Gaurav Bansal

Orcid: 0000-0002-7031-6620

According to our database1, Gaurav Bansal authored at least 99 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Impact of Cybersecurity Disclosures on Stakeholder Intentions.
J. Comput. Inf. Syst., 2024

It pays to be forthcoming: timing of data breach announcement, trust violation, and trust restoration.
Internet Res., 2024

A Panel Report on Higher Education in the Age of AI from the Perspective of Academic Leaders in the Midwest U.S.
Commun. Assoc. Inf. Syst., 2024

Stereotype Tax: The Unequal Terrain of Crowdfunding for Women and Black Entrepreneurs.
Proceedings of the 32nd European Conference on Information Systems, 2024

Dual Perspectives: Navigating the Ambiguity of Trust in AI.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

2023
Where authorities fail and experts excel: Influencing internet users' compliance intentions.
Comput. Secur., May, 2023

Internalization of Gender Roles: Challenges for Female CIOs in Ensuring IT Security Compliance.
Proceedings of the 29th Americas Conference on Information Systems, 2023

2022
Impacts of Connected Automated Vehicles on Freeway Traffic Patterns at Different Penetration Levels.
IEEE Trans. Intell. Transp. Syst., 2022

Internet Privacy Concerns Revisited: Oversight from Surveillance and Right To Be Forgotten as New Dimensions.
Inf. Manag., 2022

The Role of Cybersecurity Risk Disclosures in Influencing Stakeholder Intentions and the Moderating Role of Privacy Concern.
Proceedings of the 28th Americas Conference on Information Systems, 2022

2021
Restoring Trust after an Insider Breach: Both the Genders Matter - CEOs and Users.
J. Comput. Inf. Syst., 2021

Information system security policy noncompliance: the role of situation-specific ethical orientation.
Inf. Technol. People, 2021

Do You Still Trust?: The Role of Age, Gender, and Privacy Concern on Trust after Insider Data Breaches.
Data Base, 2021

Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

Developing Multidimensional Scale for measuring Social Media Habit: A Nomological Examination in the Context of Cyberbullying.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2020
Introduction to the Special Issue on AI Fairness, Trust, and Ethics.
AIS Trans. Hum. Comput. Interact., December, 2020

S<sup>3</sup>Net: Semantic-Aware Self-supervised Depth Estimation with Monocular Videos and Synthetic Data.
Proceedings of the Computer Vision - ECCV 2020, 2020

Something Real about Fake News: The Role of Polarization and Mindfulness.
Proceedings of the 26th Americas Conference on Information Systems, 2020

Measuring Privacy Concerns with Government Surveillance and Right-to-be-Forgotten in Nomological Net of Trust and Willingness-to-Share.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
A Study of the Effectiveness of Message Content, Length, and Rate Control for Improving Map Accuracy in Automated Driving Systems.
IEEE Trans. Intell. Transp. Syst., 2019

ITS+DM Hackathon (ITSC 2017): Lane Departure Prediction With Naturalistic Driving Data.
IEEE Intell. Transp. Syst. Mag., 2019

Online Learning for Position-Aided Millimeter Wave Beam Training.
IEEE Access, 2019

SIGNet: Semantic Instance Aided Unsupervised 3D Geometry Perception.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
Impact of Measurement Noise on Millimeter Wave Beam Alignment Using Beam Subsets.
IEEE Wirel. Commun. Lett., 2018

Blind Instantly Decodable Network Codes for Wireless Broadcast of Real-Time Multimedia.
IEEE Trans. Wirel. Commun., 2018

Inverse Multipath Fingerprinting for Millimeter Wave V2I Beam Alignment.
IEEE Trans. Veh. Technol., 2018

Delay Analysis and Time-Critical Protocol Design for In-Vehicle Power Line Communication Systems.
IEEE Trans. Veh. Technol., 2018

The Fifth IEEE Workshop on Smart Vehicles: Connectivity Technologies and its Applications (SmartVehicles'18).
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

Automotive radar using IEEE 802.11p signals.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

CoReCast: Collision Resilient Broadcasting in Vehicular Networks.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

Collaborative Perception for Automated Vehicles Leveraging Vehicle-to-Vehicle Communications.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

Lane Change Detection Using V2V Safety Messages.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

Experimental verification platform for connected vehicle networks.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

Data Breaches and Trust Rebuilding: Moderating Impact of Signaling of Corporate Social Responsibility.
Proceedings of the HCI in Business, Government, and Organizations, 2018

Multi-sensor Data Fusion for Vehicle Detection in Autonomous Vehicle Applications.
Proceedings of the Autonomous Vehicles and Machines 2018, Burlingame, CA, USA, January 28, 2018

Web-Image Signifier Congruency Theory (WISC): Conceptualization and Examination in an Online Donation Context.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Distinguishing between Privacy and Security Concerns: An Empirical Examination and Scale Validation.
J. Comput. Inf. Syst., 2017

Position-aided millimeter wave V2I beam alignment: A learning-to-rank approach.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Robust vehicle environment reconstruction from point clouds for irregularity detection.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2017

V2V and on-board sensor fusion for road geometry estimation.
Proceedings of the 20th IEEE International Conference on Intelligent Transportation Systems, 2017

Message content control for distributed map sharing in vehicle safety communications.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Trust Drops when Insiders Drop the Ball: The Role of Age, Gender, and Privacy Concern in Insider Data Breaches.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Stability Challenges and Enhancements for Vehicular Channel Congestion Control Approaches.
IEEE Trans. Intell. Transp. Syst., 2016

Do context and personality matter? Trust and privacy concerns in disclosing private information online.
Inf. Manag., 2016

Millimeter Wave Vehicular Communications: A Survey.
Found. Trends Netw., 2016

Evolution of vehicular congestion control without degrading legacy vehicle performance.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

Coordinated merge control based on V2V communication.
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016

High Performance Optimizations for Nuclear Physics Code MFDn on KNL.
Proceedings of the High Performance Computing, 2016

Cooperative localization via DSRC and multi-sensor multi-target track association.
Proceedings of the 19th IEEE International Conference on Intelligent Transportation Systems, 2016

Heterogeneous Streaming.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Beam design for beam switching based millimeter wave vehicle-to-infrastructure communications.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Interaction Effect of Gender and Neutralization Techniques on Information Security Policy Compliance: An Ethical Perspective.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern.
Eur. J. Inf. Syst., 2015

Trust violation and repair: The information privacy perspective.
Decis. Support Syst., 2015

Performance evaluation of a mixed vehicular network with CAM-DCC and LIMERIC vehicles.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Differential pressure for V2V vertical clearance.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

2014
Trust-Discount Tradeoff in Three Contexts: Frugality Moderating Privacy and Security Concerns.
J. Comput. Inf. Syst., 2014

Adaptive content control for communication amongst cooperative automated vehicles.
Proceedings of the 6th IEEE International Symposium on Wireless Vehicular Communications, 2014

Comparing LIMERIC and DCC approaches for VANET channel congestion control.
Proceedings of the 6th IEEE International Symposium on Wireless Vehicular Communications, 2014

Insider Privacy Breach and Trust Restoration: Is the CEO's Gender as Important as the CEO's Response?
Proceedings of the 20th Americas Conference on Information Systems, 2014

2013
Controlling Congestion in Safety-Message Transmissions: A Philosophy for Vehicular DSRC Systems.
IEEE Veh. Technol. Mag., 2013

LIMERIC: A Linear Adaptive Message Rate Algorithm for DSRC Congestion Control.
IEEE Trans. Veh. Technol., 2013

Subcarrier and Power Allocation for OFDMA-Based Cognitive Radio Systems With Joint Overlay and Underlay Spectrum Access Mechanism.
IEEE Trans. Veh. Technol., 2013

Achieving weighted-fairnessin message rate-based congestion control for DSRC systems.
Proceedings of the 5th IEEE International Symposium on Wireless Vehicular Communications, 2013

EMBARC: error model based adaptive rate control for vehicle-to-vehicle communications.
Proceedings of the Proceeding of the tenth ACM international workshop on Vehicular inter-networking, 2013

2012
Power Loading Algorithms for OFDM-Based Cognitive Radio Systems with Imperfect Sensing.
IEEE Trans. Wirel. Commun., 2012

Using EDCA to improve vehicle safety messaging.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

A novel use of EDCA to improve vehicle safety communication.
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012

On the use of graph search techniques for the analysis of extreme-scale combustion simulation data.
Proceedings of the IEEE Symposium on Large Data Analysis and Visualization, 2012

Unauthorized Information Sharing Vs. Hacking: The Moderating Role of Privacy Concern on Trust Found and Lost.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Performance Analysis of a Cooperative System with Rateless Codes and Buffered Relays.
IEEE Trans. Wirel. Commun., 2011

Relay and Power Allocation Schemes for OFDM-Based Cognitive Radio Systems.
IEEE Trans. Wirel. Commun., 2011

Adaptive Power Loading for OFDM-Based Cognitive Radio Systems with Statistical Interference Constraint.
IEEE Trans. Wirel. Commun., 2011

Cultural Signifiers of Web Site Images.
J. Manag. Inf. Syst., 2011

E-Book Usage: Role of Environmental Consciousness, Personality and past Usage.
J. Comput. Inf. Syst., 2011

An extended tuning method for cost-sensitive regression and forecasting.
Decis. Support Syst., 2011

Cross-Validation of DSRC Radio Testbed and NS-2 Simulation Platform for Vehicular Safety Communications.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

LIMERIC: a linear message rate control algorithm for vehicular DSRC systems.
Proceedings of the Eighth International Workshop on Vehicular Ad Hoc Networks, 2011

Security Concerns in the Nomological Network of Trust and Big 5: First Order Vs. Second Order.
Proceedings of the International Conference on Information Systems, 2011

Understanding the Security in Privacy-Security Concerns: A Theoretical and Empirical Examination.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Success Factors in Cooperative Online Marketplaces: Trust as the Social Capital and Value Generator in Vendors-Exchange Relationships.
J. Organ. Comput. Electron. Commer., 2010

The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online.
Decis. Support Syst., 2010

Joint Sensing and Power Loading Algorithms for OFDM-Based Cognitive Radio Systems.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Joint Overlay and Underlay Power Allocation Scheme for OFDM-Based Cognitive Radio Systems.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

Relay Load Balancing in Queued Cooperative Wireless Networks with Rateless Codes.
Proceedings of IEEE International Conference on Communications, 2010

An Approach to Identify and Manage Interoperability of Class Diagrams in Visual Paradigm and MagicDraw Tools.
Proceedings of the Contemporary Computing - Third International Conference, 2010

An Integrated Model of Individual Web Security Behavior.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

Trading Trust for Discount: Does Frugality Moderate the Impact of Privacy and Security Concerns?
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

Continuing E-book Use: Role of Environmental Consciousness, Personality and Past Usage.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
Energy-efficient power allocation in OFDM-based cognitive radio systems: A risk-return model.
IEEE Trans. Wirel. Commun., 2009

Tuning Data Mining Methods for Cost-Sensitive Regression: A Study in Loan Charge-Off Forecasting.
J. Manag. Inf. Syst., 2009

2008
Optimal and Suboptimal Power Allocation Schemes for OFDM-based Cognitive Radio Systems.
IEEE Trans. Wirel. Commun., 2008

The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation.
Proceedings of the International Conference on Information Systems, 2008

Queued Cooperative Wireless Networks With Rateless Codes.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Efficacy of Privacy Assurance Mechanisms in the Context of Disclosing Health Information Online.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Adaptive Power Loading for OFDM-Based Cognitive Radio Systems.
Proceedings of IEEE International Conference on Communications, 2007

The Impact of Personal Dispositions on Privacy and Trust in Disclosing Health Information Online.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Three Research Essays on Examining Online Privacy Concerns: The Role of Personal Dispositions, Contexts and Privacy-Assurance Features.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Exploring Cultural Contents of Website Images.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006


  Loading...