Athena Vakali

Athena Vakali
Aristotle University of Thessaloniki | AUTH · Department of Informatics

phd in computer science

About

393
Publications
150,799
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,796
Citations
Additional affiliations
September 1997 - present
Aristotle University of Thessaloniki
Position
  • Professor (Full) Web information systems

Publications

Publications (393)
Preprint
Full-text available
This chapter introduces a research project titled "Analyzing the Political Discourse: A Collaboration Between Humans and Artificial Intelligence", which was initiated in preparation for Greece's 2023 general elections. The project focused on the analysis of political leaders' campaign speeches, employing Artificial Intelligence (AI), in conjunction...
Article
Full-text available
In today’s connected society, self-tracking technologies (STTs), such as wearables and mobile fitness apps, empower humans to improve their health and well-being through ubiquitous physical activity monitoring, with several personal and societal benefits. Despite the advances in such technologies’ hardware, low user engagement and decreased effecti...
Article
Full-text available
In this paper, we study the Greek wiretappings scandal, which was revealed in 2022 and attracted significant attention from the press and citizens. Specifically, we propose a methodology for collecting data and analyzing patterns of online public discussions on Twitter. We apply our methodology to the Greek wiretappings use case and present finding...
Preprint
Full-text available
Nowadays, we delegate many of our decisions to Artificial Intelligence (AI) that acts either in solo or as a human companion in decisions made to support several sensitive domains, like healthcare, financial services and law enforcement. AI systems, even carefully designed to be fair, are heavily criticized for delivering misjudged and discriminate...
Article
Full-text available
This study examines the relationship between Bitcoin market dynamics and user activity on the r/cryptocurrency subreddit. The purpose of this research is to understand how social media activity correlates with Bitcoin price and trading volume, and to explore the sentiment and topical focus of Reddit discussions. We collected data on Bitcoin’s closi...
Preprint
Full-text available
This study examines the relationship between Bitcoin market dynamics and user activity on the r/cryptocurrency subreddit. The purpose of this research is to understand how social media activity correlates with Bitcoin price and trading volume, and to explore the sentiment and topical focus of Reddit discussions. We collected data on Bitcoin’s closi...
Preprint
Full-text available
This study examines the relationship between Bitcoin market dynamics and user activity on the r/cryptocurrency subreddit. The purpose of this research is to understand how social media activity correlates with Bitcoin price and trading volume, and to explore the sentiment and topical focus of Reddit discussions. We collected data on Bitcoin’s closi...
Article
Full-text available
Do politicians' relational traits predict their bipartisan voting behavior? In this paper, we empirically test and find that relational individual dispositions, namely attachment orientations and conformity to cultural norms, can predict the bipartisan voting behavior of politicians in the United States House of Representatives and Senate. We annot...
Article
Full-text available
Since its inception in 2009, Bitcoin has become and is currently the most successful and widely used cryptocurrency. It introduced blockchain technology, which allows transactions that transfer funds between users to take place online, in an immutable manner. No real-world identities are needed or stored in the blockchain. At the same time, all tra...
Article
Full-text available
Personal informatics (PI) systems, powered by smartphones and wearables, enable people to lead healthier lifestyles by providing meaningful and actionable insights that break down barriers between users and their health information. Today, such systems are used by billions of users for monitoring not only physical activity and sleep but also vital...
Preprint
Full-text available
In this paper, we study the Greek wiretappings scandal, which has been revealed in 2022 and attracted a lot of attention by press and citizens. Specifically, we propose a methodology for collecting data and analyzing patterns of online public discussions on Twitter. We apply our methodology to the Greek wiretappings use case, and present findings r...
Preprint
Full-text available
Network operators and researchers frequently use Internet measurement platforms (IMPs), such as RIPE Atlas, RIPE RIS, or RouteViews for, e.g., monitoring network performance, detecting routing events, topology discovery, or route optimization. To interpret the results of their measurements and avoid pitfalls or wrong generalizations, users must und...
Article
Full-text available
The need for a more energy-efficient future is now more evident than ever. Energy disagreggation (NILM) methodologies have been proposed as an effective solution for the reduction in energy consumption. However, there is a wide range of challenges that NILM faces that still have not been addressed. Herein, we propose HeartDIS, a generalizable energ...
Article
Full-text available
Clin App is a platform streamlining medical appointment management and patient data collection using a conversational agent. Focused on healthcare professionals and patients, it offers appointment automation, questionnaire creation, and medical data management. This work showcases ClinApp's microservices-based architecture and its user-centered des...
Article
Full-text available
Appointment Scheduling (AS), typically serves as the basis for the majority of non-urgent healthcare services and is a fundamental healthcare-related procedure which, if done correctly and effectively, can lead to significant benefits for the healthcare facility. The main objective of this work is to present ClinApp, an intelligent system able to s...
Preprint
Full-text available
The need for a more energy efficient future is now more evident than ever and has led to the continuous growth of sectors with greater potential for energy savings, such as smart buildings, energy consumption meters, etc. The large volume of energy related data produced is a huge advantage but, at the same time, it creates a new problem; The need t...
Preprint
Full-text available
Personal informatics (PI) systems, powered by smartphones and wearables, enable people to lead healthier lifestyles by providing meaningful and actionable insights that break down barriers between users and their health information. Today, such systems are used by billions of users for monitoring not only physical activity and sleep but also vital...
Preprint
Full-text available
The field of mobile, wearable, and ubiquitous computing (UbiComp) is undergoing a revolutionary integration of machine learning. Devices can now diagnose diseases, predict heart irregularities, and unlock the full potential of human cognition. However, the underlying algorithms are not immune to biases with respect to sensitive attributes (e.g., ge...
Preprint
Full-text available
Today online social networks have a high impact in our society as more and more people use them for communicating with each other, express their opinions, participating in public discussions, etc. In particular, Twitter is one of the most popular social network platforms people mainly use for political discussions. This attracted the interest of ma...
Preprint
Full-text available
It is indisputable that physical activity is vital for an individual's health and wellness. However, a global prevalence of physical inactivity has induced significant personal and socioeconomic implications. In recent years, a significant amount of work has showcased the capabilities of self-tracking technology to create positive health behavior c...
Preprint
Full-text available
Named Entity Recognition and Intent Classification are among the most important subfields of the field of Natural Language Processing. Recent research has lead to the development of faster, more sophisticated and efficient models to tackle the problems posed by those two tasks. In this work we explore the effectiveness of two separate families of D...
Article
Globalization and rapid advancements in the IT sector brought new challenges and intensified competition between companies, strongly highlighting the demand for Business Intelligence and Analytics in decision-making and strategy development planning. Motivated by the analysis and forecasting capabilities offered by time-series data and its limited...
Article
Full-text available
Ubiquitous self-tracking technologies have penetrated various aspects of our lives, from physical and mental health monitoring to fitness and entertainment. Yet, limited data exist on the association between in the wild large-scale physical activity patterns, sleep, stress, and overall health, and behavioral and psychological patterns due to challe...
Preprint
Full-text available
The Internet is composed of networks, called Autonomous Systems (or, ASes), interconnected to each other, thus forming a large graph. While both the AS-graph is known and there is a multitude of data available for the ASes (i.e., node attributes), the research on applying graph machine learning (ML) methods on Internet data has not attracted a lot...
Poster
Full-text available
This initiative “Setting the scene for co-creating Citizen Science Hubs” started in the framework of INCENTIVE, a H2020 Project whose primary aim is the creation of Citizen Science hubs (CSh) in 4 different Research Organizations. The Poster's main objectives are to present how a Research Performing and Funding Organization (RPFO) can co-create a C...
Preprint
Full-text available
Online social networks are actively involved in the removal of malicious social bots due to their role in the spread of low quality information. However, most of the existing bot detectors are supervised classifiers incapable of capturing the evolving behavior of sophisticated bots. Here we propose MulBot, an unsupervised bot detector based on mult...
Article
Full-text available
This work describes a novel end-to-end data ingestion and runtime processing pipeline, which is a core part of a technical solution aiming to monitor frailty indices of patients during and after treatment and improve their quality of life. The focus of this work is on the technical architectural details and the functionalities provided, which have...
Chapter
Full-text available
Within the most recent years, most of the cancer patients are older age, which implies the necessity to a better understanding of aging and cancer connection. This work presents the LifeChamps solution built on top of cutting-edge Big Data architecture and HPC infrastructure concepts. An innovative architecture was envisioned supported by the Big D...
Preprint
Full-text available
Despite the indisputable personal and societal benefits of regular physical activity, a large portion of the population does not follow the recommended guidelines, harming their health and wellness. The World Health Organization has called upon governments, practitioners, and researchers to accelerate action to address the global prevalence of phys...
Article
Full-text available
Named Entity Recognition and Intent Classification are among the most important subfields of the field of Natural Language Processing. Recent research has lead to the development of faster, more sophisticated and efficient models to tackle the problems posed by those two tasks. In this work we explore the effectiveness of two separate families of D...
Preprint
Full-text available
The high growth of Online Social Networks (OSNs) over the last few years has allowed automated accounts, known as social bots, to gain ground. As highlighted by other researchers, most of these bots have malicious purposes and tend to mimic human behavior, posing high-level security threats on OSN platforms. Moreover, recent studies have shown that...
Article
Full-text available
Fake news spreading is strongly connected with the human involvement as individuals tend to fall, adopt and circulate misinformation stories. Until recently, the role of human characteristics in fake news diffusion, in order to deeply understand and fight misinformation patterns, has not been explored to the full extent. This paper suggests a human...
Article
Full-text available
Although research interest in leader narcissism has been on the rise over the past few years, prior literature has predominantly discussed leader narcissism from a leader-centric perspective. In this paper, we provide a relational-based perspective of leader narcissism by examining the interaction between follower personality traits and leader narc...
Article
Full-text available
Given a network of Twitter users, can we capture their posting behavior over time, identify patterns that could probably describe, model or predict their activity? Can we identify temporal connectivity patterns that emerge from the use of specific attributes? More challengingly, are there particular attribute usage patterns which indicate an inhere...
