default search action
John C.-I. Chuang
Person information
- affiliation: University of California, Berkeley, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Max T. Curran, John Chuang:
Social Distancing and Social Biosensing: Intersubjectivity from Afar. Comput. Support. Cooperative Work. 32(2): 313-346 (2023) - 2021
- [c57]Jeremy Raboff Gordon, Max T. Curran, John Chuang, Coye Cheshire:
Covert Embodied Choice: Decision-Making and the Limits of Privacy Under Biometric Surveillance. CHI 2021: 551:1-551:12 - [c56]John Chuang:
Neural Dynamics of a Single Human with Long-Term, High Temporal Density Electroencephalography. EMBC 2021: 7199-7205 - [c55]Jeremy Gordon, John Chuang:
Active Dynamical Prospection: Modeling Mental Simulation as Particle Filtering for Sensorimotor Control during Pathfinding. ALIFE 2021: 85 - [i9]Jeremy Gordon, Max T. Curran, John Chuang, Coye Cheshire:
Covert Embodied Choice: Decision-Making and the Limits of Privacy Under Biometric Surveillance. CoRR abs/2101.00771 (2021) - [i8]Jeremy Gordon, John Chuang:
Active Dynamical Prospection: Modeling Mental Simulation as Particle Filtering for Sensorimotor Control during Pathfinding. CoRR abs/2103.07966 (2021)
2010 – 2019
- 2019
- [c54]Nick Merrill, John Chuang, Coye Cheshire:
Sensing is Believing: What People Think Biosensors Can Reveal About Thoughts and Feelings. Conference on Designing Interactive Systems 2019: 413-420 - [c53]Max T. Curran, Jeremy Raboff Gordon, Lily Lin, Priyashri Kamlesh Sridhar, John Chung-I Chuang:
Understanding Digitally-Mediated Empathy: An Exploration of Visual, Narrative, and Biosensory Informational Cues. CHI 2019: 614 - [c52]Nick Merrill, John Chuang:
Models of Minds: Reading the Mind Beyond the Brain. CHI Extended Abstracts 2019 - 2018
- [j17]Noura Howell, John Chuang, Abigail De Kosnik, Greg Niemeyer, Kimiko Ryokai:
Emotional Biosensing: Exploring Critical Alternatives. Proc. ACM Hum. Comput. Interact. 2(CSCW): 69:1-69:25 (2018) - [c51]Richmond Y. Wong, Nick Merrill, John Chuang:
When BCIs have APIs: Design Fictions of Everyday Brain-Computer Interface Adoption. Conference on Designing Interactive Systems 2018: 1359-1371 - [c50]Tanya Piplani, Nick Merrill, John Chuang:
Faking it, Making it: Fooling and Improving Brain-Based Authentication with Generative Adversarial Networks. BTAS 2018: 1-7 - [c49]Nick Merrill, John Chuang:
From Scanning Brains to Reading Minds: Talking to Engineers about Brain-Computer Interface. CHI 2018: 323 - [c48]Max T. Curran, Nick Merrill, Swapan Gandhi, John Chuang:
Exploring the Feasibility and Performance of One-step Three-factor Authentication with Ear-EEG. PhyCS 2018: 30-41 - 2017
- [j16]Thomas Maillart, Mingyi Zhao, Jens Grossklags, John Chuang:
Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs. J. Cybersecur. 3(2): 81-90 (2017) - [j15]Richmond Y. Wong, Deirdre K. Mulligan, Ellen Van Wyk, James Pierce, John Chuang:
Eliciting Values Reflections by Engaging Privacy Futures Using Design Workbooks. Proc. ACM Hum. Comput. Interact. 1(CSCW): 111:1-111:26 (2017) - [c47]Max T. Curran, Nick Merrill, John Chuang, Swapan Gandhi:
One-step, three-factor authentication in a single earpiece. UbiComp/ISWC Adjunct 2017: 21-24 - [c46]Richmond Y. Wong, Deirdre K. Mulligan, John Chuang:
Using science fiction texts to surface user reflections on privacy. UbiComp/ISWC Adjunct 2017: 213-216 - [c45]Nick Merrill, Max T. Curran, John Chuang:
Is the Future of Authenticity All In Our Heads?: Moving Passthoughts From the Lab to the World. NSPW 2017: 70-79 - [i7]Elaine Sedenberg, Richmond Y. Wong, John C.-I. Chuang:
A Window into the Soul: Biosensing in Public. CoRR abs/1702.04235 (2017) - [i6]Elaine Sedenberg, John Chuang:
Smile for the Camera: Privacy and Policy Implications of Emotion AI. CoRR abs/1709.00396 (2017) - 2016
- [j14]Elaine Sedenberg, John Chuang, Deirdre K. Mulligan:
Designing Commercial Therapeutic Robots for Privacy Preserving Systems and Ethical Research Practices Within the Home. Int. J. Soc. Robotics 8(4): 575-587 (2016) - [c44]Nick Merrill, Max T. Curran, Jong-Kai Yang, John Chuang:
Classifying mental gestures with in-ear EEG. BSN 2016: 130-135 - [c43]Max T. Curran, Jong-Kai Yang, Nick Merrill, John Chuang:
Passthoughts authentication with low cost EarEEG. EMBC 2016: 1979-1982 - [i5]Elaine Sedenberg, John Chuang, Deirdre K. Mulligan:
Designing Commercial Therapeutic Robots for Privacy Preserving Systems and Ethical Research Practices within the Home. CoRR abs/1606.04033 (2016) - [i4]Thomas Maillart, Mingyi Zhao, Jens Grossklags, John Chuang:
Given Enough Eyeballs, All Bugs Are Shallow? Revisiting Eric Raymond with Bug Bounty Programs. CoRR abs/1608.03445 (2016) - 2015
- [c42]Pablo Paredes, Ryuka Ko, Arezu Aghaseyedjavadi, John Chuang, John F. Canny, Linda Babler:
Synestouch: Haptic + audio affective design for wearable devices. ACII 2015: 595-601 - [c41]Maximilian Klein, Thomas Maillart, John C.-I. Chuang:
The Virtuous Circle of Wikipedia: Recursive Measures of Collaboration Structures. CSCW 2015: 1106-1115 - [c40]Nick Merrill, Thomas Maillart, Benjamin Johnson, John C.-I. Chuang:
Improving Physiological Signal Classification Using Logarithmic Quantization and a Progressive Calibration Technique. PhyCS 2015: 44-51 - [c39]Benjamin Johnson, Paul Laskowski, Thomas Maillart, John C.-I. Chuang, Nicolas Christin:
Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You. WEIS 2015 - 2014
- [j13]John Chuang, Patrick Loiseau:
The Joint Workshop on Pricing and Incentives in Networks and Systems (WPIN+NetEcon 2014). SIGMETRICS Perform. Evaluation Rev. 42(3): 2-3 (2014) - [c38]Benjamin Johnson, Thomas Maillart, John C.-I. Chuang:
My thoughts are not your thoughts. UbiComp Adjunct 2014: 1329-1338 - 2013
- [c37]John C.-I. Chuang, Hamilton Nguyen, Charles Wang, Benjamin Johnson:
I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves. Financial Cryptography Workshops 2013: 1-16 - [c36]Melissa Densmore, Ben Bellows, John Chuang, Eric A. Brewer:
The evolving braid: how an organization in Uganda achieved reliable communications. ICTD (1) 2013: 257-266 - 2012
- [c35]Pern Hui Chia, John Chuang:
Community-based web security: complementary roles of the serious and casual contributors. CSCW 2012: 1023-1032 - [c34]Benjamin Johnson, John Chuang, Jens Grossklags, Nicolas Christin:
Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper). Financial Cryptography 2012: 89-97 - [i3]Sebastian Benthall, John Chuang:
Computational Asymmetry in Strategic Bayesian Networks. CoRR abs/1206.2878 (2012) - 2011
- [j12]John Chuang:
Loci of competition for future internet architectures. IEEE Commun. Mag. 49(7): 38-43 (2011) - [c33]Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents. GAMENETS 2011: 444-458 - [c32]Pern Hui Chia, John Chuang:
Colonel Blotto in the Phishing War. GameSec 2011: 201-218 - 2010
- [c31]Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. ESORICS 2010: 588-606 - [c30]Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Uncertainty in Interdependent Security Games. GameSec 2010: 234-244 - [c29]Paul Laskowski, John Chuang:
Innovations and Upgrades in Virtualized Network Architectures. NetEcon 2010: 6:1-6:11 - [c28]Jens Grossklags, Svetlana Radosavac, Alvaro A. Cárdenas, John Chuang:
Nudge: intermediaries' role in interdependent network security. SAC 2010: 1879-1880 - [c27]Jens Grossklags, Svetlana Radosavac, Alvaro A. Cárdenas, John Chuang:
Nudge: Intermediaries' Role in Interdependent Network Security. TRUST 2010: 323-336
2000 – 2009
- 2009
- [e2]John Chuang, Lance Fortnow, Pearl Pu:
Proceedings 10th ACM Conference on Electronic Commerce (EC-2009), Stanford, California, USA, July 6--10, 2009. ACM 2009, ISBN 978-1-60558-458-4 [contents] - 2008
- [j11]Kartik Hosanagar, John C.-I. Chuang, Ramayya Krishnan, Michael D. Smith:
Service Adoption and Pricing of Content Delivery Network (CDN) Services. Manag. Sci. 54(9): 1579-1593 (2008) - [c26]Jens Grossklags, Nicolas Christin, John Chuang:
Predicted and Observed User Behavior in the Weakest-link Security Game. UPSEC 2008 - [c25]Paul Laskowski, Benjamin Johnson, John Chuang:
User-directed routing: from theory, towards practice. NetEcon 2008: 1-6 - [c24]Jens Grossklags, Nicolas Christin, John Chuang:
Security and insurance management in networks with heterogeneous agents. EC 2008: 160-169 - [c23]Jens Grossklags, Nicolas Christin, John Chuang:
Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents. WEIS 2008 - [c22]Jens Grossklags, Nicolas Christin, John Chuang:
Secure or insure?: a game-theoretic analysis of information security games. WWW 2008: 209-218 - 2007
- [j10]Ahsan Habib, John Chuang:
Improving application QoS with residential multihoming. Comput. Networks 51(12): 3323-3337 (2007) - [j9]Michal Feldman, John Chuang, Ion Stoica, Scott Shenker:
Hidden-Action in Network Routing. IEEE J. Sel. Areas Commun. 25(6): 1161-1172 (2007) - [c21]Dilip Antony Joseph, Nikhil Shetty, John Chuang, Ion Stoica:
Modeling the adoption of new network architectures. CoNEXT 2007: 5 - [c20]Moshe Babaioff, John Chuang:
On the Optimality and Interconnection of Valiant Load-Balancing Networks. INFOCOM 2007: 80-88 - [c19]Ahsan Habib, Nicolas Christin, John C.-I. Chuang:
On the Feasibility of Switching ISPs in Residential Multihoming. IWQoS 2007: 91-99 - 2006
- [j8]Michal Feldman, Christos H. Papadimitriou, John Chuang, Ion Stoica:
Free-riding and whitewashing in peer-to-peer systems. IEEE J. Sel. Areas Commun. 24(5): 1010-1019 (2006) - [j7]Ahsan Habib, John C.-I. Chuang:
Service differentiated peer selection: an incentive mechanism for peer-to-peer media streaming. IEEE Trans. Multim. 8(3): 610-621 (2006) - [c18]Ahsan Habib, Nicolas Christin, John Chuang:
Taking Advantage of Multihoming with Session Layer Striping. INFOCOM 2006 - [c17]Paul Laskowski, John Chuang:
Network monitors and contracting systems: competition and innovation. SIGCOMM 2006: 183-194 - [e1]Joan Feigenbaum, John C.-I. Chuang, David M. Pennock:
Proceedings 7th ACM Conference on Electronic Commerce (EC-2006), Ann Arbor, Michigan, USA, June 11-15, 2006. ACM 2006, ISBN 1-59593-236-4 [contents] - 2005
- [j6]Kartik Hosanagar, Ramayya Krishnan, John Chuang, Vidyanand Choudhary:
Pricing and Resource Allocation in Caching Services with Multiple Levels of Quality of Service. Manag. Sci. 51(12): 1844-1859 (2005) - [j5]Michal Feldman, John Chuang:
Overcoming free-riding behavior in peer-to-peer systems. SIGecom Exch. 5(4): 41-50 (2005) - [j4]Ahsan Habib, Dongyan Xu, Mikhail J. Atallah, Bharat K. Bhargava, John Chuang:
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming. IEEE Trans. Knowl. Data Eng. 17(7): 1010-1014 (2005) - [c16]Nicolas Christin, John Chuang:
A cost-based analysis of overlay routing geometries. INFOCOM 2005: 2566-2577 - [c15]Ahsan Habib, John Chuang:
Multihoming media streaming. IPCCC 2005: 499-504 - [c14]Nicolas Christin, Andreas S. Weigend, John Chuang:
Content availability, pollution and poisoning in file sharing peer-to-peer networks. EC 2005: 68-77 - [c13]Michal Feldman, John Chuang, Ion Stoica, Scott Shenker:
Hidden-action in multi-hop routing. EC 2005: 117-126 - [c12]Michal Feldman, John Chuang:
The Evolution of Cooperation under Cheap Pseudonyms. CEC 2005: 284-291 - 2004
- [c11]Kartik Hosanagar, Ramayya Krishnan, Michael D. Smith, John Chuang:
Optimal Pricing of Content Delivery Network (CDN) Services. HICSS 2004 - [c10]Nicolas Christin, John Chuang:
On the Cost of Participating in a Peer-to-Peer Network. IPTPS 2004: 22-32 - [c9]Ahsan Habib, John Chuang:
Incentive mechanism for peer-to-peer media streaming. IWQoS 2004: 171-180 - [c8]Michal Feldman, Kevin Lai, Ion Stoica, John Chuang:
Robust incentive techniques for peer-to-peer networks. EC 2004: 102-111 - [i2]Nicolas Christin, Jens Grossklags, John Chuang:
Near Rationality and Competitive Equilibria in Networked Systems. CoRR cs.GT/0404040 (2004) - [i1]Nicolas Christin, John Chuang:
On the Cost of Participating in a Peer-to-Peer Network. CoRR cs.NI/0401010 (2004) - 2003
- [j3]Abhishek Ghose, Jens Grossklags, John Chuang:
Resilient Data-Centric Storage in Wireless Sensor Networks. IEEE Distributed Syst. Online 4(11) (2003) - [c7]Abhishek Ghose, Jens Grossklags, John Chuang:
Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks. Mobile Data Management 2003: 45-62 - [c6]Gabriel Lucas, Abhishek Ghose, John Chuang:
On characterizing affinity and its impact on network performance. MoMeTools@SIGCOMM 2003: 65-75 - 2002
- [c5]Kartik Hosanagar, Ramayya Krishnan, John Chuang, Vidyanand Choudhary:
Optimal Pricing and Capacity Allocation in Vertically Differentiated Web Caching Services. ICIS 2002: 44 - [c4]John Chuang, Steve Kafka, Kim Norlen:
Efficiency and Performance of Web Cache Reporting Strategies. WISE Workshops 2002: 120-129 - 2001
- [j2]John C.-I. Chuang, Marvin A. Sirbu:
Pricing Multicast Communication: A Cost-Based Approach. Telecommun. Syst. 17(3): 281-297 (2001) - [c3]Andy Myers, John Chuang, Urs Hengartner, Yinglian Xie, Weiqiang Zhuang, Hui Zhang:
A Secure, Publisher-Centric Web Caching Infrastructure. INFOCOM 2001: 1235-1243 - [c2]John Chuang, Kartik Hosanagar, Ramayya Krishnan:
Pricing Caching services with multiple levels of QoS. SMC 2001: 3031 - 2000
- [j1]John Chung-I Chuang, Marvin A. Sirbu:
Distributed network storage service with quality-of-service guarantees. J. Netw. Comput. Appl. 23(3): 163-185 (2000)
1990 – 1999
- 1997
- [c1]Marvin A. Sirbu, John C.-I. Chuang:
Distributed Authentication in Kerberos Using Public Key Cryptography. NDSS 1997: 134-143
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint