Zikai Alex Wen

ORCID: 0000-0001-9163-7450
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Spam and Phishing Detection
  • Reading and Literacy Development
  • Digital Games and Media
  • Cognitive and developmental aspects of mathematical skills
  • Advanced Malware Detection Techniques
  • Privacy, Security, and Data Protection
  • Internet Traffic Analysis and Secure E-voting
  • Artificial Intelligence in Games
  • Peer-to-Peer Network Technologies
  • Blockchain Technology Applications and Security
  • Digital Accessibility for Disabilities
  • Online Learning and Analytics
  • Cloud Data Security Solutions
  • Tactile and Sensory Interactions
  • Ethics and Social Impacts of AI
  • Educational Games and Gamification
  • Text Readability and Simplification
  • Data Quality and Management
  • Sexuality, Behavior, and Technology
  • Network Security and Intrusion Detection
  • Biometric Identification and Security
  • Advanced Authentication Protocols Security
  • Virtual Reality Applications and Impacts

Hong Kong University of Science and Technology
2022-2024

Virginia Tech
2024

University of Hong Kong
2022-2024

Cornell University
2015-2021

Beijing University of Chemical Technology
2014

University of Strathclyde
2013

Emerging smart contract systems over decentralized cryptocurrencies allow mutually distrustful parties to transact safely without trusted third parties. In the event of contractual breaches or aborts, blockchain ensures that honest obtain commensurate compensation. Existing systems, however, lack transactional privacy. All transactions, including flow money between pseudonyms and amount transacted, are exposed on blockchain. We present Hawk, a system does not store financial transactions in...

10.1109/sp.2016.55 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2016-05-01

Large scale data processing brings new challenges to the design of privacy-preserving protocols: how meet increasing requirements speed and throughput modern applications, up smoothly when being protected is big. Efficiency scalability become critical criteria for privacy preserving protocols in age Big Data. In this paper, we present a Private Set Intersection (PSI) protocol that extremely efficient highly scalable compared with existing protocols. The based on novel approach call oblivious...

10.1145/2508859.2516701 article EN 2013-01-01

Phishing attacks are a major problem, as evidenced by the DNC hackings during 2016 US presidential election, in which staff were tricked into sharing passwords fake Google security emails, granting access to confidential information. Vulnerabilities such these due part insufficient and tiresome user training cybersecurity. Ideally, we would have more engaging methods that teach cybersecurity an active entertaining way. To address this need, introduce game What.Hack, not only teaches phishing...

10.1145/3290605.3300338 article EN 2019-04-29

The shuffle model of differential privacy provides promising privacy-utility balances in decentralized, privacy-preserving data analysis. However, the current analyses amplification via shuffling lack both tightness and generality. To address this issue, we propose variation-ratio reduction as a comprehensive framework for single-message multi-message protocols. It leverages two new parameterizations: total variation bounds local messages probability ratio blanket messages, to determine...

10.14778/3659437.3659444 article EN Proceedings of the VLDB Endowment 2024-04-01

Many students with specific learning disabilities (SLDs) have difficulty math. To succeed in math, they need to receive personalized support from teachers. Recently, math e-learning tools that provide skills training gained popularity. However, we know little about how well these help teachers personalize instruction for SLDs. answer this question, conducted semi-structured interviews 12 who taught SLDs grades five eight. We found participants used were not designed specifically Participants...

10.1145/3373625.3417029 article EN 2020-10-26

Record linkage allows data from different sources to be integrated facilitate mining tasks. However, in many cases, records have linked by personally identifiable information. To prevent privacy breaches, ideally should a private way such that no information other than the matching result is leaked process. In this paper, we present an exact Private Linkage (PRL) protocol and approximate PRL protocol. The based on Oblivious Bloom Intersection, which efficient set intersection extends...

10.1145/2554850.2555001 article EN 2014-03-24

As information security systems become increasingly sophisticated and reliable, humans are rapidly becoming the weakest link in pipeline. Technological countermeasures can only be deployed if depending upon them aware of how to use them, hackers beginning take advantage knowledge gap that exists this area. The recent DNC hackings during 2016 US presidential election evidence this, as staff were tricked into sharing passwords which granted access confidential by fake Google emails....

10.1145/3027063.3048412 article EN 2017-05-01

Students with specific learning disabilities (SLD) typically struggle in their K-12 math classes, limiting the likelihood of success STEM fields. Private tutoring is reported to be effective at helping them succeed math, but it not a scalable solution. While many recent e-learning tools have aimed personalizing support ways that might scalable, there remains much done. To better understand gaps between current and particular needs students SLD (and teachers), we conducted semi-structured...

10.1145/3308561.3354607 article EN 2019-10-24

Most students with specific learning disabilities (SLDs) have difficulties in reading and writing. The SLDs pre-screening is crucial because the golden period for therapy before six years old. However, many Hong Kong receive assessments after period. Also, challenging, especially a language logographic script but without prominent sound-script correspondence (e.g., Chinese, Japanese). To make Chinese more effective efficient, we designed new comprehensive game (i.e., dyslexia, dysgraphia,...

10.1145/3517428.3550384 article EN 2022-10-22

Students with specific learning disabilities (SLDs) often experience reading, writing, attention, and physical movement coordination difficulties. However, in Hong Kong, it takes years for special education needs coordinators (SENCOs) special-ed teachers to pre-screen diagnose students SLDs. Therefore, many SLDs missed the golden time interventions (i.e., before six old). In addition, although there are screening tools Chinese Indo-European languages (e.g., English Spanish), they did not...

10.1145/3517428.3550361 article EN 2022-10-22

The IDC research community has a growing interest in designing AI interfaces for children with special educational needs. Nonetheless, little explored the and design issues, rationale, challenges, opportunities this field. Therefore, we propose to host half-day workshop bring together researchers practitioners from Learning & Education, Accessibility, Intelligent User Interfaces sub-fields discuss identify existing collaboration barriers, establish consensus on of pragmatic framework, as...

10.1145/3585088.3589934 article EN 2023-06-14

Students with specific learning disabilities (SLDs) often experience negative emotions when solving math problems, which they have difficulty managing. This is one reason that current e-learning tools, elicit these emotions, are not effective for students. We designed an intelligent e-tutoring system aims to reduce students' emotional behaviors. The automatically detects possible behaviors by analyzing gaze, inputs on the touchscreen, and response time. It then uses of four intervention...

10.1145/3441852.3476568 article EN 2021-10-17

First-person shooter (FPS) game tournaments take place across the globe. A growing number of people choose to watch FPS games online instead attending events in person. However, live streaming might miss critical highlight moments game, including kills and tactics. We identify how why team fails capture reduce such mistakes. named mistakes jarring observations. conducted a field study competitions Game For Peace, popular mobile summarize five typical observations three primary reasons that...

10.1109/gem56474.2022.10017960 article EN 2022-11-27

Making the hit effect satisfy players is a long-standing problem faced by action game designers. However, no research has systematically analyzed which design elements affect such feel. There not even term to describe it. So, we proposed use impact feel player's feeling when receiving juicy feedback. After collecting comments on games from Steam's top seller list, trained natural language processing (NLP) model rank with their performance We presented 19-feature framework of feedback and...

10.1109/gem56474.2022.10017782 article EN 2022-11-27

Children with dyslexia face extra challenges in reading and writing words. They need more learning exercises than children typical development to acquire vocabulary, which is often repetitive daunting. Research has shown that combining visuospatial information practices helped memorize words, especially the real-world physical context. Nevertheless, existing word recognition spelling training games for were not able leverage children's immediate vicinity. Therefore, we designed an augmented...

10.1145/3505270.3558318 article EN 2022-11-02

Organizations started to adopt differential privacy (DP) techniques hoping persuade more users share personal data with them. However, many do not understand DP techniques, thus may be willing share. Previous research suggested that the design of mechanism communication could influence users' willingness data. Based on prior work, we propose a new pipeline starts by asking about their concerns and then provides customized communication. We also framework systemically explores effective...

10.48550/arxiv.2208.02759 preprint EN cc-by-nc-nd arXiv (Cornell University) 2022-01-01

Making the hit effect satisfy players is a long-standing problem faced by action game designers. However, no research systematically analyzed which design elements affect such feel. There not even term to describe it. So, we propose use impact feel player's feeling when receiving juicy feedback. After collecting comments on games from Steam's top seller list, trained natural language processing (NLP) model rank with their performance We presented 19-feature framework of feedback and examined...

10.48550/arxiv.2208.06155 preprint EN other-oa arXiv (Cornell University) 2022-01-01

First-person shooter (FPS) game tournaments take place across the globe. A growing number of people choose to watch FPS games online instead attending events in person. However, live streaming might miss critical highlight moments game, including kills and tactics. We identify how why team fails capture reduce such mistakes. named mistakes jarring observations. conducted a field study competitions Game For Peace, popular mobile summarize five typical observations three primary reasons that...

10.48550/arxiv.2208.07529 preprint EN other-oa arXiv (Cornell University) 2022-01-01
Coming Soon ...