John Chuang - Publications

Affiliations: 
Electrical Engineering and Computer Science University of California, Berkeley, Berkeley, CA, United States 
Area:
Biosensory Computing; Information Economics & Policy; Biosystems & Computational Biology (BIO); Communications & Networking (COMNET); Operating Systems & Networking (OSNT); Security (SEC)

20 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2022 Curran MT, Chuang J. Social Distancing and Social Biosensing: Intersubjectivity from Afar. Computer Supported Cooperative Work : Cscw : An International Journal. 1-34. PMID 35910485 DOI: 10.1007/s10606-022-09428-5  0.699
2019 Merrill N, Curran MT, Gandhi S, Chuang J. One-Step, Three-Factor Passthought Authentication With Custom-Fit, In-Ear EEG. Frontiers in Neuroscience. 13: 354. PMID 31133772 DOI: 10.3389/Fnins.2019.00354  0.707
2017 Maillart T, Zhao M, Grossklags J, Chuang J. Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs Journal of Cybersecurity. 3: 81-90. DOI: 10.1093/Cybsec/Tyx008  0.612
2016 Curran MT, Jong-Kai Yang, Merrill N, Chuang J. Passthoughts authentication with low cost EarEEG. Conference Proceedings : ... Annual International Conference of the Ieee Engineering in Medicine and Biology Society. Ieee Engineering in Medicine and Biology Society. Annual Conference. 2016: 1979-1982. PMID 28268717 DOI: 10.1109/EMBC.2016.7591112  0.725
2016 Curran MT, Yang JK, Merrill N, Chuang J, Curran MT, Jong-Kai Yang, Merrill N, Chuang J, Yang JK, Curran MT, Chuang J, Merrill N. Passthoughts authentication with low cost EarEEG. Conference Proceedings : ... Annual International Conference of the Ieee Engineering in Medicine and Biology Society. Ieee Engineering in Medicine and Biology Society. Annual Conference. 2016: 1979-1982. PMID 28226905 DOI: 10.1109/EMBC.2016.7591112  0.725
2012 Johnson B, Chuang J, Grossklags J, Christin N. Metrics for measuring ISP badness: The case of spam Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7397: 89-97. DOI: 10.1007/978-3-642-32946-3_8  0.542
2012 Johnson B, Grossklags J, Christin N, Chuang J. Nash equilibria for weakest target security games with heterogeneous agents Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 75: 444-458. DOI: 10.1007/978-3-642-30373-9_31  0.642
2010 Grossklags J, Radosavac S, Cárdenas AA, Chuang J. Nudge: Intermediaries' role in interdependent network security Proceedings of the Acm Symposium On Applied Computing. 1879-1880. DOI: 10.1145/1774088.1774486  0.606
2010 Johnson B, Grossklags J, Christin N, Chuang J. Uncertainty in interdependent security games Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6442: 234-244. DOI: 10.1007/978-3-642-17197-0_16  0.624
2010 Johnson B, Grossklags J, Christin N, Chuang J. Are security experts useful? Bayesian Nash equilibria for network security games with limited information Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 588-606. DOI: 10.1007/978-3-642-15497-3_36  0.657
2008 Grossklags J, Christin N, Chuang J. Security and insurance management in networks with heterogeneous agents Proceedings of the Acm Conference On Electronic Commerce. 160-169. DOI: 10.1145/1386790.1386818  0.648
2008 Grossklags J, Christin N, Chuang J. Secure or insure? a game-theoretic analysis of information security games Proceeding of the 17th International Conference On World Wide Web 2008, Www'08. 209-218. DOI: 10.1145/1367497.1367526  0.626
2008 Christin N, Chuang J, Grossklags J. Economics-informed design of CDNs Lecture Notes in Electrical Engineering. 9: 183-210. DOI: 10.1007/978-3-540-77887-5_7  0.559
2007 Gebbie M, Norlen K, Lucas G, Chuang J. Improving transparency: extracting, visualising and analysing corporate relationships from SEC 10-K documents International Journal of Technology, Policy and Management. 7: 15. DOI: 10.1504/Ijtpm.2007.012237  0.302
2007 Feldman M, Chuang J, Stoica I, Shenker S. Hidden-action in network routing Ieee Journal On Selected Areas in Communications. 25: 1161-1172. DOI: 10.1109/Jsac.2007.070810  0.554
2007 Habib A, Chuang J. Improving application QoS with residential multihoming Computer Networks. 51: 3323-3337. DOI: 10.1016/J.Comnet.2007.01.024  0.319
2006 Habib A, Chuang J. Service differentiated peer selection: An incentive mechanism for peer-to-peer media streaming Ieee Transactions On Multimedia. 8: 610-621. DOI: 10.1109/Tmm.2006.870724  0.307
2006 Feldman M, Papadimitriou C, Chuang J, Stoica I. Free-riding and whitewashing in peer-to-peer systems Ieee Journal On Selected Areas in Communications. 24: 1010-1018. DOI: 10.1109/Jsac.2006.872882  0.548
2005 Feldman M, Chuang J. Overcoming free-riding behavior in peer-to-peer systems Acm Sigecom Exchanges. 5: 41-50. DOI: 10.1145/1120717.1120723  0.534
2005 Habib A, Xu D, Atallah M, Bhargava B, Chuang J. A tree-based forward digest protocol to verify data integrity in distributed media streaming Ieee Transactions On Knowledge and Data Engineering. 17: 1010-1014. DOI: 10.1109/Tkde.2005.102  0.313
Show low-probability matches.