
Athena VakaliAristotle University of Thessaloniki | AUTH · Department of Informatics
Athena Vakali
phd in computer science
About
379
Publications
139,905
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,037
Citations
Introduction
Additional affiliations
September 1997 - present
Publications
Publications (379)
Personal informatics (PI) systems, powered by smartphones and wearables, enable people to lead healthier lifestyles by providing meaningful and actionable insights that break down barriers between users and their health information. Today, such systems are used by billions of users for monitoring not only physical activity and sleep but also vital...
In this paper, we study the Greek wiretappings scandal, which has been revealed in 2022 and attracted a lot of attention by press and citizens. Specifically, we propose a methodology for collecting data and analyzing patterns of online public discussions on Twitter. We apply our methodology to the Greek wiretappings use case, and present findings r...
Network operators and researchers frequently use Internet measurement platforms (IMPs), such as RIPE Atlas, RIPE RIS, or RouteViews for, e.g., monitoring network performance, detecting routing events, topology discovery, or route optimization. To interpret the results of their measurements and avoid pitfalls or wrong generalizations, users must und...
Clin App is a platform streamlining medical appointment management and patient data collection using a conversational agent. Focused on healthcare professionals and patients, it offers appointment automation, questionnaire creation, and medical data management. This work showcases ClinApp's microservices-based architecture and its user-centered des...
Appointment Scheduling (AS), typically serves as the basis for the majority of non-urgent healthcare services and is a fundamental healthcare-related procedure which, if done correctly and effectively, can lead to significant benefits for the healthcare facility. The main objective of this work is to present ClinApp, an intelligent system able to s...
The need for a more energy efficient future is now more evident than ever and has led to the continuous growth of sectors with greater potential for energy savings, such as smart buildings, energy consumption meters, etc. The large volume of energy related data produced is a huge advantage but, at the same time, it creates a new problem; The need t...
Personal informatics (PI) systems, powered by smartphones and wearables, enable people to lead healthier lifestyles by providing meaningful and actionable insights that break down barriers between users and their health information. Today, such systems are used by billions of users for monitoring not only physical activity and sleep but also vital...
The field of mobile, wearable, and ubiquitous computing (UbiComp) is undergoing a revolutionary integration of machine learning. Devices can now diagnose diseases, predict heart irregularities, and unlock the full potential of human cognition. However, the underlying algorithms are not immune to biases with respect to sensitive attributes (e.g., ge...
Today online social networks have a high impact in our society as more and more people use them for communicating with each other, express their opinions, participating in public discussions, etc. In particular, Twitter is one of the most popular social network platforms people mainly use for political discussions. This attracted the interest of ma...
It is indisputable that physical activity is vital for an individual's health and wellness. However, a global prevalence of physical inactivity has induced significant personal and socioeconomic implications. In recent years, a significant amount of work has showcased the capabilities of self-tracking technology to create positive health behavior c...
Named Entity Recognition and Intent Classification are among the most important subfields of the field of Natural Language Processing. Recent research has lead to the development of faster, more sophisticated and efficient models to tackle the problems posed by those two tasks. In this work we explore the effectiveness of two separate families of D...
Globalization and rapid advancements in the IT sector brought new challenges and intensified competition between companies, strongly highlighting the demand for Business Intelligence and Analytics in decision-making and strategy development planning. Motivated by the analysis and forecasting capabilities offered by time-series data and its limited...
Ubiquitous self-tracking technologies have penetrated various aspects of our lives, from physical and mental health monitoring to fitness and entertainment. Yet, limited data exist on the association between in the wild large-scale physical activity patterns, sleep, stress, and overall health, and behavioral and psychological patterns due to challe...
The Internet is composed of networks, called Autonomous Systems (or, ASes), interconnected to each other, thus forming a large graph. While both the AS-graph is known and there is a multitude of data available for the ASes (i.e., node attributes), the research on applying graph machine learning (ML) methods on Internet data has not attracted a lot...
This initiative “Setting the scene for co-creating Citizen Science Hubs” started in the framework of INCENTIVE, a H2020 Project whose primary aim is the creation of Citizen Science hubs (CSh) in 4 different Research Organizations. The Poster's main objectives are to present how a Research Performing and Funding Organization (RPFO) can co-create a C...
Online social networks are actively involved in the removal of malicious social bots due to their role in the spread of low quality information. However, most of the existing bot detectors are supervised classifiers incapable of capturing the evolving behavior of sophisticated bots. Here we propose MulBot, an unsupervised bot detector based on mult...
This work describes a novel end-to-end data ingestion and runtime processing pipeline, which is a core part of a technical solution aiming to monitor frailty indices of patients during and after treatment and improve their quality of life. The focus of this work is on the technical architectural details and the functionalities provided, which have...
Within the most recent years, most of the cancer patients are older age, which implies the necessity to a better understanding of aging and cancer connection. This work presents the LifeChamps solution built on top of cutting-edge Big Data architecture and HPC infrastructure concepts. An innovative architecture was envisioned supported by the Big D...
Despite the indisputable personal and societal benefits of regular physical activity, a large portion of the population does not follow the recommended guidelines, harming their health and wellness. The World Health Organization has called upon governments, practitioners, and researchers to accelerate action to address the global prevalence of phys...
Named Entity Recognition and Intent Classification are among the most important subfields of the field of Natural Language Processing. Recent research has lead to the development of faster, more sophisticated and efficient models to tackle the problems posed by those two tasks. In this work we explore the effectiveness of two separate families of D...
The high growth of Online Social Networks (OSNs) over the last few years has allowed automated accounts, known as social bots, to gain ground. As highlighted by other researchers, most of these bots have malicious purposes and tend to mimic human behavior, posing high-level security threats on OSN platforms. Moreover, recent studies have shown that...
Fake news spreading is strongly connected with the human involvement as individuals tend to fall, adopt and circulate misinformation stories. Until recently, the role of human characteristics in fake news diffusion, in order to deeply understand and fight misinformation patterns, has not been explored to the full extent. This paper suggests a human...
Although research interest in leader narcissism has been on the rise over the past few years, prior literature has predominantly discussed leader narcissism from a leader-centric perspective. In this paper, we provide a relational-based perspective of leader narcissism by examining the interaction between follower personality traits and leader narc...
Given a network of Twitter users, can we capture their posting behavior over time, identify patterns that could probably describe, model or predict their activity? Can we identify temporal connectivity patterns that emerge from the use of specific attributes? More challengingly, are there particular attribute usage patterns which indicate an inhere...
We explore how two paradoxical yet potentially complementary leader traits — grandiose narcissism and servant leadership — interact to affect follower state anxiety over a period of 316 days covering periods before and during the COVID-19 pandemic. Daily observations provided by 204 leaders and 1,131 followers show that grandiose admiration-seeking...
This study extends prior research on the relational antecedents of employee voluntary turnover to examine the association between leader attachment orientations and employee retention (i.e., how long employees stay with their organization). Using a machine learning approach, attachment orientations and (as a control) Big Five personality traits of...
Aggression in online social networks has been studied mostly from the perspective of machine learning, which detects such behavior in a static context. However, the way aggression diffuses in the network has received little attention as it embeds modeling challenges. In fact, modeling how aggression propagates from one user to another is an importa...
Users in Online Social Networks (OSN) leave traces that reflect their personality characteristics. The study of these traces is important for several fields, such as social science, psychology, marketing, and others. Despite a marked increase in research on personality prediction based on online behavior, the focus has been heavily on individual pe...
Local community detection is a widely used method for identifying groups of nodes starting from seeding nodes. The seed(s) are usually selected either randomly or based only on structural properties of the network. However, in many cases the choice of seed(s) incorporates external knowledge that attaches to these nodes an additional importance for...
OSN platforms are under attack by intruders born and raised within their own ecosystems. These attacks have multiple scopes from mild critiques to violent offences targeting individual or community rights and opinions. Negative publicity on microblogging platforms, such as Twitter, is due to the infamous Twitter bots which highly impact posts’ circ...
Information propagation analysis in Online Social Networks (OSNs) sparks great interest due to its impact across different business sectors. In the wide range of OSNs, the famous micro-blogging service Twitter stands out for a plethora of reasons, such as the platform popularity and the ease of access to data. Activities like retweeting in the popu...
Graph Representation Learning (GRL) has become essential for modern graph data mining and learning tasks. GRL aims to capture the graph's structural information and exploit it in combination with node and edge attributes to compute low-dimensional representations. While Graph Neural Networks (GNNs) have been used in state-of-the-art GRL architectur...
Public key infrastructure (PKI) is widely used over the Internet to secure and to encrypt communication among parties. PKI involves digital certificates which are managed by certificate authorities (CAs) that authenticate users identity, in order to establish encrypted communication channels. The centralized operation model of CAs has already cause...
Urbanization and knowledge economy have highly marked the new millennium. Urbanization brings new challenges which can be addressed by the knowledge economy, which opens up scientific and technical innovation opportunities. The enhancement of cities' intelligence has heavily impacted city transformation and sustainable decision-making based on urba...
Although research interest in the dark triad traits, and in particular, leader narcissism, has been on the rise over the past few years, the prior literature has predominantly discussed leader narcissism from a leader-centric perspective. In this paper, we provide a relational-based perspective of leader narcissism by examining the interaction betw...
Mosquito-Borne Diseases (MBDs) are known to be more prevalent in the tropics, and yet, in the last two decades, they are spreading to many other countries, especially in Europe. The set (volume) of environmental, meteorological and other spatio-temporally variable parameters affecting mosquito abundance makes the modeling and prediction tasks quite...
BGP prefix hijacking is a critical threat to the resilience and security of communications in the Internet. While several mechanisms have been proposed to prevent, detect or mitigate hijacking events, it has not been studied how to accurately quantify the impact of an ongoing hijack. When detecting a hijack, existing methods do not estimate how man...
Due to their confidence and dominance, narcissistic leaders oftentimes can be perceived favorably by followers, in particular during times of uncertainty. In this study, we propose and examine the relationship between narcissistic leaders and followers who are prone to experience uncertainty intensely and frequently in general, namely highly anxiou...
In today's connected society, many people rely on mHealth and self-tracking (ST) technology to help them break their sedentary lifestyle and stay fit. However, there is scarce evidence of such technological interventions' effectiveness, and there are no standardized methods to evaluate the short- and long-term impact of such technologies on people'...
The extensive use of Information and Communication Technologies and the consequent unprecedented generation of data have radically transformed the way we understand cities today. The vision of smart cities considers technology as an enabling force for the emergence of new forms of intelligence and collaboration, enhancing, thus, the problem-solving...
Given a tabular dataset which should be graphically represented, how could the current complex visualization pipeline be improved? Could we produce a more visually enriched final representation, while minimizing the user intervention? Most of the existing approaches lack in capacity to provide a simplified end-to-end solution and leave the intricat...
Cloud services have become increasingly popular during the past few years. Through these services, users can store their data remotely and access them any time and from anywhere. These services are offered by centralized systems where an organization or company usually offers their resources to users. The centralized nature of these systems causes...
Crowdsourcing offers an invaluable toolkit for obtaining dynamic trends and insights from social media data analytics, enabling the capture of the wisdom of the crowds. The plethora of available platforms requires the appropriate definition of data schemas and techniques to allow for efficient knowledge extraction from unstructured social media use...
Users in Online Social Networks (OSN) leaves traces that reflect their personality characteristics. The study of these traces is important for a number of fields, such as a social science, psychology, OSN, marketing, and others. Despite a marked increase on research in personality prediction on based on online behavior the focus has been heavily on...
We examine the relationship between leader grandiose narcissism, composed of admiration and rivalry, and corporate fundraising success in a sample of 2377 organizational leaders. To examine a large sample of leaders, we applied a machine-learning algorithm to predict leaders' personality scores based on leaders' Twitter profiles. We found that admi...
We examine the relationship between leader grandiose narcissism, composed of admiration and rivalry, and corporate fundraising success in a sample of 2377 organizational leaders. To examine a large sample of leaders, we applied a machine-learning algorithm to predict leaders' personality scores based on leaders' Twitter profiles. We found that admi...
As the confidentiality and integrity of modern health infrastructures is threatened by intrusions and real-time attacks related to privacy and cyber-security, there is a need for proposing novel methodologies to predict future incidents and identify new threat patterns. The main scope of this article is to propose an advanced extension to current I...
Aggression in online social networks has been studied up to now, mostly with several machine learning methods which detect such behavior in a static context. However, the way aggression diffuses in the network has received little attention as it embeds modeling challenges. In fact, modeling how aggression propagates from one user to another, is an...
Smart cities have emerged significantly since their initial appearance in 1990s, more and more cities around the world are striving to gain intelligence and in this regard the need for standardization and performance measurement grows. Given the current challenges in the field of smart cities, this work revisits the proposed "cityDNA" framework whi...