Publications

[1]
Z. Zhang, T. Cilloni, C. Walter, and C. Fleming, “Multi-Scale, Class-Generic, Privacy-Preserving Video,” Electronics, vol. 10, no. 10, p. 1172, 2021.
[1]
I. Riley, S. Jahan, A. Marshall, C. Walter, and R. F. Gamble, “Evaluating verification awareness as a method for assessing adaptation risk,” Future Generation Computer Systems, vol. 119, pp. 110–135, 2021.
[1]
Z. Zhang, T. Cilloni, C. Walter, and C. Fleming, “Multi-Scale, Class-Generic, Privacy-Preserving Video,” Electronics, vol. 10, no. 10, p. 1172, 2021.
[1]
S. Jahan, I. Riley, C. Walter, and R. F. Gamble, “Extending Context Awareness by Anticipating Uncertainty with Enki and Darjeeling,” presented at the 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C), 2020, pp. 170–175.
[1]
T. Cilloni, W. Wang, C. Walter, and C. Fleming, “Preventing Personal Data Theft in Images with Adversarial ML,” arXiv preprint arXiv:2010.10242, 2020.
[1]
G. M. Alarcon et al., “Would you fix this code for me? effects of repair source and commenting on trust in code repair,” Systems, vol. 8, no. 1, p. 8, 2020.
[1]
S. Jahan et al., “MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases,” Future Generation Computer Systems, vol. 109, pp. 197–209, 2020.
[1]
C. Walter and C. Fleming, “Toward the creation of a personal device security testbed to aid student learning objectives,” Journal of Computing Sciences in Colleges, vol. 35, no. 9, pp. 86–94, 2020.
[1]
G. M. Alarcon et al., “Trust perceptions of metadata in open-source software: The role of performance and reputation,” Systems, vol. 8, no. 3, p. 28, 2020.
[1]
T. Cilloni, W. Wang, C. Walter, and C. Fleming, “Preventing Personal Data Theft in Images with Adversarial ML,” arXiv preprint arXiv:2010.10242, 2020.
[1]
J. Li, A. Grintsvayg, J. Kauffman, and C. Fleming, “LBRY: A Blockchain-Based Decentralized Digital Content Marketplace,” presented at the 2020 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 2020, pp. 42–51.
[1]
T. Cilloni, X. Cai, C. Fleming, and J. Li, “Understanding and Detecting Majority Attacks,” presented at the 2020 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 2020, pp. 11–21.
[1]
I. Olade, H.-N. Liang, C. Fleming, and C. Champion, “Exploring the vulnerabilities and advantages of swipe or pattern authentication in virtual reality (vr),” presented at the Proceedings of the 2020 4th International Conference on Virtual and Augmented Reality Simulations, 2020, pp. 45–52.
[1]
H.-N. Liang, C. Fleming, and K. L. Man, “Personal Mobile devices at work: factors affecting the adoption of security mechanisms.,” Multimedia Tools & Applications, vol. 79, 2020.
[1]
I. Olade, C. Fleming, and H.-N. Liang, “Biomove: Biometric user identification from human kinesiological movements for virtual reality systems,” Sensors, vol. 20, no. 10, p. 2944, 2020.
[1]
C. Walter and C. Fleming, “Toward the creation of a personal device security testbed to aid student learning objectives,” Journal of Computing Sciences in Colleges, vol. 35, no. 9, pp. 86–94, 2020.
[1]
T. Ryan, C. Walter, G. Alarcon, R. Gamble, S. A. Jessup, and A. Capiola, “The influence of personality on code reuse,” 2019.
[1]
C. Walter and R. Gamble, “Crossing the Adaptation Boundaries of Distinct Testbeds,” presented at the 2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems (FAS* W), 2019, pp. 36–39.
[1]
S. Chowdhury, C. Walter, and R. Gamble, “Observing Team Collaboration Personality Traits in Undergraduate Software Development Projects,” presented at the Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019.
[1]
T. J. Ryan et al., “Trust in automated software repair,” presented at the International Conference on Human-Computer Interaction, 2019, pp. 452–470.
[1]
M. L. Hale, K. Lotfy, R. F. Gamble, C. Walter, and J. Lin, “Developing a platform to evaluate and assess the security of wearable devices,” Digital Communications and Networks, vol. 5, no. 3, pp. 147–159, 2019.
[1]
C. Walter and R. Gamble, “Gait-Based Identification Using Wearables in the Personal Fog,” presented at the Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019.
[1]
J. Tyler et al., “Trust in Automated Software Repair,” presented at the HCI for Cybersecurity, Privacy and Trust: First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings, 2019, vol. 11594, p. 452.
[1]
A. Capiola et al., “Trust in Software: Attributes of Computer Code and the Human Factors that Influence Utilization Metrics,” presented at the International Conference on Human-Computer Interaction, 2019, pp. 190–196.
[1]
I. Sadien, K. Papangelis, C. Fleming, and H.-N. Liang, “Lessons Learned from Developing a Microservice Based Mobile Location-Based Crowdsourcing Platform,” arXiv preprint arXiv:1909.03596, 2019.
[1]
D. Yu, H.-N. Liang, K. Fan, H. Zhang, C. Fleming, and K. Papangelis, “Design and evaluation of visualization techniques of off-screen and occluded targets in virtual reality environments,” IEEE transactions on visualization and computer graphics, vol. 26, no. 9, pp. 2762–2774, 2019.
