default search action
Aiping Xiong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Wooyong Jung, Nishant Asati, Phuong (Lucy) Doan, Thai Le, Aiping Xiong, Dongwon Lee:
The Strange Case of Jekyll and Hyde: Analysis of R/ToastMe and R/RoastMe Users on Reddit. ICWSM 2024: 787-799 - [c20]Margie Ruffin, Haeseung Seo, Aiping Xiong, Gang Wang:
Does It Matter Who Said It? Exploring the Impact of Deepfake-Enabled Profiles on User Perception towards Disinformation. ICWSM 2024: 1328-1341 - [c19]Haeseung Seo, Sian Lee, Dongwon Lee, Aiping Xiong:
Reliability Matters: Exploring the Effect of AI Explanations on Misinformation Detection with a Warning. ICWSM 2024: 1395-1407 - [c18]Yi-Li Hsu, Jui-Ning Chen, Yang Fan Chiang, Shang-Chien Liu, Aiping Xiong, Lun-Wei Ku:
Enhancing Perception: Refining Explanations of News Claims with LLM Conversations. NAACL-HLT (Findings) 2024: 2129-2147 - [i7]Mahjabin Nahar, Haeseung Seo, Eun-Ju Lee, Aiping Xiong, Dongwon Lee:
Fakes of Varying Shades: How Warning Affects Human Perception and Engagement Regarding LLM Hallucinations. CoRR abs/2404.03745 (2024) - [i6]Yan Pang, Aiping Xiong, Yang Zhang, Tianhao Wang:
Towards Understanding Unsafe Video Generation. CoRR abs/2407.12581 (2024) - 2023
- [c17]Yi-Li Hsu, Shih-Chieh Dai, Aiping Xiong, Lun-Wei Ku:
Is Explanation the Cure? Misinformation Mitigation in the Short Term and Long Term. EMNLP (Findings) 2023: 1313-1323 - [c16]Shih-Chieh Dai, Aiping Xiong, Lun-Wei Ku:
LLM-in-the-loop: Leveraging Large Language Model for Thematic Analysis. EMNLP (Findings) 2023: 9993-10001 - [c15]Sian Lee, Haeseung Seo, Dongwon Lee, Aiping Xiong:
Associative Inference Can Increase People's Susceptibility to Misinformation. ICWSM 2023: 530-541 - [c14]Zekun Cai, Aiping Xiong:
Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous Vehicles. USENIX Security Symposium 2023: 2975-2992 - [i5]Shih-Chieh Dai, Aiping Xiong, Lun-Wei Ku:
LLM-in-the-loop: Leveraging Large Language Model for Thematic Analysis. CoRR abs/2310.15100 (2023) - [i4]Yi-Li Hsu, Shih-Chieh Dai, Aiping Xiong, Lun-Wei Ku:
Is Explanation the Cure? Misinformation Mitigation in the Short Term and Long Term. CoRR abs/2310.17711 (2023) - 2022
- [c13]Shuofei Zhu, Ziyi Zhang, Boqin Qin, Aiping Xiong, Linhai Song:
Learning and Programming Challenges of Rust: A Mixed-Methods Study. ICSE 2022: 1269-1281 - [c12]Haeseung Seo, Aiping Xiong, Sian Lee, Dongwon Lee:
If You Have a Reliable Source, Say Something: Effects of Correction Comments on COVID-19 Misinformation. ICWSM 2022: 896-907 - [c11]Shih-Chieh Dai, Yi-Li Hsu, Aiping Xiong, Lun-Wei Ku:
Ask to Know More: Generating Counterfactual Explanations for Fake Claims. KDD 2022: 2800-2810 - [c10]Ziyi Zhang, Shuofei Zhu, Jaron Mink, Aiping Xiong, Linhai Song, Gang Wang:
Beyond Bot Detection: Combating Fraudulent Online Survey Takers✱. WWW 2022: 699-709 - [c9]Kuan-Chieh Lo, Shih-Chieh Dai, Aiping Xiong, Jing Jiang, Lun-Wei Ku:
VICTOR: An Implicit Approach to Mitigate Misinformation via Continuous Verification Reading. WWW 2022: 3511-3519 - [i3]Aiping Xiong, Chuhao Wu, Tianhao Wang, Robert W. Proctor, Jeremiah Blocki, Ninghui Li, Somesh Jha:
Using Illustrations to Communicate Differential Privacy Trust Models: An Investigation of Users' Comprehension, Perception, and Data Sharing Decision. CoRR abs/2202.10014 (2022) - [i2]Shih-Chieh Dai, Yi-Li Hsu, Aiping Xiong, Lun-Wei Ku:
Ask to Know More: Generating Counterfactual Explanations for Fake Claims. CoRR abs/2206.04869 (2022) - 2021
- [j4]Youngseung Jeon, Bogoan Kim, Aiping Xiong, Dongwon Lee, Kyungsik Han:
ChamberBreaker: Mitigating the Echo Chamber Effect and Supporting Information Hygiene through a Gamified Inoculation System. Proc. ACM Hum. Comput. Interact. 5(CSCW2): 472:1-472:26 (2021) - [c8]Kuan-Chieh Lo, Shih-Chieh Dai, Aiping Xiong, Jing Jiang, Lun-Wei Ku:
All the Wiser: Fake News Intervention Using User Reading Preferences. WSDM 2021: 1069-1072 - [c7]Kuan-Chieh Lo, Shih-Chieh Dai, Aiping Xiong, Jing Jiang, Lun-Wei Ku:
Escape from An Echo Chamber. WWW (Companion Volume) 2021: 713-716 - 2020
- [c6]Sian Lee, Joshua P. Forrest, Jessica Strait, Haeseung Seo, Dongwon Lee, Aiping Xiong:
Beyond Cognitive Ability: Susceptibility to Fake News Is Also Explained by Associative Inference. CHI Extended Abstracts 2020: 1-8 - [c5]Aiping Xiong, Tianhao Wang, Ninghui Li, Somesh Jha:
Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension. SP 2020: 392-410 - [i1]Aiping Xiong, Tianhao Wang, Ninghui Li, Somesh Jha:
Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension. CoRR abs/2003.13922 (2020)
2010 – 2019
- 2019
- [j3]Aiping Xiong, Robert W. Proctor, Weining Yang, Ninghui Li:
Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages. Hum. Factors 61(4) (2019) - [j2]Markus Janczyk, Aiping Xiong, Robert W. Proctor:
Stimulus-Response and Response-Effect Compatibility With Touchless Gestures and Moving Action Effects. Hum. Factors 61(8) (2019) - [c4]Haeseung Seo, Aiping Xiong, Dongwon Lee:
Trust It or Not: Effects of Machine-Learning Warnings in Helping Individuals Mitigate Misinformation. WebSci 2019: 265-274 - 2017
- [j1]Aiping Xiong, Robert W. Proctor, Weining Yang, Ninghui Li:
Is Domain Highlighting Actually Helpful in Identifying Phishing Web Pages? Hum. Factors 59(4): 640-660 (2017) - [c3]Weining Yang, Aiping Xiong, Jing Chen, Robert W. Proctor, Ninghui Li:
Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment. HotSoS 2017: 52-61 - 2016
- [c2]Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor:
An Empirical Study of Mnemonic Sentence-based Password Generation Strategies. CCS 2016: 1216-1229 - 2015
- [c1]Weining Yang, Jing Chen, Aiping Xiong, Robert W. Proctor, Ninghui Li:
Effectiveness of a phishing warning in field settings. HotSoS 2015: 14:1-14:2
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint