Seguir
Lei Jin
Lei Jin
Tsinghua University; School of Information Sciences, University of Pittsburgh
Dirección de correo verificada de pitt.edu - Página principal
Título
Citado por
Citado por
Año
Towards active detection of identity clone attacks on online social networks
L Jin, H Takabi, JBD Joshi
Proceedings of the first ACM conference on Data and application security and …, 2011
1612011
Exploring Trajectory-Driven Local Geographic Topics in Foursquare
X Long, L Jin, J Joshi
Proc LBSN'12, 2012
1212012
Mutual-friend based attacks in social network systems
L Jin, JBD Joshi, M Anwar
Computers & security 37, 15-30, 2013
502013
Towards Understanding Residential Privacy by Analyzing Users' Activities in Foursquare
L Jin, X Long, JBD Joshi
Proceedings of the 2012 ACM Workshop on Building analysis datasets and …, 2012
262012
Towards Understanding the Gamification upon Users' Scores in a Location-based Social Network
YRL Lei Jin, Ke Zhang, Jianfeng Lu
Multimedia Tools and Applications, 2014
19*2014
Towards Understanding Traveler Behavior in Location-Based Social Networks
X Long, L Jin, J Joshi
GLOBECOM'13, 3182 - 3187, 2013
172013
Security and privacy risks of using e-mail address as an identity
L Jin, H Takabi, JBD Joshi
2010 IEEE Second International Conference on Social Computing, 906-913, 2010
172010
Characterizing Users' Check-in Activities Using Their Scores in a Location-based Social Network
L Jin, X Long, K Zhang, YR Lin, JBD Joshi
Multimedia Systems, pp. 1-12, 2014
162014
Towards complexity analysis of user authorization query problem in RBAC
J Lu, JBD Joshi, L Jin, Y Liu
Computers & Security 48, 116-130, 2015
152015
Software piracy prevention: splitting on client
Y Zhang, L Jin, X Ye, D Chen
2008 International Conference on Security Technology, 62-65, 2008
142008
Understanding venue popularity in Foursquare
X Long, L Jin, J Joshi
9th IEEE International Conference on Collaborative Computing: Networking …, 2013
122013
Sybil Attacks VS Identity Clone Attacks in Online Social Networks
L Jin, X Long, H Takabi, JBD Joshi
ISA 2012, 2012
112012
An extensible data model with security support for dataspace management
L Jin, Y Zhang, X Ye
2008 10th IEEE International Conference on High Performance Computing and …, 2008
92008
k-trustee: Location injection attack-resilient anonymization for location privacy
L Jin, C Li, B Palanisamy, J Joshi
Computers & Security 78, 212-230, 2018
82018
Analysis of access control mechanisms for users' check-ins in location-based social network systems
L Jin, X Long, JBD Joshi, M Anwar
Information Reuse and Integration (IRI), 2012 IEEE 13th International …, 2012
72012
Analyzing security and privacy issues of using e-mail address as identity
L Jin, H Takabi, JBD Joshi
International Journal of Information Privacy, Security and Integrity 1 (1 …, 2011
72011
A Multi-Dimensional K-Anonymity Model for Hierarchical Data
X Ye, L Jin, B Li
Electronic Commerce and Security, 2008 International Symposium on, 327-332, 2008
72008
Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks
L Jin, B Palanisamy, J Joshi
CCS'14, 0
7*
On the complexity of role updating feasibility problem in RBAC
J Lu, D Xu, L Jin, J Han, H Peng
Information Processing Letters 114 (11), 597-602, 2014
62014
Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links
L Jin, H Takabi, X Long, J Joshi
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
52014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20