Publications

Please follow our publications on Mendeley.

Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, and Kevin Fu. November 2019. Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. Retrieved from https://lightcommands.com/20191104-Light-Commands.pdf

Timothy J. Pierson, Travis Peters, Ronald Peterson, and David Kotz. October 2019. Proximity Detection with Single-Antenna IoT Devices. In ACM International Conference on Mobile Computing and Networking (MobiCom), 1–15. DOI: 10.1145/3300061.3300120

Sung J. Choi, M. Eric Johnson, and Christoph U. Lehmann. September 2019. Data breach remediation efforts and their implications for hospital quality. Health Services Research 54, 5 (September 2019), 971–980. DOI: 10.1111/1475-6773.13203

Tuo Yu and Klara Nahrstedt. September 2019. ShoesHacker: Indoor Corridor Map and User Location Leakage through Force Sensors in Smart Shoes. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3 (September 2019). DOI: 10.1145/3351278

Bo Chen, Zhisheng Yan, Haiming Jin, and Klara Nahrstedt. June 2019. Event-driven stitching for tile-based live 360 video streaming. In ACM Multimedia Systems Conference (MMSys ’19), 1–12. DOI: 10.1145/3304109.3306234

Timothy J. Pierson, Travis Peters, Ronald Peterson, and David Kotz. June 2019. CloseTalker: Secure, Short-Range Ad Hoc Wireless Communication. In ACM International Conference on Mobile Systems, Applications, and Services (MobiSys ’19), 340–352. DOI: 10.1145/3307334.3326100

Andrew Kwong, Wenyuan Xu, and Kevin Fu. May 2019. Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone. In IEEE Symposium on Security and Privacy. Retrieved from https://www.computer.org/csdl/proceedings-article/sp/2019/666000a125/19skffuAOaI

Tuo Yu, Haiming Jin, and Klara Nahrstedt. April 2019. Mobile devices based eavesdropping of handwriting. IEEE Transactions on Mobile Computing (April 2019), 1–1. DOI: 10.1109/TMC.2019.2912747

Joe Carlson. March 2019. 750,000 Medtronic Defibrillators Vulnerable to Hacking. Retrieved from http://m.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/

Bo Chen and Klara Nahrstedt. March 2019. FIS: Facial Information Segmentation for Video Redaction. In IEEE Conference on Multimedia Information Processing and Retrieval (MIPR). DOI: 10.1109/MIPR.2019.00071

Tuo Yu, Haiming Jin, and Klara Nahrstedt. March 2019. ShoesLoc: In-shoe force sensor-based indoor walking path tracking. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 1 (March 2019). DOI: 10.1145/3314418

Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, and David Kotz. February 2019. Continuous Smartphone Authentication using Wristbands. In Proceedings 2019 Workshop on Usable Security. DOI: 10.14722/usec.2019.23013

Lanier Watkins, Shreya Aggarwal, Omotola Akeredolu, William H Robinson, and Aviel Rubin. February 2019. Tattle Tale Security: An Intrusion Detection System for Medical Body Area Networks (MBAN). In Workshop on Decentralized IoT Systems and Security (DISS). DOI: 10.14722/diss.2019.23003

Sung J. Choi and M. Eric Johnson. January 2019. Understanding the relationship between data breaches and hospital advertising expenditures. The American Journal of Managed Care 25, 1 (January 2019), e14–e20. Retrieved from https://www.ajmc.com/journals/issue/2019/2019-vol25-n1/understanding-the-relationship-between-data-breaches-and-hospital-advertising-expenditures

Chen Yan, Kevin Fu, and Wenyuan Xu. January 2019. On Cuba, diplomats, ultrasound, and intermodulation distortion. Computers in Biology and Medicine 104, (January 2019), 250–266. DOI: 10.1016/j.compbiomed.2018.11.012

Juhee Kwon and M. Eric Johnson. December 2018. Meaningful healthcare security: does meaningful-use attestation improve information security performance? MIS Quarterly 42, 4 (December 2018), 1043–1067. DOI: 10.25300/MISQ/2018/13580

Bo Chen, Klara Nahrstedt, and Carl A. Gunter. November 2018. ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System. In EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous ’18), 39–48. DOI: 10.1145/3286978.3286990

Tuo Yu, Haiming Jin, Wai-Tian Tan, and Klara Nahrstedt. November 2018. SKEPRID: Pose and illumination change-resistant skeleton-based person re-identification. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) – Special Section on Deep Learning for Intelligent Multimedia Analytics 14, 4 (November 2018). DOI: 10.1145/3243217

Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, and Nikita Borisov. October 2018. Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations. In ACM SIGSAC Conference on Computer and Communications Security (CCS), 619–633. DOI: 10.1145/3243734.3243834

Shubhra Kanti Karmaker Santu, Vincent Bindschadler, ChengXiang Zhai, and Carl A. Gunter. October 2018. NRF: A Naive Re-identification Framework. In ACM Workshop on Privacy in the Electronic Society (WPES ’18), 121–132. DOI: 10.1145/3267323.3268948

Timothy J Pierson, Travis Peters, Ronald Peterson, and David Kotz. October 2018. Poster: Proximity Detection with Single-Antenna IoT Devices. In International Conference on Mobile Computing and Networking (MobiCom), 663–665. DOI: 10.1145/3241539.3267751

Sougata Sen, Archan Misra, Vigneshwaran Subbaraju, Karan Grover, Meera Radhakrishnan, Rajesh K. Balan, and Youngki Lee. October 2018. I4S: capturing shopper’s in-store interactions. In ACM International Symposium on Wearable Computers – ISWC ’18, 156–159. DOI: 10.1145/3267242.3267259

Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, and David Kotz. September 2018. SAW: Wristband-based authentication for desktop computers. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (Ubicomp) 2, 3 (September 2018), Article No. 125. DOI: 10.1145/3264935

David J. Slotwiner, Thomas F. Deering, Kevin Fu, Andrea M. Russo, Mary N. Walsh, and George F. Van Hare. July 2018. Cybersecurity vulnerabilities of cardiac implantable electronic devices: communication strategies for clinicians. Heart Rhythm 15, 7 (July 2018), e61–e67. DOI: 10.1016/j.hrthm.2018.05.001

Travis Peters, Reshma Lal, Srikanth Varadarajan, Pradeep Pappachan, and David Kotz. June 2018. BASTION-SGX: Bluetooth and Architectural Support for Trusted I/O on SGX. In International Workshop on Hardware and Architectural Support for Security and Privacy (HASP), Article No. 3. DOI: 10.1145/3214292.3214295

Timothy J Pierson. June 2018. Secure Short-range Communications. Dartmouth Computer Science. Retrieved from http://www.cs.dartmouth.edu/reports/abstracts/TR2018-845/

Aston Zhang, Xun Lu, Carl A. Gunter, Shuochao Yao, Fangbo Tao, Rongda Zhu, Huan Gui, Daniel Fabbri, David Liebovitz, and Bradley Malin. June 2018. De facto diagnosis specialties: recognition and discovery. Learning Health Systems 2, 3 (June 2018). DOI: 10.1002/lrh2.10057

Connor Bolton, Sara Rampazzi, Chaohao Li, Andrew Kwong, Wenyuan Xu, and Kevin Fu. May 2018. Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems. In IEEE Symposium on Security and Privacy (SP), 1048–1062. DOI: 10.1109/SP.2018.00050

A. J. Burns and Eric Johnson. May 2018. The evolving threat to privacy: analyzing breach data to understand the cyberthreat vector. IT Professional 20, 3 (May 2018), 64–72. DOI: 10.1109/MITP.2018.032501749

Xiaohui Liang, Ronald Peterson, and David Kotz. May 2018. Securely connecting wearables to ambient displays with user intent. IEEE Transactions on Dependable and Secure Computing (May 2018), 1. DOI: 10.1109/TDSC.2018.2840979

Andrés Molina-Markham, Shrirang Mare, Ronald Peterson Jr., and David Kotz. May 2018. Continuous Seamless Mobile Device Authentication Using a Separate Electronic Wearable Apparatus. Retrieved from https://www.cs.dartmouth.edu/~dfk/papers/molina-markham-patent9961547.pdf

Soteris Demetriou. April 2018. Analyzing & designing the security of shared resources on smartphone operating systems. University of Illinois at Urbana-Champaign. Retrieved from https://www.ideals.illinois.edu/handle/2142/100907

Soteris Demetriou, Nathaniel D. Kaufman, Jonah Baim, Adam J. Goldsher, and Carl A. Gunter. April 2018. Toward an Extensible Framework for Redaction. In Workshop on Security and Privacy for the Internet-of-Things (IoTSec). Retrieved from http://seclab.illinois.edu/wp-content/uploads/2018/06/demetriou2018toward.pdf

Karan Ganju. April 2018. Inferring properties of neural networks with intelligent designs. University of Illinois at Urbana-Champaign. Retrieved from http://seclab.illinois.edu/wp-content/uploads/2018/06/ganju2018inferring.pdf

Paul D. Martin, David Russell, Aviel D. Rubin, Stephen Checkoway, and Malek Ben Salem. April 2018. Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems. In IEEE/ACM International Conference on Internet-of-Things Design and Implementation (IoTDI). DOI: 10.1109/IoTDI.2018.00020

Wei Yang. April 2018. Adversarial-resilience assurance for mobile security systems. University of Illinois at Urbana-Champaign. Retrieved from http://seclab.illinois.edu/wp-content/uploads/2018/06/yang2018adversarial.pdf

Tuo Yu, Haiming Jin, and Klara Nahrstedt. April 2018. Audio Based Handwriting Input for Tiny Mobile Devices. In IEEE Conference on Multimedia Information Processing and Retrieval (MIPR). DOI: 10.1109/MIPR.2018.00030

Rui Liu, Cory Cornelius, Reza Rawassizadeh, Ron Peterson, and David Kotz. March 2018. Vocal resonance: using internal body voice for wearable authentication. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (UbiComp) 2, 1 (March 2018), Article No. 19. DOI: 10.1145/3191751

Reza Rawassizadeh, Timothy Pierson, Ronald Peterson, and David Kotz. March 2018. NoCloud: exploring network disconnection through on-device data analysis. IEEE Pervasive Computing 17, 1 (March 2018), 64–74. DOI: 10.1109/MPRV.2018.011591063

Michael L. Rinke, Hardeep Singh, Moonseong Heo, Jason S. Adelman, Heather C. O’Donnell, Steven J. Choi, Amanda Norton, Ruth E. K. Stein, Tammy M. Brady, Christoph U. Lehmann, Steven W. Kairys, Elizabeth Rice-Conboy, Keri Thiessen, and David G. Bundy. March 2018. Diagnostic errors in primary care pediatrics: Project RedDE. Academic Pediatrics 18, 2 (March 2018), 220–227. DOI: 10.1016/j.acap.2017.08.005

Joseph Carrigan, David Kotz, and Aviel Rubin. February 2018. STEM Outreach Activity with Fitbit Wearable Devices. Dartmouth College. Retrieved from http://www.cs.dartmouth.edu/~trdata/reports/TR2018-839.pdf

Kevin Fu and Wenyuan Xu. February 2018. Inside risks: risks of trusting the physics of sensors. Communications of the ACM 61, 2 (February 2018), 20–23. DOI: 10.1145/3176402

Güliz Seray Tuncay, Soteris Demetriou, Karan Ganju, and Carl A. Gunter. February 2018. Resolving the Predicament of Android Custom Permissions. In Network and Distributed System Security Symposium (NDSS ’18). DOI: 10.14722/ndss.2018.23210

Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl A. Gunter. February 2018. Fear and Logging in the Internet of Things. In Network and Distributed System Security Symposium (NDSS ’18). DOI: 10.14722/ndss.2018.23282

Daniel B. Kramer and Kevin Fu. December 2017. Cybersecurity concerns and medical devices: lessons from a pacemaker advisory. Journal of the American Medical Association (JAMA) (December 2017), 2077–2078. DOI: 10.1001/jama.2017.15692

Yunhui Long, Vincent Bindschaedler, and Carl A. Gunter. December 2017. Towards Measuring Membership Privacy. University of Illinois at Urbana-Champaign. Retrieved from http://seclab.illinois.edu/wp-content/uploads/2017/12/long2017towards.pdf

David Kotz and Travis Peters. November 2017. Challenges to Ensuring Human Safety Throughout the Life-cycle of Smart Environments. In ACM Workshop on the Internet of Safe Things (SafeThings), 1–7. DOI: 10.1145/3137003.3137012

Shrirang Mare, Andrés Molina-Markham, Ronald Peterson, and David Kotz. November 2017. System, Method and Authorization Device for Biometric Access Control to Digital Devices. Retrieved from http://www.cs.dartmouth.edu/~dfk/papers/mare-patent9832206.pdf

Aarathi Prasad, Xiaohui Liang, and David Kotz. November 2017. SPICE: Secure Proximity-based Infrastructure for Close Encounters. In ACM Workshop on Mobile Crowdsensing Systems and Applications (CrowdSenSys), 56–61. DOI: 10.1145/3139243.3139245

Tarek Elgamal, Bo Chen, and Klara Nahrstedt. October 2017. Teleconsultant: Communication and Analysis of Wearable Videos in Emergency Medical Environments. In ACM International Conference on Multimedia (MM ’17), 1241–1242. DOI: 10.1145/3123266.3127920

Timothy J Pierson, Reza Rawassizadeh, Ronald Peterson, and David Kotz. October 2017. Secure Information Transfer Between Nearby Wireless Devices. In ACM Workshop on Wireless of the Students, by the Students, and for the Students (S3), 11–13. DOI: 10.1145/3131348.3131355

Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, and Carl A. Gunter. October 2017. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. In ACM Computer and Communications Security (CCS ’17), 2421–2434. DOI: 10.1145/3133956.3134038

John Poikonen, Edward Fotsch, and Christoph U. Lehmann. September 2017. Response to Lapkoff and Sittig – Who watches the watchers: working towards safety for clinical decision support knowledge resources. Applied Clinical Informatics 8, 3 (September 2017), 945–948. DOI: 10.4338/ACI2017050081

Reinhold Haux, Antoine Geissbuhler, Justice Holmes, Marie-Christine Jaulent, Sabine Koch, Casimir A. Kulikowski, Christoph U. Lehmann, Alexa T. McCray, Brigitte Séroussi, Lina Fatima Soualmia, and Jan H. van Bemmel. August 2017. On contributing to the progress of medical informatics as publisher. Yearbook of Medical Informatics 26, 01 (August 2017), 9–15. DOI: 10.15265/iy-2017-003

Christopher U. Lehmann, Hyeoun-Ae Park, Edward H. Shortliffe, and Patrice Degoulet. August 2017. The international academy of health sciences informatics: an academy of excellence. Yearbook of Medical Informatics 26, 01 (August 2017), 7–8. DOI: 10.15265/IY-2016-015

Stephane M. Meystre, Christian Lovis, T Bürkle, Gabriella Tognola, Andrius Budrionis, and Christoph U. Lehmann. August 2017. Clinical data reuse or secondary use: current status and potential future progress. Yearbook of Medical Informatics 26, 01 (August 2017), 38–52. DOI: 10.15265/iy-2017-007

Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiaoyong Zhou, and Michael Grace. July 2017. HanGuard: SDN-driven Protection of Smart Home WiFi Devices from Malicious Mobile Apps. In ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’17), 122–133. DOI: 10.1145/3098243.3098251

Haiming Jin, Lu Su, and Klara Nahrstedt. July 2017. Theseus: Incentivizing Truth Discovery in Mobile Crowd Sensing Systems. In ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc ’17), Article No. 1. DOI: 10.1145/3084041.3084063

Sung Choi and M. Eric Johnson. June 2017. Do Hospital Data Breaches Reduce Patient Care Quality? In Workshop on the Economics of Information Security. Retrieved from https://arxiv.org/pdf/1904.02058.pdf

Kevin Fu and Harold Thimbleby. June 2017. Ransomware: How We Can Climb Out of This Mess. Retrieved from https://www.healthcareitnews.com/blog/ransomware-how-we-can-climb-out-mess

Xiaohui Liang and David Kotz. June 2017. AuthoRing: Wearable User-presence Authentication. In ACM Workshop on Wearable Systems and Applications (WearSys), 5–10. DOI: 10.1145/3089351.3089357

Rui Liu, Cory Cornelius, Reza Rawassizadeh, Ron Peterson, and David Kotz. June 2017. Poster: Vocal Resonance as a Passive Biometric. In International Conference on Mobile Systems, Applications, and Services (MobiSys), 160. DOI: 10.1145/3081333.3089304

Rui Liu, Reza Rawassizadeh, and David Kotz. June 2017. Toward Accurate and Efficient Feature Selection for Speaker Recognition on Wearables. In ACM Workshop on Wearable Systems and Applications (WearSys), 41–46. DOI: 10.1145/3089351.3089352

Aarathi Prasad and David Kotz. June 2017. ENACT: Encounter-based Architecture for Contact Tracing. In International Workshop on Physical Analytics (WPA ’17), 37–42. DOI: 10.1145/3092305.3092310

Haiming Jin, Lu Su, and Klara Nahrstedt. May 2017. CENTURION: Incentivizing Multi-Requester Mobile Crowd Sensing. In IEEE Conference on Computer Communications (INFOCOM). DOI: 10.1109/INFOCOM.2017.8057111

Christoph U Lehmann, Susan Kressly, Winston W Hart, Kevin B Johnson, and Mark E Frisse. May 2017. Barriers to pediatric health information exchange. Pediatrics 139, 5 (May 2017). DOI: 10.1542/peds.2016-2653

Xiaohui Liang, Tianlong Yun, Ronald Peterson, and David Kotz. May 2017. LightTouch: Securely Connecting Wearables to Ambient Displays with User Intent. In IEEE International Conference on Computer Communications (INFOCOM). DOI: 10.1109/INFOCOM.2017.8057210

Travis W. Peters. May 2017. A Survey of Trustworthy Computing on Mobile & Wearable Systems. Dartmouth College. Retrieved from http://www.cs.dartmouth.edu/reports/abstracts/TR2017-823/

Aston Zhang. May 2017. Analyzing intentions from big data traces of human activities. University of Illinois at Urbana-Champaign. Retrieved from http://seclab.illinois.edu/wp-content/uploads/2017/08/zhang2017analyzing.pdf

Kevin R Dufendach, Sabine Koch, Kim M Unertl, and Christoph U Lehmann. April 2017. A randomized trial comparing classical participatory design to VandAID, an interactive crowdsourcing platform to facilitate user-centered design. Methods of Information in Medicine (April 2017). DOI: 10.3414/ME16-01-0098

Gabriel Kaptchuk, Matthew Green, and Aviel Rubin. April 2017. Outsourcing Medical Dataset Analysis: A Possible Solution. In Financial Cryptography and Data Security (FC). Springer, Cham, Malta, 98–123. DOI: 10.1007/978-3-319-70972-7_6

Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, and Kevin Fu. April 2017. WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks. In IEEE European Symposium on Security and Privacy (EuroS&P). DOI: 10.1109/eurosp.2017.42

Reza Rawassizadeh, Chelsea Dobbins, Manouchehr Nourizadeh, Zahra Ghamchili, and Michael Pazzani. March 2017. A Natural Language Query Interface for Searching Personal Information on Smartwatches. In IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 679–684. DOI: 10.1109/PERCOMW.2017.7917645

Vincent Bindschaedler, Reza Shokri, and Carl A. Gunter. January 2017. Plausible deniability for privacy-preserving data synthesis. Proceedings of the VLDB Endowment 10, 5 (January 2017), 481–492. DOI: 10.14778/3055540.3055542

Amy Tsou, Christoph Lehmann, Jeremy Michel, Ronni Solomon, Lorraine Possanza, and Tejal Gandhi. January 2017. Safe practices for copy and paste in the EHR: systematic review, recommendations, and novel model for health IT collaboration. Applied Clinical Informatics 8, 01 (January 2017), 12–34. DOI: 10.4338/ACI-2016-09-R-0150

Erman Ayday and Jean-Pierre Hubaux. October 2016. Privacy and Security in the Genomic Era. In ACM SIGSAC Conference on Computer and Communications Security (CCS), 1863–1865. DOI: 10.1145/2976749.2976751

A J Burns, M Eric Johnson, and Peter Honeyman. October 2016. A brief chronology of medical device security. Communications of the ACM 59, 10 (October 2016), 66–72. DOI: 10.1145/2890488

Paul D Martin, Michael Rushanan, Thomas Tantillo, Christoph U Lehmann, and Aviel D Rubin. October 2016. Applications of Secure Location Sensing in Healthcare. In ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics (BCB), 58–67. DOI: 10.1145/2975167.2975173

Guliz S Tuncay, Soteris Demetriou, and Carl A. Gunter. October 2016. Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android. In ACM SIGSAC Conference on Computer and Communications Security, 104–115. DOI: 10.1145/2976749.2978322

Kevin Fu, John Halamka, Jack Kufahl, and Mary Logan. September 2016. Commentary: Hospitals need better cybersecurity, not more fear. Retrieved from https://www.modernhealthcare.com/article/20160914/NEWS/160919950/commentary-hospitals-need-better-cybersecurity-not-more-fear

Tuo Yu, Haiming Jin, and Klara Nahrstedt. September 2016. WritingHacker: Audio-based Eavesdropping of Handwriting via Mobile Devices. In ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), 463–473. DOI: 10.1145/2971648.2971681

Haiming Jin, Lu Su, Houping Xiao, and Klara Nahrstedt. July 2016. INCEPTION: Incentivizing Privacy-Preserving Data Aggregation for Mobile Crowd Sensing Systems. In ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 341–350. DOI: 10.1145/2942358.2942375

Alexander G Fiks, Nathalie DuRivage, Stephanie L Mayne, Stacia Finch, Michelle E Ross, Kelli Giacomini, Andrew Suh, Banita McCarn, Elias Brandt, Dean Karavite, Elizabeth W Staton, Laura P Shone, Valerie McGoldrick, Kathleen Noonan, Dorothy Miller, Christoph U Lehmann, Wilson D Pace, and Robert W Grundmeier. June 2016. Adoption of a portal for the primary care management of pediatric asthma: a mixed methods implementation study. Journal of Medical Internet Research 18, 6 (June 2016), e172. DOI: 10.2196/jmir.5610

Haiming Jin, Lu Su, Bolin Ding, Klara Nahrstedt, and Nikita Borisov. June 2016. Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems. In IEEE International Conference on Distributed Computing Systems (ICDCS), 344–353. DOI: 10.1109/ICDCS.2016.50

David Kotz, Carl A. Gunter, Santosh Kumar, and Jonathan P. Weiner. June 2016. Privacy and security in mobile health: a research agenda. Computer 49, 6 (June 2016), 22–30. DOI: 10.1109/MC.2016.185

Timothy J Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz. June 2016. Demo: Wanda, Securely Introducing Mobile Devices. In International Conference on Mobile Systems, Applications, and Services Companion (MobiSys Companion), 113. DOI: 10.1145/2938559.2938581

Christoph U Lehmann, Marie-Christine Jaulent, and Brigitte Séroussi. May 2016. Silver Anniversary: 25 Editions of the IMIA Yearbook. Yearb Med Inform. DOI: 10.15265/IYS-2016-s041

Shrirang Mare. May 2016. Seamless authentication for ubiquitous devices. Dartmouth College, Hanover, NH. Retrieved from http://www.cs.dartmouth.edu/reports/TR2016-793.pdf

Aarathi Prasad. May 2016. Privacy-preserving controls for sharing mHealth data. Dartmouth College, Hanover, NH. Retrieved from http://www.cs.dartmouth.edu/reports/TR2016-794.pdf

Sayed H Hashemi, Faraz Faghri, Paul Rausch, and Roy H Campbell. April 2016. World of Empowered IoT Users. In IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), 13–24. DOI: 10.1109/iotdi.2015.39

Timothy J Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz. April 2016. Wanda: Securely Introducing Mobile Devices. In IEEE International Conference on Computer Communications (IEEE INFOCOM). DOI: 10.1109/INFOCOM.2016.7524366

Jessica A George, Paul S Park, Joanne Hunsberger, Joanne E Shay, Christoph U Lehmann, Elizabeth D White, Benjamin H Lee, and Myron Yaster. March 2016. An analysis of 34,218 pediatric outpatient controlled substance prescriptions. Anesthesia & Analgesia 122, 3 (March 2016), 807–813. DOI: 10.1213/ANE.0000000000001081.

Joseph Kannry, Patricia Sengstack, Thankam Paul Thyvalikakath, John Poikonen, Blackford Middleton, Thomas Payne, and Christoph U Lehmann. March 2016. The chief clinical informatics officer (CCIO): AMIA task force report on CCIO knowledge, education, and skillset requirements. Applied Clinical Informatics 7, 1 (March 2016), 143–176. DOI: 10.4338/ACI-2015-12-R-0174

Howard Silverman, Christoph U Lehmann, and Benson Munger. March 2016. Milestones: critical elements in clinical informatics fellowship programs. Applied Clinical Informatics 7, 1 (March 2016), 177–190. DOI: 10.4338/ACI-2015-10-SOA-0141

Bingyue Wang. March 2016. Learning device usage in context: a continuous and hierarchical smartphone authentication scheme. Dartmouth College, Hanover, NH. Retrieved from http://www.cs.dartmouth.edu/reports/TR2016-790.pdf

Joseph Carrigan, Paul D. Martin, and Michael Rushanan. February 2016. KBID: Kerberos Bracelet Identification (Short Paper). In Financial Cryptography and Data Security (FC 2016) (Lecture notes in computer science), 544–551. DOI: 10.1007/978-3-662-54970-4_32

Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang, and Carl A. Gunter. February 2016. Free for All! Assessing User Data Exposure to Advertising Libraries on Android. In Network and Distributed System Security (NDSS) Symposium. DOI: 10.14722/ndss.2016.23082

Timothy J Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz. February 2016. Wanda: Securely Introducing Mobile Devices – Extended Version. Dartmouth College, Hanover, NH. Retrieved from http://www.cs.dartmouth.edu/reports/abstracts/TR2016-789/

Kevin R Dufendach and Christoph U Lehmann. December 2015. Topics in neonatal informatics: essential functionalities of the neonatal electronic health record. NeoReviews 16, 12 (December 2015), e668–e673. DOI: 10.1542/neo.16-12-e668

Abhishek Bafna and Jenna Wiens. November 2015. Learning Useful Abstractions from the Web. In American Medical Informatics Association (AMIA) Annual Symposium. Retrieved from https://knowledge.amia.org/59310-amia-1.2741865/t005-1.2744350/f005-1.2744351/2246283-1.2745418/2249163-1.2745415?qr=1

Abhishek Bafna and Jenna Wiens. November 2015. Automated Feature Learning: Mining Unstructured Data for Useful Abstractions. In IEEE International Conference on Data Mining, 703–708. DOI: 10.1109/icdm.2015.115

M. Eric Johnson and Juhee Kwon. November 2015. Patient Reaction to Healthcare Data Breaches. In INFORMS Annual Conference. Retrieved from http://meetings2.informs.org/wordpress/philadelphia/files/2015/10/Tuesday.pdf

M. Eric Johnson. October 2015. Healthcare in the Age of Analytics. Retrieved from https://pubsonline.informs.org/editorscut/healthcareanalytics

A J Burns, Jacob Young, Tom L Roberts, James F Courtney, and T Selwyn Ellis. September 2015. Exploring the role of contextual integrity in electronic medical record (EMR) system workaround decisions: an information security and privacy perspective. AIS Transactions on Human-Computer Interaction 7, 3 (September 2015), 142–165. Retrieved from http://aisel.aisnet.org/thci/vol7/iss3/4/

Juhee Kwon and M Eric Johnson. September 2015. Protecting patient data-the economic perspective of healthcare security. IEEE Security & Privacy 13, 5 (September 2015), 90–95. DOI: 10.1109/msp.2015.113

Muhammad Naveed, Erman Ayday, Ellen W Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, and Xiaofeng Wang. September 2015. Privacy in the genomic era. ACM Computing Surveys (CSUR) 48, 1 (September 2015), Article No. 6. DOI: 10.1145/2767007

Sai Gouravajhala, Sree Vadrevu, Matthew Hicks, Jenna Wiens, and Kevin Fu. August 2015. An LED Blink is Worth a Thousand Packets: Inferring a Networked Device’s Activity from its LED Blinks. In USENIX Summit on Information Technologies for Health (HealthTech). Retrieved from https://www.usenix.org/conference/healthtech15/poster-session

David Kotz, Kevin Fu, Carl A. Gunter, and Avi Rubin. August 2015. Security for mobile and cloud frontiers in healthcare. Communications of the ACM 58, 8 (August 2015), 21–23. DOI: 10.1145/2790830

You Chen, Joydeep Ghosh, Cosmin A. Bejan, Carl A. Gunter, Siddharth Gupta, Abel Kho, David Liebovitz, Jimeng Sun, Joshua Denny, and Bradley Malin. June 2015. Building bridges across electronic health record systems through inferred phenotypic topics. Journal of Biomedical Informatics 55, (June 2015), 82–93. DOI: 10.1016/j.jbi.2015.03.011

Haiming Jin, Lu Su, Danyang Chen, Klara Nahrstedt, and Jinhui Xu. June 2015. Quality of Information Aware Incentive Mechanisms for Mobile Crowd Sensing Systems. In ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 167–176. DOI: 10.1145/2746285.2746310

Juhee Kwon and M Eric Johnson. June 2015. The Market Effect of Healthcare Security: Do Patients Care about Data Breaches? In Workshop on the Economics of Information Security (WEIS). Retrieved from https://pdfs.semanticscholar.org/f3c4/2d80583f5d87957a9dbd8bf0bdd4db3c279d.pdf

Ting-Yu Wang, Haiming Jin, and Klara Nahrstedt. June 2015. mAuditor: Mobile Auditing Framework for mHealth Applications. In ACM MobiHoc Workshop on Pervasive Wireless Healthcare (MobileHealth), 7–12. DOI: 10.1145/2757290.2757291

Tom J. Haigh and Carl Landwehr. May 2015. Building Code for Medical Device Software Security. IEEE, Cyber Security; IEEE. Retrieved from https://ieeecs-media.computer.org/media/technical-activities/CYBSI/docs/BCMDSS.pdf

Juhee Kwon and M Eric Johnson. May 2015. Meaningful Information Security. In Production and Operations Managment Society Annual Conference (POMS). Retrieved from https://www.pomsmeetings.org/ConfProceedings/060/General

Soteris Demetriou, Xiaoyong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, Xiaofeng Wang, and Carl A. Gunter. February 2015. What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. In Network and Distributed Systems Security Symposium (NDSS). DOI: 10.14722/ndss.2015.23098

James Brian Jones, Jonathan P Weiner, Nirav R Shah, and Walter F Stewart. February 2015. The wired patient: patterns of electronic patient portal use among patients with cardiac disease or diabetes. Journal of Medical Internet Research 17, 2 (February 2015), e42. DOI: 10.2196/jmir.3157

Carl Landwehr. February 2015. We need a building code for building code. Communications of the ACM 58, 2 (February 2015), 24–26. DOI: 10.1145/2700341

Andrei Sleptchenko and M Eric Johnson. February 2015. Maintaining secure and reliable distributed control systems. INFORMS Journal on Computing 27, 1 (February 2015), 103–117. DOI: 10.1287/ijoc.2014.0613

A. J. Burns and M. Eric Johnson. January 2015. Securing health information. IT Professional 17, 1 (January 2015), 23–29. DOI: 10.1109/MITP.2015.13

Charles Friedman, Joshua Rubin, Jeffrey Brown, Melinda Buntin, Milton Corn, Lynn Etheredge, Carl Gunter, Mark Musen, Richard Platt, William Stead, Kevin Sullivan, and Douglas Van Houweling. January 2015. Toward a science of learning systems: a research agenda for the high-functioning learning health system. Journal of the American Medical Informatics Association (JAMIA) 22, 1 (January 2015), 43–50. DOI: 10.1136/amiajnl-2014-002977

Carl Landwehr. January 2015. Workshop to Develop a Building Code and Research Agenda For Medical Device Software Security (Final Report). The George Washington University. Retrieved from http://www.landwehr.org/2015-01-landwehr-gw-cspri.pdf

Dongjing He, Muhammad Naveed, Carl A. Gunter, and Klara Nahrstedt. November 2014. Security Concerns in Android mHealth Apps. In AMIA Annual Symposium, 645–54. Retrieved from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4419898/

Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, and Carl A. Gunter. November 2014. Controlled Functional Encryption. In ACM SIGSAC Conference on Computer and Communications Security (CCS), 1280–1291. DOI: 10.1145/2660267.2660291

Andrei Sleptchenko and M. Eric Johnson. November 2014. The Impact of Security in Maintaining Reliable Distributed Control Systems. In INFORMS Annual Conference. Retrieved from http://meetings2.informs.org/sanfrancisco2014/poster.html

Wen Zhang, You Chen, Thaddeus Cybulski, Daniel Fabbri, Carl A. Gunter, Patrick Lawlor, David Liebovitz, and Bradley Malin. November 2014. Decide Now or Decide Later? In ACM SIGSAC Conference on Computer and Communications Security (CCS), 1182–1192. DOI: 10.1145/2660267.2660341

Carl A. Gunter, Mike Berry, and Martin French. August 2014. Decision Support for Data Segmentation (DS2): Application to Pull Architectures for HIE. In USENIX Safety, Security, Privacy, and Interoperability of Health Information Technologies (HealthTech). Retrieved from https://www.usenix.org/conference/healthtech14/summit-program/gunter

Xiaohui Liang and David Kotz. August 2014. Securely Connecting Wearable Health Devices to External Displays. In USENIX Safety, Security, Privacy, and Interoperability of Health Information Technologies (HealthTech). Retrieved from https://www.usenix.org/conference/healthtech14/summit-program/presentation/liang

Anthony Louie. June 2014. Information leakage in mobile health sensors and applications. University of Illinois at Urbana-Champaign. Retrieved from https://thawproject.files.wordpress.com/2014/07/anthony-louie-final-information-leakage-in-mobile-health-sensors-and-applications.pdf

Aarathi Prasad, Xiaohui Liang, and David Kotz. June 2014. Poster: Balancing Disclosure and Utility of Personal Information. In International Conference on Mobile Systems, Applications, and Services (MobiSys), 380–381. DOI: 10.1145/2594368.2601448

Dongjing He. May 2014. Security threats to Android apps. University of Illinois at Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/49659

Shrirang Mare, Andrés Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz. May 2014. ZEBRA: Zero-Effort Bilateral Recurring Authentication. In IEEE Symposium on Security and Privacy, 705–720. DOI: 10.1109/SP.2014.51

Shrirang Mare, Andrés Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz. May 2014. ZEBRA: Zero-Effort Bilateral Recurring Authentication (Companion report). Dartmouth College, Computer Science, Hanover, NH. Retrieved from http://www.cs.dartmouth.edu/reports/abstracts/TR2014-748/

Muhammad Naveed. May 2014. Hurdles for Genomic Data Usage Management. In IEEE Security and Privacy Workshops, 44–48. DOI: 10.1109/spw.2014.44

Muhammad Naveed, Manoj Prabhakaran, and Carl A Gunter. May 2014. Dynamic Searchable Encryption via Blind Storage. In IEEE Symposium on Security and Privacy (S&P). DOI: 10.1109/SP.2014.47

Michael Rushanan, Aviel D Rubin, Denis F Kune, and Colleen M Swanson. May 2014. SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks. In IEEE Symposium on Security and Privacy (S&P), 524–539. DOI: 10.1109/sp.2014.40

Jonathan P Weiner, Susan Yeh, and David Blumenthal. November 2013. The impact of health information technology and e-health on the future demand for physician services. Health Affairs 32, 11 (November 2013), 1998–2004. DOI: 10.1377/hlthaff.2013.0680

Michael W Temple, Christoph U Lehmann, and Daniel Fabbri. 2016. Natural language processing for cohort discovery in a discharge prediction model for the neonatal ICU. Applied Clinical Informatics 7, 1 (2016), 101–115. DOI: 10.4338/ACI-2015-09-RA-0114

1 thought on “Publications

  1. Pingback: When it Comes to Medical Device Security, the Dos Outweigh the Don’ts | Trustworthy Health and Wellness

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s