Google Scholar
Privacy and Security
L. Fan, S. Zhang, Y. Kong, X. Yi, Y. Wang, X. Xu, C. Yu, H. Li, Y. Shi. Evaluating the Privacy Valuation of Personal Data on Smartphones. The Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). Oral presentation at UbiComp2024 [Journal paper]
*T. Sharma, L. Kyi, Y. Wang, A. Biega. ``I'm not convinced that they don't collect more than is necessary'': User-Controlled Data Minimization Design in Search Engines. Proceedings of the USENIX Security Symposium (USENIX Security2024). [Conference paper]
*T. Sharma, L. Kyi, Y. Wang, A. Biega. ``I'm not convinced that they don't collect more than is necessary'': User-Controlled Data Minimization Design in Search Engines. Proceedings of the USENIX Security Symposium (USENIX Security2024). [Conference paper]
*Y. Yu, T. Sharma, S. Das, Y. Wang. ``Don't put all your eggs in one basket'': How Cryptocurrency Users Choose and Secure Their Wallets. Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2024). [Conference paper, Best Paper Honorable Mention]
*T. Sharma, V. Nair, H. Wang, Y. Wang, D. Song. ``I Can't Believe It's Not Custodial!'': Usable Trustless Decentralized Key Management. Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2024). [Conference paper, Best Paper Honorable Mention]
Z. Yu, H. Namkung, J. Guo, H. Milner, J. Goldfoot, Y. Wang, V. Sekar. SEAM-EZ: Simplifying Stateful Analytics through Visual Programming. Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2024). [Conference paper]
L. Zhang, A. Stangl, T. Sharma, Y. Tseng, I. Xu, D. Gurari, Y. Wang, L. Findlater. Designing Accessible Obfuscation Support for Blind Individuals' Visual Privacy Management. Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2024). [Conference paper]
N. Bosch, A. Chan, J. Davis, R. Gutiérrez, J. He, K. Karahalios, S. Koyejo, M. Loui, R. Mendenhall, M. Sanfilippo, H. Tong, L. Varshney, Y. Wang. Artificial Intelligence, Social Responsibility, and the Roles of the University. To appear in the Communications of the ACM (2024). [Journal paper]
T. Sharma, Y. Kwon, K. Pongmala, H. Wang, A. Miller, D. Song, Y. Wang. Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice. To appear in Proceedings of IEEE International Conference on Blockchain and Cryptocurrency (ICBC2024). [Conference paper]
T. Sharma, Z. Zhou, A. Miller, Y. Wang. A Mixed-Methods Study of Security Practices of Smart Contract Developers. Proceedings of the USENIX Security Symposium (USENIX Security2023). [Conference paper]
Z. Zhou, T. Sharma, L. Emano, S. Das, Y. Wang. Iterative Design of An Accessible Crypto Wallet for Blind Users. Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2023. [Conference paper]
Z. Zhang, S. Kaushik, J. Seo, H. Yuan, S. Das, L. Findlater, D. Gurari, A. Stangl, Y. Wang. ImageAlly: A Human-AI Hybrid Approach to Support Blind People in Detecting and Redacting Private Image Content. Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2023. [Conference paper]
S. Kaushik, N. Barbosa, Y. Yu, T. Sharma, Z. Kilhoffer, J. Seo, S. Das, Y. Wang. GuardLens: Supporting Safer Online Browsing for People with Visual Impairments. Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2023. [Conference paper]
T. Sharma, A. Stangl, L. Zhang, Y. Tseng, I. Xu, L. Findlater, D. Gurari, Y. Wang. Disability-First Design and Creation of A Dataset Showing Private Visual Information Collected With People Who Are Blind. To appear in the ACM Conference on Human Factors in Computer Systems (CHI2023). [Conference paper]
T. Sharma, S. Kaushik, Y. Yu, I. Ahmed, Y. Wang. User Perceptions and Experiences of Targeted Ads on Social Media Platforms: Learning from Bangladesh and India. To appear in the ACM Conference on Human Factors in Computer Systems (CHI2023). [Conference paper]
Z. Kilhoffer, Z. Zhou, F. Wang, F. Tamton, Y. Huang, P. Kim, Tom Yeh, Y. Wang. ``How technical do you get? I'm an English teacher'': Teaching and Learning Cybersecurity and AI Ethics in High School. To appear in the IEEE Symposium on Security and Privacy (S&P2023). [Conference paper]
Y. Yu, S. Ashok, S. Kaushik, Y. Wang, G. Wang. Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments. To appear in the IEEE Symposium on Security and Privacy (S&P2023). [Conference paper]
H.P. Lee, J. Logas, S. Yang, Z. Li, N. Barbosa, Y. Wang, S. Das. When and Why Do People Want Ad Targeting Explanations? Evidence from a Four-Week, Mixed-Methods Field Study. To appear in the IEEE Symposium on Security and Privacy (S&P2023). [Conference paper]
M. Ashraf, G. Patterson, Z. Kilhoffer, X. Han, N. Brady, A. Rahn, N. Atluri, V. Oliver, Y. Huang, Y. Wang, P. Kim, T. Yeh. Using fNIRS To Understand Adults' Empathy for Children in AI and Cybersecurity Scenarios. Proceedings of the ACM Interaction Design and Children Conference (IDC2023). [Conference paper]
A. Stangl, E. Sadjo, P. Emami-Naeini, Y. Wang, D. Gurari, L. Findlater. Blind People's Expectations for Visual Privacy in Visual Assistance Technologies. Proceedings of the International Web for All Conference (W4A2023). [Conference paper]
T. Sharma, Z. Zhou, Y. Huang, Y. Wang. "It's A Blessing and A Curse": Unpacking Creators' Practices with Non-Fungible Tokens (NFTs) and Their Communities. To appear in Crypto Economics Security Conference (CESC2022).
N. Barbosa, J. Hayes, S. Kaushik, Y. Wang. ``Every Website Is A Puzzle!'': Facilitating Access to Common Website Features for People with Visual Impairments. To appear in ACM Transactions on Accessible Computing (TACCESS). [Journal paper]
J. Mink, L. Luo, N. Barbosa, O. Figueira, Y. Wang, G. Wang. DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks. Proceedings of the 31th USENIX Security Symposium (USENIX Security2022). [Conference paper]
Y. Wang and C. Price. Accessible Privacy. In ``Modern Socio-Technical Perspectives on Privacy'' Edited by Knijnenburg et al. Springer (2022) [Book chapter].
N. Barbosa, G. Wang, B. Ur, Y. Wang. Who Am I? A Design Probe Exploring Real-Time Transparency About Online and Offline User Profiling Underlying Targeted Ads. The Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). Oral presentation at UbiComp2021 [Journal paper]
H. Hu, S. Jan, Y. Wang, G. Wang. Assessing Browser-Level Defense against IDN-Based Phishing. Proceedings of the 30th USENIX Security Symposium (USENIX Security2021). [Conference paper]
Z. Zhang, Z. Zhang, H. Yuan, N. Barbosa, S. Das, Y. Wang. WebAlly: Making Visual Task-based CAPTCHAs Transferable for People with Visual Impairments. Proceedings of the Symposium on Usable Privacy and Security (SOUPS2021). [Conference paper]
S. Kaushik, Y. Yao, P. Dewitte, Y. Wang. ``How I Know For Sure'': People's Perspectives on Solely Automated Decision-Making (SADM). Proceedings of the Symposium on Usable Privacy and Security (SOUPS2021). [Conference paper, IAPP SOUPS Privacy Award]
N. Barbosa, Z. Zhang, Y. Wang. Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption. Proceedings of the Symposium on Usable Privacy and Security (SOUPS2020). [Conference paper]
J. Hayes, S. Kaushik, C. Price, Y. Wang. Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies. Proceedings of the Symposium on Usable Privacy and Security (SOUPS2019). [Conference paper, IAPP SOUPS Privacy Award]
Y. Yao, J. Basdeo, O. McDonough, Y. Wang. Privacy Perceptions and Designs of Bystanders in Smart Homes. To appear in the Proceedings of the ACM (PACM): Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW2019). [Journal paper]
