Follow
Kun Yu
Kun Yu
CASIA,NOKIA,NICTA,Data61,CSIRO, UTS
Verified email at data61.csiro.au
Title
Cited by
Cited by
Year
Robust multimodal cognitive load measurement
F Chen, J Zhou, Y Wang, K Yu, SZ Arshad, A Khawaji, D Conway
Springer, 2016
2462016
Method, apparatus and computer program product for creating graphical objects with desired physical features for usage in animation
K Yu, H Wang
US Patent 8,427,503, 2013
1462013
Method and apparatus for providing a trust level to access a resource
K Yu, H Wang, W Wang, Y Cui
US Patent 9,319,390, 2016
1352016
User trust dynamics: An investigation driven by differences in system performance
K Yu, S Berkovsky, R Taib, D Conway, J Zhou, F Chen
Proceedings of the 22nd international conference on intelligent user …, 2017
1312017
Gesture based document editor
K Yu, K Wang, JA Kangas
US Patent 8,643,605, 2014
1262014
Do i trust my machine teammate? an investigation from perception to decision
K Yu, S Berkovsky, R Taib, J Zhou, F Chen
Proceedings of the 24th International Conference on Intelligent User …, 2019
992019
Cognitive load evaluation of handwriting using stroke-level features
K Yu, J Epps, F Chen
Proceedings of the 16th international conference on Intelligent user …, 2011
752011
Method, device computer program and graphical user interface for user input of an electronic device
K Yu, KQ Wang, J Kangas
US Patent 7,728,818, 2010
712010
Interaction using touch and non-touch gestures
H Wang, X Chai, K Yu
US Patent 8,433,138, 2013
702013
A qualitative investigation of bank employee experiences of information security and phishing
D Conway, R Taib, M Harris, K Yu, S Berkovsky, F Chen
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 115-129, 2017
612017
Variational co-embedding learning for attributed network clustering
S Yang, S Verma, B Cai, J Jiang, K Yu, F Chen, S Yu
Knowledge-Based Systems 270, 110530, 2023
522023
Social engineering and organisational dependencies in phishing attacks
R Taib, K Yu, S Berkovsky, M Wiggins, P Bayl-Smith
IFIP conference on human-computer interaction, 564-584, 2019
432019
Writer identification using dynamic features
K Yu, Y Wang, T Tan
Biometric Authentication, 1-8, 2004
432004
Effects of influence on user trust in predictive decision making
J Zhou, Z Li, H Hu, K Yu, F Chen, Z Li, Y Wang
Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing …, 2019
412019
Trust and reliance based on system accuracy
K Yu, S Berkovsky, D Conway, R Taib, J Zhou, F Chen
Proceedings of the 2016 Conference on User Modeling Adaptation and …, 2016
402016
Device and method for stroke based graphic input
Y Kun, ZY Ming, WK Qiao
US Patent 8,610,672, 2013
372013
Physiological indicators for user trust in machine learning with influence enhanced fact-checking
J Zhou, H Hu, Z Li, K Yu, F Chen
Machine Learning and Knowledge Extraction: Third IFIP TC 5, TC 12, WG 8.4 …, 2019
362019
Method and apparatus for collaborative graphical creation
H Wang, K Yu, L Chang
US Patent 8,201,094, 2012
362012
Analysis and insights for myths circulating on Twitter during the COVID-19 pandemic
S Yang, J Jiang, A Pal, K Yu, F Chen, S Yu
IEEE Open Journal of the Computer Society 1, 209-219, 2020
342020
Response to a phishing attack: persuasion and protection motivation in an organizational context
P Bayl-Smith, R Taib, K Yu, M Wiggins
Information & Computer Security 30 (1), 63-78, 2022
292022
The system can't perform the operation now. Try again later.
Articles 1–20