Heng Xu

Orcid: 0000-0002-9422-7438

According to our database1, Heng Xu authored at least 146 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Machine Unlearning: A Survey.
ACM Comput. Surv., January, 2024

2023
Causality Network of Infectious Disease Revealed With Causal Decomposition.
IEEE J. Biomed. Health Informatics, July, 2023

Impact Study of Layout-Dependent Effects Toward FinFET Combinational Standard Cell Optimization.
IEEE Trans. Circuits Syst. II Express Briefs, February, 2023

Skin lesion classification based on the VGG-16 fusion residual structure.
Int. J. Imaging Syst. Technol., January, 2023

A Novel Approach for Radar Passive Jamming Based on Multiphase Coding Rapid Modulation.
IEEE Trans. Geosci. Remote. Sens., 2023

Neuro-Modulated Hebbian Learning for Fully Test-Time Adaptation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
From Contextualizing to Context Theorizing: Assessing Context Effects in Privacy Research.
Manag. Sci., 2022

Implications of Data Anonymization on the Statistical Evidence of Disparity.
Manag. Sci., 2022

Modelling offline expansion strategies of online companies.
Kybernetes, 2022

Government subsidy, asymmetric information and green innovation.
Kybernetes, 2022

An efficient malicious webpage static detection framework based on optimized Bayesian and hybrid machine learning.
Concurr. Comput. Pract. Exp., 2022

Unsupervised Domain Adaptation via bidirectional generation and middle domains alignment.
Comput. Electr. Eng., 2022

Unsupervised Domain Adaptation through high-order tensor matching with discriminative manifold learning.
Comput. Electr. Eng., 2022

Chinese Tourists in Malaysia: An Analysis of Spatio-Temporal Behavior Based on Tourism Digital Footprints.
IEEE Access, 2022

SIA-Net: Scalable Interaction-Aware Network for Vehicle Trajectory Prediction Based on Self-Attention.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

2021
Reconciling the Paradoxical Findings of Choice Overload Through an Analytical Lens.
MIS Q., December, 2021

Statistical Temperature Coefficient Distribution in Analog RRAM Array: Impact on Neuromorphic System and Mitigation Method.
CoRR, 2021

MMWD: An efficient mobile malicious webpage detection framework based on deep learning and edge cloud.
Concurr. Comput. Pract. Exp., 2021

Sentiment Analysis of Autonomous Vehicles After Extreme Events Using Social Media Data.
Proceedings of the 24th IEEE International Intelligent Transportation Systems Conference, 2021

Constant Fluidic Mass Control for Soft Actuators Using Artificial Neural Network Algorithm.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2021

An Efficient Redundancy Control and Load Balancing Scheme for Cloud Storage.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

HRSE: A novel high-speed random sampling encryption scheme on big data.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

2020
How the Mechanical Properties and Thickness of Glass Affect TPaD Performance.
IEEE Trans. Haptics, 2020

Localizable Button Click Rendering via Active Lateral Force Feedback.
IEEE Trans. Haptics, 2020

Why Individual Employees Commit Malicious Computer Abuse: A Routine Activity Theory Perspective.
J. Assoc. Inf. Syst., 2020

Cramér-Rao lower bound analysis of RSS/TDoA joint localization algorithms based on rigid graph theory.
Ad Hoc Networks, 2020

Fad, Fashion or Classic? Fashion Life Cycle Forecasting with Instagram.
Proceedings of the 41st International Conference on Information Systems, 2020

SwitchPaD: Active Lateral Force Feedback over a Large Area Based on Switching Resonant Modes.
Proceedings of the Haptics: Science, Technology, Applications, 2020

2019
UltraShiver: Lateral Force Feedback on a Bare Fingertip via Ultrasonic Oscillation and Electroadhesion.
IEEE Trans. Haptics, 2019

Data Governance, Consumer Privacy, and Project Status Reporting: Remembering H. Jeff Smith.
Inf. Syst. Frontiers, 2019

An improved MDS localisation algorithm for a WSN in a sub-surface mine.
Int. J. Sens. Networks, 2019

A novel radio map construction method with reduced human efforts for Wi-Fi localisation system.
Int. J. Sens. Networks, 2019

A Promising Method for Touch-typing Keyboard Rendering.
CoRR, 2019

Protecting Privacy on Social Media: Is Consumer Privacy Self-Management Sufficient?
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Localized Rendering of Button Click Sensation via Active Lateral Force Feedback.
Proceedings of the 2019 IEEE World Haptics Conference, 2019

LS-SVM Based Two Step Commercial Short-Term Load Prediction.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

2018
An Optimization Routing Algorithm for Green Communication in Underground Mines.
Sensors, 2018

When SNS Privacy Settings Become Granular: Investigating Users' Choices, Rationales, and Influences on Their Social Experience.
Proc. ACM Hum. Comput. Interact., 2018

My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Integrating Topic Information into VAE for Text Semantic Similarity.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Your Privacy Is Your Friend's Privacy: Examining Interdependent Information Disclosure on Online Social Networks.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Extracting Conflict Models from Interaction Traces in Virtual Collaborative Work.
Proceedings of the Advances in Conceptual Modeling, 2018

A Matter of Control or Safety?: Examining Parental Use of Technical Monitoring Apps on Teens' Mobile Devices.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Confidence Levels for Empirical Research Using Twitter Data.
Proceedings of the Technology, Mind, and Society Conference, 2018

2017
Most Teens Bounce Back: Using Diary Methods to Examine How Quickly Teens Recover from Episodic Online Risk Exposure.
Proc. ACM Hum. Comput. Interact., 2017

An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: a scenario-based experiment.
Inf. Technol. Dev., 2017

Resolving the privacy paradox: Toward a cognitive appraisal and emotion approach to online privacy behaviors.
Inf. Manag., 2017

Examining the intended and unintended consequences of organisational privacy safeguards.
Eur. J. Inf. Syst., 2017

Privacy concerns for mobile app download: An elaboration likelihood model perspective.
Decis. Support Syst., 2017

How Are Social Capital and Parental Mediation Associated with Cyberbullying and Cybervictimization Among Youth in the United States?
Proceedings of the HCI International 2017 - Posters' Extended Abstracts, 2017

Parents Just Don't Understand: Why Teens Don't Talk to Parents about Their Online Risk Experiences.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety?
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

Examining Parents' Technical Mediation of Teens' Mobile Devices.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

Adolescent Online Safety: Moving Beyond Formative Evaluations to Designing Solutions for the Future.
Proceedings of the 2017 Conference on Interaction Design and Children, 2017

2016
The boundaries between: Parental involvement in a teen's online world.
J. Assoc. Inf. Sci. Technol., 2016

Quantifying Different Tactile Sensations Evoked by Cutaneous Electrical Stimulation Using Electroencephalography Features.
Int. J. Neural Syst., 2016

Performance analysis of delayed mobile data offloading with multi-level priority.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

Simultaneous information and energy transfer in large-scale cellular networks with sleep mode.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Privacy Nudges for Mobile Applications: Effects on the Creepiness Emotion and Privacy Attitudes.
Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, 2016

Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Autonomous and Interdependent: Collaborative Privacy Management on Social Networking Sites.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Argument Detection in Online Discussion: A Theory Based Approach.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Big Data in Fashion Industry: Color Cycle Mining from Runway Data.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Facebook apps and tagging: The trade-off between personal privacy and engaging with friends.
J. Assoc. Inf. Sci. Technol., 2015

The role of information systems research in shaping the future of information privacy.
Inf. Syst. J., 2015

Designing for privacy management in hospitals: Understanding the gap between user activities and IT staff's understandings.
Int. J. Medical Informatics, 2015

Styles in the Fashion Social Network: An Analysis on Lookbook.nu.
Proceedings of the Social Computing, Behavioral-Cultural Modeling, and Prediction, 2015

Exploring the effect of permission notice on users' initial trust to an application store: The case of China's Android application market.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Measuring Individuals' Concerns over Collective Privacy on Social Networking Sites.
Proceedings of the International Conference on Information Systems, 2015

Providing Slip Feedback for Closed-Loop Control of Myoelectric Prosthesis via Electrotactile Stimulation.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

Text-Generated Fashion Influence Model: An Empirical Study on Style.com.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Interaction Effects of Contextual Cues on Privacy Concerns: The Case of Android Applications.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

"Preventative" vs. "Reactive": How Parental Mediation Influences Teens' Social Media Privacy Behaviors.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Risk-taking as a Learning Process for Shaping Teen's Online Information Privacy Behaviors.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Privacy-aware electronic society.
Ann. des Télécommunications, 2014

Privacy in the Age of Big Data: The Challenges and Opportunities for Privacy Research.
Proceedings of the International Conference on Information Systems, 2014

Adolescent online safety: the "moral" of the story.
Proceedings of the Computer Supported Cooperative Work, 2014

Designing the default privacy settings for facebook applications.
Proceedings of the Computer Supported Cooperative Work, 2014

Privacy practices in collaborative environments: a study of emergency department staff.
Proceedings of the Computer Supported Cooperative Work, 2014

Understanding user adaptation strategies for the launching of facebook timeline.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts.
Eur. J. Inf. Syst., 2013

Is this app safe for children?: a comparison study of maturity ratings on Android and iOS applications.
Proceedings of the 22nd International World Wide Web Conference, 2013

Children's Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Effects of Fear appeals and point of reference on the persuasiveness of IT security communications.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

An online experiment of privacy authorization dialogues for social applications.
Proceedings of the Computer Supported Cooperative Work, 2013

Privacy management in dynamic groups: understanding information privacy in medical practices.
Proceedings of the Computer Supported Cooperative Work, 2013

Using contextual integrity to examine interpersonal information boundary on social network sites.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Grand Challenges of Researching Adolescent Online Safety: A Family Systems Approach.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services.
Inf. Syst. Res., 2012

E-commerce intelligence development and research in the Greater China Region.
Electron. Mark., 2012

The security-liberty balance: individuals' attitudes towards internet government surveillance.
Electron. Gov. an Int. J., 2012

A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers.
Decis. Support Syst., 2012

Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy Concerns.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Detecting Offensive Language in Social Media to Protect Adolescent Online Safety.
Proceedings of the 2012 International Conference on Privacy, 2012

Privacy by ReDesign: Alleviating Privacy Concerns for Third-Party Apps.
Proceedings of the International Conference on Information Systems, 2012

Measuring Mobile Users' Concerns for Information Privacy.
Proceedings of the International Conference on Information Systems, 2012

Beyond the Individual Privacy Paradigm: Implications for Interpersonal Interactions on Facebook.
Proceedings of the 25th Bled eConference: eTrust: eDependability: Reliable and Trustworthy eStructures, 2012

See Friendship: Interpersonal Privacy Management in a Collective World.
Proceedings of the 18th Americas Conference on Information Systems, 2012

Who will be your next friend: the bonding role of linkage influence in social networks.
Proceedings of the Fourteenth International Conference on Electronic Commerce, 2012

2011
Introduction to special issue on information privacy and trust in social media.
EAI Endorsed Trans. Security Safety, 2011

Trust in social computing. The case of peer-to-peer file sharing networks.
EAI Endorsed Trans. Security Safety, 2011

Information Privacy Research: An Interdisciplinary Review.
MIS Q., 2011

CoPE: Enabling collaborative privacy management in online social networks.
J. Assoc. Inf. Sci. Technol., 2011

Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances.
J. Assoc. Inf. Syst., 2011

Balancing privacy concerns in the adoption of Location-Based Services: an empirical analysis.
Int. J. Electron. Bus., 2011

The influence of product integration on online advertising effectiveness.
Electron. Commer. Res. Appl., 2011

The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing.
Decis. Support Syst., 2011

The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors.
Decis. Support Syst., 2011

Open source software adoption: motivations of adopters and amotivations of non-adopters.
Data Base, 2011

Informing security indicator design in web browsers.
Proceedings of the iConference 2011, 2011

Understanding the Drivers and Outcomes of Healthcare Organizational Privacy Responses.
Proceedings of the International Conference on Information Systems, 2011

Healthcare Information Privacy Research: Iusses, Gaps and What Next?
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

Ethics and Privacy Considerations for Systems Biology Applications in Predictive and Personalized Medicine.
Proceedings of the Handbook of Research on Computational and Systems Biology, 2011

2010
The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services.
J. Manag. Inf. Syst., 2010

Understanding Situational Online Information Disclosure as a Privacy Calculus.
J. Comput. Inf. Syst., 2010

An investigation of the word-processing software market war in South Korea: A game-theoretic approach.
Inf. Manag., 2010

Online auction: the effects of transaction probability and listing price on a seller's decision-making behavior.
Electron. Mark., 2010

Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry.
Electron. Commer. Res. Appl., 2010

Information Disclosure and Online Social Networks: From the Case of Facebook News Feed Controversy to a Theoretical Understanding.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

COP: A Step toward Children Online Privacy.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Perceived effectiveness of text vs. multimedia Location-Based Advertising messaging.
Int. J. Mob. Commun., 2009

Consumer Responses to the Introduction of Privacy Protection Measures: An Exploratory Research Framework.
Int. J. E Bus. Res., 2009

The effects of privacy concerns and personal innovativeness on potential and experienced customers' adoption of location-based services.
Electron. Mark., 2009

Privacy protection for RFID data.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Regulating Privacy in Wireless Advertising Messaging: FIPP Compliance by Policy vs. by Design.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Trust in the Social Computing: The Case of Peer-to-Peer (P2P) File Sharing Networks.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Alleviating Parental Concerns for Children's Online Privacy: A Value Sensitive Design Investigation.
Proceedings of the International Conference on Information Systems, 2008

Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View.
Proceedings of the International Conference on Information Systems, 2008

Mobile User's Privacy Decision Making: Integrating Economic Exchange and Social Justice Perspectives.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Lesbian, gay, bisexual and transgender (LGBT) issues in virtual worlds.
Data Base, 2007

The Effects of Self-Construal and Perceived Control on Privacy Concerns.
Proceedings of the International Conference on Information Systems, 2007

2006
Information Privacy in the Digital Era: An Exploratory Research Framework.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Partitioned Cache Shadowing for Deep Sub-Micron (DSM) Regime.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Comparative Analysis of Scheduling Algorithms in Ad Hoc Mobile Networking.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Privacy Considerations in Location-Based Advertising.
Proceedings of the Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges, 2005

Predicting the Adoption of Location-Based Services: The Role of Trust and Perceived Privacy Risk.
Proceedings of the International Conference on Information Systems, 2005

Predicting the Usage of P2P Sharing Software: The Role of Trust and Perceived Risk.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Consumers' Privacy Concerns toward Using Location-Based Services: An Exploratory Framework and Research Proposal.
Proceedings of the 13th European Conference on Information Systems, 2005

2004
Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective.
Proceedings of the International Conference on Information Systems, 2004

2003
Effects of Multimedia on Mobile Consumer Behavior: An Empirical Study of Location-Aware Advertising.
Proceedings of the International Conference on Information Systems, 2003

Foundations of SMS Commerce Success: Lessons from SMS Messaging and Co-Opetition.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2002
Adaptive congestion control in infrastructure wireless LANs with bounded medium access delay.
Proceedings of the International Mobility and Wireless Access Workshop, 2002

Hybrid MR/near infrared imaging of the murine brain: optimization of optical fiber arrangement and use of a-priori knowledge.
Proceedings of the 2002 IEEE International Symposium on Biomedical Imaging, 2002

Critical Success Factors for Web-Based Organizational IT Training Systems.
Proceedings of the Advances in Web-Based Learning, First International Conference, 2002


  Loading...