The rise of social botnets: Attacks and countermeasures J Zhang, R Zhang, Y Zhang, G Yan IEEE Transactions on Dependable and Secure Computing (TDSC), 2016 | 128 | 2016 |
Privacy-preserving profile matching for proximity-based mobile social networking R Zhang, J Zhang, Y Zhang, J Sun, G Yan IEEE Journal on Selected Areas in Communications 31 (9), 656-668, 2013 | 124 | 2013 |
Touchin: Sightless two-factor authentication on multi-touch mobile devices J Sun, R Zhang, J Zhang, Y Zhang 2014 IEEE conference on communications and network security, 436-444, 2014 | 107 | 2014 |
VISIBLE: Video-Assisted Keystroke Inference from Tablet Backside Motion J Sun, X Jin, Y Chen, J Zhang, R Zhang, Y Zhang NDSS, 2016 | 90 | 2016 |
TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter J Zhang, R Zhang, J Sun, Y Zhang, C Zhang IEEE/ACM Transactions on Networking, 2015 | 65 | 2015 |
Privacy-preserving Social Media Data Outsourcing J Zhang, J Sun, R Zhang, Y Zhang, H Xia IEEE INFOCOM 2018, 2018 | 63 | 2018 |
Secure crowdsourcing-based cooperative pectrum sensing R Zhang, J Zhang, Y Zhang, C Zhang 2013 Proceedings IEEE INFOCOM, 2526-2534, 2013 | 63 | 2013 |
Your age is no secret: Inferring microbloggers’ ages via content and interaction analysis J Zhang, X Hu, Y Zhang, H Liu International AAAI Conference on Web and Social Media (ICWSM’2016), 2016 | 59 | 2016 |
On the impact of social botnets for spam distribution and digital-influence manipulation J Zhang, R Zhang, Y Zhang, G Yan 2013 IEEE Conference on Communications and Network Security (CNS), 46-54, 2013 | 59 | 2013 |
SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks J Sun, X Chen, J Zhang, Y Zhang, J Zhang IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 997-1005, 2014 | 26 | 2014 |
PriStream: Privacy-Preserving Distributed Stream Monitoring of Thresholded Percentile Statistics J Sun, R Zhang, J Zhang, Y Zhang IEEE International Conference on Computer Communications (INFOCOM’16), 2016 | 17 | 2016 |
Taprouter: an emulating framework to run real applications on simulated mobile ad hoc network J Zhang, Z Qin Proceedings of the 44th Annual Simulation Symposium, 39-46, 2011 | 17 | 2011 |
Your actions tell where you are: Uncovering Twitter users in a metropolitan area J Zhang, J Sun, R Zhang, Y Zhang 2015 IEEE conference on Communications and Network Security (CNS), 424-432, 2015 | 16 | 2015 |
A context-aware framework supporting complex ubiquitous scenarios with augmented reality enabled J Zhang, Y Sheng, W Hao, PP Wang, P Tian, K Miao, CK Pickering 5th International Conference on Pervasive Computing and Applications, 69-74, 2010 | 15 | 2010 |
A Replication-Based Distribution Approach for Tuple Space-Based Collaboration of Heterogeneous Agents J Xing, Z Qin, J Zhang Research Journal of Information Technology 2 (4), 201-214, 2010 | 12 | 2010 |
Degree and resource-constrained routing algorithm for application layer multicast in ad hoc networks W Juan, Q Zheng, Z Jinxue The 6th International Conference on Networked Computing and Advanced …, 2010 | 2 | 2010 |
Secure and Privacy-Preserving Microblogging Services: Attacks and Defenses J Zhang Arizona State University, 2016 | 1 | 2016 |
Multi-sensor fusion for interactive visual computing in mixed environment PP Wang, T Wang, D Ding, Y Zhang, K Miao, CK Pickering, P Tian, ... Proceedings of the 18th ACM international conference on Multimedia, 1509-1510, 2010 | 1 | 2010 |
A Decentralized Tuple Space Model with Policy Management for Collaboration J Xing, Z Qin, X Zheng Chinese Journal of Electronics 19 (2), 206-210, 2010 | 1 | 2010 |
Replication management for decentralized tuple spaces J Xing, Z Qin, X Zheng, J Zhang Journal of Tsinghua University Science and Technology 51 (1), 2011 | | 2011 |