default search action
Jason I. Hong
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j74]Tianshi Li, Lorrie Faith Cranor, Yuvraj Agarwal, Jason I. Hong:
Matcha: An IDE Plugin for Creating Accurate Privacy Nutrition Labels. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(1): 33:1-33:38 (2024) - [c145]Cori Faklaris, Laura Dabbish, Jason I. Hong:
A Framework for Reasoning about Social Influences on Security and Privacy Adoption. CHI Extended Abstracts 2024: 16:1-16:13 - [c144]Isadora Krsek, Shuyang Chen, Sauvik Das, Jason I. Hong, Laura Dabbish:
C.A.L.Y.P.S.O.: Designing Gameplay Features for Improving Player's Cybersecurity Self-Efficacy. CHI PLAY (Companion) 2024: 372-377 - [i20]Tianshi Li, Lorrie Faith Cranor, Yuvraj Agarwal, Jason I. Hong:
Matcha: An IDE Plugin for Creating Accurate Privacy Nutrition Labels. CoRR abs/2402.03582 (2024) - 2023
- [j73]Jason I. Hong:
Teaching the FATE Community about Privacy. Commun. ACM 66(8): 10-11 (2023) - [j72]Ángel Alexander Cabrera, Adam Perer, Jason I. Hong:
Improving Human-AI Collaboration With Descriptions of AI Behavior. Proc. ACM Hum. Comput. Interact. 7(CSCW1): 1-21 (2023) - [c143]Ángel Alexander Cabrera, Erica Fu, Donald Bertucci, Kenneth Holstein, Ameet Talwalkar, Jason I. Hong, Adam Perer:
Zeno: An Interactive Framework for Behavioral Evaluation of Machine Learning. CHI 2023: 419:1-419:14 - [c142]Rena Li, Sara Kingsley, Chelsea Fan, Proteeti Sinha, Nora Wai, Jaimie Lee, Hong Shen, Motahhare Eslami, Jason I. Hong:
Participation and Division of Labor in User-Driven Algorithm Audits: How Do Everyday Users Work together to Surface Algorithmic Harms? CHI 2023: 567:1-567:19 - [c141]Tzu-Sheng Kuo, Hong Shen, Jisoo Geum, Nev Jones, Jason I. Hong, Haiyi Zhu, Kenneth Holstein:
Understanding Frontline Workers' and Unhoused Individuals' Perspectives on AI Used in Homeless Services. CHI 2023: 860:1-860:17 - [i19]Ángel Alexander Cabrera, Adam Perer, Jason I. Hong:
Improving Human-AI Collaboration With Descriptions of AI Behavior. CoRR abs/2301.06937 (2023) - [i18]Ángel Alexander Cabrera, Erica Fu, Donald Bertucci, Kenneth Holstein, Ameet Talwalkar, Jason I. Hong, Adam Perer:
Zeno: An Interactive Framework for Behavioral Evaluation of Machine Learning. CoRR abs/2302.04732 (2023) - [i17]Tzu-Sheng Kuo, Hong Shen, Jisoo Geum, Nev Jones, Jason I. Hong, Haiyi Zhu, Kenneth Holstein:
Understanding Frontline Workers' and Unhoused Individuals' Perspectives on AI Used in Homeless Services. CoRR abs/2303.09743 (2023) - [i16]Rena Li, Sara Kingsley, Chelsea Fan, Proteeti Sinha, Nora Wai, Jaimie Lee, Hong Shen, Motahhare Eslami, Jason I. Hong:
Participation and Division of Labor in User-Driven Algorithm Audits: How Do Everyday Users Work together to Surface Algorithmic Harms? CoRR abs/2304.02134 (2023) - 2022
- [j71]Sauvik Das, Cori Faklaris, Jason I. Hong, Laura A. Dabbish:
The Security & Privacy Acceptance Framework (SPAF). Found. Trends Priv. Secur. 5(1-2): 1-143 (2022) - [j70]Serena Lutong Wang, Cori Faklaris, Junchao Lin, Laura Dabbish, Jason I. Hong:
'It's Problematic but I'm not Concerned': University Perspectives on Account Sharing. Proc. ACM Hum. Comput. Interact. 6(CSCW1): 68:1-68:27 (2022) - [j69]Sara Kingsley, Proteeti Sinha, Clara Wang, Motahhare Eslami, Jason I. Hong:
"Give Everybody [..] a Little Bit More Equity": Content Creator Perspectives and Responses to the Algorithmic Demonetization of Content Associated with Disadvantaged Groups. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-37 (2022) - [j68]Mohammad Tahaei, Kopo M. Ramokapane, Tianshi Li, Jason I. Hong, Awais Rashid:
Charting App Developers' Journey Through Privacy Regulation Features in Ad Networks. Proc. Priv. Enhancing Technol. 2022(3): 33-56 (2022) - [j67]Tianshi Li, Julia Katherine Haines, Miguel Flores Ruiz De Eguino, Jason I. Hong, Jeffrey Nichols:
Alert Now or Never: Understanding and Predicting Notification Preferences of Smartphone Users. ACM Trans. Comput. Hum. Interact. 29(5): 39:1-39:33 (2022) - [c140]Yucheng Li, Deyuan Chen, Tianshi Li, Yuvraj Agarwal, Lorrie Faith Cranor, Jason I. Hong:
Understanding iOS Privacy Nutrition Labels: An Exploratory Large-Scale Analysis of App Store Data. CHI Extended Abstracts 2022: 356:1-356:7 - [c139]Haojian Jin, Boyuan Guo, Rituparna Roychoudhury, Yaxing Yao, Swarun Kumar, Yuvraj Agarwal, Jason I. Hong:
Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes. CHI 2022: 449:1-449:19 - [c138]Tianshi Li, Kayla Reiman, Yuvraj Agarwal, Lorrie Faith Cranor, Jason I. Hong:
Understanding Challenges for Developers to Create Accurate Privacy Nutrition Labels. CHI 2022: 588:1-588:24 - [c137]Isadora Krsek, Kimi Wenzel, Sauvik Das, Jason I. Hong, Laura Dabbish:
To Self-Persuade or be Persuaded: Examining Interventions for Users' Privacy Setting Selection. CHI 2022: 623:1-623:17 - [c136]Haojian Jin, Gram Liu, David Hwang, Swarun Kumar, Yuvraj Agarwal, Jason I. Hong:
Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes. SP 2022: 303-320 - [i15]Cori Faklaris, Laura Dabbish, Jason I. Hong:
Do They Accept or Resist Cybersecurity Measures? Development and Validation of the 13-Item Security Attitude Inventory (SA-13). CoRR abs/2204.03114 (2022) - [i14]Haojian Jin, Gram Liu, David Hwang, Swarun Kumar, Yuvraj Agarwal, Jason I. Hong:
Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes (Extended Technical Report). CoRR abs/2204.04540 (2022) - [i13]Hong Shen, Ángel Alexander Cabrera, Adam Perer, Jason I. Hong:
"Public(s)-in-the-Loop": Facilitating Deliberation of Algorithmic Decisions in Contentious Public Policy Domains. CoRR abs/2204.10814 (2022) - [i12]Cori Faklaris, Laura Dabbish, Jason I. Hong:
Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption. CoRR abs/2205.06937 (2022) - 2021
- [j66]Haojian Jin, Jingxian Wang, Swarun Kumar, Jason I. Hong:
Software-defined cooking using a microwave oven. Commun. ACM 64(12): 95-103 (2021) - [j65]Tianshi Li, Elijah B. Neundorfer, Yuvraj Agarwal, Jason I. Hong:
Honeysuckle: Annotation-Guided Code Generation of In-App Privacy Notices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(3): 112:1-112:27 (2021) - [j64]Junchao Lin, Jason I. Hong, Laura Dabbish:
"It's our mutual responsibility to share": The Evolution of Account Sharing in Romantic Couples. Proc. ACM Hum. Comput. Interact. 5(CSCW1): 160:1-160:27 (2021) - [j63]Ángel Alexander Cabrera, Abraham J. Druck, Jason I. Hong, Adam Perer:
Discovering and Validating AI Errors With Crowdsourced Failure Reports. Proc. ACM Hum. Comput. Interact. 5(CSCW2): 425:1-425:22 (2021) - [j62]Tianshi Li, Camille Cobb, Jackie (Junrui) Yang, Sagar Baviskar, Yuvraj Agarwal, Beibei Li, Lujo Bauer, Jason I. Hong:
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention. Pervasive Mob. Comput. 75: 101439 (2021) - [j61]Haojian Jin, Hong Shen, Mayank Jain, Swarun Kumar, Jason I. Hong:
Lean Privacy Review: Collecting Users' Privacy Concerns of Data Practices at a Low Cost. ACM Trans. Comput. Hum. Interact. 28(5): 34:1-34:55 (2021) - [c135]Yu-Ning Huang, Siyan Zhao, Michael L. Rivera, Jason I. Hong, Robert E. Kraut:
Predicting Well-being Using Short Ecological Momentary Audio Recordings. CHI Extended Abstracts 2021: 306:1-306:7 - [c134]Jingxian Wang, Chengfeng Pan, Haojian Jin, Vaibhav Singh, Yash Jain, Jason I. Hong, Carmel Majidi, Swarun Kumar:
Speech Recognition Using RFID Tattoos (Extended Abstract). IJCAI 2021: 4849-4853 - [i11]Jason I. Hong, Yuvraj Agarwal, Matt Fredrikson, Mike Czapik, Shawn Hanna, Swarup Sahoo, Judy Chun, Won-Woo Chung, Aniruddh Iyer, Ally Liu, Shen Lu, Rituparna Roychoudhury, Qian Wang, Shan Wang, Siqi Wang, Vida Zhang, Jessica Zhao, Yuan Jiang, Haojian Jin, Sam Kim, Evelyn Kuo, Tianshi Li, Jinping Liu, Yile Liu, Robert Zhang:
The Design of the User Interfaces for Privacy Enhancements for Android. CoRR abs/2104.12032 (2021) - [i10]Ángel Alexander Cabrera, Abraham J. Druck, Jason I. Hong, Adam Perer:
Discovering and Validating AI Errors With Crowdsourced Failure Reports. CoRR abs/2109.11690 (2021) - [i9]Xingyu Liu, Annabel Sun, Jason I. Hong:
Identifying Terms and Conditions Important to Consumers using Crowdsourcing. CoRR abs/2111.12182 (2021) - [i8]Haojian Jin, Swarun Kumar, Jason I. Hong:
Sensor as a Company: On Self-Sustaining IoT Commons. CoRR abs/2112.02775 (2021) - [i7]Dan Tasse, Jason I. Hong:
Travel Guides for Creative Tourists, Powered by Geotagged Social Media. CoRR abs/2112.12009 (2021) - [i6]Alexander Yu, Yuvraj Agarwal, Jason I. Hong:
Analysis of Longitudinal Changes in Privacy Behavior of Android Applications. CoRR abs/2112.14205 (2021) - 2020
- [j60]Hong Shen, Haojian Jin, Ángel Alexander Cabrera, Adam Perer, Haiyi Zhu, Jason I. Hong:
Designing Alternative Representations of Confusion Matrices to Support Non-Expert Public Understanding of Algorithm Performance. Proc. ACM Hum. Comput. Interact. 4(CSCW2): 153:1-153:22 (2020) - [j59]Hong Shen, Cori Faklaris, Haojian Jin, Laura Dabbish, Jason I. Hong:
'I Can't Even Buy Apples If I Don't Use Mobile Pay?': When Mobile Payments Become Infrastructural in China. Proc. ACM Hum. Comput. Interact. 4(CSCW2): 170:1-170:26 (2020) - [j58]Tianshi Li, Elizabeth Louie, Laura Dabbish, Jason I. Hong:
How Developers Talk About Personal Data and What It Means for User Privacy: A Case Study of a Developer Forum on Reddit. Proc. ACM Hum. Comput. Interact. 4(CSCW3): 1-28 (2020) - [c133]Yunpeng Song, Yun Huang, Zhongmin Cai, Jason I. Hong:
I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios. CHI 2020: 1-13 - [c132]Junchao Lin, Irene Yu, Jason I. Hong, Laura Dabbish:
"Did You Just Purchase a Butt Head on Amazon". CSCW Companion 2020: 311-315 - [c131]Haojian Jin, Swarun Kumar, Jason I. Hong:
Providing architectural support for building privacy-sensitive smart home applications. UbiComp/ISWC Adjunct 2020: 212-217 - [i5]Tianshi Li, Jackie Yang, Cori Faklaris, Jennifer King, Yuvraj Agarwal, Laura Dabbish, Jason I. Hong:
Decentralized is not risk-free: Understanding public perceptions of privacy-utility trade-offs in COVID-19 contact-tracing apps. CoRR abs/2005.11957 (2020) - [i4]Tianshi Li, Camille Cobb, Jackie Yang, Sagar Baviskar, Yuvraj Agarwal, Beibei Li, Lujo Bauer, Jason I. Hong:
What Makes People Install a COVID-19 Contact-Tracing App? Understanding the Influence of App Design and Individual Difference on Contact-Tracing App Adoption Intention. CoRR abs/2012.12415 (2020)
2010 – 2019
- 2019
- [j57]Jingxian Wang, Chengfeng Pan, Haojian Jin, Vaibhav Singh, Yash Jain, Jason I. Hong, Carmel Majidi, Swarun Kumar:
RFID Tattoo: A Wireless Platform for Speech Recognition. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(4): 155:1-155:24 (2019) - [j56]Yunpeng Song, Cori Faklaris, Zhongmin Cai, Jason I. Hong, Laura Dabbish:
Normal and Easy: Account Sharing Practices in the Workplace. Proc. ACM Hum. Comput. Interact. 3(CSCW): 83:1-83:25 (2019) - [j55]Haojian Jin, Jingxian Wang, Swarun Kumar, Jason I. Hong:
Software-Defined Cooking Using a Microwave Oven. GetMobile Mob. Comput. Commun. 23(4): 21-24 (2019) - [c130]Fanglin Chen, Kewei Xia, Karan Dhabalia, Jason I. Hong:
MessageOnTap: A Suggestive Interface to Facilitate Messaging-related Tasks. CHI 2019: 575 - [c129]Fanglin Chen, Jason I. Hong:
Personal bits: mining interaction traces for personalized task intelligence. UbiComp/ISWC Adjunct 2019: 358-362 - [c128]Haojian Jin, Jingxian Wang, Swarun Kumar, Jason I. Hong:
Software-Defined Cooking using a Microwave Oven. MobiCom 2019: 40:1-40:16 - [c127]Haojian Jin, Jingxian Wang, Swarun Kumar, Jason I. Hong:
Software-Defined Cooking (SDC) using a Microwave Oven. MobiCom 2019: 64:1-64:3 - [c126]Sauvik Das, Laura A. Dabbish, Jason I. Hong:
A Typology of Perceived Triggers for End-User Security and Privacy Behaviors. SOUPS @ USENIX Security Symposium 2019 - [c125]Cori Faklaris, Laura A. Dabbish, Jason I. Hong:
A Self-Report Measure of End-User Security Attitudes (SA-6). SOUPS @ USENIX Security Symposium 2019 - [c124]Sauvik Das, David Lu, Taehoon Lee, Joanne Lo, Jason I. Hong:
The Memory Palace: Exploring Visual-Spatial Paths for Strong, Memorable, Infrequent Authentication. UIST 2019: 1109-1121 - [i3]Haojian Jin, Vita Chen, Ritwik Rajendra, Jason I. Hong:
Enhancing Email Functionality using Late Bound Content. CoRR abs/1907.01423 (2019) - 2018
- [j54]Haojian Jin, Minyi Liu, Kevan Dodhia, Yuanchun Li, Gaurav Srivastava, Matthew Fredrikson, Yuvraj Agarwal, Jason I. Hong:
Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(4): 173:1-173:27 (2018) - [j53]Tianshi Li, Yuvraj Agarwal, Jason I. Hong:
Coconut: An IDE Plugin for Developing Privacy-Friendly Apps. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(4): 178:1-178:35 (2018) - [j52]Jason I. Hong, Kyle Rector, Khai N. Truong:
Accessibility. IEEE Pervasive Comput. 17(1): 13-14 (2018) - [j51]Yingjie Zhang, Beibei Li, Jason I. Hong:
Using Online Geotagged and Crowdsourced Data to Understand Human Offline Behavior in the City: An Economic Perspective. ACM Trans. Intell. Syst. Technol. 9(3): 32:1-32:24 (2018) - [c123]Alex Sciuto, Arnita Saini, Jodi Forlizzi, Jason I. Hong:
"Hey Alexa, What's Up?": A Mixed-Methods Studies of In-Home Conversational Agent Usage. Conference on Designing Interactive Systems 2018: 857-868 - [c122]Yuanchun Li, Ziyue Yang, Yao Guo, Xiangqun Chen, Yuvraj Agarwal, Jason I. Hong:
Automated Extraction of Personal Knowledge from Smartphone Push Notifications. IEEE BigData 2018: 733-742 - [c121]Sauvik Das, Joanne Lo, Laura Dabbish, Jason I. Hong:
Breaking! A Typology of Security and Privacy News and How It's Shared. CHI 2018: 1 - [c120]Joseph Jofish Kaye, Joel E. Fischer, Jason I. Hong, Frank R. Bentley, Cosmin Munteanu, Alexis Hiniker, Janice Y. Tsai, Tawfiq Ammari:
Panel: Voice Assistants, UX Design and Research. CHI Extended Abstracts 2018 - [c119]Haojian Jin, Jingxian Wang, Zhijian Yang, Swarun Kumar, Jason I. Hong:
RF-Wear: Towards Wearable Everyday Skeleton Tracking Using Passive RFIDs. UbiComp/ISWC Adjunct 2018: 369-372 - [c118]Haojian Jin, Jingxian Wang, Zhijian Yang, Swarun Kumar, Jason I. Hong:
WiSh: Towards a Wireless Shape-aware World using Passive RFIDs. MobiSys 2018: 428-441 - [c117]Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason I. Hong:
Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships. SOUPS @ USENIX Security Symposium 2018: 83-102 - [c116]Jason I. Hong:
Helping developers with privacy (Invited Keynote). VL/HCC 2018: 1 - [i2]Yuanchun Li, Ziyue Yang, Yao Guo, Xiangqun Chen, Yuvraj Agarwal, Jason I. Hong:
Automated Extraction of Personal Knowledge from Smartphone Push Notifications. CoRR abs/1808.02013 (2018) - 2017
- [j50]Jason Wiese, Sauvik Das, Jason I. Hong, John Zimmerman:
Evolving the Ecosystem of Personal Behavioral Data. Hum. Comput. Interact. 32(5-6): 447-510 (2017) - [j49]Saksham Chitkara, Nishad Gothoskar, Suhas Harish, Jason I. Hong, Yuvraj Agarwal:
Does this App Really Need My Location?: Context-Aware Privacy Management for Smartphones. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(3): 42:1-42:22 (2017) - [j48]Yuanchun Li, Fanglin Chen, Toby Jia-Jun Li, Yao Guo, Gang Huang, Matthew Fredrikson, Yuvraj Agarwal, Jason I. Hong:
PrivacyStreams: Enabling Transparency in Personal Data Processing for Mobile Apps. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(3): 76:1-76:26 (2017) - [j47]Haojian Jin, Zhijian Yang, Swarun Kumar, Jason I. Hong:
Towards Wearable Everyday Body-Frame Tracking using Passive RFIDs. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(4): 145:1-145:23 (2017) - [j46]Jason I. Hong:
The Privacy Landscape of Pervasive Computing. IEEE Pervasive Comput. 16(3): 40-48 (2017) - [j45]Haoyu Wang, Yuanchun Li, Yao Guo, Yuvraj Agarwal, Jason I. Hong:
Understanding the Purpose of Permission Use in Mobile Apps. ACM Trans. Inf. Syst. 35(4): 43:1-43:40 (2017) - [c115]Sauvik Das, Gierad Laput, Chris Harrison, Jason I. Hong:
Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks. CHI 2017: 3764-3774 - [c114]Dan Tasse, Zichen Liu, Alex Sciuto, Jason I. Hong:
State of the Geotags: Motivations and Recent Changes. ICWSM 2017: 250-259 - [c113]Haoyu Wang, Zhe Liu, Yao Guo, Xiangqun Chen, Miao Zhang, Guoai Xu, Jason I. Hong:
An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective. WWW 2017: 163-172 - [i1]Gaurav Srivastava, Saksham Chitkara, Kevin Ku, Swarup Kumar Sahoo, Matt Fredrikson, Jason I. Hong, Yuvraj Agarwal:
PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage. CoRR abs/1708.06384 (2017) - 2016
- [j44]Jason I. Hong:
Inside the great wall. Commun. ACM 59(8): 10-11 (2016) - [j43]A. J. Brush, Jason I. Hong, James Scott:
Pervasive Computing Moves In. IEEE Pervasive Comput. 15(2): 14-15 (2016) - [c112]Jason I. Hong:
Privacy, Ethics and Big Data. ICISSP 2016: 5 - [c111]Dan Tasse, Jennifer T. Chou, Jason I. Hong:
Generating Neighborhood Guides from Social Media. CitiLab@ICWSM 2016 - [c110]Dan Tasse, Alex Sciuto, Jason I. Hong:
Our House, in the Middle of Our Tweets. ICWSM 2016: 691-694 - [c109]Su Mon Kywe, Yingjiu Li, Jason I. Hong, Cheng Yao:
Dissecting developer policy violating apps: characterization and detection. MALWARE 2016: 10-19 - [c108]Sauvik Das, Jason Wiese, Jason I. Hong:
Epistenet: facilitating programmatic access & processing of semantically related mobile personal data. MobileHCI 2016: 244-253 - [c107]Amos Azaria, Jason I. Hong:
Recommender Systems with Personality. RecSys 2016: 207-210 - [c106]David Lu, Taehoon Lee, Sauvik Das, Jason I. Hong:
Examining Visual-Spatial Paths for Mobile Authentication. WAY@SOUPS 2016 - [c105]Minxing Liu, Haoyu Wang, Yao Guo, Jason I. Hong:
Identifying and Analyzing the Privacy of Apps for Kids. HotMobile 2016: 105-110 - [c104]Yingjie Zhang, Beibei Li, Jason I. Hong:
Understanding User Economic Behavior in the City Using Large-scale Geotagged and Crowdsourced Data. WWW 2016: 205-214 - 2015
- [j42]Gökhan Bal, Kai Rannenberg, Jason I. Hong:
Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns. Comput. Secur. 53: 187-202 (2015) - [j41]Sunny Consolvo, Jason I. Hong, Marc Langheinrich:
Privacy and Security [Guest editors' introduction]. IEEE Pervasive Comput. 14(1): 16-17 (2015) - [j40]Rui José, Jorge C. S. Cardoso, Jason I. Hong:
User Expectations for Media Sharing Practices in Open Display Networks. Sensors 15(7): 16210-16224 (2015) - [c103]Jason Wiese, Jun-Ki Min, Jason I. Hong, John Zimmerman:
"You Never Call, You Never Write": Call and SMS Logs Do Not Always Indicate Tie Strength. CSCW 2015: 765-774 - [c102]Sauvik Das, Adam D. I. Kramer, Laura A. Dabbish, Jason I. Hong:
The Role of Social Influence in Security Feature Adoption. CSCW 2015: 1416-1426 - [c101]Eiji Hayashi, Jason I. Hong:
Knock x knock: the design and evaluation of a unified authentication management system. UbiComp 2015: 379-389 - [c100]Haoyu Wang, Jason I. Hong, Yao Guo:
Using text mining to infer the purpose of permission use in mobile apps. UbiComp 2015: 1107-1118 - [c99]Xiangmin Fan, Youming Liu, Nan Cao, Jason I. Hong, Jingtao Wang:
MindMiner: A Mixed-Initiative Interface for Interactive Distance Metric Learning. INTERACT (2) 2015: 611-628 - [c98]Xiangmin Fan, Youming Liu, Nan Cao, Jason I. Hong, Jingtao Wang:
MindMiner: Quantifying Entity Similarity via Interactive Distance Metric Learning. IUI Companion 2015: 93-96 - [e1]Gaetano Borriello, Giovanni Pau, Marco Gruteser, Jason I. Hong:
Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2015, Florence, Italy, May 19-22, 2015. ACM 2015, ISBN 978-1-4503-3494-5 [contents] - 2014
- [j39]Jason I. Hong, Mary Baker:
3D Printing, Smart Cities, Robots, and More. IEEE Pervasive Comput. 13(1): 6-9 (2014) - [j38]Jason I. Hong, Mary Baker:
Wearable Computing. IEEE Pervasive Comput. 13(2): 7-9 (2014) - [j37]Jason I. Hong, Mary Baker:
Smartphones, Teddy Bears, and Toys. IEEE Pervasive Comput. 13(3): 5-7 (2014) - [j36]Mary Baker, Jason I. Hong, Mark Billinghurst:
Wearable Computing from Jewels to Joules [Guest editors' introduction]. IEEE Pervasive Comput. 13(4): 20-22 (2014) - [j35]Kenneth Joseph, Kathleen M. Carley, Jason I. Hong:
Check-ins in "Blau Space": Applying Blau's Macrosociological Theory to Foursquare Check-ins from New York City. ACM Trans. Intell. Syst. Technol. 5(3): 46:1-46:22 (2014) - [c97]Afsaneh Doryab, Jun-Ki Min, Jason Wiese, John Zimmerman, Jason I. Hong:
Detection of Behavior Change in People with Depression. AAAI Workshop: Modern Artificial Intelligence for Health Analytics 2014 - [c96]Sauvik Das, Adam D. I. Kramer, Laura A. Dabbish, Jason I. Hong:
Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation. CCS 2014: 739-749 - [c95]Jun-Ki Min, Afsaneh Doryab, Jason Wiese, Shahriyar Amini, John Zimmerman, Jason I. Hong:
Toss 'n' turn: smartphone as sleep and sleep quality detector. CHI 2014: 477-486 - [c94]Eiji Hayashi, Manuel Maas, Jason I. Hong:
Wave to me: user identification using body lengths and natural gestures. CHI 2014: 3453-3462 - [c93]Jason Wiese, Jason I. Hong, John Zimmerman:
Challenges and opportunities in data mining contact lists for inferring relationships. UbiComp 2014: 643-647 - [c92]Su Mon Kywe, Yingjiu Li, Robert H. Deng, Jason I. Hong:
Detecting Camouflaged Applications on Mobile Application Markets. ICISC 2014: 241-254 - [c91]Gökhan Bal, Kai Rannenberg, Jason I. Hong:
Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones. SEC 2014: 113-126 - [c90]