Robust multimodal cognitive load measurement F Chen, J Zhou, Y Wang, K Yu, SZ Arshad, A Khawaji, D Conway Springer, 2016 | 246 | 2016 |
Method, apparatus and computer program product for creating graphical objects with desired physical features for usage in animation K Yu, H Wang US Patent 8,427,503, 2013 | 146 | 2013 |
Method and apparatus for providing a trust level to access a resource K Yu, H Wang, W Wang, Y Cui US Patent 9,319,390, 2016 | 135 | 2016 |
User trust dynamics: An investigation driven by differences in system performance K Yu, S Berkovsky, R Taib, D Conway, J Zhou, F Chen Proceedings of the 22nd international conference on intelligent user …, 2017 | 131 | 2017 |
Gesture based document editor K Yu, K Wang, JA Kangas US Patent 8,643,605, 2014 | 126 | 2014 |
Do i trust my machine teammate? an investigation from perception to decision K Yu, S Berkovsky, R Taib, J Zhou, F Chen Proceedings of the 24th International Conference on Intelligent User …, 2019 | 99 | 2019 |
Cognitive load evaluation of handwriting using stroke-level features K Yu, J Epps, F Chen Proceedings of the 16th international conference on Intelligent user …, 2011 | 75 | 2011 |
Method, device computer program and graphical user interface for user input of an electronic device K Yu, KQ Wang, J Kangas US Patent 7,728,818, 2010 | 71 | 2010 |
Interaction using touch and non-touch gestures H Wang, X Chai, K Yu US Patent 8,433,138, 2013 | 70 | 2013 |
A qualitative investigation of bank employee experiences of information security and phishing D Conway, R Taib, M Harris, K Yu, S Berkovsky, F Chen Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 115-129, 2017 | 61 | 2017 |
Variational co-embedding learning for attributed network clustering S Yang, S Verma, B Cai, J Jiang, K Yu, F Chen, S Yu Knowledge-Based Systems 270, 110530, 2023 | 52 | 2023 |
Social engineering and organisational dependencies in phishing attacks R Taib, K Yu, S Berkovsky, M Wiggins, P Bayl-Smith IFIP conference on human-computer interaction, 564-584, 2019 | 43 | 2019 |
Writer identification using dynamic features K Yu, Y Wang, T Tan Biometric Authentication, 1-8, 2004 | 43 | 2004 |
Effects of influence on user trust in predictive decision making J Zhou, Z Li, H Hu, K Yu, F Chen, Z Li, Y Wang Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing …, 2019 | 41 | 2019 |
Trust and reliance based on system accuracy K Yu, S Berkovsky, D Conway, R Taib, J Zhou, F Chen Proceedings of the 2016 Conference on User Modeling Adaptation and …, 2016 | 40 | 2016 |
Device and method for stroke based graphic input Y Kun, ZY Ming, WK Qiao US Patent 8,610,672, 2013 | 37 | 2013 |
Physiological indicators for user trust in machine learning with influence enhanced fact-checking J Zhou, H Hu, Z Li, K Yu, F Chen Machine Learning and Knowledge Extraction: Third IFIP TC 5, TC 12, WG 8.4 …, 2019 | 36 | 2019 |
Method and apparatus for collaborative graphical creation H Wang, K Yu, L Chang US Patent 8,201,094, 2012 | 36 | 2012 |
Analysis and insights for myths circulating on Twitter during the COVID-19 pandemic S Yang, J Jiang, A Pal, K Yu, F Chen, S Yu IEEE Open Journal of the Computer Society 1, 209-219, 2020 | 34 | 2020 |
Response to a phishing attack: persuasion and protection motivation in an organizational context P Bayl-Smith, R Taib, K Yu, M Wiggins Information & Computer Security 30 (1), 63-78, 2022 | 29 | 2022 |