N. Barbosa, Y. Yao, J. Park, Y. Wang. ``What if?'' Predicting Individual Users' Smart Home Privacy Preferences and Their Changes. To appear in Proceedings on Privacy Enhancing Technologies (PETS2019). [Journal paper]
Y. Yao, S. Kaushik, J. Basdeo, Y. Wang. Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes. To appear in Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2019). [Conference paper]
Y. Yao, Y. Huang, Y. Wang. Unpacking People's Understandings of Bluetooth Beacon Systems - A Location-Based IoT Technology. To appear in Proceedings of the Hawaii International Conference on System Sciences (HICSS2019). [Conference paper, best paper nomination]
C. Jackson, Y. Wang. Addressing Privacy Discrepancy through Personalized Notifications. To appear in the Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (Oral presentation at UbiComp2018). [Journal paper]
H. Xia, Y. Wang, Y. Huang, A. Shah. ``Our Privacy Needs To Be Protected At All Costs'': Crowd Workers' Privacy Experiences on Mechanical Turk To appear in the Proceedings of the ACM (PACM): Human-Computer Interaction: Volume 1: Issue 1: Computer-Supported Cooperative Work and Social Computing (Oral presentation at CSCW2018). [Journal paper]
Y. Yao, Y. Huang, Y. Wang. Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders To appear in Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2017). [Conference paper]
Y. Yao, H. Xia, Y. Huang, Y. Wang. Free to Fly in Public Spaces: Drone Controllers' Privacy Perceptions and Practices To appear in Proceedings of the ACM Conference on Human Factors in Computer Systems (CHI2017). [Conference paper]
B. Dosono, J. Hayes, Y. Wang. Towards Accessible Authentication: Learning from People with Visual Impairments. IEEE Internet Computing. [Journal paper]
P. Leon, I. Adjerid, R. Balebako, L. Brandimarte, S. Komanduri, F. Schaub, M. Sleeper, Y. Wang, S. Wilson, A. Acquisti, L. Cranor, N. Sadeh. Nudges for Privacy and Security: Understanding and Assisting Users’ Choices Online. ACM Computing Surveys, 2017. [Journal paper]
Y. Huang, C. White, H. Xia, Y. Wang. A Computational Cognitive Modeling Approach to Understand and Design Mobile Crowdsourcing for Campus Safety Reporting. International Journal of Human-Computer Studies (IJHCS), Special Issue on Mobile and Situated Crowdsourcing, 2017. [Journal paper]
Y. Yao, D. Lo Re, Y. Wang. Folk Models of Online Behavioral Advertising. Proceedings of the ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2017). [Conference paper]
B. Dosono, J. Hayes, Y. Wang. "They Should Be Convenient and Strong": Password Perceptions and Practices of Visually Impaired Users. Proceedings of the iConference 2017. [Conference paper]
N. Barbosa, J. Hayes, Y. Wang. UniPass: Design and Evaluation of A Smart Device-Based Password Manager for Visually Impaired Users. Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2016). [Conference paper]
Y. Wang, H. Xia, Yaxing Yao, Y. Huang. Flying Eyes and Hidden Controllers: A Qualitative Study of People's Privacy Perceptions of Civilian Drones in the US. Proceedings on Privacy Enhancing Technologies (PoPETS). 2016 (3):1–19. [Journal paper]
Y. Wang, Y. Li, B. Semaan, J. Tang. Space Collapse: Reinforcing, Reconfiguring and Enhancing Chinese Social Practices through WeChat. Proceedings of AAAI Conference on Web and Social Media ﴾ICWSM 2016﴿. [Conference paper]
Y. Wang, H. Xia, Y. Huang. Examining American and Chinese Internet Users’ Contextual Privacy Preferences of Behavioral Advertising. Proceedings of the ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2016). [Conference paper]
N. Barbosa, Y. Wang. Lessons Learned from Designing and Evaluating Smart Device-based Authentication for Visually Impaired Users. SOUPS2016 Workshop on Who are you?! Adventures in Authentication (WAY2016). [Workshop paper]
B. Dosono, J. Hayes, Y. Wang. "Im Stuck!": A Contextual Inquiry of People with Visual Impairments in Authentication. Proceedings of the Symposium on Usable Privacy and Security (SOUPS2015). [Conference paper]
Y. Huang, C. White, H. Xia, Y. Wang. Modeling Sharing Decision of Campus Safety Reports and Its Design Implications to Mobile Crowdsourcing for Safety. International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI2015). [Conference paper]
Y. Wang, Y. Li, J. Tang. Dwelling and Fleeting Encounters: Exploring Why People Use WeChat - A Mobile Instant Messenger. ACM SIGCHI Conference on Human Factors in Computing Systems (CHI2015). [Work-in-Progress paper]
Y. Wang, P. Leon, A. Acquisti, L.F. Cranor, A. Forget, N. Sadeh. A Field Trial of Privacy Nudges for Facebook. ACM SIGCHI Conference on Human Factors in Computing Systems (CHI2014). [Conference paper]
Y. Wang. Universal Authentication: Towards Accessible Authentication for Everyone. SOUPS2014 Workshop on Who are you?! Adventures in Authentication (WAY2014). [Workshop paper]
Xianyi Gao, Yulong Yang, Huiqing Fu, Janne Lindqvist, Y. Wang. Private Browsing: an Inquiry on Usability and Privacy Protection Workshop on Privacy in the Electronic Society (WPES2014). [Workshop paper]
Y. Wang, Y. Huang, C. Louis. Towards A Framework for Privacy-Aware Mobile Crowdsourcing. ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2013). [Conference paper, acceptance rate: 9.6%]
Y. Wang, Y. Huang, C. Louis. Towards A Framework for Privacy-Aware Mobile Crowdsourcing. ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2013). [Conference paper, acceptance rate: 9.6%]
P.G. Leon, B. Ur, Y. Wang, M. Sleeper, R. Balebako, R. Shay, L. Bauer, M. Christodorescu, L. F. Cranor. What Matters to Users? Factors that Affect Users’ Willingness to Share Information with Online Advertisers. Symposium on Usable Privacy and Security (SOUPS2013). [Conference paper]
Y. Wang, P. G. Leon, K. Scott, X. Chen, A. Acquisti, L. F. Cranor. Privacy Nudges for Social Media: An Exploratory Facebook Study. WWW2013 Workshop on Privacy and Security on Online Social Media (PSOSM2013). [Workhop paper]
B. Ur, Y. Wang. A Cross-Cultural Framework for Protecting User Privacy in Social Media WWW2013 Workshop on Privacy and Security on Online Social Media (PSOSM2013). [Workhop paper]
B. Ur, P. G. Leon, L. F. Cranor, R. Shay, Y. Wang. Smart, Useful, Scary, Creepy: Perceptions of Online Behavioral Advertising Symposium on Usable Privacy and Security (SOUPS2012). [Conference paper, acceptance rate: 25%]
P.G. Leon, B. Ur, R. Shay, Y. Wang, R. Balebako, L.F. Cranor. “Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising International Conference on Human Factors in Computing Systems (CHI2012). [Conference paper, acceptance rate: 23%, Best Paper Honorable Mention, awarded top 5% of accepted papers]
B. Ur, Y. Wang. Online Social Networks in a Post-Soviet State: How Hungarians Protect and Share on Facebook iConference2012. [Conference paper]
Y. Wang, A. Kobsa. A PLA-Based Privacy-Enhancing User Modeling Framework and its Evaluation User Modeling and User-Adapted Interaction (UMUAI). [Journal paper]
Y. Wang, A. Aghasaryan, A. Shrihari, D. Pergament, G. Kamga, S. Betgé-Brezetz. Intelligent Reactive Access Control for Moving Personal Data In Proceedings of the 3rd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2011). [Conference paper, acceptance rate: 8%]
P.G. Leon, B. Ur, R. Balebako, L.F. Cranor, R. Shay and Y. Wang. “Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising CyLab Technical Report CMU-CyLab-11-017.
