Athena Vakali

Athena Vakali
Aristotle University of Thessaloniki | AUTH · Department of Informatics

phd in computer science

About

379
Publications
139,905
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,037
Citations
Additional affiliations
September 1997 - present
Aristotle University of Thessaloniki
Position
  • Professor (Full) Web information systems

Publications

Publications (379)
Article
Full-text available
Personal informatics (PI) systems, powered by smartphones and wearables, enable people to lead healthier lifestyles by providing meaningful and actionable insights that break down barriers between users and their health information. Today, such systems are used by billions of users for monitoring not only physical activity and sleep but also vital...
Preprint
Full-text available
In this paper, we study the Greek wiretappings scandal, which has been revealed in 2022 and attracted a lot of attention by press and citizens. Specifically, we propose a methodology for collecting data and analyzing patterns of online public discussions on Twitter. We apply our methodology to the Greek wiretappings use case, and present findings r...
Preprint
Full-text available
Network operators and researchers frequently use Internet measurement platforms (IMPs), such as RIPE Atlas, RIPE RIS, or RouteViews for, e.g., monitoring network performance, detecting routing events, topology discovery, or route optimization. To interpret the results of their measurements and avoid pitfalls or wrong generalizations, users must und...
Article
Full-text available
Clin App is a platform streamlining medical appointment management and patient data collection using a conversational agent. Focused on healthcare professionals and patients, it offers appointment automation, questionnaire creation, and medical data management. This work showcases ClinApp's microservices-based architecture and its user-centered des...
Article
Full-text available
Appointment Scheduling (AS), typically serves as the basis for the majority of non-urgent healthcare services and is a fundamental healthcare-related procedure which, if done correctly and effectively, can lead to significant benefits for the healthcare facility. The main objective of this work is to present ClinApp, an intelligent system able to s...
Preprint
Full-text available
The need for a more energy efficient future is now more evident than ever and has led to the continuous growth of sectors with greater potential for energy savings, such as smart buildings, energy consumption meters, etc. The large volume of energy related data produced is a huge advantage but, at the same time, it creates a new problem; The need t...
Preprint
Full-text available
Personal informatics (PI) systems, powered by smartphones and wearables, enable people to lead healthier lifestyles by providing meaningful and actionable insights that break down barriers between users and their health information. Today, such systems are used by billions of users for monitoring not only physical activity and sleep but also vital...
Preprint
Full-text available
The field of mobile, wearable, and ubiquitous computing (UbiComp) is undergoing a revolutionary integration of machine learning. Devices can now diagnose diseases, predict heart irregularities, and unlock the full potential of human cognition. However, the underlying algorithms are not immune to biases with respect to sensitive attributes (e.g., ge...
Preprint
Full-text available
Today online social networks have a high impact in our society as more and more people use them for communicating with each other, express their opinions, participating in public discussions, etc. In particular, Twitter is one of the most popular social network platforms people mainly use for political discussions. This attracted the interest of ma...
Preprint
Full-text available
It is indisputable that physical activity is vital for an individual's health and wellness. However, a global prevalence of physical inactivity has induced significant personal and socioeconomic implications. In recent years, a significant amount of work has showcased the capabilities of self-tracking technology to create positive health behavior c...
Preprint
Full-text available
Named Entity Recognition and Intent Classification are among the most important subfields of the field of Natural Language Processing. Recent research has lead to the development of faster, more sophisticated and efficient models to tackle the problems posed by those two tasks. In this work we explore the effectiveness of two separate families of D...
Article
Globalization and rapid advancements in the IT sector brought new challenges and intensified competition between companies, strongly highlighting the demand for Business Intelligence and Analytics in decision-making and strategy development planning. Motivated by the analysis and forecasting capabilities offered by time-series data and its limited...
Article
Full-text available
Ubiquitous self-tracking technologies have penetrated various aspects of our lives, from physical and mental health monitoring to fitness and entertainment. Yet, limited data exist on the association between in the wild large-scale physical activity patterns, sleep, stress, and overall health, and behavioral and psychological patterns due to challe...
Preprint
Full-text available
The Internet is composed of networks, called Autonomous Systems (or, ASes), interconnected to each other, thus forming a large graph. While both the AS-graph is known and there is a multitude of data available for the ASes (i.e., node attributes), the research on applying graph machine learning (ML) methods on Internet data has not attracted a lot...
Poster
Full-text available
This initiative “Setting the scene for co-creating Citizen Science Hubs” started in the framework of INCENTIVE, a H2020 Project whose primary aim is the creation of Citizen Science hubs (CSh) in 4 different Research Organizations. The Poster's main objectives are to present how a Research Performing and Funding Organization (RPFO) can co-create a C...
Preprint
Full-text available
Online social networks are actively involved in the removal of malicious social bots due to their role in the spread of low quality information. However, most of the existing bot detectors are supervised classifiers incapable of capturing the evolving behavior of sophisticated bots. Here we propose MulBot, an unsupervised bot detector based on mult...
