. & Ritter, F. E., Jun 2005, In : Cognitive Processing. 6, 2, p. 142-146 5 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Applying software engineering to agent development

Cohen, M. A., Ritter, F. E. & Haynes, S. R., Jan 1 2010, In : AI Magazine. 31, 2, p. 25-44 20 p.

Research output: Contribution to journalArticle

Software engineering
Intelligent agents
Computer software reusability
High level languages
Modems
3 Citations (Scopus)

Applying the Naïve Bayes classifier to assist users in detecting speech recognition errors

Zhou, L., Feng, J., Sears, A. & Shi, Y., Nov 10 2005, In : Proceedings of the Annual Hawaii International Conference on System Sciences. 1 p.

Research output: Contribution to journalConference article

Speech recognition
Classifiers
Error correction
Human computer interaction
Anchors
1 Citation (Scopus)

Applying the NSF broader impacts criteria to HCI research

Gilbert, J. E., Rosson, M. B., Burnett, M., Davis, J. & Ladner, R. E., Jun 8 2011, CHI EA 2011 - 29th Annual CHI Conference on Human Factors in Computing Systems, Conference Proceedings and Extended Abstracts. p. 459-462 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Human computer interaction
7 Citations (Scopus)

Applying the permutation test to factorial designs

Mewhort, D. J. K., Johns, B. T. & Kelly, M., May 1 2010, In : Behavior research methods. 42, 2, p. 366-372 7 p.

Research output: Contribution to journalArticle

Open Access
Analysis of Variance
Computational
Experiment
3 Citations (Scopus)

Approximate rewriting of queries using views

Afrati, F., Chandrachud, M., Chirkova, R. & Mitra, P., Nov 25 2009, Advances in Databases and Information Systems - 13th East European Conference, ADBIS 2009, Proceedings. p. 164-178 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5739 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rewriting
Query
Acoustic waves
Scalability
Expressive Power
10 Citations (Scopus)

A practical approach for adaptive data structure layout randomization

Chen, P., Xu, J., Lin, Z., Xu, D., Mao, B. & Liu, P., Jan 1 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Ryan, P. Y. A., Pernul, G. & Weippl, E. (eds.). Springer Verlag, p. 69-89 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Randomisation
Data structures
Layout
Data Structures
Countermeasures
1 Citation (Scopus)

A practice-led account of the conceptual evolution of UX knowledge

Kou, Y. & Gray, C. M., May 2 2019, CHI 2019 - Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lead
Human computer interaction
Education
Trajectories
Communication
5 Citations (Scopus)

A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract)

Jiang, Y., Zhang, C., Wu, D. & Liu, P., Nov 6 2015, Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015. Institute of Electrical and Electronics Engineers Inc., p. 184-185 2 p. 7322142. (Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data flow analysis
Computer programming
Computer programming languages
Software engineering
Creep

A preliminary model of participation

Morgan, J. H., Morgan, G. P., Ritter, F. E. & De Raucourt, V. P., Dec 1 2009, 18th Annual Conference on Behavior Representation in Modeling and Simulation 2009, BRiMS 2009. p. 128-135 8 p. (18th Annual Conference on Behavior Representation in Modeling and Simulation 2009, BRiMS 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Individual Differences
Simulation
Model
Demonstrate
Participation
17 Citations (Scopus)

A preliminary model of participation for small groups

Morgan, J. H., Morgan, G. P. & Ritter, F. E., Sep 7 2010, In : Computational and Mathematical Organization Theory. 16, 3, p. 246-270 25 p.

Research output: Contribution to journalArticle

Individual Differences
Reflexivity
Simulation
Model
Costs
6 Citations (Scopus)

A preliminary study of novice and expert users' decision-making procedures during visual trade space exploration

Wolf, D., Simpson, T. W. & Zhang, X., Jun 25 2010, Proceedings of the ASME International Design Engineering Technical Conferences and Computers and Information in Engineering Conference 2009, DETC2009. PART B ed. p. 1361-1371 11 p. (Proceedings of the ASME International Design Engineering Technical Conferences and Computers and Information in Engineering Conference 2009, DETC2009; vol. 5, no. PART B).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision making
Data visualization
Operations research
Human computer interaction
Network protocols
3 Citations (Scopus)

A preliminary study of novice and expert users' decision-making procedures during visual trade space exploration

Wolf, D., Simpson, T. W. & Zhang, X., Dec 1 2009, ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, IDETC/CIE2009. PARTS A AND B ed. p. 1361-1371 11 p. (Proceedings of the ASME Design Engineering Technical Conference; vol. 5, no. PARTS A AND B).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multidimensional Data
Decision making
Decision Making
Data visualization
Data Visualization
16 Citations (Scopus)

A privacy-preserving approach for Web service selection and provisioning

Squicciarini, A., Carminati, B. & Karumanchi, S., Sep 29 2011, Proceedings - 2011 IEEE 9th International Conference on Web Services, ICWS 2011. p. 33-40 8 p. 6009369. (Proceedings - 2011 IEEE 9th International Conference on Web Services, ICWS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web services
Availability
6 Citations (Scopus)

A privacy preserving assertion based policy language for federation systems

Squicciarini, A., Hintoglu, A. A., Bertino, E. & Saygin, Y., Aug 24 2007, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. p. 51-60 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A privacy-preserving framework for ranked retrieval model

Yan, T., Gao, Y. & Zhang, N., Dec 1 2019, In : Computational Social Networks. 6, 1, 6.

Research output: Contribution to journalArticle

Open Access
Equivalent sets
Privacy Preserving
Retrieval
Attribute
Privacy
1 Citation (Scopus)

A Privacy-Preserving Framework for Rank Inference

Gao, Y., Yan, T. & Zhang, N., Dec 4 2017, Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 180-181 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Visibility
World Wide Web
85 Citations (Scopus)

A Proteomic Analysis of Maize Chloroplast Biogenesis

Lonosky, P. M., Zhang, X., Honavar, V. G., Dobbs, D. L., Fu, A. & Rodermel, S. R., Feb 1 2004, In : Plant physiology. 134, 2, p. 560-574 15 p.

Research output: Contribution to journalArticle

Chloroplasts
Proteomics
proteomics
Zea mays
chloroplasts
5 Citations (Scopus)

A provably sound TAL for back-end optimization

Chen, J., Wu, D., Appel, A. W. & Fang, H., Jan 1 2003, In : ACM SIGPLAN Notices. 38, 5, p. 208-219 12 p.

Research output: Contribution to journalConference article

Acoustic waves
Macros
Semantics
Scheduling
21 Citations (Scopus)

A provably sound TAL for back-end optimization

Chen, J., Wu, D., Appel, A. W. & Fang, H., 2003, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). p. 208-219 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Acoustic waves
Macros
Semantics
Scheduling
3 Citations (Scopus)

A proxy server experiment: An indication of the changing nature of the Web

Howard, R. & Jansen, B. J., Jan 1 1998, Proceedings - 7th International Conference on Computer Communications and Networks, ICCCN 1998. Institute of Electrical and Electronics Engineers Inc., Vol. 1998-October. p. 646-649 4 p. 998824

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Servers
Experiments
Bandwidth
Internet
14 Citations (Scopus)

A query-aware document ranking method for geographic information retrieval

Yu, B. & Cai, G., Dec 1 2007, Proceedings of the 4th ACM Workshop on Geographical Information Retrieval, GIR '07, Co-located with the 16th ACM Conference on Information and Knowledge Management, CIKM 2007. p. 49-54 6 p. 1316962. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Geographic information retrieval
Ranking
Query
Specificity
Evaluation

ARBEE: Towards Automated Recognition of Bodily Expression of Emotion in the Wild

Luo, Y., Ye, J., Adams, R. B., Li, J., Newman, M. G. & Wang, J. Z., Jan 1 2019, (Accepted/In press) In : International Journal of Computer Vision.

Research output: Contribution to journalArticle

Robots
Information science
Computer science
Statistical methods
Robotics
9 Citations (Scopus)

ARBOR: Hang together rather than hang separately in 802.11 WiFi networks

Xing, X., Mishra, S. & Liu, X., Jun 15 2010, 2010 Proceedings IEEE INFOCOM. 5461908. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bandwidth
Internet
DSL
Authentication
Wireless networks

Arcana: Enabling private posts on public microblog platforms

Narasimman, A., Wang, Q., Li, F., Lee, D. & Luo, B., Jan 1 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Karlsson, F., Hedström, K. & Zúquete, A. (eds.). Springer New York LLC, p. 271-285 15 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Twitter
Access control
Dissemination
Encryption
Follower
50 Citations (Scopus)

Architecture of a metasearch engine that supports user information needs

Glover, E. J., Lawrence, S., Birmingham, W. P. & Giles, C. L., Dec 1 1999, International Conference on Information and Knowledge Management, Proceedings. ACM, p. 210-216 7 p. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information needs
Metasearch
Query
Key words
Search engine
54 Citations (Scopus)

Architectures for intrusion tolerant database systems

Liu, P., Jan 1 2002, Proceedings - 18th Annual Computer Security Applications Conference, ACSAC 2002. IEEE Computer Society, p. 311-320 10 p. 1176303. (Proceedings - Annual Computer Security Applications Conference, ACSAC; vol. 2002-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Repair
Recovery
5 Citations (Scopus)

Architectures for intrusion tolerant database systems

Liu, P., Jan 1 2003, Foundations of Intrusion Tolerant Systems, OASIS 2003. Lala, J. H. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 3-13 11 p. 1264924. (Foundations of Intrusion Tolerant Systems, OASIS 2003).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Repair
Recovery
5 Citations (Scopus)

A real options approach to strategic RFID investment decision

Wu, X., Yue, D., Bai, J. & Chu, C. H., Sep 25 2009, 2009 IEEE International Conference on RFID, RFID 2009. p. 314-321 8 p. 4911201

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio frequency identification (RFID)
Cost benefit analysis
Sensitivity analysis
Uncertainty
34 Citations (Scopus)

A real time fault analysis tool for monitoring operation of transmission line protective relay

Zhang, N. & Kezunovic, M., Mar 1 2007, In : Electric Power Systems Research. 77, 3-4, p. 361-370 10 p.

Research output: Contribution to journalArticle

Relay protection
Electric lines
Monitoring
Electric fault location
Fault detection
5 Citations (Scopus)

ARECA: A highly attack resilient Certification Authority

Jing, J., Liu, P., Feng, D., Xiang, J., Gao, N. & Jingqiang, L., Dec 1 2003, Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems (In Association with 10th ACM Conference on Computer Communications Security). Liu, P. & Pal, P. (eds.). p. 53-63 11 p. (Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Engineers
Chemical analysis