Phoebe Moh

ORCID: 0000-0003-1812-0783
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Image and Video Quality Assessment
  • Data Visualization and Analytics
  • Privacy, Security, and Data Protection
  • Video Analysis and Summarization
  • Cancer-related gene regulation
  • Internet Traffic Analysis and Secure E-voting
  • Acute Lymphoblastic Leukemia research
  • Ethics in Clinical Research
  • Privacy-Preserving Technologies in Data
  • Advanced Malware Detection Techniques
  • Neuroblastoma Research and Treatments
  • Childhood Cancer Survivors' Quality of Life

University of Maryland, College Park
2021-2024

Broad Institute
2021

The University of Texas MD Anderson Cancer Center
2019

PRMT5 is an arginine methyltransferase that accounts for the vast majority of symmetric methylation in cells. exerts its function when complexed with MEP50/WDR77. This activity often elevated cancer cells and correlates poor prognosis, making a therapeutic target. To investigate signaling pathway to identify genes whose loss-of-function sensitizes inhibition, we performed CRISPR/Cas9 genetic screen presence inhibitor. We identified known components writer/reader including itself,...

10.1093/nar/gkz200 article EN cc-by-nc Nucleic Acids Research 2019-03-16

Although we have seen a proliferation of algorithms for recommending visualizations, these are rarely compared with one another, making it difficult to ascertain which algorithm is best given visual analysis scenario. Though several formal frameworks been proposed in response, believe this issue persists because visualization recommendation inadequately specified from an evaluation perspective. In paper, propose evaluation-focused framework contextualize and compare broad range algorithms....

10.1109/tvcg.2021.3114814 article EN IEEE Transactions on Visualization and Computer Graphics 2021-09-29

Exploration of Internet Things (IoT) security often focuses on threats posed by external and technically-skilled attackers. While it is important to understand these most extreme cases, equally the likely risks harm smart device ownership. In this paper, we explore how devices are misused — used without permission in a manner that causes owners' everyday associates such as friends, family, romantic partners. preliminary characterization survey (n = 100), broadly capture kinds unauthorized...

10.1109/sp46215.2023.10179476 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2023-05-01

The landscape of digital privacy risks faced by individuals seeking abortions has grown increasingly complex following the overturn Roe v. Wade. Reproductive healthcare providers are uniquely positioned to offer critical guidance. We conducted interviews with 22 reproductive across U.S. explore their perceptions threats for abortion-seeking patients and types guidance they provide. Our findings show that most concerned about vulnerable patients—minors, gender-affirming care, those in abusive...

10.1145/3704634 article EN ACM Transactions on Computer-Human Interaction 2024-11-18

Although we have seen a proliferation of algorithms for recommending visualizations, these are rarely compared with one another, making it difficult to ascertain which algorithm is best given visual analysis scenario. Though several formal frameworks been proposed in response, believe this issue persists because visualization recommendation inadequately specified from an evaluation perspective. In paper, propose evaluation-focused framework contextualize and compare broad range algorithms....

10.48550/arxiv.2109.02706 preprint EN other-oa arXiv (Cornell University) 2021-01-01
Coming Soon ...