Y. Wang, S. Komanduri, P.G. Leon, G. Norcie, A. Acquisti, L.F. Cranor. “I regretted the minute I pressed share”: A Qualitative Study of Regrets on Facebook In Proceedings of the 7th Symposium on Usable Privacy and Security (SOUPS2011). [Conference paper, acceptance rate: 33%]
Y. Wang, G. Norcie, L.F. Cranor. Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Networking Sites In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST2011). [Conference paper, acceptance rate: TBA]
E. Toch, Y. Wang, L.F. Cranor. Personalization and Privacy: A Survey of Privacy Risks and Remedies in Personalization-Based Systems To appear in User Modeling and User-Adapted Interaction (UMUAI) 20th Anniversary Special Issue, 2012. [Journal paper]
Y. Wang, A. Kobsa. Privacy in Cross-System Personalization In Proceedings of AAAI Privacy 2010 Symposium (Privacy2010), Palo Alto, CA, 2010.
Y. Wang, A. Kobsa. Performance Evaluation of a Dynamic Privacy-Enhancing Framework for Personalized Websites In Proceedings of the 1st and 17th International Conference on User Modeling, Adaptation, and Personalization (UMAP09), Trento, Italy, pp. 78-89, 2009. [Conference paper, acceptance rate: 26%]
S. A. Hendrickson, Y. Wang, A. van der Hoek, R. N. Taylor, A. Kobsa Modeling PLA Variation of Privacy-Enhancing Personalized Systems In Proceedings of the 13th International Software Product Line Conference (SPLC09), San Francisco, CA, 2009. [Conference paper, acceptance rate: 36%]
A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun and Y. Wang (authors in alphabetical order) Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods In Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS09), Mountain View, CA, pp. 1-12, 2009. [Conference paper, acceptance rate: 30%]
Y. Wang, A. Kobsa. Privacy in Online Social Networking at Workplace In Proceedings of the IEEE SocialCom'09 Workshop on Security and Privacy in Online Social Networking (SPOSN09), Vancouver, Canada, 2009. [Workshop paper]
Y. Wang, A. Kobsa. Technical Solutions for Privacy-Enhanced Personalization In: Constantinos Mourlas and Panagiotis Germanakos, eds.: Intelligent User Interfaces: Adaptation and Personalization Systems and Technologies. Hershey, PA: IGI Global, 2009. [Book chapter]
Y. Wang, A. Kobsa. Privacy Enhancing Technology In: M. Gupta and R. Sharman, eds.: Handbook of Research on Social and Organizational Liabilities in Information Security. Hershey, PA: IGI Global, 2009. [Book chapter]
Y. Wang, A. Kobsa. Respecting Users’ Individual Privacy Constraints in Web Personalization In Proceedings of the 11th International Conference on User Modeling (UM07), Corfu, Greece, pp.157-166 , 2007. [Conference paper, acceptance rate: 20%]
Y. Wang, A. Kobsa., A. van der Hoek, J. White. PLA-based Runtime Dynamism in Support of Privacy-Enhanced Web Personalization In Proceedings of the 10th International Software Product Line Conference (SPLC06), Baltimore, Maryland, USA, pp. 151-162, 2006. [Conference paper, acceptance rate: 32%]
Y. Wang, A. Kobsa. Impacts of Privacy Laws and Regulations on Personalized Systems In Proceedings of the CHI06 Workshop on Privacy-Enhanced Personalization, Montreal, Canada, 2006. [Workshop paper]
Y. Wang, A. Kobsa. A Software Product Line Approach for Handling Privacy Constraints in Web Personalization In Proceedings of the UM05 Workshop on Privacy-Enhanced Personalization, Edinburgh, UK, 2005. [Workshop paper]
Y. Wang Constraint-Sensitive Privacy Management for Personalized Web-based Systems In Proceedings of the 10th International Conference on User Modeling (UM05), Edinburgh, UK, 2005. [Doctoral consortium paper]
Social and Mobile Computing
Y. Huang, S. Huo, Y. Yao, C. Niu, Y. Wang, J. Grygiel, S. Sawyer. Municipal Police Departments on Facebook: What Are They Posting and Are People Engaging? In Proceedings of the 17th International Digital Government Research Conference (dg.o 2016). [Conference paper]
Y. Huang, B. Dobreski, B. Deo, J. Xin, N. Barbosa, Y. Wang, J. Bigham. CAN: Composable Accessibility Infrastructure via Data-Driven Crowdsourcing. In Proceedings of the 12th Web for All Conference (W4A 2015). [Conference paper]
Y. Huang, Y. Tang, Y. Wang. Emotion Map: A Location-Based Mobile Social System for Improving Emotion Awareness and Regulation. In Proceedings of ACM Conf. on Computer-Supported Cooperative Work and Social Computing (CSCW 2015). [Conference paper, acceptance rate: 28%]
Y. Wang, S. Mainwaring. Incentives in the Wild: Leveraging Virtual Currency to Sustain Online Community In Proceedings of iConference 2010, University of Illinois at Urbana-Champaign, USA, 2010. [Conference paper]
S. M. Lindtner, S. Mainwaring, P. Dourish, Y. Wang. Situating Productive Play: Online Gaming Practices and Guanxi in China In Proceedings of the 12th IFIP Conf. Human-Computer Interaction (INTERACT09), Uppsala, Sweden, pp. 328-341, 2009. [Conference paper, acceptance rate: 27%]
S. M. Lindtner, B. Nardi, Y. Wang, S. Mainwaring, J. He, W. Liang. A Hybrid Cultural Ecology: World of Warcraft in China In Proceedings of The 21th International Conference on Computer Supported Cooperative Work (CSCW08), San Diego, USA, pp. 371-382, 2008. [Conference paper, acceptance rate: 23%]
Y. Wang, S. Mainwaring. “Human-Currency Interaction”: Learning from Virtual Currency Use in China In Proceedings of The 26th International Conference on Human Factors in Computing Systems (CHI08), Florence, Italy, pp. 25-28, 2008. [Conference paper, acceptance rate: 18%]
Y. Wang, S. Mainwaring. Ethnography at Play: An Exploratory Case Study of Chinese Users’ Experience in Online Games In Proceedings of the CHI08 Workshop on Evaluating User Experiences in Games, Florence, Italy, 2008. [Workshop paper]
Y. Huang, N. Venkatasubramanian and Y. Wang. MAPGrid: A New Architecture for Empowering Mobile Data Placement in Grid Environments In Proceedings of the IEEE CCGrid07 Workshop on Context-Awareness and Mobility in Grid Computing, Rio de Janeiro, Brazil, 2007. [Workshop paper]
N. M. Su, Y. Wang, G. Mark, T. Aieylokun, T. Nakano. A Bosom Buddy Afar Brings a Distant Land Near: Are Bloggers a Global Community? In Proceedings of The 2nd International Conference on Communities & Technologies (C&T05), Milano, Italy, pp. 171-190, 2005. [Conference paper, acceptance rate: 23%]
N. M. Su, Y. Wang, G. Mark. Politics as Usual in the Blogosphere In Proceedings of Social Intelligence Design: The 4th International Workshop, Stanford, USA, 2005. [Workshop paper]