Research articles, presentations, and other scholarship

Recent Submissions

  • CrowdLayout: Crowdsourced Design and Evaluation of Biological Network Visualizations 

    Singh, Divit P.; Lisle, Lee; Murali, T.M.; Luther, Kurt (ACM, 2018-04)
    Biologists often perform experiments whose results generate large quantities of data, such as interactions between molecules in a cell, that are best represented as networks (graphs). To visualize these networks and ...
  • Detecting Malicious Landing Pages in Malware Distribution Networks 

    Wang, Gang; Stokes, Jack W.; Herley, Cormac; Felstead, David (IEEE, 2013-06)
    Drive-by download attacks attempt to compromise a victim’s computer through browser vulnerabilities. Often they are launched from Malware Distribution Networks (MDNs) consisting of landing pages to attract traffic, ...
  • Co-located Collaborative Play in Virtual Environments for Group Learning in Museums 

    Apostolellis, Panagiotis (ACM, 2014-06)
    Having witnessed the unexplored potential of co-located group collaboration in contemporary museums, the proposed research aims to identify which elements of collaborative virtual environments and serious games can be ...
  • Designing for Schadenfreude (or, how to express well-being and see if youʼre boring people) 

    André, Paul; Schraefel, M.C.; Dix, Alan; White, Ryen W.; Bernstein, Michael; Luther, Kurt (ACM, 2010)
    This position paper presents two studies of content not normally expressed in status updates—well-being and status feedback—and considers how they may be processed, valued and used for potential quality-of-life benefits ...
  • Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers 

    Gang, Wang; Wang, Tianyi; Zheng, Haitao; Zhao, Ben Y. (USENIX, 2014-08)
    Recent work in security and systems has embraced the use of machine learning (ML) techniques for identifying misbehavior, e.g. email spam and fake (Sybil) users in social networks. However, ML models are typically derived ...
  • Social Turing Tests: Crowdsourcing Sybil Detection 

    Wang, Gang; Mohanlal, Manish; Wilson, Christo; Wang, Xiao; Metzger, Miriam; Zheng, Haitao; Zhao, Ben Y. (Internet Society, 2013-02)
    As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks (OSNs). Today, sophisticated attackers are creating realistic Sybils ...
  • HOMER: An Interactive System for Home Based Stroke Rehabilitation 

    Kelliher, Aisling; Choi, Jinwoo; Huang, Jia-Bin; Rikakis, Thanassis; Kitani, Kris (ACM, 2017)
    Delivering long term, unsupervised stroke rehabilitation in the home is a complex challenge that requires robust, low cost, scalable, and engaging solutions. We present HOMER, an interactive system that uses novel therapy ...
  • Got the Flu (or Mumps)? Check the Eigenvalue! 

    Prakash, B. Aditya; Chakrabarti, Deepayan; Faloutsos, Michalis; Valler, Nicholas; Faloutsos, Christos (Virginia Tech, 2010-03-30)
    For a given, arbitrary graph, what is the epidemic threshold? That is, under what conditions will a virus result in an epidemic? We provide the super-model theorem, which generalizes older results in two important, orthogonal ...
  • Forecasting the Flu: Designing Social Network Sensors for Epidemics 

    Shao, Huijuan; Hossain, K.S.M. Tozammel; Wu, Hao; Khan, Maleq; Vullikanti, Anil; Prakash, B. Aditya; Marathe, Madhav; Ramakrishnan, Naren (Virginia Tech, 2016-03-08)
    Early detection and modeling of a contagious epidemic can provide important guidance about quelling the contagion, controlling its spread, or the effective design of countermeasures. A topic of recent interest has been to ...
  • Identification of Differentially Methylated Sites with Weak Methylation Effects 

    Tran, Hong; Zhu, Hongxiao; Wu, Xiaowei; Kim, Gunjune; Clarke, Christopher R.; Larose, Hailey; Haak, David C.; Askew, Shawn D.; Barney, Jacob N.; Westwood, James H.; Zhang, Liqing (MDPI, 2018-02-08)
    Deoxyribonucleic acid (DNA) methylation is an epigenetic alteration crucial for regulating stress responses. Identifying large-scale DNA methylation at single nucleotide resolution is made possible by whole genome bisulfite ...
  • Predicting Complications in Critical Care Using Heterogeneous Clinical Data 

    Huddar, Vijay; Desiraju, Bapu Koundinya; Rajan, Vaibhav; Bhattacharya, Sakyajit; Roy, Shourya; Reddy, Chandan K. (IEEE, 2016-10-19)
    Patients in hospitals, particularly in critical care, are susceptible to many complications affecting morbidity and mortality. Digitized clinical data in electronic medical records can be effectively used to develop machine ...
  • A large-scale RNA interference screen identifies genes that regulate autophagy at different stages 

    Guo, Sujuan; Pridham, Kevin J.; Virbasius, Ching-Man; He, Bin; Zhang, Liqing; Varmark, Hanne; Green, Michael R.; Sheng, Zhi (Nature Publishing Group, 2018-02-12)
    Dysregulated autophagy is central to the pathogenesis and therapeutic development of cancer. However, how autophagy is regulated in cancer is not well understood and genes that modulate cancer autophagy are not fully ...
  • DeepARG: a deep learning approach for predicting antibiotic resistance genes from metagenomic data 

    Arango-Argoty, Gustavo; Garner, Emily; Pruden, Amy; Heath, Lenwood S; Vikesland, Peter; Zhang, Liqing (2018-02-01)
    Abstract Background Growing concerns about increasing rates of antibiotic resistance call for expanded and comprehensive global monitoring. Advancing methods for monitoring ...
  • Measuring the Insecurity of Mobile Deep Links of Android 

    Lui, Fang; Wang, Chun; Pico, Andres; Yao, Danfeng; Wang, Gang (USENIX, 2017-08)
    Mobile deep links are URIs that point to specific locations within apps, which are instrumental to web-to-app communications. Existing “scheme URLs” are known to have hijacking vulnerabilities where one app can freely ...
  • CCS 2017- Women in Cyber Security (CyberW) Workshop 

    Yao, Danfeng (Daphne); Bertino, Elisa (ACM, 2017)
    The CyberW workshop is motivated by the significant gender imbalance in all security conferences, in terms of the number of publishing authors, PC members, organizers, and attendees. What causes this gender imbalance remains ...
  • FastViromeExplorer: a pipeline for virus and phage identification and abundance profiling in metagenomics data 

    Tithi, Saima Sultana; Aylward, Frank O.; Jensen, Roderick V.; Zhang, Liqing (PeerJ, 2018-01-12)
    With the increase in the availability of metagenomic data generated by next generation sequencing, there is an urgent need for fast and accurate tools for identifying viruses in host-associated and environmental samples. ...
  • Herbicide injury induces DNA methylome alterations in Arabidopsis 

    Kim, G; Clarke, CR; Larose, H; Tran, HT; Haak, DC; Zhang, L; Askew, S; Barney, J; Westwood, JH (PEERJ INC, 2017-07-20)
    The emergence of herbicide-resistant weeds is a major threat facing modern agriculture. Over 470 weedy-plant populations have developed resistance to herbicides. Traditional evolutionary mechanisms are not always sufficient ...
  • UPS-indel: a Universal Positioning System for Indels 

    Hasan, Mohammad Shabbir; Wu, Xiaowei; Watson, Layne T.; Li, Zhiyi; Zhang, Liqing (Nature, 2017-10-26)
    Storing biologically equivalent indels as distinct entries in databases causes data redundancy, and misleads downstream analysis. It is thus desirable to have a unified system for identifying and representing equivalent ...
  • Cooperative Object Manipulation in Collaborative Virtual Environments 

    Pinho, Marcio S.; Bowman, Doug A.; Dal Sasso Freitas, Carla M. (Springer Nature, 2008-06-20)
    Cooperative manipulation refers to the simultaneous manipulation of a virtual object by multiple users in an immersive virtual environment (VE). In this work, we present techniques for cooperative manipulation based on ...
  • Enterprise data breach: causes, challenges, prevention, and future directions 

    Cheng, Long; Liu, Fang; Yao, Danfeng (Daphne) (Wiley, 2017)
    A data breach is the intentional or inadvertent exposure of confidential information to unauthorized parties. In the digital era, data has become one of the most critical components of an enterprise. Data leakage poses ...

View more