Follow
Jinxue (Gene) Zhang
Title
Cited by
Cited by
Year
The rise of social botnets: Attacks and countermeasures
J Zhang, R Zhang, Y Zhang, G Yan
IEEE Transactions on Dependable and Secure Computing (TDSC), 2016
1282016
Privacy-preserving profile matching for proximity-based mobile social networking
R Zhang, J Zhang, Y Zhang, J Sun, G Yan
IEEE Journal on Selected Areas in Communications 31 (9), 656-668, 2013
1242013
Touchin: Sightless two-factor authentication on multi-touch mobile devices
J Sun, R Zhang, J Zhang, Y Zhang
2014 IEEE conference on communications and network security, 436-444, 2014
1072014
VISIBLE: Video-Assisted Keystroke Inference from Tablet Backside Motion
J Sun, X Jin, Y Chen, J Zhang, R Zhang, Y Zhang
NDSS, 2016
902016
TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter
J Zhang, R Zhang, J Sun, Y Zhang, C Zhang
IEEE/ACM Transactions on Networking, 2015
652015
Privacy-preserving Social Media Data Outsourcing
J Zhang, J Sun, R Zhang, Y Zhang, H Xia
IEEE INFOCOM 2018, 2018
632018
Secure crowdsourcing-based cooperative pectrum sensing
R Zhang, J Zhang, Y Zhang, C Zhang
2013 Proceedings IEEE INFOCOM, 2526-2534, 2013
632013
Your age is no secret: Inferring microbloggers’ ages via content and interaction analysis
J Zhang, X Hu, Y Zhang, H Liu
International AAAI Conference on Web and Social Media (ICWSM’2016), 2016
592016
On the impact of social botnets for spam distribution and digital-influence manipulation
J Zhang, R Zhang, Y Zhang, G Yan
2013 IEEE Conference on Communications and Network Security (CNS), 46-54, 2013
592013
SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks
J Sun, X Chen, J Zhang, Y Zhang, J Zhang
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 997-1005, 2014
262014
PriStream: Privacy-Preserving Distributed Stream Monitoring of Thresholded Percentile Statistics
J Sun, R Zhang, J Zhang, Y Zhang
IEEE International Conference on Computer Communications (INFOCOM’16), 2016
172016
Taprouter: an emulating framework to run real applications on simulated mobile ad hoc network
J Zhang, Z Qin
Proceedings of the 44th Annual Simulation Symposium, 39-46, 2011
172011
Your actions tell where you are: Uncovering Twitter users in a metropolitan area
J Zhang, J Sun, R Zhang, Y Zhang
2015 IEEE conference on Communications and Network Security (CNS), 424-432, 2015
162015
A context-aware framework supporting complex ubiquitous scenarios with augmented reality enabled
J Zhang, Y Sheng, W Hao, PP Wang, P Tian, K Miao, CK Pickering
5th International Conference on Pervasive Computing and Applications, 69-74, 2010
152010
A Replication-Based Distribution Approach for Tuple Space-Based Collaboration of Heterogeneous Agents
J Xing, Z Qin, J Zhang
Research Journal of Information Technology 2 (4), 201-214, 2010
122010
Degree and resource-constrained routing algorithm for application layer multicast in ad hoc networks
W Juan, Q Zheng, Z Jinxue
The 6th International Conference on Networked Computing and Advanced …, 2010
22010
Secure and Privacy-Preserving Microblogging Services: Attacks and Defenses
J Zhang
Arizona State University, 2016
12016
Multi-sensor fusion for interactive visual computing in mixed environment
PP Wang, T Wang, D Ding, Y Zhang, K Miao, CK Pickering, P Tian, ...
Proceedings of the 18th ACM international conference on Multimedia, 1509-1510, 2010
12010
A Decentralized Tuple Space Model with Policy Management for Collaboration
J Xing, Z Qin, X Zheng
Chinese Journal of Electronics 19 (2), 206-210, 2010
12010
Replication management for decentralized tuple spaces
J Xing, Z Qin, X Zheng, J Zhang
Journal of Tsinghua University Science and Technology 51 (1), 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–20