John C.-I. Chuang
Orcid: 0000-0003-4348-6226Affiliations:
- University of California, Berkeley, USA
According to our database1,
John C.-I. Chuang
authored at least 78 papers
between 1997 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2023
Comput. Support. Cooperative Work., June, 2023
2021
Active Dynamical Prospection: Modeling Mental Simulation as Particle Filtering for Sensorimotor Control during Pathfinding.
Proceedings of the 2021 Conference on Artificial Life, 2021
Neural Dynamics of a Single Human with Long-Term, High Temporal Density Electroencephalography.
Proceedings of the 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2021
Covert Embodied Choice: Decision-Making and the Limits of Privacy Under Biometric Surveillance.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
2019
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Understanding Digitally-Mediated Empathy: An Exploration of Visual, Narrative, and Biosensory Informational Cues.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Sensing is Believing: What People Think Biosensors Can Reveal About Thoughts and Feelings.
Proceedings of the 2019 on Designing Interactive Systems Conference, DIS 2019, San Diego, 2019
2018
Proc. ACM Hum. Comput. Interact., 2018
Exploring the Feasibility and Performance of One-step Three-factor Authentication with Ear-EEG.
Proceedings of the 5th International Conference on Physiological Computing Systems, 2018
From Scanning Brains to Reading Minds: Talking to Engineers about Brain-Computer Interface.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Faking it, Making it: Fooling and Improving Brain-Based Authentication with Generative Adversarial Networks.
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018
Proceedings of the 2018 on Designing Interactive Systems Conference 2018, 2018
2017
Proc. ACM Hum. Comput. Interact., 2017
Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs.
J. Cybersecur., 2017
Is the Future of Authenticity All In Our Heads?: Moving Passthoughts From the Lab to the World.
Proceedings of the 2017 New Security Paradigms Workshop, 2017
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017
2016
Designing Commercial Therapeutic Robots for Privacy Preserving Systems and Ethical Research Practices Within the Home.
Int. J. Soc. Robotics, 2016
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016
Proceedings of the 13th IEEE International Conference on Wearable and Implantable Body Sensor Networks, 2016
2015
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
Improving Physiological Signal Classification Using Logarithmic Quantization and a Progressive Calibration Technique.
Proceedings of the PhyCS 2015 - Proceedings of the 2nd International Conference on Physiological Computing Systems, ESEO, Angers, Loire Valley, France, 11, 2015
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015
Proceedings of the 2015 International Conference on Affective Computing and Intelligent Interaction, 2015
2014
The Joint Workshop on Pricing and Incentives in Networks and Systems (WPIN+NetEcon 2014).
SIGMETRICS Perform. Evaluation Rev., 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
2013
Proceedings of the International conference on information and communication technologies and development, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
2012
Proceedings of the Financial Cryptography and Data Security, 2012
Community-based web security: complementary roles of the serious and casual contributors.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, 2012
2011
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011
2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the 2010 Workshop on the Economics of Networks, Systems, and Computation, 2010
Proceedings of the Decision and Game Theory for Security, 2010
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information.
Proceedings of the Computer Security, 2010
2008
Manag. Sci., 2008
Proceedings of the 17th International Conference on World Wide Web, 2008
Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
Proceedings of the Proceedings 9th ACM Conference on Electronic Commerce (EC-2008), 2008
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008
Proceedings of the Usability, Psychology, and Security, 2008
2007
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007
2006
Service differentiated peer selection: an incentive mechanism for peer-to-peer media streaming.
IEEE Trans. Multim., 2006
IEEE J. Sel. Areas Commun., 2006
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
2005
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming.
IEEE Trans. Knowl. Data Eng., 2005
Pricing and Resource Allocation in Caching Services with Multiple Levels of Quality of Service.
Manag. Sci., 2005
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
2004
Proceedings of the Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), 2004
Proceedings of the Quality of Service, 2004
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
2003
Resilient Data-Centric Storage in Wireless Sensor Networks.
IEEE Distributed Syst. Online, 2003
Proceedings of the ACM SIGCOMM workshop on Models, 2003
Proceedings of the Mobile Data Management, 4th International Conference, MDM 2003, 2003
2002
Proceedings of the 3rd International Conference on Web Information Systems Engineering Workshops, 2002
Optimal Pricing and Capacity Allocation in Vertically Differentiated Web Caching Services.
Proceedings of the International Conference on Information Systems, 2002
2001
Proceedings of the IEEE International Conference on Systems, 2001
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001
2000
J. Netw. Comput. Appl., 2000
1997
Proceedings of the Network and Distributed System Security Symposium, 1997