College of Information Sciences and Technology

  • United States

Research Output

Anonymous proxy re-encryption

Shao, J., Liu, P., Wei, G. & Ling, Y., Jan 1 2012, In : Security and Communication Networks. 5, 5, p. 439-449 11 p.

Research output: Contribution to journalArticle

22 Scopus citations

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Wang, D., He, D., Wang, P. & Chu, C. H., Jul 2015, In : IEEE Transactions on Dependable and Secure Computing. 12, 4, p. 428-442 15 p., 6894170.

Research output: Contribution to journalArticle

209 Scopus citations

An optimization model of machining process route for low carbon manufacturing

Yi, Q., Li, C., Zhang, X., Liu, F. & Tang, Y., Sep 1 2015, In : International Journal of Advanced Manufacturing Technology. 80, 5-8, p. 1181-1196 16 p.

Research output: Contribution to journalArticle

18 Scopus citations

A note on the Estrada-Hatano communicability algorithm for detecting community structure in complex networks

Michele Rajtmajer, S. & Vukičević, D., Dec 1 2010, In : Applied Mathematics and Computation. 217, 7, p. 3516-3521 6 p.

Research output: Contribution to journalArticle

3 Scopus citations

A novel channel-aware attention framework for multi-channel EEG seizure detection via multi-view deep learning

Yuan, Y., Xun, G., Ma, F., Suo, Q., Xue, H., Jia, K. & Zhang, A., Apr 6 2018, 2018 IEEE EMBS International Conference on Biomedical and Health Informatics, BHI 2018. Institute of Electrical and Electronics Engineers Inc., p. 206-209 4 p. (2018 IEEE EMBS International Conference on Biomedical and Health Informatics, BHI 2018; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

A novel distributed algorithm for redundant reader elimination in RFID networks

Ma, M., Wang, P. & Chu, C. H., Dec 1 2013, 2013 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2013. 6694501. (2013 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

An Overview of veryIDX - A privacy-preserving digital identity management system for mobile devices

Paci, F., Bertino, E., Kerr, S., Squicciarini, A. & Woo, J., Sep 1 2009, In : Journal of Software. 4, 7, p. 696-706 11 p.

Research output: Contribution to journalArticle

7 Scopus citations

Answering complex queries in an online community network

Nazi, A., Thirumuruganathan, S., Hristidis, V., Zhang, N. & Das, G., Jan 1 2015, Proceedings of the 9th International Conference on Web and Social Media, ICWSM 2015. AAAI press, p. 662-665 4 p. (Proceedings of the 9th International Conference on Web and Social Media, ICWSM 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Answering queries using views with arithmetic comparisons

Afrati, F., Li, C. & Mitra, P., 2002, Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. p. 209-220 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Scopus citations
1 Scopus citations

An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content

Rajtmajer, S., Squicciarini, A., Such, J. M., Semonsen, J. & Belmonte, A., Jan 1 2017, Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Proceedings. Kiekintveld, C., Schauer, S., An, B., Rass, S. & Fang, F. (eds.). Springer Verlag, p. 112-130 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10575 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

An unsupervised learning approach to content-based image retrieval

Chen, Y., Wang, J. & Krovetz, R., Jan 1 2003, Proceedings - 7th International Symposium on Signal Processing and Its Applications, ISSPA 2003. IEEE Computer Society, p. 197-200 4 p. 1224674. (Proceedings - 7th International Symposium on Signal Processing and Its Applications, ISSPA 2003; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

36 Scopus citations

Anything you can do, I can do better: Finding expert teams by CrewScout

Hassan, N., Feng, H., Venkataraman, R., Das, G., Li, C. & Zhang, N., Jan 1 2014, CIKM 2014 - Proceedings of the 2014 ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, Inc, p. 2030-2032 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

A personal information management scheme using shared labels and implication links

Dubey, G. & Zhang, X., Dec 1 2012, In : Proceedings of the ASIST Annual Meeting. 49, 1

Research output: Contribution to journalArticle

1 Scopus citations

A picture is worth a thousand alerts

Giacobe, N. A., Dec 13 2013, Proceedings of the Human Factors and Ergonomics Society Annual Meeting, HFES 2013. p. 172-176 5 p. (Proceedings of the Human Factors and Ergonomics Society).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

A policy-based accountability tool for grid computing systems

Squicciarini, A. C., Lee, W., Bertino, E. & Song, C. X., Jan 1 2008, Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008. IEEE Computer Society, p. 95-100 6 p. 4780658. (Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

A policy-centric approach to protecting OS kernel from vulnerable LKMs

Tian, D., Xiong, X., Hu, C. & Liu, P., Jun 2018, In : Software - Practice and Experience. 48, 6, p. 1269-1284 16 p.

