College of Information Sciences and Technology

  • United States

Research Output

Wearing many (social) hats: How different are your different social network personae?

Zhong, C., Chang, H. W., Karamshuk, D., Lee, D. & Sastry, N., Jan 1 2017, Proceedings of the 11th International Conference on Web and Social Media, ICWSM 2017. AAAI press, p. 397-406 10 p. (Proceedings of the 11th International Conference on Web and Social Media, ICWSM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

We are healthier together: Designing for technology-mediated health coproductions by older adults

Yuan, C. W. T., Hanrahan, B. V., Wirth, R., Rosson, M. B. & Carroll, J., May 23 2017, Proceedings of the 11th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2017. Association for Computing Machinery, p. 488-491 4 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Weak ties in networked communities

Kavanaugh, A. L., Reese, D. D., Carroll, J. M. & Rosson, M. B., Jan 1 2005, In : Information Society. 21, 2, p. 119-131 13 p.

Research output: Contribution to journalArticle

179 Scopus citations

Weakly supervised facial attribute manipulation via deep adversarial network

Wang, Y., Wang, S., Qi, G., Tang, J. & Li, B., May 3 2018, Proceedings - 2018 IEEE Winter Conference on Applications of Computer Vision, WACV 2018. Institute of Electrical and Electronics Engineers Inc., p. 112-121 10 p. (Proceedings - 2018 IEEE Winter Conference on Applications of Computer Vision, WACV 2018; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

wConnect: Cultivating a landscape of online places for a developmental learning community

Rosson, M. B., Sinha, H., Zhao, D., Carroll, J., Ganoe, C. & Mahar, J., Oct 1 2009, In : Educational Technology and Society. 12, 4, p. 87-97 11 p.

Research output: Contribution to journalArticle

4 Scopus citations

WaveMark: Digital image watermarking using Daubechies' wavelets and error correcting coding

Wang, J. Z. & Wiederhold, G., Jan 1 1999, In : Proceedings of SPIE - The International Society for Optical Engineering. 3528, p. 432-439 8 p.

Research output: Contribution to journalConference article

12 Scopus citations

Wavelets and imaging informatics: A review of the literature

Wang, J. Z., Jan 1 2001, In : Journal of Biomedical Informatics. 34, 2, p. 129-141 13 p.

Research output: Contribution to journalReview article

21 Scopus citations

Wavelet-based image indexing techniques with partial sketch retrieval capability

Wang, J., Wiederhold, G., Firschein, O. & Wei, S. X., Jan 1 1997, p. 13-24. 12 p.

Research output: Contribution to conferencePaper

73 Scopus citations

Watershed reanalysis: Towards a national strategy for model-data integration

Duffy, C., Leonard, L., Bhatt, G., Yu, X. & Giles, L., Dec 1 2011, Proceedings - 7th IEEE International Conference on e-Science Workshops, eScienceW 2011. p. 61-65 5 p. 6130732. (Proceedings - 7th IEEE International Conference on e-Science Workshops, eScienceW 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Warehousing structured and unstructured data for data mining

Miller, L. L., Honavar, V. & Barta, T., Dec 1 1997, In : Proceedings of the ASIS Annual Meeting. 34, p. 215-224 10 p.

Research output: Contribution to journalArticle

2 Scopus citations

WANDS: Wide-Area Network Delay Simulator

Borella, M. S. & Sears, A. L., 1997, Proceedings of the IEEE International Workshop on Network and Operating System Support for Digital Audio and Video. Anon (ed.). IEEE, p. 85-92 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

WANDS: Tools for designing and testing distributed documents

Sears, A. & Borella, M. S., Mar 22 1997, CHI 1997 Extended Abstracts on Human Factors in Computing Systems: Looking to the Future, CHI EA 1997. Pemberton, S. (ed.). Association for Computing Machinery, p. 327-328 2 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 22-27-March-1997).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Walk, not wait: Faster sampling over online social networks

Nazi, A., Zhou, Z., Thirumuruganathan, S., Zhang, N. & Das, G., Jan 1 2015, In : Proceedings of the VLDB Endowment. 8, 6, p. 678-689 12 p.

Research output: Contribution to journalConference article

12 Scopus citations

Vulnerabilities leading to denial of services attacks in grid computing systems: A survey

Lee, W., Squicciarini, A. & Bertino, E., Nov 22 2010, 6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10. 1852725. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Vox populi: The public searching of the Web

Wolfram, D., Spink, A., Jansen, B. J. & Saracevic, T., Oct 1 2001, In : Journal of the American Society for Information Science and Technology. 52, 12, p. 1073-1074 2 p.

Research output: Contribution to journalArticle

78 Scopus citations

VMhunt: A verifiable approach to partially-virtualized binary code simplification

Xu, D., Ming, J., Fu, Y. & Wu, D., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 442-458 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

VLHCC 2010

Díaz, P., Rosson, M. B., Hundhausen, C. & Pietriga, E., Dec 1 2010, In : Proceedings - 2010 IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2010. 5635277.

Research output: Contribution to journalEditorial

VisualWikiCurator: Human and machine intelligence for organizing wiki content

Kong, N., Hanrahan, B., Weksteen, T., Convertino, G. & Chi, E. H., Mar 23 2011, Proceedings of the 15th International Conference on Intelligent User Interfaces, IUI'11. p. 367-370 4 p. (International Conference on Intelligent User Interfaces, Proceedings IUI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Visual toolkit for network security experiment specification and data analysis

Li, L., Liu, P. & Kesidis, G., Dec 1 2006, Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 7-14 8 p. 1179579. (Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Visual storytelling

Huang, T. H., Ferraro, F., Mostafazadeh, N., Misra, I., Agrawal, A., Devlin, J., Girshick, R., He, X., Kohli, P., Batra, D., Zitnick, C. L., Parikh, D., Vanderwende, L., Galley, M. & Mitchell, M., Jan 1 2016, 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL HLT 2016 - Proceedings of the Conference. Association for Computational Linguistics (ACL), p. 1233-1239 7 p. (2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL HLT 2016 - Proceedings of the Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

71 Scopus citations

Visual salience, not the graspable part of a pictured eating utensil, grabs attention

Xiong, A., Proctor, R. W. & Zelaznik, H. N., Jul 15 2019, In : Attention, Perception, and Psychophysics. 81, 5, p. 1454-1463 10 p.

Research output: Contribution to journalArticle

2 Scopus citations

Visual representation of web design patterns for end-users

Díaz, P., Aedo, I. & Rosson, M. B., 2008, Proceedings of the Working Conference on Advanced Visual Interfaces, AVI 08. p. 408-411 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Visual methods for examining SVM classifiers

Caragea, D., Cook, D., Wickham, H. & Honavar, V., Aug 29 2008, Visual Data Mining - Theory, Techniques and Tools for Visual Analytics. Simoff, S. J., Bohlen, M. H. & Mazeika, A. (eds.). p. 136-153 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4404 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations
13 Scopus citations

Visualizing efficiency: a technique to help designers judge interface efficiency

Sears, A. L., Jan 1 1996, p. 311-312. 2 p.

Research output: Contribution to conferencePaper

2 Scopus citations

Visual analytics towards big data

Ren, L., Du, Y., Ma, S., Zhang, X. L. & Dai, G. Z., Sep 1 2014, In : Ruan Jian Xue Bao/Journal of Software. 25, 9, p. 1909-1936 28 p.

Research output: Contribution to journalReview article

54 Scopus citations

Visual analysis adding breadth to a computer graphics course

Sears, A., Mar 15 1995, Proceedings of the 26th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 1995. Miller, J. E., White, C. M., Gersting, J. & White, C. M. (eds.). Association for Computing Machinery, Inc, p. 195-198 4 p. (Proceedings of the 26th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 1995).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visual Analysis: Adding Breadth to a Computer Graphics Course

Sears, A. L. & Wolfe, R., Mar 15 1995, In : ACM SIGCSE Bulletin. 27, 1, p. 195-198 4 p.

Research output: Contribution to journalArticle

1 Scopus citations

Viewing online searching within a learning paradigm

Jansen, B. J., Smith, B. & Booth, D. L., Nov 30 2007, Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR'07. p. 859-860 2 p. (Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR'07).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Viewed by too many or viewed too little: Using information dissemination for audience segmentation

Jansen, B. J., Jung, S. G., Salminen, J., An, J. & Kwak, H., Jan 1 2017, In : Proceedings of the Association for Information Science and Technology. 54, 1, p. 189-196 8 p.

Research output: Contribution to journalArticle

5 Scopus citations

ViewDroid: Towards obfuscation-resilient mobile application repackaging detection

Zhang, F., Huang, H., Zhu, S., Wu, D. & Liu, P., Jan 1 2014, WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, p. 25-36 12 p. (WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

105 Scopus citations

View-dependent JPEG 2000-based mesh streaming

Lin, N. S., Huang, K. & Chen, B. Y., Jul 30 2006, ACM SIGGRAPH 2006 Research Posters, SIGGRAPH 2006. Association for Computing Machinery, Inc, 177. (ACM SIGGRAPH 2006 Research Posters, SIGGRAPH 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

View, like, comment, post: Analyzing user engagement by topic at 4 levels across 5 social media platforms for 53 news organizations

Aldous, K. K., An, J. & Jansen, B. J., Jan 1 2019, p. 47-57. 11 p.

