Aiping Xiong

alt text 

Assistant Professor
College of Information Sciences and Technology
Penn State University
Office: 413J Eric J. Barron Innovation Hub
Phone: (814)-865-2370
Email: axx29 @ psu.edu
Google scholar

To prospective graduate students:

I am currently recruiting graduate students for Fall 2024. Any students sharing the similar academic interests and with a solid background in cognitive psychology/human factors/usable security and privacy, are encouragegd to apply. Please note that applications are due on December 15th, 2023.
Prospective Students: I welcome inquireies if you have any questions or are interested in my research areas.

About me

I'm an Assistant Professor in the College of Information Sciences and Technology, Penn State University - University Park.
Prior to Penn State, I obtained my Ph.D. in Psychological Sciences and MS degree in Industrial Engineering:Human Factors from Purdue University, West Lafayette. My advisor is Professor Robert W. Proctor.

Research

My primary research interests lie in the interdisciplinary field of decision making and cybersecruity and privacy. I design and conduct online and laboratory human subject experiments to obtain quantitative and qualitative measures of human performance in various cybersecurity and privacy settings.
My research spans cognitive psychology, human factors, and cybersecurity and privacy.

News

  • 11/2023: Call of paper for Symposium VehicleSec 2024 (due Dec 15 AoE 2023)
    [CFP] Second Symposium on Vehicle Security and Privacy (VehicleSec 2024)
  • 11/2023: Two papers accepted by ICWSM 2024
  • 10/2023: One paper accepted by HKS Misinformation Review 2023
  • 10/2023: Two finding papers accepted by EMNLP 2023
  • 07/2023: One paper accepted by ICWSM 2024
  • 06/2023: One poster accepted by SOUPS 2023
  • 05/2023: One paper accepted by HFES 2023
  • 02/2023: One paper and one poster accepted by VehicleSec 2023
  • 12/2022: Call of paper for Symposium VehicleSec 2023 (due Jan 3 2023)
    [CFP] Inaugural Symposium on Vehicle Security and Privacy (VehicleSec 2023)
  • 11/2022: One paper accepted by USENIX Security 2023
  • 7/2022: One paper accepted by ICWSM 2023
  • 5/2022: Three papers accepted by HFES 2022 (Two based on students' class projects of Human Aspects of S&P course)
  • 5/2022: One extended abstract accepted by HFES 2022
  • 5/2022: One paper accepted by KDD 2022
  • 4/2022: Dr. Xiong is named a Fellow of the Psychonomic Society
  • 1/2022: One paper accepted by USEC 2022
  • 1/2022: Two papers accepted by WWW 2022
  • 1/2022: One paper accepted by ICSE 2022
  • 12/2021: One paper accepted by JEP: Applied
  • 11/2021: One paper accepted by ICWSM 2022
  • 10/2021: One paper accepted by PLoS One
  • 8/2021: One paper accepted by QJEP
  • 8/2021: Two extended abstracts accepted by APA TMS 2021
  • 7/2021: One paper accepted by CSCW 2021
  • 5/2021: One paper accepted by AJP
  • 5/2021: One extended abstract accepted by HFES 2021
  • 3/2021: One demo paper accepted by WWW 2021
  • 2/2021: One demo paper accepted by WSDM 2021
  • 8/2020: One paper accepted by QJEP
  • 5/2020: One extended abstract accepted by HFES 2020
  • 3/2020: One paper accepted by IEEE S&P 2020
  • 3/2020: One paper accepted by Attention, Perception, & Psychophysics
  • 2/2020: One extended abstract accepted by CHI 2020
  • 1/2020: Our book chapter on Big Data was published in the book of Big Data in Psychological Research
  • 9/2019: Our book chapter on Phishing was published in the book of Human Performance in Automated and Autonomous Systems
  • 6/2019: One paper accepted by Human Factors
  • 4/2019: One paper accepted by WebSci 2019
  • 1/2019: One paper accepted by Attention, Perception, & Psychophysics
  • 1/2019: One paper accepted by Human Factors
  • 11/2018: One tutorial accepted by AAAI 2019
  • 10/2018: One paper accepted by Human Factors

Projects

  • Trust In Online Information (PI)
  • User-Centered Deployment of Differential Privacy (Co-PI)
  • Machine Learning in Cybersecurity (Co-PI)
  • COVID-19 Vaccination Decision Making (PI)

Publication

Journal Papers

  1. Fact-checking fact checkers: A data-driven Approach. [online]
    Lee, S.*, Xiong, A., Seo, H.*, & Lee, D. (2023).
    Harvard Kennedy School Misinformation Review. 4(5)

  2. Effects of associative inference on individuals' susceptibility to misinformation. [pdf]
    Xiong, A., Lee, S.*, Seo, H.*, & Lee, D. (2023).
    Journal of Experimental Psychology: Applied.

  3. A systematic review on fake news research through the lens of news creation and consumption: Research efforts, challenges, and future directions. [pdf]
    Kim, B., Xiong, A., Lee, D., & Han, K.(2021).
    PLoS One. 16(12): e0260080.

  4. Practice and transfer with mappings of spoon tip and handle to keypress responses. [pdf]
    Xu, Y.**, Xiong, A., & Proctor, R. W.(2021).
    Quarterly Journal of Experimental Psychology. 17470218211041366.

  5. Visal salience of 3D and 2D spoons determines SR mapping and flanker effects. [pdf]
    Xiong, A., Proctor, R. W., Xu, Y.**, & Zelaznik, H. N.(2020).
    Quarterly Journal of Experimental Psychology. 74, pp. 241-253.

  6. Transfer of incompatible spatial mapping to the vertical Simon task generalizes across effectors but not stimulus features. [pdf]
    Zhong, Q., Proctor, R. W., Xiong, A., & Vu, K-PL. (2020).
    Attention, Perception, & Psychophyscis. 82, pp. 2570-2580.

  7. Stimulus-response and response-effect compatibility with touchless gestures and moving action effects. [pdf]
    Jancyzyk, M., Xiong, A., & Proctor, R. W. (2019).
    Human Factors. 61, pp. 1297-1314.

  8. Visual salience, not the graspable part of a pictured eating utnesil, grabs attention. [pdf]
    Xiong, A., Proctor, R. W., & Zelanik, H. N. (2019).
    Attention, Perception, & Psychophyscis. 81, pp. 1454-1463.

  9. Effects of embedding anti-phishing training within cybersecurity warnings. [pdf]
    Xiong, A., Proctor, R. W., Yang, W., & Li, N. (2019).
    Human Factors. 61, pp. 577-595.

  10. Human factors in privacy and security of the Internet of Things. [pdf]
    Chong, I., Xiong, A., & Proctor, R. W. (2019).
    Ergonomics in Design. 27, pp. 1-6

  11. Information processing: The language and analytical tools for cognitive psychology in the information age. [pdf]
    Xiong, A., & Proctor, R. W. (2018).
    Frontiers in Psychology. 9, Article 1270.

  12. Vertically arrayed stimuli and responses: transfer of incompatible spatial mapping to Simon task occurs regardless of response-device orientation. [pdf]
    Zhong, Q., Xiong, A., Vu, K-PL, & Proctor, R. W. (2018).
    Experimental Brain Research. 236, pp. 175-185.

  13. Is domain highlighting actually helpful in identifying phishing web pages?. [pdf]
    Xiong, A., Proctor, R. W., Yang, W., & Li, N. (2017).
    Human Factors. 59, pp. 640-660.

  14. The method of negative instruction: Herbert S. Langfeld's and Lugwig R. Geissler's 1910-1913 insightful studies. [pdf]
    Proctor, R. W. & Xiong, A.. (2017).
    American Journal of Psychology. 130, pp. 11-21.

  15. Decreasing auditory Simon effects across reaction time distributions. [pdf]
    Xiong, A. & Proctor, R. W. (2016).
    Journal of Experimental Psychology: Human Perception and Performance. 42, pp. 23-38.

  16. Polarity correspondence as a general compatibility principle. [pdf]
    Proctor, R. W. & Xiong, A.. (2015).
    Current Directions in Psychological Science. 24, pp. 446-451.

  17. Referential coding of steering-wheel button presses in a simulated driving cockpit. [pdf]
    Xiong, A. & Proctor, R. W. (2015).
    Journal of Experimental Psychology: Applied. 21, pp. 418-428.

