John Chuang

Affiliations: 
Electrical Engineering and Computer Science University of California, Berkeley, Berkeley, CA, United States 
Area:
Biosensory Computing; Information Economics & Policy; Biosystems & Computational Biology (BIO); Communications & Networking (COMNET); Operating Systems & Networking (OSNT); Security (SEC)
Google:
"John Chuang"

Children

Sign in to add trainee
Max T. Curran grad student 2015- UC Berkeley
Michal Feldman grad student 2005 UC Berkeley
Jens Grossklags grad student 2009 UC Berkeley
Paul L. Laskowski grad student 2009 UC Berkeley
Melissa R. Densmore grad student 2012 UC Berkeley
Ashwin J. Mathew grad student 2014 UC Berkeley
Jeremy Raboff Gordon grad student 2017-2022 UC Berkeley (Neurotree)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Curran MT, Chuang J. (2022) Social Distancing and Social Biosensing: Intersubjectivity from Afar. Computer Supported Cooperative Work : Cscw : An International Journal. 1-34
Merrill N, Curran MT, Gandhi S, et al. (2019) One-Step, Three-Factor Passthought Authentication With Custom-Fit, In-Ear EEG. Frontiers in Neuroscience. 13: 354
Maillart T, Zhao M, Grossklags J, et al. (2017) Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs Journal of Cybersecurity. 3: 81-90
Curran MT, Jong-Kai Yang, Merrill N, et al. (2016) Passthoughts authentication with low cost EarEEG. Conference Proceedings : ... Annual International Conference of the Ieee Engineering in Medicine and Biology Society. Ieee Engineering in Medicine and Biology Society. Annual Conference. 2016: 1979-1982
Curran MT, Yang JK, Merrill N, et al. (2016) Passthoughts authentication with low cost EarEEG. Conference Proceedings : ... Annual International Conference of the Ieee Engineering in Medicine and Biology Society. Ieee Engineering in Medicine and Biology Society. Annual Conference. 2016: 1979-1982
Johnson B, Chuang J, Grossklags J, et al. (2012) Metrics for measuring ISP badness: The case of spam Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7397: 89-97
Johnson B, Grossklags J, Christin N, et al. (2012) Nash equilibria for weakest target security games with heterogeneous agents Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 75: 444-458
Grossklags J, Radosavac S, Cárdenas AA, et al. (2010) Nudge: Intermediaries' role in interdependent network security Proceedings of the Acm Symposium On Applied Computing. 1879-1880
Johnson B, Grossklags J, Christin N, et al. (2010) Uncertainty in interdependent security games Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6442: 234-244
Johnson B, Grossklags J, Christin N, et al. (2010) Are security experts useful? Bayesian Nash equilibria for network security games with limited information Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 588-606
See more...