John Chuang
Affiliations: | Electrical Engineering and Computer Science | University of California, Berkeley, Berkeley, CA, United States |
Area:
Biosensory Computing; Information Economics & Policy; Biosystems & Computational Biology (BIO); Communications & Networking (COMNET); Operating Systems & Networking (OSNT); Security (SEC)Google:
"John Chuang"Children
Sign in to add traineeMax T. Curran | grad student | 2015- | UC Berkeley |
Michal Feldman | grad student | 2005 | UC Berkeley |
Jens Grossklags | grad student | 2009 | UC Berkeley |
Paul L. Laskowski | grad student | 2009 | UC Berkeley |
Melissa R. Densmore | grad student | 2012 | UC Berkeley |
Ashwin J. Mathew | grad student | 2014 | UC Berkeley |
Jeremy Raboff Gordon | grad student | 2017-2022 | UC Berkeley (Neurotree) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Curran MT, Chuang J. (2022) Social Distancing and Social Biosensing: Intersubjectivity from Afar. Computer Supported Cooperative Work : Cscw : An International Journal. 1-34 |
Merrill N, Curran MT, Gandhi S, et al. (2019) One-Step, Three-Factor Passthought Authentication With Custom-Fit, In-Ear EEG. Frontiers in Neuroscience. 13: 354 |
Maillart T, Zhao M, Grossklags J, et al. (2017) Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs Journal of Cybersecurity. 3: 81-90 |
Curran MT, Jong-Kai Yang, Merrill N, et al. (2016) Passthoughts authentication with low cost EarEEG. Conference Proceedings : ... Annual International Conference of the Ieee Engineering in Medicine and Biology Society. Ieee Engineering in Medicine and Biology Society. Annual Conference. 2016: 1979-1982 |
Curran MT, Yang JK, Merrill N, et al. (2016) Passthoughts authentication with low cost EarEEG. Conference Proceedings : ... Annual International Conference of the Ieee Engineering in Medicine and Biology Society. Ieee Engineering in Medicine and Biology Society. Annual Conference. 2016: 1979-1982 |
Johnson B, Chuang J, Grossklags J, et al. (2012) Metrics for measuring ISP badness: The case of spam Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7397: 89-97 |
Johnson B, Grossklags J, Christin N, et al. (2012) Nash equilibria for weakest target security games with heterogeneous agents Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 75: 444-458 |
Grossklags J, Radosavac S, Cárdenas AA, et al. (2010) Nudge: Intermediaries' role in interdependent network security Proceedings of the Acm Symposium On Applied Computing. 1879-1880 |
Johnson B, Grossklags J, Christin N, et al. (2010) Uncertainty in interdependent security games Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6442: 234-244 |
Johnson B, Grossklags J, Christin N, et al. (2010) Are security experts useful? Bayesian Nash equilibria for network security games with limited information Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 588-606 |