Year |
Citation |
Score |
2022 |
Curran MT, Chuang J. Social Distancing and Social Biosensing: Intersubjectivity from Afar. Computer Supported Cooperative Work : Cscw : An International Journal. 1-34. PMID 35910485 DOI: 10.1007/s10606-022-09428-5 |
0.699 |
|
2019 |
Merrill N, Curran MT, Gandhi S, Chuang J. One-Step, Three-Factor Passthought Authentication With Custom-Fit, In-Ear EEG. Frontiers in Neuroscience. 13: 354. PMID 31133772 DOI: 10.3389/Fnins.2019.00354 |
0.707 |
|
2017 |
Maillart T, Zhao M, Grossklags J, Chuang J. Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs Journal of Cybersecurity. 3: 81-90. DOI: 10.1093/Cybsec/Tyx008 |
0.612 |
|
2016 |
Curran MT, Jong-Kai Yang, Merrill N, Chuang J. Passthoughts authentication with low cost EarEEG. Conference Proceedings : ... Annual International Conference of the Ieee Engineering in Medicine and Biology Society. Ieee Engineering in Medicine and Biology Society. Annual Conference. 2016: 1979-1982. PMID 28268717 DOI: 10.1109/EMBC.2016.7591112 |
0.725 |
|
2016 |
Curran MT, Yang JK, Merrill N, Chuang J, Curran MT, Jong-Kai Yang, Merrill N, Chuang J, Yang JK, Curran MT, Chuang J, Merrill N. Passthoughts authentication with low cost EarEEG. Conference Proceedings : ... Annual International Conference of the Ieee Engineering in Medicine and Biology Society. Ieee Engineering in Medicine and Biology Society. Annual Conference. 2016: 1979-1982. PMID 28226905 DOI: 10.1109/EMBC.2016.7591112 |
0.725 |
|
2012 |
Johnson B, Chuang J, Grossklags J, Christin N. Metrics for measuring ISP badness: The case of spam Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7397: 89-97. DOI: 10.1007/978-3-642-32946-3_8 |
0.542 |
|
2012 |
Johnson B, Grossklags J, Christin N, Chuang J. Nash equilibria for weakest target security games with heterogeneous agents Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 75: 444-458. DOI: 10.1007/978-3-642-30373-9_31 |
0.642 |
|
2010 |
Grossklags J, Radosavac S, Cárdenas AA, Chuang J. Nudge: Intermediaries' role in interdependent network security Proceedings of the Acm Symposium On Applied Computing. 1879-1880. DOI: 10.1145/1774088.1774486 |
0.606 |
|
2010 |
Johnson B, Grossklags J, Christin N, Chuang J. Uncertainty in interdependent security games Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6442: 234-244. DOI: 10.1007/978-3-642-17197-0_16 |
0.624 |
|
2010 |
Johnson B, Grossklags J, Christin N, Chuang J. Are security experts useful? Bayesian Nash equilibria for network security games with limited information Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 588-606. DOI: 10.1007/978-3-642-15497-3_36 |
0.657 |
|
2008 |
Grossklags J, Christin N, Chuang J. Security and insurance management in networks with heterogeneous agents Proceedings of the Acm Conference On Electronic Commerce. 160-169. DOI: 10.1145/1386790.1386818 |
0.648 |
|
2008 |
Grossklags J, Christin N, Chuang J. Secure or insure? a game-theoretic analysis of information security games Proceeding of the 17th International Conference On World Wide Web 2008, Www'08. 209-218. DOI: 10.1145/1367497.1367526 |
0.626 |
|
2008 |
Christin N, Chuang J, Grossklags J. Economics-informed design of CDNs Lecture Notes in Electrical Engineering. 9: 183-210. DOI: 10.1007/978-3-540-77887-5_7 |
0.559 |
|
2007 |
Gebbie M, Norlen K, Lucas G, Chuang J. Improving transparency: extracting, visualising and analysing corporate relationships from SEC 10-K documents International Journal of Technology, Policy and Management. 7: 15. DOI: 10.1504/Ijtpm.2007.012237 |
0.302 |
|
2007 |
Feldman M, Chuang J, Stoica I, Shenker S. Hidden-action in network routing Ieee Journal On Selected Areas in Communications. 25: 1161-1172. DOI: 10.1109/Jsac.2007.070810 |
0.554 |
|
2007 |
Habib A, Chuang J. Improving application QoS with residential multihoming Computer Networks. 51: 3323-3337. DOI: 10.1016/J.Comnet.2007.01.024 |
0.319 |
|
2006 |
Habib A, Chuang J. Service differentiated peer selection: An incentive mechanism for peer-to-peer media streaming Ieee Transactions On Multimedia. 8: 610-621. DOI: 10.1109/Tmm.2006.870724 |
0.307 |
|
2006 |
Feldman M, Papadimitriou C, Chuang J, Stoica I. Free-riding and whitewashing in peer-to-peer systems Ieee Journal On Selected Areas in Communications. 24: 1010-1018. DOI: 10.1109/Jsac.2006.872882 |
0.548 |
|
2005 |
Feldman M, Chuang J. Overcoming free-riding behavior in peer-to-peer systems Acm Sigecom Exchanges. 5: 41-50. DOI: 10.1145/1120717.1120723 |
0.534 |
|
2005 |
Habib A, Xu D, Atallah M, Bhargava B, Chuang J. A tree-based forward digest protocol to verify data integrity in distributed media streaming Ieee Transactions On Knowledge and Data Engineering. 17: 1010-1014. DOI: 10.1109/Tkde.2005.102 |
0.313 |
|
Show low-probability matches. |