2nd Best Presentation at the PhD and Postdoc Forum, Cyber Security Track of ABCP 2022 (3rd ABCP Annual Conference) for presenting the work “Cognitive modelling software ‘CogTool+’ and its applications in cyber security”
Best Paper Award (Certificate): Yuan H, Li S., Rusconi P., and Aljaffan N., When Eye-tracking Meets Cognitive Modeling: Applications to Cyber Security Systems, in Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Lecture Notes in Computer Science, vol. 10292, pp. 251-264, 2017
Best new Human Computer Interaction Books (Certificate): Yuan H, Li S, Rusconi P, Cognitive Modeling for Automated Human Performance Evaluation at Scale part of Human–Computer Interaction Series book series (HCIS) and of SpringerBriefs in Human-Computer Interaction book sub series (BRIEFSHUMAN), ISBN 978-3-030-45704-4, 2020 © Springer
Yuan H., Li S., Rusconi P., Cognitive Modeling for Automated Human Performance Evaluation at Scale part of Human–Computer Interaction Series book series (HCIS) and of SpringerBriefs in Human-Computer Interaction book sub series (BRIEFSHUMAN), ISBN 978-3-030-45704-4, 2020
Parker, S., Yuan, H., and Li, S. "PassViz: An Interactive Visualisation System for Analysing Leaked Passwords," 2023 IEEE Symposium on Visualization for Cyber Security (VizSec), Melbourne, Australia, 2023, pp. 33-42
Heering, M. S, Yuan, H., and Li, S. "The Impact of Privacy and Security Attitudes and Concerns of Travellers on Their Willingness to Use Mobility-as-a-Service Systems," 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), Bilbao, Spain, 2023, pp. 5573-5578
Yuan, H., Boakes, M., Ma, X., Cao, D., Li, S., “Visualising Personal Data Flows: Insights from a Case Study of Booking.com”, Intelligent Information Systems. CAiSE 2023. Lecture Notes in Business Information Processing, vol 477, 2023
Altuncu, E., Nurse, JRC., Bagriacik, M., Kaleba, S., Yuan, H., Bonheme, L., Li, S., “aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions”, Workshop on News Media and Computational Journalism (MEDIATE '23), co-located with the AAAI International Conference on Web and Social Media (ICWSM '23), 2023
Knott, J., Yuan, H., Boakes, M. and Li, S., “Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data”, 38th ACM/SIGAPP Symposium on Applied Computing (SAC ’23), ACM, 2023.
Yuan, H., Li, S., "Cyber Security Risks of Net Zero Technologies," 2022 IEEE Conference on Dependable and Secure Computing (DSC), 2022, pp. 1-11.
Yuan, H., Altuncu, E., Li, S. and Baskent, C., 2022. Graphical Models of False Information and Fact Checking Ecosystems. arXiv preprint arXiv:2208.11582.
Ely, P., Frohlich, D.M., Bairaktaris, G., Yuan, H., Sporea, R., Silva, A., Sunley Smith, A., Kinsella, J., Sharma, A., Beck, F. and Mgee, C., 2022. The Climate Domesday Book, Curtin Research Publications
Yuan H., Li S., and Rusconi P. “CogTool+: Modeling Human Performance at Large Scale”. ACM Transactions on Computer Human Interaction. 28, 2, Article 15 (April 2021)
Zhao B.Z.H, Asghar H.J.A, Kaafar M.A, Trevisan F., and Yuan H, “Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes”. ACM Transactions on Privacy and Security. 24, 1, Article 1 (January 2021)
Corrigan-Kavanagh E., Frohlich D., Yuan H., Bober M. (2021) “Designing for the Next Generation of Augmented Books”. The Journal of Design Research
Alqahtani S.I, Li S., Yuan H., Rusconi P., “Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More ?”, Endorsed Transactions on Security and Safety, European Alliance for Innovation (EAI), 2020
Frohlich D.M., Corrigan-Kavanagh E., Bober M., Yuan H., et.al., “The Cornwall a-book: An Augmented Travel Guide Using Next Generation Paper”, The Journal of Electronic Publishing, 22 (1), 2019
Yuan H, Li S., Rusconi P., and Aljaffan N., "When Eye-tracking Meets Cognitive Modeling: Applications to Cyber Security Systems," in Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Lecture Notes in Computer Science, vol. 10292, pp. 251-264, 2017
Yuan H., Li S., Ho A.T.S., Palmer P., Lloyd A., and Head G., "Forensic Vehicle Convoy Analysis Using ANPR Data," poster presented at DFRWS EU 2016, 29-31 March 2016, Lausanne, Switzerland.
Frohlich D.M, Armstrong T., Calic J., Yuan H., Knights T., Debrulais S., “Com-Note: Designing a composer's notebook for collaborative music composition,” Digital Research in the Humanities and Arts Conference 2014
Yuan H., Calic J., Kondoz A., “Quality of interaction experience in stereoscopic 3DTV," 2014 IEEE International Conference on Image Processing (ICIP), 2014, pp. 748-752
Yuan H., Calic J., Kondoz A., "Facilitating interaction with stereoscopic 3D display devices," 2014 3DTV-Conference: The True Vision - Capture, Transmission and Display of 3D Video (3DTV-CON), 2014, pp. 1-4
Glorney E., Wells K., Yuan H., Hilton A., Perkins D., “The development of a quantitative observation system for the early warning of violent behaviours within a secure environment”, International Society for Research on Aggression, XXIst World Meeting; Atlanta; 18th July 2014
Yuan H., Calic J., Fernando A., Kondoz A.,“Impact of disparity error on user experience of interacting with stereoscopic 3D video content,” 2013 IEEE International Conference on Multimedia and Expo Workshops (ICMEW), 2013, pp. 1-6
Yuan H., Calic J., Fernando A., Kondoz, A.,“Investigation and Evaluation of Pointing Modalities for Interactive Stereoscopic 3D TV,” 2013 IEEE International Conference on Multimedia and Expo (ICME), 2013, pp. 1-6
Yuan H., Calic J., Kondoz A., “Analysis of User Requirements in Interactive 3D Video Systems,” Advances in Human-Computer Interaction, vol. 2012, Article ID 343197, 11 pages, 2012
Yuan H., Calic J., Fernando A., Kondoz A., “User Requirements Elicitation of Stereoscopic 3D Video Interaction,” 2012 IEEE International Conference on Multimedia and Expo Workshops (ICMEW), 2012, pp. 31-36
Yuan H., Calic J., Kondoz A.,“How do users select stereoscopic 3D content?,” 2012 3DTV-Conference: The True Vision - Capture, Transmission and Display of 3D Video (3DTV-CON), 2012, pp. 1-4
Yuan H, and Li S,, “Cyber Security Risks of Net Zero Technologies,” 28 pages, April 2022, a technical report for DCMS (Department for Digital, Culture, Media and Sport), UK Government
Yuan. H, Wang. Yi, Altuncu. E, Raza. A, Franqueira. V, Li. S and Bhattacherjee. S, DDD (Digital Data Deception) Technology Watch Newsletter, March 2022, Issue Code NL-2022-7, Institute of Cyber Security for Society, University of Kent