[1]
W. Xu, H.-N. Liang, Y. Yu, D. Monteiro, K. Hasan, and C. Fleming, “Assessing the effects of a full-body motion-based exergame in virtual reality,” presented at the Proceedings of the Seventh International Symposium of Chinese CHI, 2019, pp. 1–6.
[1]
I. Olade, C. Champion, H. Liang, and C. Fleming, “The Smart $^ 2$ Speaker Blocker: An Open-Source Privacy Filter for Connected Home Speakers,” arXiv preprint arXiv:1901.04879, 2019.
[1]
C. Walter, I. Riley, and R. Gamble, “Securing wearables through the creation of a personal fog,” 2018.
[1]
G. M. Alarcon et al., “The influence of commenting validity, placement, and style on perceptions of computer code trustworthiness: A heuristic-systematic processing approach,” Applied ergonomics, vol. 70, pp. 182–193, 2018.
[1]
S. Jahan, C. Walter, S. Alqahtani, and R. Gamble, “Adaptive coordination to complete mission goals,” presented at the 2018 IEEE 3rd International Workshops on Foundations and Applications of Self* Systems (FAS* W), 2018, pp. 214–221.
[1]
T. J. Ryan, C. Walter, G. M. Alarcon, R. F. Gamble, S. A. Jessup, and A. A. Capiola, “Individual differences in trust in code: The moderating effects of personality on the trustworthiness-trust relationship,” presented at the International Conference on Human-Computer Interaction, 2018, pp. 370–376.
[1]
C. W. Walter, The personal fog: An architecture for limiting wearable security vulnerabilities. The University of Tulsa, 2018.
[1]
S. Chowdhury, C. Walter, and R. Gamble, “Toward increasing collaboration awareness in software engineering teams,” presented at the 2018 IEEE Frontiers in Education Conference (FIE), 2018, pp. 1–9.
[1]
D. Yu, J. Zhu, W. Xu, H.-N. Liang, C. Fleming, and Y. Yue, “An Investigation of Micro-and Macro-Interaction for 3D Manipulation using Dual-Hand Controller in Virtual Reality Environments.,” International Journal of Design, Analysis & Tools for Integrated Circuits & Systems, vol. 7, no. 1, 2018.
[1]
I. Olade, H. Liang, and C. Fleming, “A review of multimodal facial biometric authentication methods in mobile devices and their application in head mounted displays,” presented at the 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), 2018, pp. 1997–2004.
[1]
C. Yu, C. Fleming, and H.-N. Liang, “Scale Invariant Privacy Preserving Video via Wavelet Decomposition.,” International Journal of Design, Analysis & Tools for Integrated Circuits & Systems, vol. 7, no. 1, 2018.
[1]
I. Olade, H. Liang, and C. Fleming, “SemanticLock: An authentication method for mobile devices using semantically-linked images,” arXiv preprint arXiv:1806.11361, 2018.
[1]
C. Calhoun et al., “Suspicion, trust, and automation,” SRA INTERNATIONAL INC DAYTON OH DAYTON United States, 2017.
[1]
G. M. Alarcon et al., “Application of the heuristic-systematic model to computer code trustworthiness: The influence of reputation and transparency,” Cogent Psychology, vol. 4, no. 1, p. 1389640, 2017.
[1]
C. Walter, R. Gamble, G. Alarcon, S. Jessup, and C. Calhoun, “Developing a mechanism to study code trustworthiness,” 2017.
[1]
B. Boyd, A. Townsley, C. Walter, C. Johnson, and R. Gamble, “Examining collaboration among student teams relying on Web applications to coordinate software development,” presented at the Proceedings of the 50th Hawaii International Conference on System Sciences, 2017.
[1]
C. Walter, I. Riley, X. He, E. Robards, and R. Gamble, “Toward predicting secure environments for wearable devices,” presented at the Proceedings of the 50th Hawaii International Conference on System Sciences, 2017.
[1]
M. S. Ryoo, B. Rothrock, C. Fleming, and H. J. Yang, “Privacy-preserving human activity recognition from extreme low resolution,” presented at the Thirty-First AAAI Conference on Artificial Intelligence, 2017.
[1]
M. L. Hale, C. Walter, J. Lin, and R. F. Gamble, “Apriori Prediction of Phishing Victimization Based on Structural Content Factors,” International Journal of Services Computing, pp. 1–13, 2016.
[1]
C. Walter, I. Riley, and R. Gamble, “Configuring an appropriate team environment to satisfy relevant criteria,” presented at the 2016 IEEE Frontiers in Education Conference (FIE), 2016, pp. 1–9.
[1]
C. Walter, M. L. Hale, and R. F. Gamble, “Imposing security awareness on wearables,” presented at the Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2016, pp. 29–35.
[1]
Z. Yu, I. Olade, H.-N. Liang, and C. Fleming, “Usable authentication mechanisms for mobile devices: An exploration of 3d graphical passwords,” presented at the 2016 International Conference on Platform Technology and Service (PlatCon), 2016, pp. 1–3.
[1]
Z. Yu, H.-N. Liang, C. Fleming, and K. L. Man, “An exploration of usable authentication mechanisms for virtual reality systems,” presented at the 2016 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), 2016, pp. 458–460.
[1]
M. L. Hale, R. Gamble, J. Hale, M. Haney, J. Lin, and C. Walter, “Measuring the Potential for Victimization in Malicious Content,” presented at the 2015 IEEE International Conference on Web Services, 2015, pp. 305–312.