College of Information Sciences and Technology

  • United States

Research Output 1976 2020

2019

MimosafTL: Adding secure and practical ransomware defense strategy to flash translation layer

Wang, P., Jia, S., Chen, B., Xia, L. & Liu, P., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 327-338 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Flash memory
Malware
Mobile computing
Computer operating systems
Electronic money

Minimizing Charging Delay for Directional Charging in Wireless Rechargeable Sensor Networks

Lin, C., Zhou, Y., Ma, F., Deng, J., Wang, L. & Wu, G., Apr 1 2019, INFOCOM 2019 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 1819-1827 9 p. 8737589. (Proceedings - IEEE INFOCOM; vol. 2019-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
Technology transfer
Sensors
Merging
Energy transfer

Modeling multi-stage healthcare systems with service interactions under blocking for bed allocation

Wu, X., Li, J. & Chu, C., Nov 1 2019, In : European Journal of Operational Research. 278, 3, p. 927-941 15 p.

Research output: Contribution to journalArticle

Healthcare
Blocking probability
Blocking Probability
Interaction
Modeling

MTD techniques for memory protection against zero-day attacks

chen, P., Hu, Z., Xu, J., Zhu, M., Erbacher, R., Jajodia, S. & Liu, P., Jan 1 2019, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 129-155 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11830 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

Attack
Data storage equipment
Zero
Methodology
Review
2 Citations (Scopus)

Multi-dimensional graph convolutional networks

Ma, Y., Wang, S., Aggarwal, C. C., Yin, D. & Tang, J., Jan 1 2019, SIAM International Conference on Data Mining, SDM 2019. Society for Industrial and Applied Mathematics Publications, p. 657-665 9 p. (SIAM International Conference on Data Mining, SDM 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neural networks
Experiments

Multivariate Sleep Stage Classification using Hybrid Self-Attentive Deep Learning Networks

Yuan, Y., Jia, K., Ma, F., Xun, G., Wang, Y., Su, L. & Zhang, A., Jan 21 2019, Proceedings - 2018 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2018. Schmidt, H., Griol, D., Wang, H., Baumbach, J., Zheng, H., Callejas, Z., Hu, X., Dickerson, J. & Zhang, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 963-968 6 p. 8621146. (Proceedings - 2018 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Polysomnography
Sleep Stages
Learning
Benchmarking
Informatics

Multi-view network embedding via graph factorization clustering and co-regularized multi-view agreement

Sun, Y., Bui, N., Hsieh, T. Y. & Honavar, V. G., Feb 7 2019, Proceedings - 18th IEEE International Conference on Data Mining Workshops, ICDMW 2018. Li, Z., Tong, H., Zhu, F. & Yu, J. (eds.). IEEE Computer Society, p. 1006-1013 8 p. 8637384. (IEEE International Conference on Data Mining Workshops, ICDMW; vol. 2018-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Factorization
Labeling
Labels
Experiments

Navigating ride-sharing regulations: How regulations changed the ‘gig’ of ride-sharing for drivers in Taiwan

Chen, A., Yuan, C. W., Ma, N. F., Hsu, C. Y. & Hanrahan, B. V., May 2 2019, CHI 2019 - Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Crime
statistics
offense
community
Social Isolation

Never stop creating: A preliminary inquiry in older adults’ everyday innovations

Wang, X., Knearem, T. & Carroll, J., May 20 2019, Proceedings of the 13th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2019. Association for Computing Machinery, p. 111-118 8 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Innovation
Health
Aging of materials

Notice after notice-and-consent

Susser, D., Jan 1 2019, In : Journal of Information Policy. 9, p. 132-157 26 p.

Research output: Contribution to journalArticle

privacy
criticism
Values
1 Citation (Scopus)
privacy
criticism
Values
1 Citation (Scopus)

On convergence rates of game theoretic reinforcement learning algorithms

Hu, Z., Zhu, M., Chen, P. & Liu, P., Jun 1 2019, In : Automatica. 104, p. 90-101 12 p.

Research output: Contribution to journalArticle

Reinforcement learning
Learning algorithms

Online and scalable adaptive cyber defense

Priest, B. W., Cybenko, G., Singh, S., Albanese, M. & Liu, P., Jan 1 2019, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 232-261 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11830 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

Sketching
Scalability
Streaming Data
Moving Target
Concretes
1 Citation (Scopus)

Online hate ratings vary by extremes: A statistical analysis

Salminen, J., Almerekhi, H., Kamel, A. M., Jung, S. G. & Jansen, B. J., Mar 8 2019, CHIIR 2019 - Proceedings of the 2019 Conference on Human Information Interaction and Retrieval. Association for Computing Machinery, Inc, p. 213-217 5 p. (CHIIR 2019 - Proceedings of the 2019 Conference on Human Information Interaction and Retrieval).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Statistical methods
Learning systems
Processing
2 Citations (Scopus)

Opinion dynamics in the presence of increasing agreement pressure

Semonsen, J., Griffin, C., Squicciarini, A. & Rajtmajer, S., Apr 1 2019, In : IEEE Transactions on Cybernetics. 49, 4, p. 1270-1278 9 p., 8291046.

Research output: Contribution to journalArticle

Complex networks

Optimizing Peer Referrals for Public Awareness using Contextual Bandits

Mothilal, R. K., Yadav, A. & Sharma, A., Jul 3 2019, COMPASS 2019 - Proceedings of the 2019 Conference on Computing and Sustainable Societies. Association for Computing Machinery, Inc, p. 74-85 12 p. (COMPASS 2019 - Proceedings of the 2019 Conference on Computing and Sustainable Societies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs

Optimizing the wisdom of the crowd: Inference, learning, and teaching

Zhou, Y., Ma, F., Gao, J. & He, J., Jul 25 2019, KDD 2019 - Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 3231-3232 2 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supervised learning
Teaching
Agglomeration
Feedback
Costs

Overview of Control and Game Theory in Adaptive Cyber Defenses

Cybenko, G., Wellman, M., Liu, P. & Zhu, M., Jan 1 2019, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 1-11 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11830 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

Game theory
Game Theory
Control theory
Control Theory
Moving Target
2 Citations (Scopus)

Participatory data collection and management in low-resource contexts: A field trial with urban refugees

Xu, Y. & Maitland, C. F., Jan 4 2019, Proceedings of the 10th International Conference on Information and Communication Technologies and Development, ICTD 2019. Association for Computing Machinery, a18. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information management
Education
Systems analysis
Testing

PbFG: Physique-based fuzzy granular modeling for non-invasive blood glucose monitoring

Liu, W., Huang, A., Wang, P. & Chu, C., Sep 1 2019, In : Information Sciences. 497, p. 56-76 21 p.

Research output: Contribution to journalArticle

Glucose
Blood
Monitoring
Modeling
Individual Differences

Personas changing over time: Analyzing variations of data-driven personas during a two-year period

Jung, S. G., Jansen, B. J. & Salminen, J., May 2 2019, CHI EA 2019 - Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, 3312955. (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy-enhancing artificial intelligence and language technologies (PAL 2019): Preface to the proceedings

Wilson, S., Ghanavati, S., Ghazinour, K. & Sadeh, N., Jan 1 2019, In : CEUR Workshop Proceedings. 2335

Research output: Contribution to journalEditorial

Artificial intelligence

Privacy in Health Disparity Research

Xu, H. & Zhang, N., Jun 1 2019, In : Medical care. 57, p. S172-S175

Research output: Contribution to journalArticle

Privacy
Health
Research
Public Health
Patient Protection and Affordable Care Act

Privacy preserving text representation learning

Beigi, G., Shu, K., Guo, R., Wang, S. & Liu, H., Sep 12 2019, HT 2019 - Proceedings of the 30th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, Inc, p. 275-276 2 p. (HT 2019 - Proceedings of the 30th ACM Conference on Hypertext and Social Media).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2 Citations (Scopus)

Probabilistic Multigraph Modeling for Improving the Quality of Crowdsourced Affective Data

Ye, J., Li, J., Newman, M. G., Adams, Jr., R. & Wang, J., Jan 1 2019, In : IEEE Transactions on Affective Computing. 10, 1, p. 115-128 14 p., 7872458.

