• Publications
  • Influence
Learning to detect phishing emails
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity for the purpose of stealing account information, logon credentials,Expand
  • 533
  • 42
Bridging the gap between physical location and online social networks
This paper examines the location traces of 489 users of a location sharing social network for relationships between the users' mobility patterns and structural properties of their underlying socialExpand
  • 438
  • 38
A framework of energy efficient mobile sensing for automatic user state recognition
  • Yi Wang, J. Lin, +4 authors N. Sadeh
  • Computer Science
  • MobiSys '09
  • 22 June 2009
Urban sensing, participatory sensing, and user activity recognition can provide rich contextual information for mobile applications such as social networking and location-based services. However,Expand
  • 494
  • 34
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City
Studying the social dynamics of a city on a large scale has traditionally been a challenging endeavor, requiring long hours of observation and interviews, usually resulting in only a partialExpand
  • 546
  • 32
The supply chain trading agent competition
Supply chain management deals with the planning and coordination of bidding, production, sourcing and procurement activities associated with one or more products. It is central to today's globalExpand
  • 179
  • 27
Modeling Supply Chain Dynamics: A Multiagent Approach
A global economy and increase in customer expectations in terms of cost and services have put a premium on effective supply chain reengineering. It is essential to perform risk-benefit analysis ofExpand
  • 893
  • 24
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
Smartphone security research has produced many useful tools to analyze the privacy-related behaviors of mobile apps. However, these automated tools cannot assess people's perceptions of whether aExpand
  • 386
  • 22
Look-ahead techniques for micro-opportunistic job shop scheduling
Scheduling deals with the allocation of resources over time to perform a collection of tasks. Scheduling problems arise in domains as diverse as manufacturing, computer processing, transportation,Expand
  • 202
  • 21
Understanding and capturing people’s privacy policies in a mobile social networking application
A number of mobile applications have emerged that allow users to locate one another. However, people have expressed concerns about the privacy implications associated with this class of software,Expand
  • 317
  • 19
Privacy as part of the app decision-making process
Smartphones have unprecedented access to sensitive personal information. While users report having privacy concerns, they may not actively consider privacy while downloading apps from smartphoneExpand
  • 217
  • 19