Conference Paper
We explore how two paradoxical yet potentially complementary leader traits — grandiose narcissism and servant leadership — interact to affect follower state anxiety over a period of 316 days covering periods before and during the COVID-19 pandemic. Daily observations provided by 204 leaders and 1,131 followers show that grandiose admiration-seeking...
Conference Paper
This study extends prior research on the relational antecedents of employee voluntary turnover to examine the association between leader attachment orientations and employee retention (i.e., how long employees stay with their organization). Using a machine learning approach, attachment orientations and (as a control) Big Five personality traits of...
Article
Aggression in online social networks has been studied mostly from the perspective of machine learning, which detects such behavior in a static context. However, the way aggression diffuses in the network has received little attention as it embeds modeling challenges. In fact, modeling how aggression propagates from one user to another is an importa...
Article
Full-text available
Users in Online Social Networks (OSN) leave traces that reflect their personality characteristics. The study of these traces is important for several fields, such as social science, psychology, marketing, and others. Despite a marked increase in research on personality prediction based on online behavior, the focus has been heavily on individual pe...
Article
Full-text available
Local community detection is a widely used method for identifying groups of nodes starting from seeding nodes. The seed(s) are usually selected either randomly or based only on structural properties of the network. However, in many cases the choice of seed(s) incorporates external knowledge that attaches to these nodes an additional importance for...
Article
Full-text available
OSN platforms are under attack by intruders born and raised within their own ecosystems. These attacks have multiple scopes from mild critiques to violent offences targeting individual or community rights and opinions. Negative publicity on microblogging platforms, such as Twitter, is due to the infamous Twitter bots which highly impact posts’ circ...
Article
Full-text available
Information propagation analysis in Online Social Networks (OSNs) sparks great interest due to its impact across different business sectors. In the wide range of OSNs, the famous micro-blogging service Twitter stands out for a plethora of reasons, such as the platform popularity and the ease of access to data. Activities like retweeting in the popu...
Preprint
Full-text available
Graph Representation Learning (GRL) has become essential for modern graph data mining and learning tasks. GRL aims to capture the graph's structural information and exploit it in combination with node and edge attributes to compute low-dimensional representations. While Graph Neural Networks (GNNs) have been used in state-of-the-art GRL architectur...
Article
Full-text available
Public key infrastructure (PKI) is widely used over the Internet to secure and to encrypt communication among parties. PKI involves digital certificates which are managed by certificate authorities (CAs) that authenticate users identity, in order to establish encrypted communication channels. The centralized operation model of CAs has already cause...
Article
Full-text available
Urbanization and knowledge economy have highly marked the new millennium. Urbanization brings new challenges which can be addressed by the knowledge economy, which opens up scientific and technical innovation opportunities. The enhancement of cities' intelligence has heavily impacted city transformation and sustainable decision-making based on urba...
Conference Paper
Full-text available
Although research interest in the dark triad traits, and in particular, leader narcissism, has been on the rise over the past few years, the prior literature has predominantly discussed leader narcissism from a leader-centric perspective. In this paper, we provide a relational-based perspective of leader narcissism by examining the interaction betw...
Article
Full-text available
Mosquito-Borne Diseases (MBDs) are known to be more prevalent in the tropics, and yet, in the last two decades, they are spreading to many other countries, especially in Europe. The set (volume) of environmental, meteorological and other spatio-temporally variable parameters affecting mosquito abundance makes the modeling and prediction tasks quite...
Preprint
Full-text available
BGP prefix hijacking is a critical threat to the resilience and security of communications in the Internet. While several mechanisms have been proposed to prevent, detect or mitigate hijacking events, it has not been studied how to accurately quantify the impact of an ongoing hijack. When detecting a hijack, existing methods do not estimate how man...
Article
Full-text available
Due to their confidence and dominance, narcissistic leaders oftentimes can be perceived favorably by followers, in particular during times of uncertainty. In this study, we propose and examine the relationship between narcissistic leaders and followers who are prone to experience uncertainty intensely and frequently in general, namely highly anxiou...
Preprint
Full-text available
In today's connected society, many people rely on mHealth and self-tracking (ST) technology to help them break their sedentary lifestyle and stay fit. However, there is scarce evidence of such technological interventions' effectiveness, and there are no standardized methods to evaluate the short- and long-term impact of such technologies on people'...
Article
Full-text available
The extensive use of Information and Communication Technologies and the consequent unprecedented generation of data have radically transformed the way we understand cities today. The vision of smart cities considers technology as an enabling force for the emergence of new forms of intelligence and collaboration, enhancing, thus, the problem-solving...
Article
Given a tabular dataset which should be graphically represented, how could the current complex visualization pipeline be improved? Could we produce a more visually enriched final representation, while minimizing the user intervention? Most of the existing approaches lack in capacity to provide a simplified end-to-end solution and leave the intricat...