College of Information Sciences and Technology

  • United States

Research Output 1976 2020

2018
1 Citation (Scopus)

Supporting constructive mental health discourse in social media

Blair, J. & Abdullah, S., May 21 2018, Proceedings of the 12th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2018. Association for Computing Machinery, p. 299-303 5 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
4 Citations (Scopus)

Supporting effective sharing of health information among intergenerational family members

Binda, J., Yuan, C. W., Cope, N., Park, H., Choe, E. K. & Carroll, J., May 21 2018, Proceedings of the 12th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2018. Association for Computing Machinery, p. 148-157 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Communication
12 Citations (Scopus)

Survey on access control for community-centered collaborative systems

Paci, F., Squicciarini, A. & Zannone, N., Jan 2018, In : ACM Computing Surveys. 51, 1, 6.

Research output: Contribution to journalReview article

Collaborative Systems
Access Control
Access control
Resources
Information Sharing
1 Citation (Scopus)

Take it or leave it: A survey study on operating system upgrade practices

Farhang, S., Weidman, J., Kamani, M. M., Grossklags, J. & Liu, P., Dec 3 2018, ACM International Conference Proceeding Series. Association for Computing Machinery, p. 490-504 15 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision making
Costs
Automatic Data Processing
Cognition
Hand
Research Personnel
Research
2 Citations (Scopus)

Task relevance and diversity as worker motivation in crowdsourcing

Pilourdault, J., Amer-Yahia, S., Basu Roy, S. & Lee, D., Oct 24 2018, Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018. Institute of Electrical and Electronics Engineers Inc., p. 365-376 12 p. 8509262. (Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Approximation algorithms
Workers
Task assignment
Scalability
Experiments
3 Citations (Scopus)

Tell me before you stream me: Managing information disclosure in video game live streaming

Li, Y., Kou, Y., Lee, J. S. & Kobsa, A., Nov 1 2018, In : Proceedings of the ACM on Human-Computer Interaction. 2, CSCW, 107.

Research output: Contribution to journalArticle

computer game
privacy
broadcast
new media
video

Text extraction and retrieval from smartphone screenshots: Building a repository for life in media

Chiatti, A., Cho, M. J., Gagneja, A., Yang, X., Brinberg, M., Roehrick, K., Choudhury, S. R., Ram, N., Reeves, B. & Giles, C. L., Apr 9 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. Association for Computing Machinery, p. 948-955 8 p. (Proceedings of the ACM Symposium on Applied Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Image retrieval
Optical character recognition
Search engines
Metadata
8 Citations (Scopus)

Text truth: An unsupervised approach to discover trustworthy information from multi-sourced text data

Zhang, H., Li, Y., Ma, F., Gao, J. & Su, L., Jul 19 2018, KDD 2018 - Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 2729-2737 9 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics
Experiments
1 Citation (Scopus)

The blocking analysis and application of patients in multistage health care system

Wu, X., Xu, R., Ma, Q. & Chu, C., Mar 1 2018, In : Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice. 38, 3, p. 634-642 9 p.

Research output: Contribution to journalArticle

Blocking probability
heuristics
Health care
Healthcare
health care
16 Citations (Scopus)

The dark (patterns) side of UX design

Gray, C. M., Kou, Y., Battles, B., Hoggatt, J. & Toombs, A. L., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shareholders
Education
3 Citations (Scopus)

The Gesture Disagreement Problem in Free-hand Gesture Interaction

Wu, H., Zhang, S., Liu, J., Qiu, J. & Zhang, X., Jan 1 2018, (Accepted/In press) In : International Journal of Human-Computer Interaction.

Research output: Contribution to journalArticle

Information retrieval systems
Virtual reality
interaction
virtual reality
information retrieval

The politics of titling: The representation of countries in chi papers

Kou, Y., Gray, C. M., Toombs, A. & Nardi, B., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, alt16. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Human computer interaction
3 Citations (Scopus)

The role of task space in action control: Evidence from research on instructions

Xiong, A. & Proctor, R. W., Jan 1 2018, Psychology of Learning and Motivation - Advances in Research and Theory. Federmeier, K. D. (ed.). Academic Press Inc., p. 325-364 40 p. (Psychology of Learning and Motivation - Advances in Research and Theory; vol. 69).

Research output: Chapter in Book/Report/Conference proceedingChapter

Computer Security
Privacy
Research
Surveys and Questionnaires
2 Citations (Scopus)

The safety net of aging in place: Understanding how older adults construct, develop, and maintain their social circles

Wang, X., Knearem, T., Gui, F., Gupta, S., Zhu, H., Williams, M. & Carroll, J. M., May 21 2018, Proceedings of the 12th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2018. Association for Computing Machinery, p. 191-200 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Aging of materials
Health

The symbiotic relationship of crisis response professionals and enthusiasts as demonstrated by reddit's user-interface over time

LaLone, N., Kropczynski, J. & Tapia, A., Jan 1 2018, Conference Proceedings - 15th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2018. Tomaszewski, B. & Boersma, K. (eds.). Information Systems for Crisis Response and Management, ISCRAM, p. 232-244 13 p. (Proceedings of the International ISCRAM Conference; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bombing
Theaters
User interfaces
Facings
Agglomeration

The tangled roots of real estate markets, the state, and public education

Kelly, M. G., Jul 3 2018, In : Journal of Educational Administration and History. 50, 3, p. 191-203 13 p.

Research output: Contribution to journalArticle

real estate market
public education
market
educational opportunity
education
5 Citations (Scopus)

The theory-practice gap as generative metaphor

Beck, J. & Ekbia, H. R., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Human computer interaction
2 Citations (Scopus)

Toward automated multiparty privacy conflict detection

Zhong, H., Squicciarini, A. & Miller, D. J., Oct 17 2018, CIKM 2018 - Proceedings of the 27th ACM International Conference on Information and Knowledge Management. Paton, N., Candan, S., Wang, H., Allan, J., Agrawal, R., Labrinidis, A., Cuzzocrea, A., Zaki, M., Srivastava, D., Broder, A. & Schuster, A. (eds.). Association for Computing Machinery, p. 1811-1814 4 p. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Neural networks
Multiple stakeholders
Decision-making process
Access control
2 Citations (Scopus)

Toward personalized sleep-wake prediction from actigraphy

Khademi, A., Elmanzalawi, Y., Buxton, O. M. & Honavar, V. G., Apr 6 2018, 2018 IEEE EMBS International Conference on Biomedical and Health Informatics, BHI 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 414-417 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Actigraphy
Sleep
Individuality
Learning systems
Polysomnography
19 Citations (Scopus)

Towards environment independent device free human activity recognition

Jiang, W., Miao, C., Ma, F., Yao, S., Wang, Y., Yuan, Y., Xue, H., Song, C., Ma, X., Koutsonikolas, D., Xu, W. & Su, L., Oct 15 2018, MobiCom 2018 - Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. Association for Computing Machinery, p. 289-304 16 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Testbeds
Ultrasonics
Experiments
Deep learning
2 Citations (Scopus)

Towards evaluating the security of real-world deployed image captchas

Zhao, B., Weng, H., Ji, S., Chen, J., Wang, T., He, Q. & Beyah, R., Oct 15 2018, AISec 2018 - Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2018. Association for Computing Machinery, p. 85-96 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Personnel
Image recognition
Ecosystems
Computer vision
Internet
4 Citations (Scopus)

Towards Interpretation of Recommender Systems with Sorted Explanation Paths

Yang, F., Liu, N., Wang, S. & Hu, X., Dec 27 2018, 2018 IEEE International Conference on Data Mining, ICDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 667-676 10 p. 8594891. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2018-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recommender systems
Semantics
Experiments
3 Citations (Scopus)

Towards Privacy-Preserving and Practical Image-Centric Social Discovery

Yuan, X., Wang, X., Wang, C., Squicciarini, A. C. & Ren, K., Sep 1 2018, In : IEEE Transactions on Dependable and Secure Computing. 15, 5, p. 868-882 15 p., 7568994.

Research output: Contribution to journalArticle

Quality of service
Experiments
4 Citations (Scopus)

Towards professionalization in an online community of emerging occupation: Discourses among UX practitioners

Kou, Y. & Gray, C. M., Jan 7 2018, GROUP 2018 - Proceedings of the 2018 ACM Conference on Supporting Groupwork. Association for Computing Machinery, p. 322-334 13 p. (Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Medicine
Internet
Power (Psychology)
2 Citations (Scopus)

Turing obfuscation

Wang, Y., Wang, S., Wang, P. & Wu, D., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 225-244 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Turing machines
Flow control
Reverse engineering
Flow graphs
Machine components
5 Citations (Scopus)

Uncovering scene context for predicting privacy of online shared images

Tonge, A., Caragea, C. & Squicciarini, A., Jan 1 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI press, p. 8167-8168 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neural networks
1 Citation (Scopus)

Understanding and identifying rhetorical questions in social media

Ranganath, S., Hu, X., Tang, J., Wang, S. & Liu, H., Jan 1 2018, In : ACM Transactions on Intelligent Systems and Technology. 9, 2, 17.

Research output: Contribution to journalArticle

Social Media
Linguistics
Express
Framework
Evaluate
2 Citations (Scopus)

Understanding challenges in prehabilitation for patients with multiple chronic conditions

Zhu, H., Moffa, Z., Wang, X., Abdullah, S., Julaiti, J. & Carroll, J., May 21 2018, Proceedings of the 12th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2018. Association for Computing Machinery, p. 138-147 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Surgery
Health
Health care
Costs

Understanding how GitHub supports curation repositories

Wu, Y., Kropczynski, J., Prates, R. & Carroll, J. M., Mar 10 2018, In : Future Internet. 10, 3, 29.

Research output: Contribution to journalArticle

Understanding the reproducibility of crowd-reported security vulnerabilities

Mu, D., Cuevas, A., Yang, L., Hu, H., Xing, X., Mao, B. & Wang, G., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 919-936 18 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Internet
Engineers
Experiments
3 Citations (Scopus)

Understanding the uncertainty in 1D unidirectional moving target selection

Huang, J., Zhang, X., Tian, F., Fan, X. & Zhai, S., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Human computer interaction
Uncertainty
Experiments
12 Citations (Scopus)

Understanding User Profiles on Social Media for Fake News Detection

Shu, K., Wang, S. & Liu, H., Jun 26 2018, Proceedings - IEEE 1st Conference on Multimedia Information Processing and Retrieval, MIPR 2018. Institute of Electrical and Electronics Engineers Inc., p. 430-435 6 p. (Proceedings - IEEE 1st Conference on Multimedia Information Processing and Retrieval, MIPR 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
1 Citation (Scopus)

Understanding users' privacy attitudes through subjective and objective assessments: An instagram case study

Han, K., Jung, H., Jang, J. Y. & Lee, D., Jun 1 2018, Computer, 51, 6, p. 18-28 11 p.

Research output: Contribution to specialist publicationArticle

10 Citations (Scopus)

Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths

Sun, X., Dai, J., Liu, P., Singhal, A. & Yen, J., Oct 2018, In : IEEE Transactions on Information Forensics and Security. 13, 10, p. 2506-2521 16 p.

Research output: Contribution to journalArticle

Bayesian networks
Intrusion detection
Computer networks
Experiments

Using Java to provide cognitive models with a more universal way to interact with graphical user interfaces

Tehranchi, F. & Ritter, F. E., Jan 1 2018.

Research output: Contribution to conferencePaper

Cognitive Models
Graphical User Interface
Graphical user interfaces
Java
Model
8 Citations (Scopus)

Using Stakeholder Theory to examine drivers' Stake in Uber

Ma, N. F., Yuan, C. W., Ghafurian, M. & Hanrahan, B. V., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lenses
Personnel
Industry

VaultIME: Regaining user control for password managers through auto-correction

Guan, L., Farhang, S., Pu, Y., Guo, P., Grossklags, J. & Liu, P., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 673-686 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Managers
Application programs
Websites
Mobile phones

VCIDS: Collaborative intrusion detection of sensor and actuator attacks on connected vehicles

Guo, P., Kim, H., Guan, L., Zhu, M. & Liu, P., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 377-396 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Actuators
Sensors
Launching
Testbeds
1 Citation (Scopus)

Vertically arrayed stimuli and responses: transfer of incompatible spatial mapping to Simon task occurs regardless of response-device orientation

Zhong, Q., Xiong, A., Vu, K. P. L. & Proctor, R. W., Jan 1 2018, In : Experimental Brain Research. 236, 1, p. 175-185 11 p.

Research output: Contribution to journalArticle

Equipment and Supplies
Thumb
Terminology
Brain
10 Citations (Scopus)
Image classification
image classification
learning
Information retrieval
Labeling
4 Citations (Scopus)

VMhunt: A verifiable approach to partially-virtualized binary code simplification

Xu, D., Ming, J., Fu, Y. & Wu, D., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 442-458 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary codes
Cryptography
Radar
Switches
Virtualization
1 Citation (Scopus)

Weakly supervised facial attribute manipulation via deep adversarial network

Wang, Y., Wang, S., Qi, G., Tang, J. & Li, B., May 3 2018, Proceedings - 2018 IEEE Winter Conference on Applications of Computer Vision, WACV 2018. Institute of Electrical and Electronics Engineers Inc., p. 112-121 10 p. (Proceedings - 2018 IEEE Winter Conference on Applications of Computer Vision, WACV 2018; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discriminators
Pixels
Deep neural networks

Welcome to the WASPI workshop

Dyer, R., Honavar, V. G., Leavens, G. T., Nguyen, H. A., Nguyen, T. N. & Rajan, H., Nov 9 2018, In : WASPI 2018 - Proceedings of the 1st ACM SIGSOFT International Workshop on Automated Specification Inference, Co-located with FSE 2018. p. III

Research output: Contribution to journalEditorial

privacy
experience
social network
interaction
China
4 Citations (Scopus)

When social media traumatizes teens: The roles of online risk exposure, coping, and post-traumatic stress

McHugh, B. C., Wisniewski, P., Rosson, M. B. & Carroll, J. M., Oct 2 2018, In : Internet Research. 28, 5, p. 1169-1188 20 p.

Research output: Contribution to journalArticle

social media
posttraumatic stress disorder
coping
adolescent
resilience
3 Citations (Scopus)

Where is community among online learners? Identity, efficacy and personal ties

Sun, N., Rosson, M. B. & Carroll, J., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Students

Why the Common Model of the mind needs holographic a-priori categories

Arora, N., West, R., Brook, A. & Kelly, M., Jan 1 2018, In : Procedia Computer Science. 145, p. 680-690 11 p.

Research output: Contribution to journalConference article

Open Access
Data storage equipment
Ontology
Industry
Mechanics
1 Citation (Scopus)

WiAU: An accurate device-free authentication system with resnet

Lin, C., Hu, J., Sun, Y., Ma, F., Wang, L. & Wu, G., Jun 26 2018, 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-9 9 p. (2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Channel state information
Routers
Experiments

With or without super platforms? Analyzing online publishers’ strategies in the game of traffic

Salminen, J., Maslennikov, D., Jansen, B. J. & Olkkonen, R., Jan 1 2018, Social Informatics - 10th International Conference, SocInfo 2018, Proceedings. Staab, S., Koltsova, O. & Ignatov, D. I. (eds.). Springer Verlag, p. 251-260 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11186 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Coalitions
Marketing
Traffic
Game
Websites