Article
Full-text available
This work describes a novel end-to-end data ingestion and runtime processing pipeline, which is a core part of a technical solution aiming to monitor frailty indices of patients during and after treatment and improve their quality of life. The focus of this work is on the technical architectural details and the functionalities provided, which have...
Chapter
Full-text available
Within the most recent years, most of the cancer patients are older age, which implies the necessity to a better understanding of aging and cancer connection. This work presents the LifeChamps solution built on top of cutting-edge Big Data architecture and HPC infrastructure concepts. An innovative architecture was envisioned supported by the Big D...
Preprint
Full-text available
Despite the indisputable personal and societal benefits of regular physical activity, a large portion of the population does not follow the recommended guidelines, harming their health and wellness. The World Health Organization has called upon governments, practitioners, and researchers to accelerate action to address the global prevalence of phys...
Article
Full-text available
Named Entity Recognition and Intent Classification are among the most important subfields of the field of Natural Language Processing. Recent research has lead to the development of faster, more sophisticated and efficient models to tackle the problems posed by those two tasks. In this work we explore the effectiveness of two separate families of D...
Preprint
Full-text available
The high growth of Online Social Networks (OSNs) over the last few years has allowed automated accounts, known as social bots, to gain ground. As highlighted by other researchers, most of these bots have malicious purposes and tend to mimic human behavior, posing high-level security threats on OSN platforms. Moreover, recent studies have shown that...
Article
Full-text available
Fake news spreading is strongly connected with the human involvement as individuals tend to fall, adopt and circulate misinformation stories. Until recently, the role of human characteristics in fake news diffusion, in order to deeply understand and fight misinformation patterns, has not been explored to the full extent. This paper suggests a human...
Article
Full-text available
Although research interest in leader narcissism has been on the rise over the past few years, prior literature has predominantly discussed leader narcissism from a leader-centric perspective. In this paper, we provide a relational-based perspective of leader narcissism by examining the interaction between follower personality traits and leader narc...
Article
Full-text available
Given a network of Twitter users, can we capture their posting behavior over time, identify patterns that could probably describe, model or predict their activity? Can we identify temporal connectivity patterns that emerge from the use of specific attributes? More challengingly, are there particular attribute usage patterns which indicate an inhere...
Conference Paper
We explore how two paradoxical yet potentially complementary leader traits — grandiose narcissism and servant leadership — interact to affect follower state anxiety over a period of 316 days covering periods before and during the COVID-19 pandemic. Daily observations provided by 204 leaders and 1,131 followers show that grandiose admiration-seeking...
Conference Paper
This study extends prior research on the relational antecedents of employee voluntary turnover to examine the association between leader attachment orientations and employee retention (i.e., how long employees stay with their organization). Using a machine learning approach, attachment orientations and (as a control) Big Five personality traits of...
Article
Aggression in online social networks has been studied mostly from the perspective of machine learning, which detects such behavior in a static context. However, the way aggression diffuses in the network has received little attention as it embeds modeling challenges. In fact, modeling how aggression propagates from one user to another is an importa...
Article
Full-text available
Users in Online Social Networks (OSN) leave traces that reflect their personality characteristics. The study of these traces is important for several fields, such as social science, psychology, marketing, and others. Despite a marked increase in research on personality prediction based on online behavior, the focus has been heavily on individual pe...
Article
Full-text available
Local community detection is a widely used method for identifying groups of nodes starting from seeding nodes. The seed(s) are usually selected either randomly or based only on structural properties of the network. However, in many cases the choice of seed(s) incorporates external knowledge that attaches to these nodes an additional importance for...
Article
Full-text available
OSN platforms are under attack by intruders born and raised within their own ecosystems. These attacks have multiple scopes from mild critiques to violent offences targeting individual or community rights and opinions. Negative publicity on microblogging platforms, such as Twitter, is due to the infamous Twitter bots which highly impact posts’ circ...
Article
Full-text available
Information propagation analysis in Online Social Networks (OSNs) sparks great interest due to its impact across different business sectors. In the wide range of OSNs, the famous micro-blogging service Twitter stands out for a plethora of reasons, such as the platform popularity and the ease of access to data. Activities like retweeting in the popu...
Preprint
Full-text available
Graph Representation Learning (GRL) has become essential for modern graph data mining and learning tasks. GRL aims to capture the graph's structural information and exploit it in combination with node and edge attributes to compute low-dimensional representations. While Graph Neural Networks (GNNs) have been used in state-of-the-art GRL architectur...
Article
Full-text available
Public key infrastructure (PKI) is widely used over the Internet to secure and to encrypt communication among parties. PKI involves digital certificates which are managed by certificate authorities (CAs) that authenticate users identity, in order to establish encrypted communication channels. The centralized operation model of CAs has already cause...
Article
Full-text available
Urbanization and knowledge economy have highly marked the new millennium. Urbanization brings new challenges which can be addressed by the knowledge economy, which opens up scientific and technical innovation opportunities. The enhancement of cities' intelligence has heavily impacted city transformation and sustainable decision-making based on urba...
Conference Paper
Full-text available
Although research interest in the dark triad traits, and in particular, leader narcissism, has been on the rise over the past few years, the prior literature has predominantly discussed leader narcissism from a leader-centric perspective. In this paper, we provide a relational-based perspective of leader narcissism by examining the interaction betw...
Article
Full-text available
Mosquito-Borne Diseases (MBDs) are known to be more prevalent in the tropics, and yet, in the last two decades, they are spreading to many other countries, especially in Europe. The set (volume) of environmental, meteorological and other spatio-temporally variable parameters affecting mosquito abundance makes the modeling and prediction tasks quite...
Preprint
Full-text available
BGP prefix hijacking is a critical threat to the resilience and security of communications in the Internet. While several mechanisms have been proposed to prevent, detect or mitigate hijacking events, it has not been studied how to accurately quantify the impact of an ongoing hijack. When detecting a hijack, existing methods do not estimate how man...
Article
Full-text available
Due to their confidence and dominance, narcissistic leaders oftentimes can be perceived favorably by followers, in particular during times of uncertainty. In this study, we propose and examine the relationship between narcissistic leaders and followers who are prone to experience uncertainty intensely and frequently in general, namely highly anxiou...
Preprint
Full-text available
In today's connected society, many people rely on mHealth and self-tracking (ST) technology to help them break their sedentary lifestyle and stay fit. However, there is scarce evidence of such technological interventions' effectiveness, and there are no standardized methods to evaluate the short- and long-term impact of such technologies on people'...
Article
Full-text available
The extensive use of Information and Communication Technologies and the consequent unprecedented generation of data have radically transformed the way we understand cities today. The vision of smart cities considers technology as an enabling force for the emergence of new forms of intelligence and collaboration, enhancing, thus, the problem-solving...
Article
Given a tabular dataset which should be graphically represented, how could the current complex visualization pipeline be improved? Could we produce a more visually enriched final representation, while minimizing the user intervention? Most of the existing approaches lack in capacity to provide a simplified end-to-end solution and leave the intricat...
Chapter
Cloud services have become increasingly popular during the past few years. Through these services, users can store their data remotely and access them any time and from anywhere. These services are offered by centralized systems where an organization or company usually offers their resources to users. The centralized nature of these systems causes...
Article
Full-text available
Crowdsourcing offers an invaluable toolkit for obtaining dynamic trends and insights from social media data analytics, enabling the capture of the wisdom of the crowds. The plethora of available platforms requires the appropriate definition of data schemas and techniques to allow for efficient knowledge extraction from unstructured social media use...
Preprint
Users in Online Social Networks (OSN) leaves traces that reflect their personality characteristics. The study of these traces is important for a number of fields, such as a social science, psychology, OSN, marketing, and others. Despite a marked increase on research in personality prediction on based on online behavior the focus has been heavily on...
Preprint
We examine the relationship between leader grandiose narcissism, composed of admiration and rivalry, and corporate fundraising success in a sample of 2377 organizational leaders. To examine a large sample of leaders, we applied a machine-learning algorithm to predict leaders' personality scores based on leaders' Twitter profiles. We found that admi...
Article
Full-text available
We examine the relationship between leader grandiose narcissism, composed of admiration and rivalry, and corporate fundraising success in a sample of 2377 organizational leaders. To examine a large sample of leaders, we applied a machine-learning algorithm to predict leaders' personality scores based on leaders' Twitter profiles. We found that admi...
Article
Full-text available
As the confidentiality and integrity of modern health infrastructures is threatened by intrusions and real-time attacks related to privacy and cyber-security, there is a need for proposing novel methodologies to predict future incidents and identify new threat patterns. The main scope of this article is to propose an advanced extension to current I...
Preprint
Full-text available
Aggression in online social networks has been studied up to now, mostly with several machine learning methods which detect such behavior in a static context. However, the way aggression diffuses in the network has received little attention as it embeds modeling challenges. In fact, modeling how aggression propagates from one user to another, is an...
Conference Paper
Full-text available
Smart cities have emerged significantly since their initial appearance in 1990s, more and more cities around the world are striving to gain intelligence and in this regard the need for standardization and performance measurement grows. Given the current challenges in the field of smart cities, this work revisits the proposed "cityDNA" framework whi...