Passthoughts Authentication with Low Cost EarEEG
M. Curran, J. Yang, N. Merrill, J. Chuang. Proceedings of 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2016), August 2016.
Classifying Mental Gestures with In-Ear EEG
N. Merrill, M. Curran, J. Yang, J. Chuang. Proceedings of IEEE EMBS 13th Annual International Body Sensor Networks Conference (BSN 2016), June 2016.
Brain Decoding using EEG-controlled Rapid Serial Visual Presentation
T. Maillart, N. Merrill, J. Chuang. 22nd Annual Meeting of the Organization for Human Brain Mapping (OHBM 2016), June 2016.
Given Enough Eyeballs, All Bugs Shallow? Revisiting Eric Raymond with Bug Bounty Markets
T. Maillart, M. Zhao, J. Grossklags, J. Chuang. 15th Workshop on the Economics of Information Security (WEIS'16), June 2016.
Whack-a-mole: Asymmetric Conflict and Guerrilla Warfare in Web Security
P. Chia, J. Chuang, Y. Chen. 15th Workshop on the Economics of Information Security (WEIS'16), June 2016.
MIMS'16 Final Project teams: Eudaesense, Hydrobase, Mole-bile Voice (best project award winner), and Portal!
Audio Autonomy: An Ambient, Interactive Audio Companion System for Dementia Patients and Caregivers [video, software]
R. Bora, A. McConachie, J. Chuang, B. Shapiro. ACM Conference on Human Factors in Computing Systems (CHI'16) Workshop on Interactive Systems in Healthcare (WISH), May 2016.
INFO 290 Sensors, Humans, Data, Apps
INFO 234 Information Technology Economics, Strategy, and Policy
INFO 290 Research Seminar on Ubiquitous Sensing
INFO 295 Doctoral Colloquium
Complete List: by area, at Google Scholar, in CV
I Think, Therefore I Am:
Usability and Security of Authentication Using
Brainwaves [project page]
J. Chuang, H. Nguyen, C. Wang, B. Johnson. Workshop on Usable Security (USEC'13), Proceedings of the Seventeenth International Conference on Financial Cryptography and Data Security (FC’13), April 2013.
Loci of Competition
for Future Internet Architectures
J. Chuang. IEEE Communications Magazine, Special Issue on Future Internet Architectures: Design and Deployment Perspectives, July 2011.
Incentive Dynamics in
Interdependent Network Security. Or: Buying a Raft and
Out-Running a Bear
J. Chuang. Plenary lecture, 2nd
International Conference on Game Theory for Networks
(GameNets 2011), April 2011.
Secure or Insure? A Game-Theoretic Analysis of Information Security Games
J. Grossklags, N. Christin, J. Chuang. 17th
International World Wide Web Conference (WWW2008), April
Monitors and Contracting Systems: Competition and Innovation
P. Laskowski, J. Chuang. ACM SIGCOMM, September 2006.
and Whitewashing in Peer-to-Peer Systems
Feldman, C. Papadimitriou, J. Chuang, I. Stoica. IEEE
Journal on Selected Areas in Communications,
Vol. 24, No. 5, May 2006.
Pricing Multicast Communication: A Cost-Based Approach
J. Chuang, M. Sirbu. Telecommunication Systems,
Vol. 17, No. 3, 281-297, July 2001.
Datasets and Software
Synchronized Brainwave Recordings from a Group Presented with a Common Audio-Visual Stimulus
John Chuang, Nicholas Merrill, Thomas Maillart, and Students of the UC Berkeley Spring 2015 MIDS Immersion Class, May 2015.
Synchronized Brainwave Recordings from a Group Presented with a Common Visual Stimulus
John Chuang, Nicholas Merrill, Thomas Maillart, and Students of the UC Berkeley Fall 2014 INFO290 Class, March 2015.
Doctoral Students and Postdocs
Office: 303A South Hall (directions)
School of Information
University of California at Berkeley
102 South Hall #4600
Berkeley, CA 94720-4600
The back of my business card (in chinese).