Book or Book Chapters

  1. From small-scale experiments to big data: Challenges and opportunities for experimental psychologists. [doi]
    Proctor, R. W. & Xiong, A.(2020).
    In S. E. Woo, L. Tay, & R. W. Proctor (Eds.) Big data methods for psychological research: New horizons and challenges. (pp. 35-57). Washington, D.C.: American Psychological Association.

  2. Evolution of phishing attacks: Challenges and opportunities for humans to adapt to the ubiquitous connected world.
    Xiong, A., Proctor, R. W. & Li, N. (2019).
    In P. Hancock & M. Mouloua (Eds.) Human performance in automated and autonomous systems: Emerging issues and practical perspectives. (pp. 237-258). Boca Raton, FL.: CRC Press.

  3. The role of task space in action control: Evidence from research on instructions. [pdf]
    Xiong, A. & Proctor, R. W. (2018).
    In K. D. Federmeier (Ed.) The psychology of learning and motivation. Vol. 69, (pp. 325-364). San Diego, CA: Academic Press.

  4. Experience, skill acquisition, and deliberate practice. [doi]
    Proctor, R. W. & Xiong, A.(2017).
    In D. Z. Hambrick, G. Campitelli, & B. N. Macnamara (Eds.) The science of expertise: Behavioral, neural, and genetic approaches to complex skill. (pp. 435-443). New York: Routledge.

Conference Proceedings

    2024

  1. Reliability Matters: Exploring the effect of AI explanations on misinformation detection with warning. [Forthcoming]
    Seo, H.*, Lee, S.*, Lee, D., & Xiong, A. (Accepted).
    In Proceedings of the AAAI Conference on Web and Social Media (ICWSM).

  2. Does it matter who said it? Exploring the impact of deepfake profile on user perception towards disinformation. [Forthcoming]
    Margie Ruffin, Seo, H.*, Xiong, A., Wang, G. (Accepted).
    In Proceedings of the AAAI Conference on Web and Social Media (ICWSM).

  3. The strange case of Jekyll and Hyde: Analysis of r/ToastMe and r/RoastMe Users on Reddit. [Forthcoming]
    Jung, W., Asati, N.**, Doan, L., Thai L. Xiong, A., & Lee, D. (Accepted).
    In Proceedings of the AAAI Conference on Web and Social Media (ICWSM).

  4. 2023

  5. Is explantion the cure? Misinformation mitigation in the short term and long term. [Forthcoming]
    Hsu, YL, Dai, SC, Xiong, A., & Ku, LW. (Accepted).
    In Findings of the Association for Computational Lingustics: EMNLP 2023. This work is based on Shih-Chieh's Master's capstone project.

  6. LLM-in-the-loop: Leveraging large language model for thematic analysis. [Forthcoming]
    Dai, SC*, Xiong, A., & Ku, LW. (Accepted).
    In Findings of the Association for Computational Lingustics: EMNLP 2023.

  7. Exploring Use of Explanative Illustrations to Communication Differential Privacy. [Forthcoming]
    Xiong, A., Chuhao Wu, Wang, T., Robert W. Proctor, Jeremiah Blocki, Li, N., & Jha, S. (Accepted).
    In Proceedings of the 2023 HFES 67 th International Annual Meetings

  8. Understanding users' privacy perception and decision of V2X communication in Connected Autononomous Vechiles. [pdf]
    Cai, Z.* & Xiong, A. (2023).
    In Proceedings of the 32nd USENIX Security Symposium (USENIX Security).

  9. Associative inference can increase people's susceptibility to misinformation. [pdf]
    Lee, S.*, Seo, H.*, Lee, D., & Xiong, A. (2023).
    In Proceedings of the AAAI Conference on Web and Social Media (ICWSM). (pp. 530-541).

  10. Human drivers' situation awareness of autonomous driving under physcial-world attacks. [pdf]
    Zhang. K.**, Chen, C.**, & Xiong, A. (2023).
    In Proceedings of the Inaugural Symposium on Vehicle Security & Privacy.

  11. 2022

  12. Ask to know more: Counterfactual explanations for fake claims. [pdf]
    Dai, SC, Hsu, YL, Xiong, A., & Ku, LW. (2022).
    In Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD).

  13. Effects of knowledge and experience on privacy decision-making in connected autonomous vehicle scenarios. [Forthcoming]
    Cai, Z.* & Xiong, A. (2022).
    In Proceedings of Usable Security and Privacy (USEC) Symposium.

  14. If you have a reliable source, say something: Effect of correction comments on COVID-19 misinformation. [pdf]
    Seo, H.*, Xiong, A., Lee, S.*, & Lee, D. (2022).
    In Proceedings of the AAAI Conference on Web and Social Media (ICWSM).

  15. Learning and programming challenges of Rust: A mixed methods study. [pdf]
    Zhu, S., Zhang, Z., Qin, B., Xiong, A., Song, L. (2022).
    In Proceedings of International Conference on Software Engineering (ICSE).

  16. VICTOR: An implicit approach to mitigate misinformation via continous verification reading. [pdf]
    Lo, KC, Dai, SC, Xiong, A., Jiang, J., & Ku, LW. (2022).
    In Proceedings of the ACM Web Conference (WWW).

  17. Beyond bot detection: Combating fraudulent online survey takers. [pdf]
    Zhang, Z., Zhu, S., Mink, J., Xiong, A., Song, L., & Wang, G. (2022).
    In Proceedings of the ACM Web Conference (WWW).

  18. 2021

  19. ChamberBreaker: Mitigating the echo chamber effect and supporting information hygiene through a gamified inoculation system. [pdf]
    Jeon, Y., Kim, B., Xiong, A., Lee, D., & Han, K.(2021).
    In Proceedings of the ACM Human-Computer Interaction. 5, CSCW2, Article 472.

  20. Escape from an Echo Chamber. [pdf]
    Lo, KC, Dai, SC, Xiong, A., Jiang, J., & Ku, LW. (2021).
    In Companion Proceedings of the Web Conference (WWW), pp.713-716, 2021. Online.

  21. All the wiser: Fake news intervention using user reading preference. [pdf]
    Lo, KC, Dai, SC, Xiong, A., Jiang, J., & Ku, LW. (2021).
    In Proceedings of the 14th ACM International Conference on Web Search and Data Mining (WSDM), pp.1069-1072, 2021. Online.

  22. 2020

  23. Towards effective differential privacy communication for users' data sharing decision and comprehension. [pdf]
    Xiong, A., Wang, T., Li, N., & Jha, S. (2020).
    In 2020 IEEE Symposium on Security and Privacy (S&P), pp.392-410, 2020. Online.

  24. Beyond cognitive ability: Susceptibility to fake wews is also explained by associative inference. [pdf]
    Lee, S.*, Forrest, J. P.**, Strait, J.**, Seo, H.*, Lee, D., & Xiong, A. (2020).
    In Extended Abstract of the 2020 CHI Conference on Human Factors in Computing System, (pp.1-8). New York: ACM.

  25. 2019 and before

  26. Trust it or not: Effects of machine-learning warnings in helping individuals mitigate misinformation. [pdf]
    Seo, H.*, Xiong, A., & Lee, D. (2019).
    In Proceedings of the 10th ACM Conference on Web Science, (pp.265-274). New York: ACM.

  27. Contribution of training in improving security warning compliance: Evidence from a field phishing experiment. [pdf]
    Yang, W., Xiong, A., Chen, J., Proctor, R. W., & Li, N. (2017).
    In Proceedings of the 4th Annual Symposium and Bootcamp on the Science of Security, (pp.59-61). New York: ACM.

  28. An empirical study of mnemonic sentence-based password generation strategies. [pdf]
    Yang, W., Li, N. Chowdhury, O., Xiong, A., & Proctor, R. W. (2016).
    In Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communication Security, (pp.1216-1229). New York: ACM.

Teaching

  • IST597: Human Aspects of Security and Privacy (Graduate-level), Fall 2021
  • SRA472: Human Aspects of Security and Privacy (Undergraduate-level), Fall 2020
  • IST504: Foundations of Theories and Methods of Information Sciences and Technology Research, Fall 2019
  • IST597: The Psychology of Deception, Spring 2019 & 2021
  • IST110H/110S: Information, People, & Technology, Fall 2018 & Spring 2020 & Spring 2022