Takip et
Lei Jin
Lei Jin
Tsinghua University; School of Information Sciences, University of Pittsburgh
pitt.edu üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Towards active detection of identity clone attacks on online social networks
L Jin, H Takabi, JBD Joshi
Proceedings of the first ACM conference on Data and application security and …, 2011
1612011
Exploring Trajectory-Driven Local Geographic Topics in Foursquare
X Long, L Jin, J Joshi
Proc LBSN'12, 2012
1212012
Mutual-friend based attacks in social network systems
L Jin, JBD Joshi, M Anwar
Computers & security 37, 15-30, 2013
502013
Towards Understanding Residential Privacy by Analyzing Users' Activities in Foursquare
L Jin, X Long, JBD Joshi
Proceedings of the 2012 ACM Workshop on Building analysis datasets and …, 2012
262012
Towards Understanding the Gamification upon Users' Scores in a Location-based Social Network
YRL Lei Jin, Ke Zhang, Jianfeng Lu
Multimedia Tools and Applications, 2014
19*2014
Towards Understanding Traveler Behavior in Location-Based Social Networks
X Long, L Jin, J Joshi
GLOBECOM'13, 3182 - 3187, 2013
172013
Security and privacy risks of using e-mail address as an identity
L Jin, H Takabi, JBD Joshi
2010 IEEE Second International Conference on Social Computing, 906-913, 2010
172010
Characterizing Users' Check-in Activities Using Their Scores in a Location-based Social Network
L Jin, X Long, K Zhang, YR Lin, JBD Joshi
Multimedia Systems, pp. 1-12, 2014
162014
Towards complexity analysis of user authorization query problem in RBAC
J Lu, JBD Joshi, L Jin, Y Liu
Computers & Security 48, 116-130, 2015
152015
Software piracy prevention: splitting on client
Y Zhang, L Jin, X Ye, D Chen
2008 International Conference on Security Technology, 62-65, 2008
142008
Understanding venue popularity in Foursquare
X Long, L Jin, J Joshi
9th IEEE International Conference on Collaborative Computing: Networking …, 2013
122013
Sybil Attacks VS Identity Clone Attacks in Online Social Networks
L Jin, X Long, H Takabi, JBD Joshi
ISA 2012, 2012
112012
An extensible data model with security support for dataspace management
L Jin, Y Zhang, X Ye
2008 10th IEEE International Conference on High Performance Computing and …, 2008
92008
k-trustee: Location injection attack-resilient anonymization for location privacy
L Jin, C Li, B Palanisamy, J Joshi
Computers & Security 78, 212-230, 2018
82018
Analysis of access control mechanisms for users' check-ins in location-based social network systems
L Jin, X Long, JBD Joshi, M Anwar
Information Reuse and Integration (IRI), 2012 IEEE 13th International …, 2012
72012
Analyzing security and privacy issues of using e-mail address as identity
L Jin, H Takabi, JBD Joshi
International Journal of Information Privacy, Security and Integrity 1 (1 …, 2011
72011
A Multi-Dimensional K-Anonymity Model for Hierarchical Data
X Ye, L Jin, B Li
Electronic Commerce and Security, 2008 International Symposium on, 327-332, 2008
72008
Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks
L Jin, B Palanisamy, J Joshi
CCS'14, 0
7*
On the complexity of role updating feasibility problem in RBAC
J Lu, D Xu, L Jin, J Han, H Peng
Information Processing Letters 114 (11), 597-602, 2014
62014
Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links
L Jin, H Takabi, X Long, J Joshi
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
52014
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20