Welcome!

Mohammad Maifi Hasan Khan 
Associate Professor
Department of Computer Science and Engineering
University of Connecticut
Office: 363 ITE Building
Storrs Mansfiled, CT, USA
Email: maifi dot khan @ uconn.edu
Phone: 860-486-0609

I am an Associate Professor in the Department of Computer Science and Engineering at UCONN. I received my PhD from University of Illinois, Urbana-Champaign (UIUC) in 2011. My current research focuses on human-automation interactions, trust calibration in autonomous systems, and risk communication in the context of cybersecurity. 

 

Awards

– NSF CAREER Award, 2018.
– Best Paper Award, 2023 ACM Conference on Human Factors in Computing Systems (CHI), Hamburg, Germany, April 23 – 28, 2023.
– Best Paper Nominee, 6th International Conference on Human-Agent Interaction, 15-18th December, 2018, Southampton, UK.

 

Publications

Link to my Google Scholar site for more up-to-date information:

https://scholar.google.com/citations?user=BxZd6T4AAAAJ&hl=en&oi=ao

 

Book Chapter

Data Mining for Diagnostic Debugging in Sensor Networks: Preliminary Evidence and Lessons Learned. Tarek Abdelzaher, Mohammad Maifi Hasan Khan, Hieu Le, Hossein Ahmadi, and Jiawei Han. Knowledge Discovery from Sensor Data, Lecture Notes on Computer Science, Springer, 2009. (Book Chapter)

Journal/Magazine Publications 

  1. Human vs. Automation: Which One Will You Trust More If You Are About to Lose Money? Fahim, M.A.A., Khan, M.M.H., Jensen, T. and Albayram, Y. International Journal of Human–Computer Interaction, 39(12), pp.2420-2435, 2023.
  2. The mediating effect of emotions on trust in the context of automated system usage. Al Fahim, M.A., Khan, M.M.H., Jensen, T., Albayram, Y., Coman, E. and Buck, R.  IEEE transactions on affective computing, 2021.
  3. Anticipated emotions in initial trust evaluations of a drone system based on performance and process information. Jensen, T., Khan, M.M.H., Albayram, Y., Fahim, M.A.A., Buck, R. and Coman, E. International Journal of Human–Computer Interaction, 36(4), pp.316-325, 2020.
  4. Investigating the Effect of System Reliability, Risk, and Role on Users’ Emotions and Attitudes toward a Safety-Critical Drone System.Albayram, Y., Jensen, T., Khan, M.M.H., Buck, R. and Coman, E. International Journal of Human–Computer Interaction, 35(9), pp.761-772, 2019.
  5. Design and Implementation of an Analytical Framework for Interference Aware Job Scheduling on Apache Spark Platform. KewenWang, Mohammad Maifi Hasan Khan, Nhan Nguyen, and Swapna Gokhale. Cluster Computing (Special Issue), Springer, 2017. 
  6. To Follow or Not to Follow: A Study of User Motivations Around Cybersecurity Advice. Accepted for Publication in IEEE Internet Computing, 2017.
  7. The User Affective Experience Scale: A Measure of Emotions Anticipated in Response to Pop-Up Computer
    Warnings. Ross Buck, Mohammad Khan, Michael Fagan, and Emil Coman.  International Journal of Human–Computer Interaction 34, no. 1 (2018): 25-34. Impact Factor: 1.259
  8. A Study on Designing Video Tutorials for Promoting Security Features: A Case Study in the Context of Two-Factor Authentication (2FA). Yusuf Albayram, Mohammad Maifi Hasan Khan, and Michael Fagan. Accepted for Publication in International Journal of Human-Computer Interaction, 2017.
  9. Fagan, Michael, Yusuf Albayram, Mohammad Maifi Hasan Khan, and Ross Buck. “An investigation into users’ considerations towards using password managers.” Human-centric Computing and Information Sciences 7, no. 1 (2017): 12.
  10. Evaluating Smartphone-based Dynamic Security Questions for Fallback Authentication: A Field Study. Accepted for publication in Springer Open access journal on Human-centric Computing and Information Sciences 2016.
  11. A Study of Users’ Experiences and Beliefs about Software Update Messages. Michael Fagan, Mohammad Maifi Hasan Khan, and Ross Buck. Accepted for publication in Elsevier Journal on Computers in Human Behavior, 2015.
  12. Designing Challenge Questions for Location-based Authentication Systems: A Real-Life Study. Yusuf Albayram, Mohammad Maifi Hasan Khan, Athanasios Bamis, Sotirios Kentros, Nhan Nguyen, and Ruhua Jiang. Accepted for publication in Springer Open access journal on Human-centric Computing and Information Sciences, 2015.
  13. How Does this Message Make You Feel?: A Study of User Perspectives on Software Update/Warning Message Design. Michael Fagan, Mohammad Maifi Hasan Khan, and Nhan Nguyen. Accepted for publication in Springer Open Access Journal on Human-centric Computing and Information Sciences, 2015.
  14. A closed-loop context aware data acquisition and resource allocation framework for dynamic data driven applications systems (DDDAS) on the cloud. Nguyen, Nhan, and Mohammad Maifi Hasan Khan. Journal of Systems and Software, Elsevier, 2015.
  15. Troubleshooting interactive complexity bugs in wireless sensor networks using data mining techniques. Mohammad Maifi Hasan Khan, Hieu Khac Le, Hossein Ahmadi, Tarek F. Abdelzaher and Jiawei Han. ACM Transaction on Sensor Networks, Volume 10, Issue 2, January 2014.
  16. Power-Based Diagnosis of Node Silence in Remote High-End Sensing Systems. ACM Transactions on Sensor Networks (TOSN). Yong Yang, Lu Su, Mohammad Maifi Hasan Khan, Michael Lemay, Tarek Abdelzaher, and Jiawei Han. Volume 11, Issue 2, Article 33, December 2014.

 Conference Publications (Not updated regularly)

  1. Divergences in Blame Attribution after a Security Breach based on Compliance Behavior: Implications for Post-breach Risk Communication. Ul Haque, Ehsan, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, and Theodore Jensen.  In Proceedings of the 2023 European Symposium on Usable Security, pp. 27-47. 2023.
  2. Effect of Device Risk Perceptions and Understandability of Data Management Features on Consumers’ Willingness to Pay (WTP) for IoT Device Premium Data Management Plan. Ul Haque, E. and Khan, M.M.H., 2023, October. In Proceedings of the 2023 European Symposium on Usable Security (pp. 68-85).
  3. The Nuanced Nature of Trust and Privacy Control Adoption in the Context of Google. Ul Haque, E., Khan, M.M.H. and Fahim, M.A.A., 2023, April. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (pp. 1-23).
  4. I’m Only Human: The Effects of Trust Dampening by Anthropomorphic Agents. Jensen, T. and Khan, M.M.H., 2022, June. In the International Conference on Human-Computer
    Interaction (pp. 285-306). Cham: Springer Nature Switzerland.
  5. Do integral emotions affect trust? The mediating effect of emotions on trust in the context of human-agent interaction. Fahim, M.A.A., Khan, M.M.H., Jensen, T., Albayram, Y. and Coman, E., 2021, June. In Designing Interactive Systems Conference 2021 (pp. 1492-1503).
  6. Trust and anthropomorphism in tandem: the interrelated nature of automated agent appearance and reliability in trustworthiness perceptions. Jensen, T., Khan, M.M.H., Fahim, M.A.A. and Albayram, Y., 2021, June. In Designing interactive systems conference 2021 (pp. 1470-1480).
  7. Investigating the effects of (empty) promises on human-automation interaction and trust repair. Albayram, Y., Jensen, T., Khan, M.M.H., Fahim, M.A.A., Buck, R. and Coman, E., 2020, November. In Proceedings of the 8th International Conference on Human-Agent Interaction (pp. 6-14).
  8. A dynamic resource allocation framework for apache spark applications. Wang, K., Khan, M.M.H. and Nguyen, N., 2020, July. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) (pp. 997-1004). IEEE.
  9. Who Would Bob Blame? Factors in Blame Attribution in Cyberattacks Among the Non-adopting Population in the Context of 2FA. Peck, S.M., Khan, M.M.H., Al Fahim, M.A., Coman, E.N., Jensen, T. and Albayram, Y., 2020, July. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) (pp. 778-789). IEEE.
  10. The role of behavioral anthropomorphism in human-automation trust calibration. Jensen, T., Khan, M.M.H. and Albayram, Y., 2020, July. In International Conference on Human-Computer Interaction (pp. 33-53). Cham: Springer International Publishing.
  11. Effect of feedback on users’ immediate emotions: Analysis of facial expressions during a simulated target detection task. Fahim, M.A.A., Khan, M.M.H., Jensen, T., Albayram, Y., Coman, E. and Buck, R., 2019, October. In 2019 International Conference on Multimodal Interaction (pp. 49-58).
  12. The apple does fall far from the tree: user separation of a system from its developers in human-automation trust repair. Jensen, T., Albayram, Y., Khan, M.M.H., Fahim, M.A.A., Buck, R. and Coman, E., 2019, June. In Proceedings of the 2019 on Designing Interactive Systems Conference (pp. 1071-1082)
  13. A Model Driven Approach towards Improving the Performance of Apache Spark Applications. Kewen Wang, Mohammad Maifi Hasan Khan, Nhan Nguyen, Swapna Gokhale. In 2019 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), Madison, Wisconsin, USA, March 24-26, 2019.
  14. Initial trustworthiness perceptions of a drone system based on performance and process information. Theodore Jensen, Y. Albayram, Mohammad Maifi Hasan Khan, Ross Buck, Emil Coman, and Md Fahim. In 6th International Conference on Human-Agent Interaction, 2018. Southampton, UK.
  15. The Effects of Risk and Role on Users’ Anticipated Emotions in Safety-critical Systems. Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, Ross Buck, and Emil Coman. In proceedings of Human-Computer Interaction International Conference, Las Vegas, USA, 2018.
  16. Towards Automatic Tuning of Apache Spark Configuration. Nhan Nguyen, Mohammad Maifi Hasan Khan, and Kewen Wang. In proceedings of 2018 IEEE International Conference on Cloud Computing (IEEE CLOUD 2018), CA, USA.
  17. “…better to use a lock screen than to worry about saving a few seconds of time”: Effect of Fear Appeal in the Context of Smartphone Locking Behavior. Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, and Nhan Nguyen. In proceedings of SOUPS 2017.
  18. Arion: a Model-driven Middleware for Minimizing Data Loss in Stream Data Storage. Nhan Nguyen, Mohammad Maifi Hasan Khan, Yusuf Albayram, Kewen Wang, and Swapna Gokhale. In proceedings of IEEE Cloud 2017.
  19. Understanding the Influence of Configuration Settings: An Execution Model-driven Framework for Apache Spark Platform. Nhan Nguyen, Mohammad Maifi Hasan Khan, Yusuf Albayram, and Kewen Wang. In proceedings of IEEE Cloud 2017.
  20. Why Do They Do What They Do? A Study of What Motivates Users to (Not) Follow Computer Security Advice. Michael Fagan and Mohammad Maifi Hasan Khan. In proceedings of Symposium On Usable Privacy and Security (SOUPS), 2016.
  21. CSMiner: An Automated Tool for Analyzing Changes in Configuration Settings Across Multiple Versions of Large Scale Cloud Software. Nhan Naguyen and Mohammad Maifi Hasan Khan. In proceedings of IEEE Cloud 2016.
  22. Modeling Interference for Apache Spark Jobs. Kewen Wang, Mohammad Maifi Hasan Khan, Nhan Nguyen, and Swapna Gokhale. In proceedings of IEEE Cloud 2016.
  23. Evaluating the Effectiveness of Using Hints for Autobiographical Authentication: A Real Life Study. Yusuf Albayram and Mohammad Maifi Hasan Khan. In proceedings of Symposium On Usable Privacy and Security (SOUPS), 2015.
  24. Performance Prediction for Apache Spark Platform. Kewen Wang and Mohammad Maifi Hasan Khan. In proceedings of 17th IEEE International Conference on High Performance Computing and Communications (HPCC), 2015.
  25. A Location Based Authentication System Leveraging Smartphones. Yusuf Albayram, Mohammad Maifi Hasan Khan, Athanasios Bamis, Sotirios Kentros, Nhan Nguyen, and Ruhua Jiang. In Proceedings of 15th IEEE International Conference on Mobile Data Management (MDM), Brisbane, Australia, 2014. Acceptance rate for short papers (6 pages): 22.64%
  26. Performance analysis of fault-tolerant exact motif mining algorithm on the cloud. Nhan Nguyen, Mohammad Maifi Hasan Khan. In proceedings of International Performance Computing and Communications Conference (IPCCC). San Diego, CA, USA, 2013.
  27. Context aware data acquisition framework for dynamic data driven applications systems (DDDAS). Nhan Nguyen, Mohammad Maifi Hasan Khan. In proceedings of the 32nd IEEE Military Communication Conference (MILCOM), San Diego, CA, USA, 2013.
  28. Leveraging Cloud Infrastructure for Troubleshooting Edge Computing Systems. Michael Fagan, Mohammad Maifi Hasan Khan, Bing Wang. Got accepted in ICPADS 2012. (Acceptance Rate: 29%)
  29. Exposing Complex Bug-Triggering Conditions in Distributed Systems via Graph Mining. Eunsoo Seo, Mohammad Maifi Hasan Khan, Prasant Mohapatra, Jiawei Han and Tarek Abdelzaher. International Conference on Parallel Processing (ICPP), Taiwan, 2011.
  30. Evaluation of Network Trust Using Provenance Based on Distributed Local Intelligence. Gulustan Dogan, Theodore Brown, Kannan Govindan, Mohammad Maifi Hasan Khan, Tarek Abdelzaher, Prasant Mohapatra, Jin-Hee Cho. MILCOM, 2011.
  31. PRONET: Network Trust Assessment Based on Incomplete Provenance. Kannan Govindan, Xinlei Wang, Maifi Khan, Gulustan Dogan, Kai Zeng, Gerald M Powell, Ted Brown, Tarek Abdelzaher, Prasant Mohapatra. MILCOM 2011.
  32. Understanding Vicious Cycles in Server Clusters. Mohammad Maifi Hasan Khan, Jin Heo, Shen Li and Tarek Abdelzaher. ICDCS 2011.
  33. Diagnostic Powertracing for Sensor Node Failure Analysis. Mohammad Maifi Hasan Khan, Hieu K. Le, Michael LeMay, Parya Moinzadeh, Lili Wang, Yong Yang, Dong K. Noh, Tarek Abdelzaher, Carl A. Gunter, Jiawei Han and Xin Jin. In Proc. of 9th ACM/IEEE International Conference on Information Processing in Sensor Networks(IPSN/SPOTS Track), Stockholm, Sweden, 2010. [Acceptance Rate for IPSN/SOPTS track: 19%]
  34. Finding Symbolic Bug Patterns in Sensor Networks. Mohammad Maifi Hasan Khan, Tarek Abdelzaher, Jiawei Han and Hossein Ahmadi. In Proc. of International Conference on Distributed Computing in Sensor Systems (DCOSS), 2009. [Acceptance Rate : 22%]
  35. DustMiner: Troubleshooting Interactive Complexity Bugs in Sensor Networks. Mohammad Maifi Hasan Khan, Hieu Khac Le, Tarek Abdelzaher and Jiawei Han. In Proc. of the 6th ACM Conference on Embedded Networked Sensor Systems (Sensys), Raleigh, NC, 2008. [Acceptance Rate : 16%]
  36. Towards a Diagnostic Simulator for Sensor Network. Mohammad Maifi Hasan Khan, Tarek Abdelzaher and Kamal K. Gupta. In Proc. of the International Conference on Distributed Computing in Sensor Systems (DCOSS), 2008. [Acceptance Rate : 25%]
  37. SNTS: Sensor Network Troubleshooting Suite. Mohammad Maifi Hasan Khan, Liqian Luo, Chengdu Huang, and Tarek Abdelzaher. In Proc. of the International Conference on Distributed Computing in Sensor Systems (DCOSS), 2007.
  38. Towards a Layered Architecture for Object-Based Execution in Wide-Area Deeply Embedded Computing. Tarek Abdelzaher, Qing Cao, Raghu Ganti, Mohammad Maifi Hasan Khan, Jin Heo, Chengdu Huang, Praveen Jayachandran, Hieu Le, Liqian Luo, and Yu-En Tsai. In Proc. of the 10th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing(ISORC), Santorini Island, Greece, May 2007. (Invited Paper)
  39. Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid. Himanshu Khurana, Mohammad Maifi Hasan Khan, and Von Welch. In Proc. of the Hawaii International Conference on System Sciences (HICSS), Hawaii, January 2007.

  Other

  1. The new technologies emotions scale (NTES): measuring emotions elicited by software update warnings (Abstract). Ross W. Buck, Mohammad Khan, Michael Fagan. 2016 Society for Affective Science (SAS) Annual Conference, Chicago, Illinois, March 17-19, 2016
  2. A Model-driven Resource Allocation Framework for Dynamic Data Driven Applications Systems (DDDAS) on the Cloud (Abstract). Mohammad Maifi Hasan Khan, Nhan Nguyen, Swapna Gokhale. 1st InfoSymbiotics/DDDAS Conference. Hartford, Connecticut, USA. Aug 9-12, 2016
  3. DustDoctor: A Self-healing Sensor Data Collection System. Mohammad Maifi Hasan Khan, Hossein Ahmadi, Gulustan Dogan, Kannan Govindan, Raghu Ganti, Theodore Brown, Jiawei Han, Prasant Mohapatra, Tarek Abdelzaher (Demo paper). IPSN 2011.
  4. Power watermarking: Facilitating power-based diagnosis of node silence in remote high-end sensing systems. Yong Yang, Lu Su, Mohammad Maifi Hasan Khan, Michael LeMay, Tarek Abdelzaher, and Jiawei Han. In proceedings of Information Processing in Sensor Networks (IPSN), 2011 (Poster).
  5. A Preliminary Study of Users’ Experiences and Beliefs about Software Update Messages (Poster). Michael Fagan, Mohammad Maifi Hasan Khan, and Ross Buck. In Symposium On Usable Privacy and Security (SOUPS), 2014.

 

Graduated Ph.D. Students

  • Md Abdullah Al Fahim, Ph.D., Graduated in 2022. Employment: Google
  • Theodore Jensen. Ph.D., Graduated in 2021. Employment: Visualization and Usability Group, National Institute of Standards and Technology (NIST)
  • Kewen Wang, Ph.D. Graduated in 2020. Employment: Salesforce
  • Nhan Nguyen, Ph.D., Graduated in 2018! Employment: Akamai Inc.
  • Michael Fagan, Ph.D., Graduated in 2017! Employment: Trusted Identities Group at the National Institute of Standards and Technology (NIST).
  • Yusuf Albayram, Ph.D., Graduated in August 2016! Employment: Accepted Tenure Track position at Central Connecticut State University!

Graduated MS Students

  • Sarah Peck, MS
  • Akond Rahman, MS., Graduated May 2014

 

Teaching (Not updated regularly!)

  • Fall 2011: Reliability of Distributed Systems
  • Spring 2012: Operating Systems
  • Fall 2012: Reliability of Distributed Systems
  • Spring 2013: Digital Logic Design
  • Fall 2013: Operating Systems
  • Spring 2014: Digital Logic Design
  • Fall 2014: Operating Systems, Advanced Distributed Systems
  • Spring 2015: Operating Systems
  • Fall 2016: Operating Systems

 

Professional Services (Not updated regularly!)

  • Technical Program Committee, IEEE International Conference on Identity, Security and Behavior Analysis, 2017
  • Technical Program Committee, IEEE BigDataService 2017
  • Technical Program Committee, IEEE International Conference on Ubiquitous Intelligence and Computing (UIC), 2017
  • Technical Program Committee, Globecom, 2017
  • Technical Program Committee, IEEE International Conference on Identity, Security and Behavior Analysis, 2017
  • Technical Program Committee, IEEE International Conference on Identity, Security and Behavior Analysis, 2017
  • Tutorials and Workshops Co-Chair, SOUPS 2016
  • Publicity Co-Chair for CSA 2016
  • Served on NSF panel, 2015, 2017
  • Technical Program Committee, International Performance Computing and Communications Conference (IPCCC), 2012, 2013, 2014, 2015, 2016
  • Technical Program Committee, Cyber-Physical Networking Systems (CPNS) Workshop, held in conjunction with ICDCS 2012
  • Reviewer, International Journal on Communications Systems
  • Reviewer, ACM Transactions on Sensor Networks

 

Research Support

Our research is supported by generous grants from NSF, AFOSR, and GAAAN.