John C.-I. Chuang

Orcid: 0000-0003-4348-6226

Affiliations:
  • University of California, Berkeley, USA


According to our database1, John C.-I. Chuang authored at least 78 papers between 1997 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Social Distancing and Social Biosensing: Intersubjectivity from Afar.
Comput. Support. Cooperative Work., June, 2023

2021
Active Dynamical Prospection: Modeling Mental Simulation as Particle Filtering for Sensorimotor Control during Pathfinding.
Proceedings of the 2021 Conference on Artificial Life, 2021

Neural Dynamics of a Single Human with Long-Term, High Temporal Density Electroencephalography.
Proceedings of the 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2021

Covert Embodied Choice: Decision-Making and the Limits of Privacy Under Biometric Surveillance.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2019
Models of Minds: Reading the Mind Beyond the Brain.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Understanding Digitally-Mediated Empathy: An Exploration of Visual, Narrative, and Biosensory Informational Cues.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Sensing is Believing: What People Think Biosensors Can Reveal About Thoughts and Feelings.
Proceedings of the 2019 on Designing Interactive Systems Conference, DIS 2019, San Diego, 2019

2018
Emotional Biosensing: Exploring Critical Alternatives.
Proc. ACM Hum. Comput. Interact., 2018

Exploring the Feasibility and Performance of One-step Three-factor Authentication with Ear-EEG.
Proceedings of the 5th International Conference on Physiological Computing Systems, 2018

From Scanning Brains to Reading Minds: Talking to Engineers about Brain-Computer Interface.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Faking it, Making it: Fooling and Improving Brain-Based Authentication with Generative Adversarial Networks.
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018

When BCIs have APIs: Design Fictions of Everyday Brain-Computer Interface Adoption.
Proceedings of the 2018 on Designing Interactive Systems Conference 2018, 2018

2017
Eliciting Values Reflections by Engaging Privacy Futures Using Design Workbooks.
Proc. ACM Hum. Comput. Interact., 2017

Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs.
J. Cybersecur., 2017

Smile for the Camera: Privacy and Policy Implications of Emotion AI.
CoRR, 2017

A Window into the Soul: Biosensing in Public.
CoRR, 2017

Is the Future of Authenticity All In Our Heads?: Moving Passthoughts From the Lab to the World.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

Using science fiction texts to surface user reflections on privacy.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

One-step, three-factor authentication in a single earpiece.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

2016
Designing Commercial Therapeutic Robots for Privacy Preserving Systems and Ethical Research Practices Within the Home.
Int. J. Soc. Robotics, 2016

Passthoughts authentication with low cost EarEEG.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

Classifying mental gestures with in-ear EEG.
Proceedings of the 13th IEEE International Conference on Wearable and Implantable Body Sensor Networks, 2016

2015
Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Improving Physiological Signal Classification Using Logarithmic Quantization and a Progressive Calibration Technique.
Proceedings of the PhyCS 2015 - Proceedings of the 2nd International Conference on Physiological Computing Systems, ESEO, Angers, Loire Valley, France, 11, 2015

The Virtuous Circle of Wikipedia: Recursive Measures of Collaboration Structures.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Synestouch: Haptic + audio affective design for wearable devices.
Proceedings of the 2015 International Conference on Affective Computing and Intelligent Interaction, 2015

2014
The Joint Workshop on Pricing and Incentives in Networks and Systems (WPIN+NetEcon 2014).
SIGMETRICS Perform. Evaluation Rev., 2014

My thoughts are not your thoughts.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

2013
The evolving braid: how an organization in Uganda achieved reliable communications.
Proceedings of the International conference on information and communication technologies and development, 2013

I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Computational Asymmetry in Strategic Bayesian Networks
CoRR, 2012

Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012

Community-based web security: complementary roles of the serious and casual contributors.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, 2012

