Yangyang He

Yangyang He
  • Doctor of Philosophy
  • Clemson University

About

16
Publications
4,064
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
299
Citations
Current institution
Clemson University

Publications

Publications (16)
Chapter
Full-text available
Modern information systems require their users to make a myriad of privacy decisions, but users are often neither motivated nor capable of managing this deluge of decisions. This chapter covers the concept of tailoring the privacy of an information system to each individual user. It discusses practical problems that may arise when collecting data t...
Article
Full-text available
Fitness trackers are undoubtedly gaining in popularity. As fitness-related data are persistently captured, stored, and processed by these devices, the need to ensure users’ privacy is becoming increasingly urgent. In this paper, we apply a data-driven approach to the development of privacy-setting recommendations for fitness devices. We first prese...
Article
Full-text available
In this article, we extend and improve upon a previously developed data-driven approach to design privacy-setting interfaces for users of household IoT devices. The essence of this approach is to gather users’ feedback on household IoT scenarios before developing the interface, which allows us to create a navigational structure that preemptively ma...
Conference Paper
Full-text available
As the rapid growth of IoT technologies, the demand to simplify the task of controlling privacy setting for IoT devices in a user-friendly manner becomes urgent. In this paper, we first present our existing works on recommending privacy settings for different IoT contexts. We use a data-driven approach to analyze how IoT users make decisions regard...
Conference Paper
Full-text available
As IoT devices begin to permeate our environment, our interaction with these devices are starting to have a real potential to transform our daily lives. Therefore, there exists an incredible opportunity for intelligent user interfaces to simplify the task of controlling such devices. The goal of IUIoT workshop was to serve as a platform for researc...
Conference Paper
Full-text available
User testing is often used to inform the development of user interfaces (UIs). But what if an interface needs to be developed for a system that does not yet exist? In that case, existing datasets can provide valuable input for UI development. We apply a data-driven approach to the development of a privacy-setting interface for Internet-of-Things (I...
Preprint
Full-text available
As a popular routing protocol in wireless sensor networks (WSNs), greedy routing has received great attention. The previous works characterize its data deliverability in WSNs by the probability of all nodes successfully sending their data to the base station. Their analysis, however, neither provides the information of the quantitative relation bet...
Conference Paper
Full-text available
The Dynamic Embedded Sensor-Actuator Language (DESAL) [2] is a rule-based programming language, without events, interrupts, or hidden control. Nodes have built-in access to their neighbors’ state, with automatic node discovery and health monitoring. Applications communicate via shared variables, rather than explicit message passing. Shared variable...
Conference Paper
Full-text available
As a popular routing protocol in wireless sensor networks (WSNs), greedy routing has received great attention. The previous works characterize its data deliverability in WSNs by the probability of all nodes successfully sending their data to the base station. Their analysis, however, neither provides the information of the quantitative relation bet...
Conference Paper
Full-text available
Radiation from radioactive environments, such as those encountered during space flight, can cause damage to embedded systems. One of the most common examples is the single event upset (SEU), which occurs when a high-energy ionizing particle passes through an integrated circuit, changing the value of a single bit by releasing its charge. The SEU cou...
Technical Report
Full-text available
As a popular routing protocol in wireless sensor networks (WSNs), greedy routing has received great attention. The previous works characterize its data deliverability in WSNs by the probability of all nodes successfully sending their data to the base station. Their analysis, however, neither provides the information of the quantitative relation bet...
Article
Full-text available
Wireless sensor networks have been widely used in scientific research, industrial manufacturing, and environmental monitoring over the past decade. Using pre-existing networks to assist in responding to disaster events can be cost-effective. In this paper, we present Alert, a software framework for re tasking wireless sensor networks, enabling thes...

Network

Cited By