Alice Leung

According to our database1, Alice Leung authored at least 23 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Language Models are Alignable Decision-Makers: Dataset and Application to the Medical Triage Domain.
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: Industry Track, 2024

2023
Groups, governance, and greed: the ACCESS world model.
Comput. Math. Organ. Theory, March, 2023

2021
Using alternate reality games to find a needle in a haystack: An approach for testing insider threat detection methods.
Comput. Secur., 2021

2018
Detecting Betrayers in Online Environments Using Active Indicators.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2018

2015
A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical System.
ACM Trans. Knowl. Discov. Data, 2015

2014
Exploiting Frequency Groups for Broadcasting in Multi-channel Multi-radio Networks.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Poster abstract: information-maximizing data collection in social sensing using named-data.
Proceedings of the IPSN'14, 2014

The Information Funnel: Exploiting Named Data for Information-Maximizing Data Collection.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

Data Selection for Maximum Coverage in Sensor Networks with Cost Constraints.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

2013
A framework of traveling companion discovery on trajectory data streams.
ACM Trans. Intell. Syst. Technol., 2013

Trustworthiness analysis of sensor data in cyber-physical systems.
J. Comput. Syst. Sci., 2013

Social patterns: Community detection using behavior-generated network datasets.
Proceedings of the 2nd IEEE Network Science Workshop, 2013

Information-maximizing caching in Ad Hoc networks with named data networking.
Proceedings of the 2nd IEEE Network Science Workshop, 2013

Caching for Non-independent Content: Improving Information Gathering in Constrained Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

2012
Multidimensional Sensor Data Analysis in Cyber-Physical System: An Atypical Cube Approach.
Int. J. Distributed Sens. Networks, 2012

IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

On Discovery of Traveling Companions from Streaming Trajectories.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Tweet Ranking Based on Heterogeneous Networks.
Proceedings of the COLING 2012, 2012

2010
Project Halo Update - Progress Toward Digital Aristotle.
AI Mag., 2010

Spectrum Curricula: Design and Initial Results.
Proceedings of the Enabling Intelligence through Middleware, 2010

2006
An Abstraction Framework for Cooperation Among Agents and People in a Virtual World.
Proceedings of the Second Artificial Intelligence and Interactive Digital Entertainment Conference, 2006

2005
Simulating scenarios for research on culture & cognition using a commercial role-play game.
Proceedings of the 37th Winter Simulation Conference, Orlando, FL, USA, December 4-7, 2005, 2005


  Loading...