Starting on 9/30, individual students will select, read, critically review and present a summary of one of the listed papers for that topic area. The papers were chosen to introduce and highlight the diversity of IST faculty’s recent research interests and methods. If you'd like to review and present a recent work in your topic area not listed below, please send the inquiry to the instructor beforehand.
Overview Paper: Badillo, S., Banfai, B., Birzele, F., Davydov, I. I., Hutchinson, L., Kam‐Thong, T., ... & Zhang, J. D. (2020). An introduction to machine learning. Clinical pharmacology & therapeutics, 107(4), 871-885.
Anderson, A., Dodge, J., Sadarangani, A., Juozapaitis, Z., Newman, E., Irvine, J., ... & Burnett, M. (2020). Mental models of mere mortals with explanations of reinforcement learning. ACM Transactions on Interactive Intelligent Systems (TiiS), 10(2), 1-37.
Bannihatti Kumar, V., Iyengar, R., Nisal, N., Feng, Y., Habib, H., Story, P., ... & Sadeh, N. (2020, April). Finding a choice in a haystack: Automatic extraction of opt-out statements from privacy policy text. In Proceedings of The Web Conference 2020 (pp. 1943-1954).
Bui, N., Yen, J., & Honavar, V. (2016). Temporal causality analysis of sentiment change in a cancer survivor network. IEEE transactions on computational social systems, 3(2), 75-87.
Chen, Y., Zhang, Z., Wu, C., Davaasuren, D., Goldstein, J. A., Gernand, A. D., & Wang, J. Z. (2020). AI-PLAX: AI-based placental assessment and examination using photos. Computerized Medical Imaging and Graphics, 84, 101744.
Dodge, J., Anderson, A. A., Olson, M., Dikkala, R., & Burnett, M. (2022, March). How Do People Rank Multiple Mutant Agents? In 27th International Conference on Intelligent User Interfaces (pp. 191-211).
Dou, Z. Y., Barman-Adhikari, A., Fang, F., & Yadav, A. (2021, May). Harnessing Social Media to Identify Homeless Youth At-Risk of Substance Use. In Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 35, No. 17, pp. 14748-14756).
Gopinath, A. A. M., Wilson, S., & Sadeh, N. (2018). Supervised and unsupervised methods for robust separation of section titles and prose text in web documents. In Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing (pp. 850-855).
Hartt, M., Hosseini, H., & Mostafapour, M. (2020). Game on: Exploring the effectiveness of game-based learning. Planning Practice & Research, 35(5), 589-604.
Hsieh, T. Y., Wang, S., Sun, Y., & Honavar, V. (2021, March). Explainable multivariate time series classification: a deep neural network which learns to attend to important variables as well as time intervals. In Proceedings of the 14th ACM international conference on web search and data mining (pp. 607-615).
Hu, Y., Cheng, X., Wang, S., Chen, J., Zhao, T., & Dai, E. (2022). Times series forecasting for urban building energy consumption based on graph convolutional network. Applied Energy, 307, 118231.
Kandimalla, B., Rohatgi, S., Wu, J., & Giles, C. L. (2021). Large scale subject category classification of scholarly papers with deep attentive neural networks. Frontiers in research metrics and analytics, 5, 600382.
Liu, H., Mu, T. J., & Huang, X. (2021). Detecting human—object interaction with multi-level pairwise feature network. Computational Visual Media, 7(2), 229-239.
Silverman, J. D., Bloom, R. J., Jiang, S., Durand, H. K., Dallow, E., Mukherjee, S., & David, L. A. (2021). Measuring and mitigating PCR bias in microbiota datasets. PLoS computational biology, 17(7), e1009113.
Tang, X., Liu, Y., Shah, N., Shi, X., Mitra, P., & Wang, S. (2020, August). Knowing your fate: Friendship, action and temporal explanations for user engagement prediction on social apps. In Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining (pp. 2269-2279).
Wilbur, M., Mukhopadhyay, A., Vazirizade, S., Pugliese, P., Laszka, A., & Dubey, A. (2021, September). Energy and Emission Prediction for Mixed-Vehicle Transit Fleets Using Multi-Task and Inductive Transfer Learning. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases (pp. 502-517). Springer, Cham.
Wu, Q., Li, Z., Wang, H., Chen, W., & Wang, H. (2019, July). Factorization bandits for online influence maximization. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (pp. 636-646).
Xu, D., Cheng, W., Luo, D., Liu, X., & Zhang, X. (2019, August). Spatio-Temporal Attentive RNN for Node Classification in Temporal Attributed Graphs. In IJCAI (pp. 3947-3953).
Ye, M., Cui, S., Wang, Y., Luo, J., Xiao, C., & Ma, F. (2021, April). Medpath: Augmenting health risk prediction via medical knowledge paths. In Proceedings of the Web Conference 2021 (pp. 1397-1409).
Lee, J., Le, T., Chen, J., & Lee, D. (2023). Do Language Models Plagiarize? The ACM Web Conference (WWW), Austin, TX, April 2023
Fukami, K., Maulik, R., Ramachandra, N., Fukagata, K., & Taira, K. (2021). Global field reconstruction from sparse sensors with Voronoi tessellation-assisted deep learning, Nature Machine Intelligence, 3 (11), 945-951
Gui, H., Jia, F., Chen, J., Squicciarini, A., Yadav, A. (2023). RoCourseNet: Distributionally Robust Training of a Prediction Aware Recourse Model, ACM CIKM
Overview Paper: Olson, G. M., & Olson, J. S. (2003). Psychological aspects of the human use of computing. Annual. Review of Psychology, 54, 491-516.
Abdullah, S., Murnane, E. L., Matthews, M., & Choudhury, T. (2017). Circadian computing: sensing, modeling, and maintaining biological rhythms. In Mobile health (pp. 35-58). Springer, Cham.
Bardzell, J., Bardzell, S., & Light, A. (2021, May). Wanting To Live Here: Design After Anthropocentric Functionalism. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (pp. 1- 24).
Belavkin, R. V., Ritter, F. E., & Elliman, D. G. (2020, December). Towards including simple emotions in a cognitive architecture in order to better fit children’s behavior. In Proceedings of the Twenty First Annual Conference of the Cognitive Science Society (pp. 784-784). Psychology Press.
Billah, S. M., Ashok, V., Porter, D. E., & Ramakrishnan, I. V. (2018, April). SteeringWheel: a locality-preserving magnification interface for low vision web browsing. In Proceedings of the 2018 CHI conference on human factors in computing systems (pp. 1-13).
Gross, S., Bardzell, J., Bardzell, S., & Stallings, M. (2017). Persuasive anxiety: designing and deploying material and formal explorations of personal tracking devices. Human–Computer Interaction, 32(5-6), 297-334.
Gui, X., & Chen, Y. (2019, May). Making healthcare infrastructure work: Unpacking the infrastructuring work of individuals. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (pp. 1-14).
Gupta, S., Jablonski, J., Tsai, C. H., & Carroll, J. M. (2022). Instagram of Rivers: Facilitating Distributed Collaboration in Hyperlocal Citizen Science. Proceedings of the ACM on Human-Computer Interaction, 6(CSCW1), 1-22.
Huang, C. Y., Huang, S. H., & Huang, T. H. K. (2020, April). Heteroglossia: In-situ story ideation with the crowd. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (pp. 1-12).
Huang, T. H., Chang, J. C., & Bigham, J. P. (2018, April). Evorus: A crowd-powered conversational assistant built to automate itself over time. In Proceedings of the 2018 CHI conference on human factors in computing systems (pp. 1-13).
Kou, Y., & Gui, X. (2020). Emotion regulation in eSports gaming: a qualitative study of league of legends. Proceedings of the ACM on Human-Computer Interaction, 4(CSCW2), 1-25.
Lee, S., Reddie, M., Tsai, C. H., Beck, J., Rosson, M. B., & Carroll, J. M. (2020, April). The emerging professional practice of remote sighted assistance for people with visual impairments. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (pp. 1-12).
Sun, F., & Cai, G. (2017, June). Community issue review: crystallizing knowledge for encouraging civic engagement. In Proceedings of the 18th Annual International Conference on Digital Government Research (pp. 260-269).
Wu, H., Wang, Y., Liu, J., Qiu, J., & Zhang, X. L. (2020). User-defined gesture interaction for in-vehicle information systems. Multimedia Tools and Applications, 79(1), 263-288.
Uchendu, A., Lee, J., Shen, H., Le, T., Huang, T.-H., & Lee, D. (2023). Does Human Collaboration Enhance the Accuracy of Identifying Deepfake Texts? 11th AAAI Conf. on Human Computation and Crowdsourcing (HCOMP), Delft, Netherlands, November 2023
Lin, C. & Silvia L. (2021). Techniques of Use: Confronting value systems of productivity, progress, and usefulness in computing and design. In Proceedings of the ACM Human Factors in Computing Systems Conference (CHI '21).
Overview Paper: Chanal, P. M., & Kakkasageri, M. S. (2020). Security and privacy in IOT: a survey. Wireless Personal Communications, 115(2), 1667-1693.
Chen, J., & Gu, Q. (2020, August). Rays: A ray searching method for hard-label adversarial attack. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (pp. 1739-1747).
Kim, T., Ding, A., Etigowni, S., Sun, P., Chen, J., Garcia, L., Zonouz, S., Xu, D., & Tian, D. (2022). Reverse Engineering and Retrofitting Robotic Aerial Vehicle Control Firmware using DisPatch, In Proceedings of the 20th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), Portland, OR
Kim, T., Kumar, V., Rhee, J., Chen, J., Kim, K., Hwan, Kim, C., Xu, D.,& Tian, D. (2021). PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-metal Embedded Applications, In Proceedings of the 30th USENIX Security Symposium (USENIX Security), Vancouver, BC, August 2021
Ye, H., Liu, S., Zhang, Z., & Hu, H. (2023). VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks, In Proceedings of the 32nd USENIX Security Symposium (USENIX 2023).
Liang, Y., Liu, S., & Hu, H. (2022). Detecting Logical Bugs of DBMS with Coverage-based Guidance, In Proceedings of the 31st USENIX Security Symposium (USENIX 2022).
He, X., Yang, Y., Zhou, W., Wang, W., Liu, P., & Zhang, Y. (2021). Fingerprinting Mainstream IoT Platforms Using Traffic Analysis. IEEE Internet of Things Journal, 9(3), 2083-2093.
Zhang, L., Lian, K., Xiao, H., Zhang, Z., Liu, P., Zhang, Y., ... & Duan, H. (2022, May). Exploit the Last Straw That Breaks Android Systems. In 2022 IEEE Symposium on Security and Privacy (SP) (pp. 2230-2247). IEEE.
Le, T., Wang, S., & Lee, D. (2020, November). MALCOM: Generating malicious comments to attack neural fake news detection models. In 2020 IEEE International Conference on Data Mining (ICDM) (pp. 282-291).
Le, T., Tran-Thanh, L., & Lee, D. (2022). Socialbots on Fire: Modeling Adversarial Behaviors of Socialbots via Multi-Agent Hierarchical Reinforcement Learning. In Proceedings of the ACM Web Conference (WWW) (pp. 545-554).
Zhang, Z., Zhu, S., Mink, J., Xiong, A., Song, L., & Wang, G. (2022). Beyond Bot Detection: Combating Fradulent Online Survey Takers. In Proceedings of the ACM Web Conference (WWW).
Liu, Z., Zhu, S., Qin, B., Chen, H., & Song, L. (2021, April). Automatically detecting and fixing concurrency bugs in go software systems. In Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (pp. 616-629).
Zhu, S., Zhang, Z., Qin, B., Xiong, A., Song, L. (2022). Learning and Programming Challenges of Rust: A Mixed-Methods Study, In Proceedings of IEEE/ACM 44th International Conference on Software Engineering (ICSE).
Serra, E., Shrestha, A., Spezzano, F., & Squicciarini, A. (2020, March). DeepTrust: An automatic framework to detect trustworthy users in opinion-based systems. In Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy (pp. 29-38).
Karimi, Y., Squicciarini, A., & Wilson, S. (2022). Automated detection of doxing on twitter, In Proceedings of the ACM on Human-Computer Interaction 6 (CSCW), 1-24
Wang, X., Wu, M., & Rajtmajer, S. (2023). From Yellow Peril to Model Minority: Asian stereotypes in social media during the COVID-19 pandemic. In Proceedings of ACM Conference on Web Science (WebSci), April 2023
Umar, P., Squicciarini, A., & Rajtmajer. S. (2019). Detection and Analysis of Self-Disclosure in Online News Commentaries. In Proceedings of The Web Conference (WWW), May 2019.
Merhi, M., Rajtmajer, S., & Lee, D. (2023). Information Operations in Turkey: Manufacturing Resilience with Free Twitter Accounts,17th Int'l AAAI Conf. on Web and Social Media (ICWSM), Limassol, Cyprus, June 2023
Cai, Z. & Xiong, A. (2023). Understanding users' privacy perception and decision of V2X communication in Connected Autonomous Vehicles, In Proceedings of the 32nd USENIX Security Symposium (USENIX Security).
Seo, H., Xiong, A., Lee, S., & Lee, D. (2022). If you have a reliable source, say something: Effect of correction comments on COVID-19 misinformation. In Proceedings of the AAAI Conference on Web and Social Media (ICWSM).
Zhang, H., Chen, J., Lin, L., Jia, J., & Wu, D. (2023). Graph Contrastive Backdoor Attacks, In Proceedings of the 40 th International Conference on Machine Learning (ICML), Honolulu, Hawaii, USA.
Li, X., Chen, L., & Wu, D. (2021). Turning Attacks into Protection: Social Media Privacy Protection Using Adversarial Attacks, In Proceedings of the SIAM International Conference on Data Mining (SDM)
Kumar, P., Subramaniam, M., Vitak, J., Clegg, T., & Chetty, M. (2020). Strengthening children’s privacy literacy through contextual integrity, Media and Communication 8 (4), 175-184
Overview Paper: Smutny, Z., & Vehovar, V. (2020). Social informatics research: Schools of thought, methodological basis, and thematic conceptualization. Journal of the Association for Information Science and Technology, 71(5), 529-539
Coche, J., Kropczynski, J., Montarnal, A., Tapia, A., & Benaben, F. (2021, May). Actionability in a Situation Awareness world: Implications for social media processing system design. In ISCRAM 2021-18th International conference on Information Systems for Crisis Response and Management (No. 2391, pp. p-994).
Cotter, K. (2022). Practical knowledge of algorithms: The case of BreadTube. New Media & Society, 14614448221081802.
Cotter, K., Medeiros, M., Pak, C., & Thorson, K. (2021). “Reach the right people”: The politics of “interests” in Facebook’s classification system for ad targeting. Big Data & Society, 8(1), 2053951721996046.
Fonseca, F. (2007). The double role of ontologies in information science research. Journal of the American Society for Information Science and Technology, 58(6), 786-793.
Grace, R., Halse, S., Aurite, W., Montarnal, A., & Tapia, A. (2019, January). Expanding awareness: Comparing location, keyword, and network filtering methods to collect hyperlocal social media data. In Proceedings of the 52nd Hawaii International Conference on System Sciences.
Hanrahan, B. V., Maitland, C., Brown, T., Chen, A., Kagame, F., & Birir, B. (2021). Agency and Extraction in Emerging Industrial Drone Applications: Imaginaries of Rwandan Farm Workers and Community Members. Proceedings of the ACM on Human-Computer Interaction, 4(CSCW3), 1-21.
Maitland, C. (2019). Collective behaviors in mobile internet access: an exchange-based approach. Information Technologies & International Development, 15, 18.
Payton, F. C., Yarger, L. K., & Pinter, A. T. (2018). Text mining mental health reports for issues impacting today’s college students: qualitative study. JMIR mental health, 5(4), e10032.
Susser, D., & Grimaldi, V. (2021, July). Measuring Automated Influence: Between Empirical Evidence and Ethical Values. In Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society (pp. 242-253).
Yarger, L., Payton, F. C., & Neupane, B. (2019). Algorithmic equity in the hiring of underrepresented IT job candidates. Online information review.
Zimmer, M., Kumar, P., Vitak, J., Liao, Y., & Chamberlain Kritikos, K. (2020). ‘There’s nothing really they can do with this information’: unpacking how users manage privacy boundaries for personal fitness information. Information, Communication & Society, 23(7), 1020-1037.
Lin, C., Lindtner, S., & Wuschitz, S. (2019) Hacking Difference in Indonesia: The Ambivalences of Designing for Alternative Futures. In Proceedings of the 2019 on Designing Interactive Systems Conference (DIS '19). ACM, 1571-1582.