2011
Loci of competition for future internet architectures.
IEEE Commun. Mag., 2011

Colonel Blotto in the Phishing War.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents.
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011

2010
Nudge: intermediaries' role in interdependent network security.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Innovations and Upgrades in Virtualized Network Architectures.
Proceedings of the 2010 Workshop on the Economics of Networks, Systems, and Computation, 2010

Uncertainty in Interdependent Security Games.
Proceedings of the Decision and Game Theory for Security, 2010

Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information.
Proceedings of the Computer Security, 2010

2008
Service Adoption and Pricing of Content Delivery Network (CDN) Services.
Manag. Sci., 2008

Secure or insure?: a game-theoretic analysis of information security games.
Proceedings of the 17th International Conference on World Wide Web, 2008

Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Security and insurance management in networks with heterogeneous agents.
Proceedings of the Proceedings 9th ACM Conference on Electronic Commerce (EC-2008), 2008

User-directed routing: from theory, towards practice.
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008

Predicted and Observed User Behavior in the Weakest-link Security Game.
Proceedings of the Usability, Psychology, and Security, 2008

2007
Hidden-Action in Network Routing.
IEEE J. Sel. Areas Commun., 2007

Improving application QoS with residential multihoming.
Comput. Networks, 2007

On the Feasibility of Switching ISPs in Residential Multihoming.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

On the Optimality and Interconnection of Valiant Load-Balancing Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Modeling the adoption of new network architectures.
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007

2006
Service differentiated peer selection: an incentive mechanism for peer-to-peer media streaming.
IEEE Trans. Multim., 2006

Free-riding and whitewashing in peer-to-peer systems.
IEEE J. Sel. Areas Commun., 2006

Network monitors and contracting systems: competition and innovation.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

Taking Advantage of Multihoming with Session Layer Striping.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming.
IEEE Trans. Knowl. Data Eng., 2005

Overcoming free-riding behavior in peer-to-peer systems.
SIGecom Exch., 2005

Pricing and Resource Allocation in Caching Services with Multiple Levels of Quality of Service.
Manag. Sci., 2005

The Evolution of Cooperation under Cheap Pseudonyms.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

Hidden-action in multi-hop routing.
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005

Content availability, pollution and poisoning in file sharing peer-to-peer networks.
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005

Multihoming media streaming.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

A cost-based analysis of overlay routing geometries.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
Near Rationality and Competitive Equilibria in Networked Systems
CoRR, 2004

Robust incentive techniques for peer-to-peer networks.
Proceedings of the Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), 2004

Incentive mechanism for peer-to-peer media streaming.
Proceedings of the Quality of Service, 2004

On the Cost of Participating in a Peer-to-Peer Network.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

Optimal Pricing of Content Delivery Network (CDN) Services.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Resilient Data-Centric Storage in Wireless Sensor Networks.
IEEE Distributed Syst. Online, 2003

On characterizing affinity and its impact on network performance.
Proceedings of the ACM SIGCOMM workshop on Models, 2003

Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks.
Proceedings of the Mobile Data Management, 4th International Conference, MDM 2003, 2003

2002
Efficiency and Performance of Web Cache Reporting Strategies.
Proceedings of the 3rd International Conference on Web Information Systems Engineering Workshops, 2002

Optimal Pricing and Capacity Allocation in Vertically Differentiated Web Caching Services.
Proceedings of the International Conference on Information Systems, 2002

2001
Pricing Multicast Communication: A Cost-Based Approach.
Telecommun. Syst., 2001

Pricing Caching services with multiple levels of QoS.
Proceedings of the IEEE International Conference on Systems, 2001

A Secure, Publisher-Centric Web Caching Infrastructure.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

2000
Distributed network storage service with quality-of-service guarantees.
J. Netw. Comput. Appl., 2000

1997
Distributed Authentication in Kerberos Using Public Key Cryptography.
Proceedings of the Network and Distributed System Security Symposium, 1997


  Loading...