Aiping Xiong

alt text 

Assistant Professor
College of Information Sciences and Technology
Penn State University
Office: E373
Phone: (814)-865-2370
Email: axx29 @ psu.edu
Google scholar

About me

I'm an Assistant Professor in the College of Information Sciences and Technology, Penn State University - University Park. My primary research interests lie in the interdisciplinary field of decision making and cybersecruity and privacy. I design and conduct online and laboratory human subject experiments to obtain quantitative and qualitative measures of human performance in various cybersecurity and privacy settings. Recently, I start to collaborate with data scientists to work on designing realistic machine learning systems and effective interfaces to facilitate people's trust in online information based on empirical human behavior data. My research spans cognitive psychology, human factors, and cybersecurity and privacy.

Prior to Penn State, I obtained my Ph.D. in Psychological Sciences and MS degree in Industrial Engineering:Human Factors from Purdue University, West Lafayette. My advisor is Professor Robert W. Proctor. I received my BS degree in Electronic and Information Engineering from Nanjing University of Science and Technology.

News

  • 5/2019: NSF EAGER SaTC Project awarded
  • 4/2019: One paper accepted by WebSci 2019
  • 2/2019: PSU SSRI seed grant awarded
  • 1/2019: One paper accepted by Attention, Perception, & Psychophysics
  • 1/2019: One paper accepted by Human Factors
  • 12/2018: PSU CSRE seed grant awarded
  • 11/2018: One tutorial accepted by AAAI 2019
  • 10/2018: One paper accepted by Human Factors

Projects

Publication

Journal Papers

  1. Visual salience, not the graspable part of a pictured eating utnesil, grabs attention. [pdf]
    Xiong, A., Proctor, R. W., & Zelanik, H. N. (in press).
    Attention, Perception, & Psychophyscis.

  2. Stimulus-response and response-effect compatibility with touchless gestures and moving action effects. [pdf]
    Jancyzyk, M., Xiong, A., & Proctor, R. W. (in press).
    Human Factors.

  3. Effects of embedding anti-phishing training within cybersecurity warnings. [pdf]
    Xiong, A., Proctor, R. W., Yang, W., & Li, N. (2019).
    Human Factors. 61, pp. 577-595.

  4. Human factors in privacy and security of the Internet of Things. [pdf]
    Chong, I., Xiong, A., & Proctor, R. W. (2019).
    Ergonomics in Design. 27, pp. 1-6

  5. Information processing: The language and analytical tools for cognitive psychology in the information age. [pdf]
    Xiong, A., & Proctor, R. W. (2018).
    Frontiers in Psychology. 9, Article 1270.

  6. Vertically arrayed stimuli and responses: transfer of incompatible spatial mapping to Simon task occurs regardless of response-device orientation. [pdf]
    Zhong, Q., Xiong, A., Vu, K-PL, & Proctor, R. W. (2018).
    Experimental Brain Research. 236, pp. 175-185.

  7. Is domain highlighting actually helpful in identifying phishing web pages?. [pdf]
    Xiong, A., Proctor, R. W., Yang, W., & Li, N. (2017).
    Human Factors. 59, pp. 640-660.

  8. The method of negative instruction: Herbert S. Langfeld's and Lugwig R. Geissler's 1910-1913 insightful studies. [pdf]
    Proctor, R. W. & Xiong, A.. (2017).
    American Journal of Psychology. 130, pp. 11-21.

  9. Decreasing auditory Simon effects across reaction time distributions. [pdf]
    Xiong, A. & Proctor, R. W. (2016).
    Journal of Experimental Psychology: Human Perception and Performance. 42, pp. 23-38.

  10. Polarity correspondence as a general compatibility principle. [pdf]
    Proctor, R. W. & Xiong, A.. (2015).
    Current Directions in Psychological Science. 24, pp. 446-451.

  11. Referential coding of steering-wheel button presses in a simulated driving cockpit. [pdf]
    Xiong, A. & Proctor, R. W. (2015).
    Journal of Experimental Psychology: Applied. 21, pp. 418-428.

Book or Book Chapters

  1. The role of task space in action control: Evidence from research on instructions. [pdf]
    Xiong, A. & Proctor, R. W. (2018).
    In K. D. Federmeier (Ed.) The psychology of learning and motivation. Vol. 69, (pp. 325-364). San Diego, CA: Academic Press.

  2. Experience, skill acquisition, and deliberate practice. [doi]
    Proctor, R. W. & Xiong, A.(2017).
    In D. Z. Hambrick, G. Campitelli, & B. N. Macnamara (Eds.) The science of expertise: Behavioral, neural, and genetic approaches to complex skill. (pp. 435-443). New York: Routledge.

Conference Proceedings

  1. Contribution of training in improving security warning compliance: Evidence from a field phishing experiment. [pdf]
    Yang, W., Xiong, A., Chen, J., Proctor, R. W., & Li, N. (2017).
    In Proceedings of the 4th Annual Symposium and Bootcamp on the Science of Security, (pp.59-61). New York: ACM.

  2. An empirical study of mnemonic sentence-based password generation strategies. [pdf]
    Yang, W., Li, N. Chowdhury, O., Xiong, A., & Proctor, R. W. (2016).
    In Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communication Security, (pp.1216-1229). New York: ACM.

Teaching

  • IST597: The Psychology of Deception, Spring 2019
  • IST110H: Information, People, & Technology, Fall 2018