Research output: Contribution to journalArticle

Labels
Experiments
Concretes
Testing
Statistical Models

Protecting mobile devices from physical memory attacks with targeted encryption

Guan, L., Cao, C., Zhu, S., Lin, J., Liu, P., Xia, Y. & Luo, B., May 15 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 34-44 11 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Dynamic random access storage
Mobile devices
Cryptography
Data storage equipment
Random access storage

PTrix: Efficient hardware-assisted fuzzing for COTS binary

Chen, Y., Mu, D., Xu, J., Sun, Z., Shen, W., Xing, X., Lu, L. & Mao, B., Jul 2 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 633-645 13 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback
Hardware
Defects
Program processors
Testing

Reinforcement learning for adaptive cyber defense against zero-day attacks

Hu, Z., Chen, P., Zhu, M. & Liu, P., Jan 1 2019, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 54-93 40 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11830 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

Reinforcement learning
Reinforcement Learning
Attack
Zero
Control theory

Relational social recommendation: Application to the academic domain

Amal, S., Tsai, C-H., Brusilovsky, P., Kuflik, T. & Minkov, E., Jun 15 2019, In : Expert Systems With Applications. 124, p. 182-195 14 p.

Research output: Contribution to journalArticle

Feedback
Information use
Recommender systems

Reports of the AAAI 2019 spring symposium series

Baldini, I., Barrett, C., Chella, A., Cinelli, C., Gamez, D., Gilpin, L. H., Hinkelmann, K., Holmes, D., Kido, T., Kocaoglu, M., Lawless, W. F., Lomuscio, A., Macbeth, J. C., Martin, A., Mittu, R., Patterson, E., Sofge, D., Tadepalli, P., Takadama, K. & Wilson, S., Jan 1 2019, In : AI Magazine. 40, 3, p. 59-66 8 p.

Research output: Contribution to journalArticle

Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks

Choi, S. H., Shin, J. M., Liu, P. & Choi, Y. H., Jun 1 2019, 2019 IEEE Conference on Communications and Network Security, CNS 2019. Institute of Electrical and Electronics Engineers Inc., 8802809. (2019 IEEE Conference on Communications and Network Security, CNS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neural networks
Malware
Robustness analysis
Attack
Visualization
3 Citations (Scopus)

RRR: Rank-regret representative

Asudeh, A., Nazi, A., Zhang, N., Das, G. & Jagadish, H. V., Jun 25 2019, SIGMOD 2019 - Proceedings of the 2019 International Conference on Management of Data. Association for Computing Machinery, p. 263-280 18 p. (Proceedings of the ACM SIGMOD International Conference on Management of Data).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Approximation algorithms
Computational complexity
Geometry
Experiments
2 Citations (Scopus)

Screenomics: A Framework to Capture and Analyze Personal Life Experiences and the Ways that Technology Shapes Them

Reeves, B., Ram, N., Robinson, T. N., Cummings, J. J., Giles, C. L., Pan, J., Chiatti, A., Cho, M., Roehrick, K., Yang, X., Gagneja, A., Brinberg, M., Muise, D., Lu, Y., Luo, M., Fitzgerald, A. & Yeykelis, L., Jan 1 2019, In : Human-Computer Interaction.

Research output: Contribution to journalArticle

Digital storage
Life Change Events
Switches
Technology
Psychological Theory

Seeking common ground while reserving differences in gesture elicitation studies

Wu, H., Liu, J., Qiu, J. & Zhang, X., Jun 15 2019, In : Multimedia Tools and Applications. 78, 11, p. 14989-15010 22 p.

Research output: Contribution to journalArticle

Navigation
1 Citation (Scopus)

Stimulus-Response and Response-Effect Compatibility With Touchless Gestures and Moving Action Effects

Janczyk, M., Xiong, A. & Proctor, R. W., Dec 1 2019, In : Human Factors. 61, 8, p. 1297-1314 18 p.

Research output: Contribution to journalArticle

Gestures
stimulus
Display devices
Experiments
manipulation
3 Citations (Scopus)

Structure-Based Suggestive Exploration: A New Approach for Effective Exploration of Large Networks

Chen, W., Guo, F., Han, D., Pan, J., Nie, X., Xia, J. & Zhang, X., Jan 1 2019, In : IEEE Transactions on Visualization and Computer Graphics. 25, 1, p. 555-565 11 p., 8440813.

Research output: Contribution to journalArticle

Navigation

Summarizing Situational Tweets in Crisis Scenarios: An Extractive-Abstractive Approach

Rudra, K., Goyal, P., Ganguly, N., Imran, M. & Mitra, P., Oct 1 2019, In : IEEE Transactions on Computational Social Systems. 6, 5, p. 981-993 13 p., 8839735.

Research output: Contribution to journalArticle

Summarization
scenario
Scenarios
Linear programming
Disasters

Talking about interaction*

Reeves, S. & Beck, J., Nov 1 2019, In : International Journal of Human Computer Studies. 131, p. 144-151 8 p.

