• Publications
  • Influence
Exploring author gender in book rating and recommendation
This work measures the distribution of the genders of the authors of books in user rating profiles and recommendation lists produced from this data to find that common collaborative filtering algorithms differ in the gender distribution of their recommendation lists, and in the relationship of that output distribution to user profile distribution. Expand
Resiliency analysis for complex engineered system design
A graph spectral approach to calculate the resilience of the design architecture of complex engineered systems is deduced from graph spectra, and a new method to identify the most vulnerable components in the design and design architectures that are robust to transmission of failures is proposed. Expand
Model-based hazard analysis of undesirable environmental and components interaction
Identifying the detrimental effect of environmental factors and subsystem interactions are historically one of the most challenging aspects of early hazard assessment in the design of complex avionicExpand
A Model-Based Failure Identification and Propagation Framework for Conceptual Design of Complex Systems
In this paper, a model-based failure identification and propagation (MFIP) framework is introduced for early identification of potential safety issues caused by environmental disturbances andExpand
Misusing Sensory Channel to Attack Industrial Control Systems
This paper investigates how sensors can be used as a communication channel by hackers to send a malicious command and control into the ICS and examines how abusing sensory channel would lead to a data pattern, which can be detected by a proper signature-based intrusion detection system (IDS). Expand
A framework for assessing and improving the resilience of complex engineered systems during the early design process
As modern systems continue to increase in size and complexity, they pose significant safety and risk management challenges. System engineers and much of the government research efforts are focused onExpand
Privacy for All: Ensuring Fair and Equitable Privacy Protections
This position paper argues for applying recent research on ensuring sociotechnical systems are fair and nondiscriminatory to the privacy protections those systems may provide to help explain the disparate impact of privacy failure. Expand
Complex Engineered Systems Design Verification Based on Assume-Guarantee Reasoning
A framework where system properties are verified and modeled with respect to the assumptions on the environment where components and subsystems' performances are guaranteed under these assumptions is provided. Expand
Model Checking of Security Properties in Industrial Control Systems (ICS)
This paper provides a simpler approach to the model checking of temperature process control system by first starting with the control module design without formal verification, and identifying possible vulnerabilities in such design. Expand
Measuring Personality for Automatic Elicitation of Privacy Preferences
The results show that the Big-Five personality traits can be used to significantly improve the prediction of user privacy preferences in a number of contexts and situations, and so using machine learning approaches to automate the setting ofuser privacy preferences has the potential to greatly reduce the burden on users while simultaneously improving the accuracy of their privacy preferences and security. Expand