Research output: Contribution to journalArticle

Open Access
2 Scopus citations

A polynomial time incremental algorithm for learning DFA

Parekh, R., Nichitiu, C. & Honavar, V., Jan 1 1998, Grammatical Inference - 4th International Colloquium, ICGI 1998, Proceedings. Honavar, V. & Slutzki, G. (eds.). Springer Verlag, p. 37-49 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1433).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations

Application-level isolation to cope with malicious database users

Jajodia, S., Liu, P. & McCollum, C. D., Jan 1 1998, Proceedings - 14th Annual Computer Security Applications Conference, ACSAC 1998. Association for Computing Machinery, p. 73-82 10 p. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Application of the JDL data fusion process model for cyber security

Giacobe, N. A., Jul 23 2010, Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2010. 77100R. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 7710).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

Applications of computational intelligence for design and operations decisions in manufacturing

Chiang, W. C., Chu, C. H. & Urban, T. L., Jan 1 2012, In : International Journal of Production Research. 50, 1, p. 1-3 3 p.

Research output: Contribution to journalEditorial

2 Scopus citations

Application-specific digital forensics investigative model in internet of things (IoT)

Zia, T., Liu, P. & Han, W., Aug 29 2017, ARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security. Association for Computing Machinery, a55. (ACM International Conference Proceeding Series; vol. Part F130521).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Applied Cognitive Science Laboratory at the Pennsylvania State University

Inguscio, L. & Ritter, F. E., Jun 2005, In : Cognitive Processing. 6, 2, p. 142-146 5 p.

Research output: Contribution to journalArticle

Applying software engineering to agent development

Cohen, M. A., Ritter, F. E. & Haynes, S. R., Jan 1 2010, In : AI Magazine. 31, 2, p. 25-44 20 p.

Research output: Contribution to journalArticle

11 Scopus citations

Applying the Naïve Bayes classifier to assist users in detecting speech recognition errors

Zhou, L., Feng, J., Sears, A. & Shi, Y., Nov 10 2005, In : Proceedings of the Annual Hawaii International Conference on System Sciences. 1 p.

Research output: Contribution to journalConference article

3 Scopus citations

Applying the NSF broader impacts criteria to HCI research

Gilbert, J. E., Rosson, M. B., Burnett, M., Davis, J. & Ladner, R. E., Jun 8 2011, CHI EA 2011 - 29th Annual CHI Conference on Human Factors in Computing Systems, Conference Proceedings and Extended Abstracts. p. 459-462 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Applying the permutation test to factorial designs

Mewhort, D. J. K., Johns, B. T. & Kelly, M., May 1 2010, In : Behavior research methods. 42, 2, p. 366-372 7 p.

Research output: Contribution to journalArticle

Open Access
7 Scopus citations

Approximate rewriting of queries using views

Afrati, F., Chandrachud, M., Chirkova, R. & Mitra, P., Nov 25 2009, Advances in Databases and Information Systems - 13th East European Conference, ADBIS 2009, Proceedings. p. 164-178 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5739 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

A practical approach for adaptive data structure layout randomization

Chen, P., Xu, J., Lin, Z., Xu, D., Mao, B. & Liu, P., Jan 1 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Ryan, P. Y. A., Pernul, G. & Weippl, E. (eds.). Springer Verlag, p. 69-89 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

A practice-led account of the conceptual evolution of UX knowledge

Kou, Y. & Gray, C. M., May 2 2019, CHI 2019 - Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract)

Jiang, Y., Zhang, C., Wu, D. & Liu, P., Nov 6 2015, Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015. Institute of Electrical and Electronics Engineers Inc., p. 184-185 2 p. 7322142. (Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

A preliminary model of participation

Morgan, J. H., Morgan, G. P., Ritter, F. E. & De Raucourt, V. P., Dec 1 2009, 18th Annual Conference on Behavior Representation in Modeling and Simulation 2009, BRiMS 2009. p. 128-135 8 p. (18th Annual Conference on Behavior Representation in Modeling and Simulation 2009, BRiMS 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A preliminary model of participation for small groups

Morgan, J. H., Morgan, G. P. & Ritter, F. E., Sep 7 2010, In : Computational and Mathematical Organization Theory. 16, 3, p. 246-270 25 p.

Research output: Contribution to journalArticle

18 Scopus citations

A preliminary study of novice and expert users' decision-making procedures during visual trade space exploration

Wolf, D., Simpson, T. W. & Zhang, X., Dec 1 2009, ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, IDETC/CIE2009. PARTS A AND B ed. p. 1361-1371 11 p. (Proceedings of the ASME Design Engineering Technical Conference; vol. 5, no. PARTS A AND B).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

A preliminary study of novice and expert users' decision-making procedures during visual trade space exploration

Wolf, D., Simpson, T. W. & Zhang, X., Jun 25 2010, Proceedings of the ASME International Design Engineering Technical Conferences and Computers and Information in Engineering Conference 2009, DETC2009. PART B ed. p. 1361-1371 11 p. (Proceedings of the ASME International Design Engineering Technical Conferences and Computers and Information in Engineering Conference 2009, DETC2009; vol. 5, no. PART B).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

A privacy-preserving approach for Web service selection and provisioning

Squicciarini, A., Carminati, B. & Karumanchi, S., Sep 29 2011, Proceedings - 2011 IEEE 9th International Conference on Web Services, ICWS 2011. p. 33-40 8 p. 6009369. (Proceedings - 2011 IEEE 9th International Conference on Web Services, ICWS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

A privacy preserving assertion based policy language for federation systems

Squicciarini, A. C., Hintoglu, A. A., Bertino, E. & Saygin, Y., Aug 24 2007, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. p. 51-60 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

A privacy-preserving framework for ranked retrieval model

Yan, T., Gao, Y. & Zhang, N., Dec 1 2019, In : Computational Social Networks. 6, 1, 6.

Research output: Contribution to journalArticle

Open Access

A Privacy-Preserving Framework for Rank Inference

Gao, Y., Yan, T. & Zhang, N., Dec 4 2017, Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017. Institute of Electrical and Electronics Engineers Inc., p. 180-181 2 p. (Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

A Proteomic Analysis of Maize Chloroplast Biogenesis

Lonosky, P. M., Zhang, X., Honavar, V. G., Dobbs, D. L., Fu, A. & Rodermel, S. R., Feb 1 2004, In : Plant physiology. 134, 2, p. 560-574 15 p.

Research output: Contribution to journalArticle

85 Scopus citations

A provably sound TAL for back-end optimization

Chen, J., Wu, D., Appel, A. W. & Fang, H., Jan 1 2003, In : ACM SIGPLAN Notices. 38, 5, p. 208-219 12 p.

Research output: Contribution to journalConference article

5 Scopus citations

A provably sound TAL for back-end optimization

Chen, J., Wu, D., Appel, A. W. & Fang, H., 2003, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). p. 208-219 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Scopus citations

A proxy server experiment: An indication of the changing nature of the Web

Howard, R. & Jansen, B. J., Jan 1 1998, Proceedings - 7th International Conference on Computer Communications and Networks, ICCCN 1998. Institute of Electrical and Electronics Engineers Inc., p. 646-649 4 p. 998824. (Proceedings - 7th International Conference on Computer Communications and Networks, ICCCN 1998; vol. 1998-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

A query-aware document ranking method for geographic information retrieval

Yu, B. & Cai, G., Dec 1 2007, Proceedings of the 4th ACM Workshop on Geographical Information Retrieval, GIR '07, Co-located with the 16th ACM Conference on Information and Knowledge Management, CIKM 2007. p. 49-54 6 p. 1316962. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

ARBOR: Hang together rather than hang separately in 802.11 WiFi networks

Xing, X., Mishra, S. & Liu, X., Jun 15 2010, 2010 Proceedings IEEE INFOCOM. 5461908. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Arcana: Enabling private posts on public microblog platforms

Narasimman, A., Wang, Q., Li, F., Lee, D. & Luo, B., Jan 1 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Karlsson, F., Hedström, K. & Zúquete, A. (eds.). Springer New York LLC, p. 271-285 15 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Architecture of a metasearch engine that supports user information needs

Glover, E. J., Lawrence, S., Birmingham, W. P. & Giles, C. L., Dec 1 1999, International Conference on Information and Knowledge Management, Proceedings. ACM, p. 210-216 7 p. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

53 Scopus citations

Architectures for intrusion tolerant database systems

Liu, P., Jan 1 2003, Foundations of Intrusion Tolerant Systems, OASIS 2003. Lala, J. H. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 3-13 11 p. 1264924. (Foundations of Intrusion Tolerant Systems, OASIS 2003).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Architectures for intrusion tolerant database systems

Liu, P., Jan 1 2002, Proceedings - 18th Annual Computer Security Applications Conference, ACSAC 2002. IEEE Computer Society, p. 311-320 10 p. 1176303. (Proceedings - Annual Computer Security Applications Conference, ACSAC; vol. 2002-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

55 Scopus citations