Research output: Contribution to journalArticle

Human computer interaction
interaction
formalization
pragmatics
discourse

Targeted knowledge transfer for learning traffic signal plans

Xu, N., Zheng, G., Xu, K., Zhu, Y. & Li, Z., Jan 1 2019, Advances in Knowledge Discovery and Data Mining - 23rd Pacific-Asia Conference, PAKDD 2019, Proceedings. Huang, S-J., Gong, Z., Yang, Q., Zhang, M-L. & Zhou, Z-H. (eds.). Springer Verlag, p. 175-187 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11440 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Knowledge Transfer
Traffic signals
Reinforcement learning
Traffic
Reinforcement Learning

Technology, autonomy, and manipulation

Susser, D., Roessler, B. & Nissenbaum, H., Jan 1 2019, In : Internet Policy Review. 8, 2

Research output: Contribution to journalArticle

autonomy
manipulation
Decision making
decision making
Information technology

TextContourNet: A flexible and effective framework for improving scene text detection architecture with a multi-task cascade

He, D., Yang, X., Kifer, D. & Giles, C. L., Mar 4 2019, Proceedings - 2019 IEEE Winter Conference on Applications of Computer Vision, WACV 2019. Institute of Electrical and Electronics Engineers Inc., p. 676-685 10 p. 8659067. (Proceedings - 2019 IEEE Winter Conference on Applications of Computer Vision, WACV 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detectors
Experiments

The challenges of creating engaging content: Results from a focus group study of a popular news media organization

Aldous, K. K., Jansen, B. J. & An, J., May 2 2019, CHI EA 2019 - Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, 3312810. (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Systems analysis
Processing
13 Citations (Scopus)

The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved

Zhou, W., Jia, Y., Peng, A., Zhang, Y. & Liu, P., Apr 1 2019, In : IEEE Internet of Things Journal. 6, 2, p. 1606-1616 11 p., 8386824.

Research output: Contribution to journalArticle

Domestic appliances
Internet of things
Automation

The effect of smiling pictures on perceptions of personas

Salminen, J., Jung, S. G., Santos, J. M. & Jansen, B. J., Jun 6 2019, ACM UMAP 2019 Adjunct - Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization. Association for Computing Machinery, Inc, p. 75-79 5 p. (ACM UMAP 2019 Adjunct - Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments

The future of data-driven personas: A marriage of online analytics numbers and human attributes

Salminen, J., Jung, S. G. & Jansen, B. J., Jan 1 2019, ICEIS 2019 - Proceedings of the 21st International Conference on Enterprise Information Systems. Filipe, J., Brodsky, A., Hammoudi, S. & Smialek, M. (eds.). SciTePress, p. 596-603 8 p. (ICEIS 2019 - Proceedings of the 21st International Conference on Enterprise Information Systems; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Innovation
Marriage
Decision maker
Segmentation
Research agenda
1 Citation (Scopus)

The internet of places

Carroll, J., Jan 1 2019, Internet of Things. Springer International Publishing, p. 23-32 10 p. (Internet of Things).

Research output: Chapter in Book/Report/Conference proceedingChapter

Internet
Data storage equipment
Sensors
Internet of things
sensors
1 Citation (Scopus)

The multi-walker chain and its application in local community detection

Bian, Y., Ni, J., Cheng, W. & Zhang, X., Sep 1 2019, In : Knowledge and Information Systems. 60, 3, p. 1663-1691 29 p.

Research output: Contribution to journalArticle

Electric network analysis

The role of working memory in syntactic sentence realization: A modeling & simulation approach

Cole, J. R. & Reitter, D. T., Jun 1 2019, In : Cognitive Systems Research. 55, p. 95-106 12 p.

Research output: Contribution to journalArticle

Syntactics
Short-Term Memory
Data storage equipment
Psycholinguistics
Linguistics
1 Citation (Scopus)

The stomatal flexoskeleton: How the biomechanics of guard cell walls animate an elastic pressure vessel

Yi, H., Chen, Y., Wang, J., Puri, V. & Anderson, C. T., Jan 1 2019, In : Journal of experimental botany. 70, 14, p. 3561-3571 11 p.

Research output: Contribution to journalReview article

guard cells
Biomechanical Phenomena
Cell Wall
cell walls
Pressure