Research output: Contribution to conferencePaper

1 Scopus citations

Video Linkage: Group based copied video detection

Kim, H. S., Lee, J., Liu, H. & Lee, D., Dec 17 2008, CIVR 2008 - Proceedings of the International Conference on Content-based Image and Video Retrieval. p. 397-406 10 p. (CIVR 2008 - Proceedings of the International Conference on Content-based Image and Video Retrieval).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

25 Scopus citations

VeryIDX - A digital identity management system for pervasive computing environments

Paci, F., Bertino, E., Kerr, S., Lint, A., Squicciarini, A. & Woo, J., Nov 28 2008, Software Technologies for Embedded and Ubiquitous Systems - 6th IFIP WG 10.2 International Workshop, SEUS 2008, Proceedings. p. 268-279 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5287 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Vertically arrayed stimuli and responses: transfer of incompatible spatial mapping to Simon task occurs regardless of response-device orientation

Zhong, Q., Xiong, A., Vu, K. P. L. & Proctor, R. W., Jan 1 2018, In : Experimental Brain Research. 236, 1, p. 175-185 11 p.

Research output: Contribution to journalArticle

3 Scopus citations

Versatile publishing for privacy preservation

Jin, X., Zhang, M., Zhang, N. & Das, G., Sep 7 2010, KDD'10 - Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data. p. 353-362 10 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

Verifying Preferential Equivalence and Subsumption via Model Checking

Santhanam, G. R., Basu, S. & Honavar, V., Dec 16 2013, Algorithmic Decision Theory - Third International Conference, ADT 2013, Proceedings. p. 324-335 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8176 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Verifying intervention policies to counter infection propagation over networks: A model checking approach

Santhanam, G. R., Suvorov, Y., Basu, S. & Honavar, V., Nov 2 2011, AAAI-11 / IAAI-11 - Proceedings of the 25th AAAI Conference on Artificial Intelligence and the 23rd Innovative Applications of Artificial Intelligence Conference. p. 1408-1414 7 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Verification of receipts from M-commerce transactions on NFC cellular phones

Woo, J., Bhagav-Spantzel, A., Squicciarini, A. C. & Bertino, E., Dec 1 2008, Proceedings - 10th IEEE Joint Conference on E-Commerce Technology and the 5th Enterprise Computing, E-Commerce and E-Services, CEC 2008 and EEE 2008. p. 36-43 8 p. 4785045. (Proceedings - 10th IEEE Joint Conference on E-Commerce Technology and the 5th Enterprise Computing, E-Commerce and E-Services, CEC 2008 and EEE 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Verbal equity, cognitive specialization, and performance

Borge, M. & Carroll, J., Nov 9 2014, GROUP 2014 - Proceedings of the 18th ACM International Conference on Supporting Group Work. Association for Computing Machinery, p. 215-225 11 p. (Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

VCIDS: Collaborative intrusion detection of sensor and actuator attacks on connected vehicles

Guo, P., Kim, H., Guan, L., Zhu, M. & Liu, P., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 377-396 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

VaultIME: Regaining user control for password managers through auto-correction

Guan, L., Farhang, S., Pu, Y., Guo, P., Grossklags, J. & Liu, P., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 673-686 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

VAST 2007 contest TexPlorer

Pan, C. C., Jaiswal, A. R., Luo, J., Robinson, A., Mitra, P., MacEachren, A. M. & Turton, I., Dec 1 2007, VAST IEEE Symposium on Visual Analytics Science and Technology 2007, Proceedings. p. 243-244 2 p. 4389037

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Value-based program characterization and its application to software plagiarism detection

Jhi, Y. C., Wang, X., Jia, X., Zhu, S., Liu, P. & Wu, D., Jul 7 2011, ICSE 2011 - 33rd International Conference on Software Engineering, Proceedings of the Conference. p. 756-765 10 p. (Proceedings - International Conference on Software Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

49 Scopus citations

Validity Concerns in Research Using Organic Data

Xu, H., Zhang, N. & Zhou, L., Jan 1 2019, (Accepted/In press) In : Journal of Management.

Research output: Contribution to journalArticle

Validating social media data for automatic persona generation

An, J., Kwak, H. & Jansen, B. J., Jul 2 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications, AICCSA 2016 - Proceedings. IEEE Computer Society, 7945816. (Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA; vol. 0).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Validating a high level behavioral representation language (HERBAL): A docking study for ACT-R

Zhao, C., Paik, J., Morgan, J. H. & Ritter, F. E., Jan 1 2010, Biologically Inspired Cognitive Architectures 2010. IOS Press, p. 181-188 8 p. (Frontiers in Artificial Intelligence and Applications; vol. 221).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Vaccine:: Obfuscating Access Pattern Against File-Injection Attacks

Liu, H., Wang, B., Niu, N., Wilson, S. & Wei, X., Jun 2019, 2019 IEEE Conference on Communications and Network Security, CNS 2019. Institute of Electrical and Electronics Engineers Inc., p. 109-117 9 p. 8802803. (2019 IEEE Conference on Communications and Network Security, CNS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

UX practitioners' engagement with intermediate-level knowledge

Gray, C. M. & Kou, Y., Jun 10 2017, DIS 2017 Companion - Proceedings of the 2017 ACM Conference on Designing Interactive Systems. Association for Computing Machinery, Inc, p. 13-17 5 p. (DIS 2017 Companion - Proceedings of the 2017 ACM Conference on Designing Interactive Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations