College of Information Sciences and Technology

  • United States

Research Output 1976 2020

2018
1 Citation (Scopus)

The safety net of aging in place: Understanding how older adults construct, develop, and maintain their social circles

Wang, X., Knearem, T., Gui, F., Gupta, S., Zhu, H., Williams, M. & Carroll, J., May 21 2018, Proceedings of the 12th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2018. Association for Computing Machinery, p. 191-200 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Aging of materials
Health

The symbiotic relationship of crisis response professionals and enthusiasts as demonstrated by reddit's user-interface over time

LaLone, N., Kropczynski, J. & Tapia, A. H., Jan 1 2018, Conference Proceedings - 15th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2018. Tomaszewski, B. & Boersma, K. (eds.). Information Systems for Crisis Response and Management, ISCRAM, p. 232-244 13 p. (Proceedings of the International ISCRAM Conference; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bombing
Theaters
User interfaces
Facings
Agglomeration

The tangled roots of real estate markets, the state, and public education

Kelly, M., Jul 3 2018, In : Journal of Educational Administration and History. 50, 3, p. 191-203 13 p.

Research output: Contribution to journalArticle

real estate market
public education
market
educational opportunity
education
5 Citations (Scopus)

The theory-practice gap as generative metaphor

Beck, J. & Ekbia, H. R., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Human computer interaction

Toward automated multiparty privacy conflict detection

Zhong, H., Squicciarini, A. & Miller, D. J., Oct 17 2018, CIKM 2018 - Proceedings of the 27th ACM International Conference on Information and Knowledge Management. Paton, N., Candan, S., Wang, H., Allan, J., Agrawal, R., Labrinidis, A., Cuzzocrea, A., Zaki, M., Srivastava, D., Broder, A. & Schuster, A. (eds.). Association for Computing Machinery, p. 1811-1814 4 p. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Neural networks
Multiple stakeholders
Decision-making process
Access control

Toward personalized sleep-wake prediction from actigraphy

Khademi, A., Elmanzalawi, Y., Buxton, O. M. & Honavar, V. G., Apr 6 2018, 2018 IEEE EMBS International Conference on Biomedical and Health Informatics, BHI 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 414-417 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Actigraphy
Sleep
Individuality
Learning systems
Polysomnography
14 Citations (Scopus)

Towards environment independent device free human activity recognition

Jiang, W., Miao, C., Ma, F., Yao, S., Wang, Y., Yuan, Y., Xue, H., Song, C., Ma, X., Koutsonikolas, D., Xu, W. & Su, L., Oct 15 2018, MobiCom 2018 - Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. Association for Computing Machinery, p. 289-304 16 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Testbeds
Ultrasonics
Experiments
Deep learning

Towards evaluating the security of real-world deployed image captchas

Zhao, B., Weng, H., Ji, S., Chen, J., Wang, T., He, Q. & Beyah, R., Oct 15 2018, AISec 2018 - Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2018. Association for Computing Machinery, p. 85-96 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Personnel
Image recognition
Ecosystems
Computer vision
Internet
3 Citations (Scopus)

Towards Interpretation of Recommender Systems with Sorted Explanation Paths

Yang, F., Liu, N., Wang, S. & Hu, X., Dec 27 2018, 2018 IEEE International Conference on Data Mining, ICDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 667-676 10 p. 8594891. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2018-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recommender systems
Semantics
Experiments
1 Citation (Scopus)

Towards Privacy-Preserving and Practical Image-Centric Social Discovery

Yuan, X., Wang, X., Wang, C., Squicciarini, A. & Ren, K., Sep 1 2018, In : IEEE Transactions on Dependable and Secure Computing. 15, 5, p. 868-882 15 p., 7568994.

Research output: Contribution to journalArticle

Quality of service
Experiments
2 Citations (Scopus)

Towards privacy preserving social recommendation under personalized privacy settings

Meng, X., Wang, S., Shu, K., Li, J., Chen, B., Liu, H. & Zhang, Y., Jul 14 2018, (Accepted/In press) In : World Wide Web. p. 1-29 29 p.

Research output: Contribution to journalArticle

Recommender systems
Feedback
4 Citations (Scopus)

Towards professionalization in an online community of emerging occupation: Discourses among UX practitioners

Kou, Y. & Gray, C. M., Jan 7 2018, GROUP 2018 - Proceedings of the 2018 ACM Conference on Supporting Groupwork. Association for Computing Machinery, p. 322-334 13 p. (Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Medicine
Internet
Power (Psychology)
2 Citations (Scopus)

Turing obfuscation

Wang, Y., Wang, S., Wang, P. & Wu, D., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 225-244 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Turing machines
Flow control
Reverse engineering
Flow graphs
Machine components
3 Citations (Scopus)

Uncovering scene context for predicting privacy of online shared images

Tonge, A., Caragea, C. & Squicciarini, A., Jan 1 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI press, p. 8167-8168 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neural networks

Understanding and identifying rhetorical questions in social media

Ranganath, S., Hu, X., Tang, J., Wang, S. & Liu, H., Jan 1 2018, In : ACM Transactions on Intelligent Systems and Technology. 9, 2, 17.

Research output: Contribution to journalArticle

Social Media
Linguistics
Express
Framework
Evaluate
2 Citations (Scopus)

Understanding challenges in prehabilitation for patients with multiple chronic conditions

Zhu, H., Moffa, Z., Wang, X., Abdullah, S., Julaiti, J. & Carroll, J., May 21 2018, Proceedings of the 12th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2018. Association for Computing Machinery, p. 138-147 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Surgery
Health
Health care
Costs

Understanding how GitHub supports curation repositories

Wu, Y., Kropczynski, J., Prates, R. & Carroll, J., Mar 10 2018, In : Future Internet. 10, 3, 29.

Research output: Contribution to journalArticle

Understanding the uncertainty in 1D unidirectional moving target selection

Huang, J., Zhang, X., Tian, F., Fan, X. & Zhai, S., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Human computer interaction
Uncertainty
Experiments
9 Citations (Scopus)

Understanding User Profiles on Social Media for Fake News Detection

Shu, K., Wang, S. & Liu, H., Jun 26 2018, Proceedings - IEEE 1st Conference on Multimedia Information Processing and Retrieval, MIPR 2018. Institute of Electrical and Electronics Engineers Inc., p. 430-435 6 p. (Proceedings - IEEE 1st Conference on Multimedia Information Processing and Retrieval, MIPR 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
1 Citation (Scopus)

Understanding users' privacy attitudes through subjective and objective assessments: An instagram case study

Han, K., Jung, H., Jang, J. Y. & Lee, D., Jun 1 2018, Computer, 51, 6, p. 18-28 11 p.

Research output: Contribution to specialist publicationArticle

7 Citations (Scopus)

Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths

Sun, X., Dai, J., Liu, P., Singhal, A. & Yen, J., Oct 1 2018, In : IEEE Transactions on Information Forensics and Security. 13, 10, p. 2506-2521 16 p.

Research output: Contribution to journalArticle

Bayesian networks
Intrusion detection
Computer networks
Experiments
2 Citations (Scopus)

Using Stakeholder Theory to examine drivers' Stake in Uber

Ma, N. F., Yuan, C. W., Ghafurian, M. & Hanrahan, B. V., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lenses
Personnel
Industry

VaultIME: Regaining user control for password managers through auto-correction

Guan, L., Farhang, S., Pu, Y., Guo, P., Grossklags, J. & Liu, P., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 673-686 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Managers
Application programs
Websites
Mobile phones

VCIDS: Collaborative intrusion detection of sensor and actuator attacks on connected vehicles

Guo, P., Kim, H., Guan, L., Zhu, M. & Liu, P., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 377-396 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Actuators
Sensors
Launching
Testbeds
1 Citation (Scopus)

Vertically arrayed stimuli and responses: transfer of incompatible spatial mapping to Simon task occurs regardless of response-device orientation

Zhong, Q., Xiong, A., Vu, K. P. L. & Proctor, R. W., Jan 1 2018, In : Experimental Brain Research. 236, 1, p. 175-185 11 p.

Research output: Contribution to journalArticle

Equipment and Supplies
Thumb
Terminology
Brain
10 Citations (Scopus)
Image classification
image classification
learning
Information retrieval
Labeling
3 Citations (Scopus)

VMhunt: A verifiable approach to partially-virtualized binary code simplification

Xu, D., Ming, J., Fu, Y. & Wu, D., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 442-458 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary codes
Cryptography
Radar
Switches
Virtualization
1 Citation (Scopus)

Weakly supervised facial attribute manipulation via deep adversarial network

Wang, Y., Wang, S., Qi, G., Tang, J. & Li, B., May 3 2018, Proceedings - 2018 IEEE Winter Conference on Applications of Computer Vision, WACV 2018. Institute of Electrical and Electronics Engineers Inc., p. 112-121 10 p. (Proceedings - 2018 IEEE Winter Conference on Applications of Computer Vision, WACV 2018; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discriminators
Pixels
Deep neural networks

Welcome to the WASPI workshop

Dyer, R., Honavar, V. G., Leavens, G. T., Nguyen, H. A., Nguyen, T. N. & Rajan, H., Nov 9 2018, In : WASPI 2018 - Proceedings of the 1st ACM SIGSOFT International Workshop on Automated Specification Inference, Co-located with FSE 2018. p. III

Research output: Contribution to journalEditorial

privacy
experience
social network
interaction
China
3 Citations (Scopus)

When social media traumatizes teens: The roles of online risk exposure, coping, and post-traumatic stress

McHugh, B. C., Wisniewski, P., Rosson, M. B. & Carroll, J., Oct 2 2018, In : Internet Research. 28, 5, p. 1169-1188 20 p.

Research output: Contribution to journalArticle

social media
posttraumatic stress disorder
coping
adolescent
resilience
3 Citations (Scopus)

Where is community among online learners? Identity, efficacy and personal ties

Sun, N., Rosson, M. B. & Carroll, J., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Students

Why the Common Model of the mind needs holographic a-priori categories

Arora, N., West, R., Brook, A. & Kelly, M., Jan 1 2018, In : Procedia Computer Science. 145, p. 680-690 11 p.

Research output: Contribution to journalConference article

Open Access
Data storage equipment
Ontology
Industry
Mechanics

WiAU: An accurate device-free authentication system with resnet

Lin, C., Hu, J., Sun, Y., Ma, F., Wang, L. & Wu, G., Jun 26 2018, 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-9 9 p. (2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Channel state information
Routers
Experiments

With or without super platforms? Analyzing online publishers’ strategies in the game of traffic

Salminen, J., Maslennikov, D., Jansen, B. J. & Olkkonen, R., Jan 1 2018, Social Informatics - 10th International Conference, SocInfo 2018, Proceedings. Staab, S., Koltsova, O. & Ignatov, D. I. (eds.). Springer Verlag, p. 251-260 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11186 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Coalitions
Marketing
Traffic
Game
Websites
4 Citations (Scopus)
internet community
communication
Communication
research focus
social media
2017

2nd international workshop on mental health and well-being: Sensing and intervention

Abdullah, S., Musolesi, M., Murnane, E. L., Bardram, J. E. & Choudhury, T., Sep 11 2017, UbiComp/ISWC 2017 - Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers. Association for Computing Machinery, Inc, p. 745-748 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health

A bridge from the use-mention distinction to natural language processing

Wilson, S., 2017, Perspectives in Pragmatics, Philosophy and Psychology. Springer International Publishing, p. 79-96 18 p. (Perspectives in Pragmatics, Philosophy and Psychology; vol. 15).

Research output: Chapter in Book/Report/Conference proceedingChapter

A case study of crisis management readiness in cross-national contexts: Applying team cognition theories to crisis response teams

Endsley, T. C., Forster, P. K. & Reep, III, J. A., Jan 1 2017, Cognitive Systems Engineering: An Integrative Living Laboratory Framework. CRC Press, p. 131-159 29 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

ACM TIST Special Issue on Urban Intelligence

An, B., Jennings, N. & Li, Z., Nov 1 2017, In : ACM Transactions on Intelligent Systems and Technology. 9, 3, 23.

Research output: Contribution to journalReview article

Intelligence

A cognitive-systems approach to understanding natural gas exploration supply chains a purview and research agenda

McNeese, M. D. & Reep, III, J. A., Jan 1 2017, Cognitive Systems Engineering: An Integrative Living Laboratory Framework. CRC Press, p. 81-102 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Cognitive systems
Supply chains
Natural gas
Natural gas fields
Gas supply
3 Citations (Scopus)

A confucian look at internet censorship in China

Kou, Y., Semaan, B. & Nardi, B., Jan 1 2017, Human-Computer Interaction - INTERACT 2017 - 16th IFIP TC 13 International Conference, Proceedings. O'Neill, J., Dalvi, G., Joshi, A., Balkrishan, D. K., Winckler, M. & Bernhaupt, R. (eds.). Springer Verlag, p. 377-398 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10513 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

China
Teaching
Internet
Limiting
Ethics
22 Citations (Scopus)

Adaptive unpacking of android apps

Xue, L., Luo, X., Yu, L., Wang, S. & Wu, D., Jul 19 2017, Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017. Institute of Electrical and Electronics Engineers Inc., p. 358-369 12 p. 7985676. (Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Packers
Application programs
Reverse engineering
Android (operating system)
8 Citations (Scopus)

Adolescent online safety: Moving beyond formative evaluations to designing solutions for the future

Pinter, A. T., Wisniewski, P. J., Xu, H., Rosson, M. B. & Carroll, J., Jun 27 2017, IDC 2017 - Proceedings of the 2017 ACM Conference on Interaction Design and Children. Association for Computing Machinery, Inc, p. 352-357 6 p. (IDC 2017 - Proceedings of the 2017 ACM Conference on Interaction Design and Children).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

adolescent
Safety
Peer Review
interaction
evaluation
2 Downloads (Pure)

Advanced Cyberinfrastructure for Science, Engineering, and Public Policy

Honavar, V. G., Yelick, K., Nahrstedt, K., Rushmeier, H., Rexford, J., Hill, M. D., Bradley, E. & Mynatt, E., Jun 30 2017, Computing Community Consortium.

Research output: Book/ReportCommissioned report

File
13 Downloads (Pure)

Advances in Artificial Intelligence Require Progress Across all of Computer Science

Hager, G. D., Bryant, R., Horvitz, E., Mataric, M. & Honavar, V., Jul 13 2017, Computing Community Consortium.

Research output: Book/ReportCommissioned report

File
23 Citations (Scopus)

Adversary resistant deep neural networks with an application to malware detection

Wang, Q., Guo, W., Zhang, K., Ororbia, A. G., Xing, X., Liu, X. & Giles, C. L., Aug 13 2017, KDD 2017 - Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 1145-1153 9 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; vol. Part F129685).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image recognition
Tides
Information retrieval
Speech recognition
Computer vision
1 Citation (Scopus)

A framework for computational models of human memory

Kelly, M. & West, R. L., Jan 1 2017, FS-17-01: Artificial Intelligence for Human-Robot Interaction; FS-17-02: Cognitive Assistance in Government and Public Sector Applications; FS-17-03: Deep Models and Artificial Intelligence for Military Applications: Potentials, Theories, Practices, Tools and Risks; FS-17-04: Human-Agent Groups: Studies, Algorithms and Challenges; FS-17-05: A Standard Model of the Mind. AI Access Foundation, p. 376-381 6 p. (AAAI Fall Symposium - Technical Report; vol. FS-17-01 - FS-17-05).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Knowledge representation
Data structures
6 Citations (Scopus)

Aggregating local context for accurate scene text detection

He, D., Yang, X., Huang, W., Zhou, Z., Kifer, D. & Giles, C. L., Jan 1 2017, Computer Vision - 13th Asian Conference on Computer Vision, ACCV 2016, Revised Selected Papers. Nishino, K., Lai, S-H., Lepetit, V. & Sato, Y. (eds.). Springer Verlag, p. 280-296 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10115 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network architecture
Neural networks
Line
Experiments
Refinement
4 Citations (Scopus)

A Group-Based personalized model for image privacy classification and labeling

Zhong, H., Squicciarini, A., Miller, D. J. & Caragea, C., Jan 1 2017, 26th International Joint Conference on Artificial Intelligence, IJCAI 2017. Sierra, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 3952-3958 7 p. (IJCAI International Joint Conference on Artificial Intelligence).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Labeling
Labels
Classifiers