- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Spam and Phishing Detection
- Reading and Literacy Development
- Digital Games and Media
- Cognitive and developmental aspects of mathematical skills
- Advanced Malware Detection Techniques
- Privacy, Security, and Data Protection
- Internet Traffic Analysis and Secure E-voting
- Artificial Intelligence in Games
- Peer-to-Peer Network Technologies
- Blockchain Technology Applications and Security
- Digital Accessibility for Disabilities
- Online Learning and Analytics
- Cloud Data Security Solutions
- Tactile and Sensory Interactions
- Ethics and Social Impacts of AI
- Educational Games and Gamification
- Text Readability and Simplification
- Data Quality and Management
- Sexuality, Behavior, and Technology
- Network Security and Intrusion Detection
- Biometric Identification and Security
- Advanced Authentication Protocols Security
- Virtual Reality Applications and Impacts
Hong Kong University of Science and Technology
2022-2024
Virginia Tech
2024
University of Hong Kong
2022-2024
Cornell University
2015-2021
Beijing University of Chemical Technology
2014
University of Strathclyde
2013
Emerging smart contract systems over decentralized cryptocurrencies allow mutually distrustful parties to transact safely without trusted third parties. In the event of contractual breaches or aborts, blockchain ensures that honest obtain commensurate compensation. Existing systems, however, lack transactional privacy. All transactions, including flow money between pseudonyms and amount transacted, are exposed on blockchain. We present Hawk, a system does not store financial transactions in...
Large scale data processing brings new challenges to the design of privacy-preserving protocols: how meet increasing requirements speed and throughput modern applications, up smoothly when being protected is big. Efficiency scalability become critical criteria for privacy preserving protocols in age Big Data. In this paper, we present a Private Set Intersection (PSI) protocol that extremely efficient highly scalable compared with existing protocols. The based on novel approach call oblivious...
Phishing attacks are a major problem, as evidenced by the DNC hackings during 2016 US presidential election, in which staff were tricked into sharing passwords fake Google security emails, granting access to confidential information. Vulnerabilities such these due part insufficient and tiresome user training cybersecurity. Ideally, we would have more engaging methods that teach cybersecurity an active entertaining way. To address this need, introduce game What.Hack, not only teaches phishing...
The shuffle model of differential privacy provides promising privacy-utility balances in decentralized, privacy-preserving data analysis. However, the current analyses amplification via shuffling lack both tightness and generality. To address this issue, we propose variation-ratio reduction as a comprehensive framework for single-message multi-message protocols. It leverages two new parameterizations: total variation bounds local messages probability ratio blanket messages, to determine...
Many students with specific learning disabilities (SLDs) have difficulty math. To succeed in math, they need to receive personalized support from teachers. Recently, math e-learning tools that provide skills training gained popularity. However, we know little about how well these help teachers personalize instruction for SLDs. answer this question, conducted semi-structured interviews 12 who taught SLDs grades five eight. We found participants used were not designed specifically Participants...
Record linkage allows data from different sources to be integrated facilitate mining tasks. However, in many cases, records have linked by personally identifiable information. To prevent privacy breaches, ideally should a private way such that no information other than the matching result is leaked process. In this paper, we present an exact Private Linkage (PRL) protocol and approximate PRL protocol. The based on Oblivious Bloom Intersection, which efficient set intersection extends...
As information security systems become increasingly sophisticated and reliable, humans are rapidly becoming the weakest link in pipeline. Technological countermeasures can only be deployed if depending upon them aware of how to use them, hackers beginning take advantage knowledge gap that exists this area. The recent DNC hackings during 2016 US presidential election evidence this, as staff were tricked into sharing passwords which granted access confidential by fake Google emails....
Students with specific learning disabilities (SLD) typically struggle in their K-12 math classes, limiting the likelihood of success STEM fields. Private tutoring is reported to be effective at helping them succeed math, but it not a scalable solution. While many recent e-learning tools have aimed personalizing support ways that might scalable, there remains much done. To better understand gaps between current and particular needs students SLD (and teachers), we conducted semi-structured...
Most students with specific learning disabilities (SLDs) have difficulties in reading and writing. The SLDs pre-screening is crucial because the golden period for therapy before six years old. However, many Hong Kong receive assessments after period. Also, challenging, especially a language logographic script but without prominent sound-script correspondence (e.g., Chinese, Japanese). To make Chinese more effective efficient, we designed new comprehensive game (i.e., dyslexia, dysgraphia,...
Students with specific learning disabilities (SLDs) often experience reading, writing, attention, and physical movement coordination difficulties. However, in Hong Kong, it takes years for special education needs coordinators (SENCOs) special-ed teachers to pre-screen diagnose students SLDs. Therefore, many SLDs missed the golden time interventions (i.e., before six old). In addition, although there are screening tools Chinese Indo-European languages (e.g., English Spanish), they did not...
The IDC research community has a growing interest in designing AI interfaces for children with special educational needs. Nonetheless, little explored the and design issues, rationale, challenges, opportunities this field. Therefore, we propose to host half-day workshop bring together researchers practitioners from Learning & Education, Accessibility, Intelligent User Interfaces sub-fields discuss identify existing collaboration barriers, establish consensus on of pragmatic framework, as...
Students with specific learning disabilities (SLDs) often experience negative emotions when solving math problems, which they have difficulty managing. This is one reason that current e-learning tools, elicit these emotions, are not effective for students. We designed an intelligent e-tutoring system aims to reduce students' emotional behaviors. The automatically detects possible behaviors by analyzing gaze, inputs on the touchscreen, and response time. It then uses of four intervention...
First-person shooter (FPS) game tournaments take place across the globe. A growing number of people choose to watch FPS games online instead attending events in person. However, live streaming might miss critical highlight moments game, including kills and tactics. We identify how why team fails capture reduce such mistakes. named mistakes jarring observations. conducted a field study competitions Game For Peace, popular mobile summarize five typical observations three primary reasons that...
Making the hit effect satisfy players is a long-standing problem faced by action game designers. However, no research has systematically analyzed which design elements affect such feel. There not even term to describe it. So, we proposed use impact feel player's feeling when receiving juicy feedback. After collecting comments on games from Steam's top seller list, trained natural language processing (NLP) model rank with their performance We presented 19-feature framework of feedback and...
Children with dyslexia face extra challenges in reading and writing words. They need more learning exercises than children typical development to acquire vocabulary, which is often repetitive daunting. Research has shown that combining visuospatial information practices helped memorize words, especially the real-world physical context. Nevertheless, existing word recognition spelling training games for were not able leverage children's immediate vicinity. Therefore, we designed an augmented...
Organizations started to adopt differential privacy (DP) techniques hoping persuade more users share personal data with them. However, many do not understand DP techniques, thus may be willing share. Previous research suggested that the design of mechanism communication could influence users' willingness data. Based on prior work, we propose a new pipeline starts by asking about their concerns and then provides customized communication. We also framework systemically explores effective...
Making the hit effect satisfy players is a long-standing problem faced by action game designers. However, no research systematically analyzed which design elements affect such feel. There not even term to describe it. So, we propose use impact feel player's feeling when receiving juicy feedback. After collecting comments on games from Steam's top seller list, trained natural language processing (NLP) model rank with their performance We presented 19-feature framework of feedback and examined...
First-person shooter (FPS) game tournaments take place across the globe. A growing number of people choose to watch FPS games online instead attending events in person. However, live streaming might miss critical highlight moments game, including kills and tactics. We identify how why team fails capture reduce such mistakes. named mistakes jarring observations. conducted a field study competitions Game For Peace, popular mobile summarize five typical observations three primary reasons that...