• Xing Y, Hu L, Du X, Shen Z, Hu J and Wang F. (2024). A privacy-preserving federated graph learning framework for threat detection in IoT trigger-action programming. Expert Systems with Applications. 10.1016/j.eswa.2024.124724. 255. (124724). Online publication date: 1-Dec-2024.

    https://linkinghub.elsevier.com/retrieve/pii/S0957417424015914

  • Wu G, Wang M and Wang F. (2024). TAP with ease: a generic recommendation system for trigger-action programming based on multi-modal representation learning. Applied Soft Computing. 10.1016/j.asoc.2024.112163. 166. (112163). Online publication date: 1-Nov-2024.

    https://linkinghub.elsevier.com/retrieve/pii/S1568494624009372

  • Deng B, Sun B and Shen L. laTAPE: Location-Aware Programming and Executing Trigger-Action Rules. Proceedings of the 15th Asia-Pacific Symposium on Internetware. (503-506).

    https://doi.org/10.1145/3671016.3672579

  • Aghvamipanah M, Amini M, Artho C and Balliu M. (2024). Activity Recognition Protection for IoT Trigger-Action Platforms 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P). 10.1109/EuroSP60621.2024.00039. 979-8-3503-5425-6. (600-616).

    https://ieeexplore.ieee.org/document/10629004/

  • Sun D, Hu L, Wu G, Xing Y, Hu J and Wang F. Threat Detection in Trigger-Action Programming Rules of Smart Home With Heterogeneous Information Network Model. IEEE Internet of Things Journal. 10.1109/JIOT.2024.3362950. 11:10. (18320-18334).

    https://ieeexplore.ieee.org/document/10436364/

  • Giudici M, Padalino L, Paolino G, Paratici I, Pascu A and Garzotto F. (2024). Designing Home Automation Routines Using an LLM-Based Chatbot. Designs. 10.3390/designs8030043. 8:3. (43).

    https://www.mdpi.com/2411-9660/8/3/43

  • Wan L, Wang K, Wang H and Bai G. Is It Safe to Share Your Files? An Empirical Security Analysis of Google Workspace. Proceedings of the ACM Web Conference 2024. (1892-1901).

    https://doi.org/10.1145/3589334.3645697

  • Wang L, Vincent N, Rukanskaitė J and Zhang A. Pika: Empowering Non-Programmers to Author Executable Governance Policies in Online Communities. Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems. (1-18).

    https://doi.org/10.1145/3613904.3642012

  • Zhao K, Zhang H, Li J, Pan Q, Lai L, Nie Y and Zhang Z. (2024). Clustering on heterogeneous IoT information network based on meta path. Science Progress. 10.1177/00368504241257389. 107:2. Online publication date: 1-Apr-2024.

    https://journals.sagepub.com/doi/10.1177/00368504241257389

  • Fei Y, Rendy B, Kumar R, Dartsi O, Sahasrabuddhe H, McDermott M, Wang Z, Szymanski N, Walters L, Milsted D, Zeng Y, Jain A and Ceder G. (2024). AlabOS: a Python-based reconfigurable workflow management framework for autonomous laboratories. Digital Discovery. 10.1039/D4DD00129J.

    https://xlink.rsc.org/?DOI=D4DD00129J

  • Kamani M, Yao Y, Lyu H, Cheng Z, Chen L, Li L, Joe-Wong C and Luo J. WYZE rule. Proceedings of the 37th International Conference on Neural Information Processing Systems. (931-943).

    /doi/10.5555/3666122.3666166

  • Wang T, Chen W, Liu L, Wu G, Wei J and Huang T. Detecting Smart Home Automation Application Interferences with Domain Knowledge. Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering. (1086-1097).

    https://doi.org/10.1109/ASE56229.2023.00070

  • Romare P, Morel V, Karegar F and Fischer-Hübner S. (2023). Tapping into Privacy: A Study of User Preferences and Concerns on Trigger-Action Platforms 2023 20th Annual International Conference on Privacy, Security and Trust (PST). 10.1109/PST58708.2023.10320180. 979-8-3503-1387-1. (1-12).

    https://ieeexplore.ieee.org/document/10320180/

  • Chi H, Zeng Q and Du X. Detecting and handling IoT interaction threats in multi-platform multi-control-channel smart homes. Proceedings of the 32nd USENIX Conference on Security Symposium. (1559-1576).

    /doi/10.5555/3620237.3620325

  • Bu L, Zhang Q, Li S, Dai J, Bai G, Chen K and Li X. Security Checking of Trigger-Action-Programming Smart Home Integrations. Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. (639-651).

    https://doi.org/10.1145/3597926.3598084

  • Abdul-nafa A, Ahmed S, Ahmed Y and Alsaydia O. (2023). Control Robotic Hand Depending on Voice Commands and IoT. Nano Biomedicine and Engineering. 10.26599/NBE.2023.9290028. 15:3. (288-295). Online publication date: 1-Jul-2023.

    https://www.sciopen.com/article/10.26599/NBE.2023.9290028

  • Mattioli A and Paternò F. Understanding User Needs in Smart Homes and How to Fulfil Them. End-User Development. (125-142).

    https://doi.org/10.1007/978-3-031-34433-6_8

  • Andrao M, Balducci F, Breve B, Cena F, Desolda G, Deufemia V, Gena C, Matera M, Mattioli A, Paternò F, Santoro C, Treccani B, Vernero F and Zancanaro M. Understanding Concepts, Methods and Tools for End-User Control of Automations in Ecosystems of Smart Objects and Services. End-User Development. (104-124).

    https://doi.org/10.1007/978-3-031-34433-6_7

  • Wang L, Dong K, Gu X, Ling Z and Yang M. (2023). Lightweight Gesture Based Trigger-Action Programming for Home Internet-of-Things 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 10.1109/CSCWD57460.2023.10152738. 979-8-3503-3168-4. (959-964).

    https://ieeexplore.ieee.org/document/10152738/

  • Yao Y, Kamani M, Cheng Z, Chen L, Joe-Wong C and Liu T. FedRule: Federated Rule Recommendation System with Graph Neural Networks. Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation. (197-208).

    https://doi.org/10.1145/3576842.3582328

  • Ahmadpanah M, Hedin D and Sabelfeld A. (2023). LazyTAP: On-Demand Data Minimization for Trigger-Action Applications 2023 IEEE Symposium on Security and Privacy (SP). 10.1109/SP46215.2023.10179425. 978-1-6654-9336-9. (3079-3097).

    https://ieeexplore.ieee.org/document/10179425/

  • Sun B, Shen L, Peng X and Wang Z. SCTAP: Supporting Scenario-Centric Trigger-Action Programming based on Software-Defined Physical Environments. Proceedings of the ACM Web Conference 2023. (2916-2926).

    https://doi.org/10.1145/3543507.3583293

  • SV A, K A, S J and M M. (2023). A Web of Things-Specific IFTTT Applet: Integration of a Trigger Service with Action Services 2023 7th International Conference on Trends in Electronics and Informatics (ICOEI). 10.1109/ICOEI56765.2023.10126019. 979-8-3503-9728-4. (492-496).

    https://ieeexplore.ieee.org/document/10126019/

  • Deng Y, Zheng X, Zhang T, Liu H, Lou G, Kim M and Chen T. A Declarative Metamorphic Testing Framework for Autonomous Driving. IEEE Transactions on Software Engineering. 10.1109/TSE.2022.3206427. 49:4. (1964-1982).

    https://ieeexplore.ieee.org/document/9906558/

  • Yuan B, Wan J, Wu Y, Zou D and Jin H. (2023). On the Security of Smart Home Systems: A Survey. Journal of Computer Science and Technology. 10.1007/s11390-023-2488-3. 38:2. (228-247). Online publication date: 1-Apr-2023.

    https://link.springer.com/10.1007/s11390-023-2488-3

  • Breve B, Cimino G and Deufemia V. Identifying Security and Privacy Violation Rules in Trigger-Action IoT Platforms With NLP Models. IEEE Internet of Things Journal. 10.1109/JIOT.2022.3222615. 10:6. (5607-5622).

    https://ieeexplore.ieee.org/document/9953113/

  • Shah H and Sahoo J. (2023). Retracted: Using a Multifaceted, Network-Informed Methodology to Assess Data Sensitivity from Consumers IoT Gadgets 2023 International Conference on Artificial Intelligence and Smart Communication (AISC). 10.1109/AISC56616.2023.10085075. 979-8-3503-2230-9. (1303-1309).

    https://ieeexplore.ieee.org/document/10085075/

  • Markus A, Al-Haboobi A, Kecskemeti G and Kertesz A. (2023). Simulating IoT Workflows in DISSECT-CF-Fog. Sensors. 10.3390/s23031294. 23:3. (1294).

    https://www.mdpi.com/1424-8220/23/3/1294

  • Thummar H, Jangid J and Patel A. (2023). E-Billing System using Smart Energy Meter for Domestic Application 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT). 10.1109/IDCIoT56793.2023.10053452. 978-1-6654-7451-1. (695-701).

    https://ieeexplore.ieee.org/document/10053452/

  • Huang Z, Li J, Zhang H, Zhang C and Yu G. (2023). TAP-AHGNN: An Attention-Based Heterogeneous Graph Neural Network for Service Recommendation on Trigger-Action Programming Platform. Advanced Intelligent Computing Technology and Applications. 10.1007/978-981-99-4752-2_12. (141-152).

    https://link.springer.com/10.1007/978-981-99-4752-2_12

  • Monge Roffarello A and De Russis L. (2023). An Ontology-Based Approach for Setting Security Policies in Smart Homes. Emerging Technologies for Authorization and Authentication. 10.1007/978-3-031-25467-3_1. (1-14).

    https://link.springer.com/10.1007/978-3-031-25467-3_1

  • Stellios I, Mokos K and Kotzanikolaou P. (2022). Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services. Connection Science. 10.1080/09540091.2022.2072470. 34:1. (1401-1429). Online publication date: 31-Dec-2022.

    https://www.tandfonline.com/doi/full/10.1080/09540091.2022.2072470

  • Kalantari S, Hughes D and De Decker B. (2022). Listing the ingredients for IFTTT recipes 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 10.1109/TrustCom56396.2022.00194. 978-1-6654-9425-0. (1376-1383).

    https://ieeexplore.ieee.org/document/10063456/

  • Manca M, Paternò F and Santoro C. (2021). Remote monitoring of end-user created automations in field trials. Journal of Ambient Intelligence and Humanized Computing. 10.1007/s12652-021-03239-0. 13:12. (5669-5697). Online publication date: 1-Dec-2022.

    https://link.springer.com/10.1007/s12652-021-03239-0

  • Constantinou S, Konstantinidis A, Chrysanthis P and Zeinalipour-Yazti D. (2022). Green Planning of IoT Home Automation Workflows in Smart Buildings. ACM Transactions on Internet of Things. 3:4. (1-30). Online publication date: 30-Nov-2022.

    https://doi.org/10.1145/3549549

  • Yusuf I, Jamal D, Jiang L and Lo D. RecipeGen++: an automated trigger action programs generator. Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. (1672-1676).

    https://doi.org/10.1145/3540250.3558913

  • Dias J, Restivo A and Ferreira H. (2022). Designing and constructing internet-of-Things systems: An overview of the ecosystem. Internet of Things. 10.1016/j.iot.2022.100529. 19. (100529). Online publication date: 1-Aug-2022.

    https://linkinghub.elsevier.com/retrieve/pii/S2542660522000312

  • Almohri H, Watson L, Evans D and Billups S. (2022). Dynamic System Diversification for Securing Cloud-based IoT Subnetworks. ACM Transactions on Autonomous and Adaptive Systems. 17:1-2. (1-23). Online publication date: 30-Jun-2022.

    https://doi.org/10.1145/3547350

  • Reda R, Carbonaro A, de Boer V, Siebes R, van der Weerdt R, Nouwt B and Daniele L. (2022). Supporting Smart Home Scenarios Using OWL and SWRL Rules. Sensors. 10.3390/s22114131. 22:11. (4131).

    https://www.mdpi.com/1424-8220/22/11/4131

  • Gopalakrishna N, Anandayuvaraj D, Detti A, Bland F, Rahaman S and Davis J. "If security is required". Proceedings of the 4th International Workshop on Software Engineering Research and Practice for the IoT. (1-8).

    https://doi.org/10.1145/3528227.3528565

  • Yusuf I, Jiang L and Lo D. Accurate generation of trigger-action programs with domain-adapted sequence-to-sequence learning. Proceedings of the 30th IEEE/ACM International Conference on Program Comprehension. (99-110).

    https://doi.org/10.1145/3524610.3527922

  • Dong K, Zhang Y, Zhao Y, Li D, Ling Z, Wu W and Zhu X. (2022). Real-Time Execution of Trigger-Action Connection for Home Internet-of-Things IEEE INFOCOM 2022 - IEEE Conference on Computer Communications. 10.1109/INFOCOM48880.2022.9796872. 978-1-6654-5822-1. (1489-1498).

    https://ieeexplore.ieee.org/document/9796872/

  • Chi H, Fu C, Zeng Q and Du X. (2022). Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks 2022 IEEE Symposium on Security and Privacy (SP). 10.1109/SP46214.2022.9833620. 978-1-6654-1316-9. (285-302).

    https://ieeexplore.ieee.org/document/9833620/

  • Menon V, Jacob S, Joseph S, Sehdev P, Khosravi M and Al-Turjman F. (2022). An IoT-enabled intelligent automobile system for smart cities. Internet of Things. 10.1016/j.iot.2020.100213. 18. (100213). Online publication date: 1-May-2022.

    https://linkinghub.elsevier.com/retrieve/pii/S2542660520300494

  • Kim S and Ko I. A Conversational Approach for Modifying Service Mashups in IoT Environments. Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. (1-16).

    https://doi.org/10.1145/3491102.3517655

  • Nakata T, Chen S and Nakamura M. (2022). Uni-Messe: Unified Rule-Based Message Delivery Service for Efficient Context-Aware Service Integration. Energies. 10.3390/en15051729. 15:5. (1729).

    https://www.mdpi.com/1996-1073/15/5/1729

  • Xing Y, Hu L, Zhang X, Wu G and Wang F. Nonnegative Matrix Factorization Based Heterogeneous Graph Embedding Method for Trigger-Action Programming in IoT. IEEE Transactions on Industrial Informatics. 10.1109/TII.2021.3092774. 18:2. (1231-1239).

    https://ieeexplore.ieee.org/document/9466395/

  • Yu Y and Liu J. TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT Systems. IEEE Transactions on Information Forensics and Security. 10.1109/TIFS.2022.3214084. 17. (3773-3788).

    https://ieeexplore.ieee.org/document/9916292/

  • Nakata T, Watanabe T, Chen S and Nakamura M. (2022). Integrating Uni-messe and FIWARE for Low-Code Development of Complex Context-Aware Applications. Distributed, Ambient and Pervasive Interactions. Smart Environments, Ecosystems, and Cities. 10.1007/978-3-031-05463-1_14. (193-207).

    https://link.springer.com/10.1007/978-3-031-05463-1_14

  • Roy M and Shah P. (2022). Internet of Things (IoT) Enabled Smart Navigation Aid for Visually Impaired. Advanced Information Networking and Applications. 10.1007/978-3-030-99619-2_23. (232-244).

    https://link.springer.com/10.1007/978-3-030-99619-2_23

  • Ban X, Ding M, Liu S, Chen C, Zhang J and Xiang Y. (2022). TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment. Computer Security. ESORICS 2021 International Workshops. 10.1007/978-3-030-95484-0_14. (218-237).

    https://link.springer.com/10.1007/978-3-030-95484-0_14

  • Stellios I, Mokos K and Kotzanikolaou P. (2022). Assessing Vulnerabilities and IoT-Enabled Attacks on Smart Lighting Systems. Computer Security. ESORICS 2021 International Workshops. 10.1007/978-3-030-95484-0_13. (199-217).

    https://link.springer.com/10.1007/978-3-030-95484-0_13

  • Mah K, Loke L and Hespanhol L. (2021). Towards a Contemplative Research Framework for Training Self-Observation in HCI: A Study of Compassion Cultivation. ACM Transactions on Computer-Human Interaction. 28:6. (1-27). Online publication date: 31-Dec-2022.

    https://doi.org/10.1145/3471932

  • Torre I, Carrigan E, Domijan K, McDonnell R and Harte N. (2021). The Effect of Audio-Visual Smiles on Social Influence in a Cooperative Human–Agent Interaction Task. ACM Transactions on Computer-Human Interaction. 28:6. (1-38). Online publication date: 31-Dec-2022.

    https://doi.org/10.1145/3469232

  • Yu H, Hua J and Julien C. Analysis of IFTTT Recipes to Study How Humans Use Internet-of-Things (IoT) Devices. Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems. (537-541).

    https://doi.org/10.1145/3485730.3494115

  • Kumar A, Manikandan R, Kose U, Gupta D and Satapathy S. (2021). Doctor's Dilemma: Evaluating an Explainable Subtractive Spatial Lightweight Convolutional Neural Network for Brain Tumor Diagnosis. ACM Transactions on Multimedia Computing, Communications, and Applications. 17:3s. (1-26). Online publication date: 31-Oct-2021.

    https://doi.org/10.1145/3457187

  • Li J, Liu C, Tao C, Chan Z, Zhao D, Zhang M and Yan R. (2021). Dialogue History Matters! Personalized Response Selection in Multi-Turn Retrieval-Based Chatbots. ACM Transactions on Information Systems. 39:4. (1-25). Online publication date: 31-Oct-2021.

    https://doi.org/10.1145/3453183

  • Lipani A, Carterette B and Yilmaz E. (2021). How Am I Doing?: Evaluating Conversational Search Systems Offline. ACM Transactions on Information Systems. 39:4. (1-22). Online publication date: 31-Oct-2021.

    https://doi.org/10.1145/3451160

  • Corno F, De Russis L and Monge Roffarello A. (2021). From Users’ Intentions to IF-THEN Rules in the Internet of Things. ACM Transactions on Information Systems. 39:4. (1-33). Online publication date: 31-Oct-2021.

    https://doi.org/10.1145/3447264

  • Phillips C, Klarkowski M, Frommel J, Gutwin C and Mandryk R. (2021). Identifying Commercial Games with Therapeutic Potential through a Content Analysis of Steam Reviews. Proceedings of the ACM on Human-Computer Interaction. 5:CHI PLAY. (1-21). Online publication date: 5-Oct-2021.

    https://doi.org/10.1145/3474682

  • Irfan M, Jawad H, Felix B, Farooq Abbasi S, Nawaz A, Akbarzadeh S, Awais M, Chen L, Westerlund T and Chen W. Non-Wearable IoT-Based Smart Ambient Behavior Observation System. IEEE Sensors Journal. 10.1109/JSEN.2021.3097392. 21:18. (20857-20869).

    https://ieeexplore.ieee.org/document/9486939/

  • Huang B, Dong H and Bouguettaya A. (2021). Conflict Detection in IoT-based Smart Homes 2021 IEEE International Conference on Web Services (ICWS). 10.1109/ICWS53863.2021.00048. 978-1-6654-1681-8. (303-313).

    https://ieeexplore.ieee.org/document/9590330/

  • Abusukhon A. Toward Achieving a Balance Between the User Satisfaction and the Power Conservation in the Internet of Things. IEEE Internet of Things Journal. 10.1109/JIOT.2021.3051764. 8:14. (10998-11015).

    https://ieeexplore.ieee.org/document/9326414/

  • Um T, Lee G and Chun B. (2021). Pluto: High-Performance IoT-Aware Stream Processing 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). 10.1109/ICDCS51616.2021.00017. 978-1-6654-4513-9. (79-91).

    https://ieeexplore.ieee.org/document/9546413/

  • Akbarzadeh O, Baradaran M, Khosravi M and Qureshi N. (2021). IoT-Based Smart Management of Healthcare Services in Hospital Buildings during COVID-19 and Future Pandemics. Wireless Communications and Mobile Computing. 10.1155/2021/5533161. 2021. (1-14). Online publication date: 30-Jun-2021.

    https://www.hindawi.com/journals/wcmc/2021/5533161/

  • Lambrichts M, Ramakers R, Hodges S, Coppers S and Devine J. (2021). A Survey and Taxonomy of Electronics Toolkits for Interactive and Ubiquitous Device Prototyping. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 5:2. (1-24). Online publication date: 23-Jun-2021.

    https://doi.org/10.1145/3463523

  • Salovaara A, Bellucci A, Vianello A and Jacucci G. Programmable Smart Home Toolkits Should Better Address Households’ Social Needs. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. (1-14).

    https://doi.org/10.1145/3411764.3445770

  • Zhao V, Zhang L, Wang B, Littman M, Lu S and Ur B. Understanding Trigger-Action Programs Through Novel Visualizations of Program Differences. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. (1-17).

    https://doi.org/10.1145/3411764.3445567

  • Goksel F, Ozmen M, Reeves M, Shivakumar B and Celik Z. (2021). On the Safety Implications of Misordered Events and Commands in IoT Systems 2021 IEEE Security and Privacy Workshops (SPW). 10.1109/SPW53761.2021.00038. 978-1-6654-3732-5. (235-241).

    https://ieeexplore.ieee.org/document/9474310/

  • Chen Y, Chowdhury A, Wang R, Sabelfeld A, Chatterjee R and Fernandes E. (2021). Data Privacy in Trigger-Action Systems 2021 IEEE Symposium on Security and Privacy (SP). 10.1109/SP40001.2021.00108. 978-1-7281-8934-5. (501-518).

    https://ieeexplore.ieee.org/document/9519495/

  • Constantinou S, Konstantinidis A, Zeinalipour-Yazti D and Chrysanthis P. (2021). The IoT Meta-Control Firewall 2021 IEEE 37th International Conference on Data Engineering (ICDE). 10.1109/ICDE51399.2021.00284. 978-1-7281-9184-3. (2523-2534).

    https://ieeexplore.ieee.org/document/9458652/

  • Jiang K, Zhang H, Zhang W, Fang L, Ge C, Yuan Y, Liu Z and Han J. (2021). TapChain. Security and Communication Networks. 2021. Online publication date: 1-Jan-2021.

    https://doi.org/10.1155/2021/6568602

  • Asunis L, Frau V, Macis R, Pireddu C and Spano L. (2021). PAC-Bot: Writing Text Messages for Developing Point-and-Click Games. End-User Development. 10.1007/978-3-030-79840-6_15. (213-221).

    https://link.springer.com/10.1007/978-3-030-79840-6_15

  • Soares D, Dias J, Restivo A and Ferreira H. (2021). Programming IoT-Spaces: A User-Survey on Home Automation Rules. Computational Science – ICCS 2021. 10.1007/978-3-030-77970-2_39. (512-525).

    https://link.springer.com/10.1007/978-3-030-77970-2_39

  • Boukharrou R, Chaouche A and Mahdjar K. (2021). Toward a Privacy Guard for Cloud-Based Home Assistants and IoT Devices. Mobile, Secure, and Programmable Networking. 10.1007/978-3-030-67550-9_12. (177-194).

    http://link.springer.com/10.1007/978-3-030-67550-9_12

  • Stevens C, Alhanahnah M, Yan Q and Bagheri H. Comparing formal models of IoT app coordination analysis. Proceedings of the 3rd ACM SIGSOFT International Workshop on Software Security from Design to Deployment. (3-10).

    https://doi.org/10.1145/3416507.3423188

  • Harvey J, Poorrezaei M, Woodall T, Nica-Avram G, Smith G, Ajiboye T, Kholodova K and Zhu K. (2020). The Smart Home: How Consumers Craft New Service Networks by Combining Heterogeneous Smart Domestic Products. Journal of Service Research. 10.1177/1094670520929095. 23:4. (504-526). Online publication date: 1-Nov-2020.

    https://journals.sagepub.com/doi/10.1177/1094670520929095

  • Corno F, De Russis L and Monge Roffarello A. HeyTAP. Proceedings of the 2020 International Conference on Advanced Visual Interfaces. (1-9).

    https://doi.org/10.1145/3399715.3399905

  • Zhang L, He W, Morkved O, Zhao V, Littman M, Lu S and Ur B. (2020). Trace2TAP. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 4:3. (1-26). Online publication date: 4-Sep-2020.

    https://doi.org/10.1145/3411838

  • Cobb C, Surbatovich M, Kawakami A, Sharif M, Bauer L, Das A and Jia L. How risky are real users' IFTTT applets?. Proceedings of the Sixteenth USENIX Conference on Usable Privacy and Security. (505-529).

    /doi/10.5555/3488905.3488931

  • Zhao V, Zhang L, Wang B, Lu S and Ur B. Visualizing Differences to Improve End-User Understanding of Trigger-Action Programs. Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. (1-10).

    https://doi.org/10.1145/3334480.3382940

  • Mun H, Lee H, Kim S and Lee Y. A smart speaker performance measurement tool. Proceedings of the 35th Annual ACM Symposium on Applied Computing. (755-762).

    https://doi.org/10.1145/3341105.3373990

  • Corno F, De Russis L and Monge Roffarello A. TAPrec. Proceedings of the 25th International Conference on Intelligent User Interfaces. (579-588).

    https://doi.org/10.1145/3377325.3377499

  • Hu L, Wu G, Xing Y and Wang F. Things2Vec: Semantic Modeling in the Internet of Things With Graph Representation Learning. IEEE Internet of Things Journal. 10.1109/JIOT.2019.2962630. 7:3. (1939-1948).

    https://ieeexplore.ieee.org/document/8944272/

  • Xiao D, Wang Q, Cai M, Zhu Z and Zhao W. A3ID: An Automatic and Interpretable Implicit Interference Detection Method for Smart Home via Knowledge Graph. IEEE Internet of Things Journal. 10.1109/JIOT.2019.2959063. 7:3. (2197-2211).

    https://ieeexplore.ieee.org/document/8930944/

  • Khanna S, Becerra V, Allahham A, Giaouris D, Foster J, Roberts K, Hutchinson D and Fawcett J. (2020). Demand Response Model Development for Smart Households Using Time of Use Tariffs and Optimal Control—The Isle of Wight Energy Autonomous Community Case Study. Energies. 10.3390/en13030541. 13:3. (541).

    https://www.mdpi.com/1996-1073/13/3/541

  • Lee H, Mun H and Lee Y. (2020). Comparing Response Time of Home IoT Devices with or without Cloud 2020 IEEE International Conference on Consumer Electronics (ICCE). 10.1109/ICCE46568.2020.9043102. 978-1-7281-5186-1. (1-6).

    https://ieeexplore.ieee.org/document/9043102/

  • Paci F, Bianchin D, Quintarelli E and Zannone N. (2020). IFTTT Privacy Checker. Emerging Technologies for Authorization and Authentication. 10.1007/978-3-030-64455-0_6. (90-107).

    http://link.springer.com/10.1007/978-3-030-64455-0_6

  • Chiang Y, Hsiao H, Yu C and Kim T. (2020). On the Privacy Risks of Compromised Trigger-Action Platforms. Computer Security – ESORICS 2020. 10.1007/978-3-030-59013-0_13. (251-271).

    http://link.springer.com/10.1007/978-3-030-59013-0_13

  • Maskeliūnas R, Damaševičius R and Segal S. (2019). A Review of Internet of Things Technologies for Ambient Assisted Living Environments. Future Internet. 10.3390/fi11120259. 11:12. (259).

    https://www.mdpi.com/1999-5903/11/12/259

  • Wang Q, Datta P, Yang W, Liu S, Bates A and Gunter C. Charting the Attack Surface of Trigger-Action IoT Platforms. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. (1439-1453).

    https://doi.org/10.1145/3319535.3345662

  • Ren J, Dubois D, Choffnes D, Mandalari A, Kolcun R and Haddadi H. Information Exposure From Consumer IoT Devices. Proceedings of the Internet Measurement Conference. (267-279).

    https://doi.org/10.1145/3355369.3355577

  • Hsu K, Chiang Y and Hsiao H. SafeChain: Securing Trigger-Action Programming From Attack Chains. IEEE Transactions on Information Forensics and Security. 10.1109/TIFS.2019.2899758. 14:10. (2607-2622).

    https://ieeexplore.ieee.org/document/8642934/

  • Benhaddou D, Afogbuom L, Attia F and Anan M. (2019). Autonomous Living Building: Adapting to Occupant’s Behavior 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC). 10.1109/IWCMC.2019.8766447. 978-1-5386-7747-6. (1803-1808).

    https://ieeexplore.ieee.org/document/8766447/

  • Zhang L, He W, Martinez J, Brackenbury N, Lu S and Ur B. AutoTap. Proceedings of the 41st International Conference on Software Engineering. (281-291).

    https://doi.org/10.1109/ICSE.2019.00043

  • Brackenbury W, Deora A, Ritchey J, Vallee J, He W, Wang G, Littman M and Ur B. How Users Interpret Bugs in Trigger-Action Programming. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. (1-12).

    https://doi.org/10.1145/3290605.3300782

  • Corno F, De Russis L and Monge Roffarello A. Empowering End Users in Debugging Trigger-Action Rules. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. (1-13).

    https://doi.org/10.1145/3290605.3300618

  • Hu L, Gong Y, Xing Y and Wang F. Semantic Representation with Heterogeneous Information Network Using Matrix Factorization for Clustering in the Internet of Things. IEEE Access. 10.1109/ACCESS.2019.2903310. (1-1).

    https://ieeexplore.ieee.org/document/8661628/

  • Stach C, Steimle F and Mitschang B. (2019). How to Realize Device Interoperability and Information Security in mHealth Applications. Biomedical Engineering Systems and Technologies. 10.1007/978-3-030-29196-9_12. (213-237).

    http://link.springer.com/10.1007/978-3-030-29196-9_12

  • Manca M, Paternò F and Santoro C. (2019). Analyzing Trigger-Action Programming for Personalization of Robot Behaviour in IoT Environments. End-User Development. 10.1007/978-3-030-24781-2_7. (100-114).

    http://link.springer.com/10.1007/978-3-030-24781-2_7

  • Fanni F, Senis M, Tola A, Murru F, Romoli M, Spano L, Blec̆ić I and Trunfio G. (2019). PAC-PAC: End User Development of Immersive Point and Click Games. End-User Development. 10.1007/978-3-030-24781-2_20. (225-229).

    http://link.springer.com/10.1007/978-3-030-24781-2_20

  • Shadbolt N, O’Hara K, De Roure D and Hall W. (2019). The Future(s) of Social Machines: The Research Agenda. The Theory and Practice of Social Machines. 10.1007/978-3-030-10889-2_5. (201-217).

    http://link.springer.com/10.1007/978-3-030-10889-2_5

  • Corcella L, Manca M, Paternò F and Santoro C. (2019). A Visual Tool for Analysing IoT Trigger/Action Programming. Human-Centered Software Engineering. 10.1007/978-3-030-05909-5_11. (189-206).

    https://link.springer.com/10.1007/978-3-030-05909-5_11

  • Nguyen D, Song C, Qian Z, Krishnamurthy S, Colbert E and McDaniel P. IotSan. Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies. (191-203).

    https://doi.org/10.1145/3281411.3281440

  • Kodali R, Greeshma R, Nimmanapalli K and Borra Y. (2018). IOT Based Industrial Plant Safety Gas Leakage Detection System 2018 4th International Conference on Computing Communication and Automation (ICCCA). 10.1109/CCAA.2018.8777463. 978-1-5386-6947-1. (1-5).

    https://ieeexplore.ieee.org/document/8777463/

  • Bastys I, Balliu M and Sabelfeld A. If This Then What?. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. (1102-1119).

    https://doi.org/10.1145/3243734.3243841

  • Flittner M, Mahfoudi M, Saucez D, Wählisch M, Iannone L, Bajpai V and Afanasyev A. (2018). A Survey on Artifacts from CoNEXT, ICN, IMC, and SIGCOMM Conferences in 2017. ACM SIGCOMM Computer Communication Review. 48:1. (75-80). Online publication date: 27-Apr-2018.

    https://doi.org/10.1145/3211852.3211864

  • Lodge T, Crabtree A and Brown A. (2018). Developing GDPR Compliant Apps for the Edge. Data Privacy Management, Cryptocurrencies and Blockchain Technology. 10.1007/978-3-030-00305-0_22. (313-328).

    http://link.springer.com/10.1007/978-3-030-00305-0_22