Jiefeng (Terence) Chen
Jiefeng (Terence) Chen
Data Scientist - Telstra
Adresse e-mail validée de nicta.com.au
Titre
Citée par
Citée par
Année
Censorship in the wild: Analyzing Internet filtering in Syria
A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar
Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014
632014
Is More Always Merrier? A Deep Dive Into Online Social Footprints
T Chen, MA Kaafar, A Friedman, R Boreli
Workshop on Online Social Networks, 67-72, 2012
582012
The where and when of finding new friends: Analysis of a location-based social discovery network
T Chen, MA Kaafar, R Boreli
Seventh International AAAI Conference on Weblogs and Social Media, 2013
502013
Trusted routing for VANET
T Chen, O Mehani, R Boreli
Intelligent Transport Systems Telecommunications,(ITST), 2009 9th …, 2009
402009
Information Leakage through Mobile Analytics Services
T Chen, I Ullah, MA Kaafar, R Boreli
The 15th International Workshop on Mobile Computing Systems and Applications, 6, 2014
342014
Cross social networks interests predictions based ongraph features
A Tiroshi, S Berkovsky, MA Kaafar, T Chen, T Kuflik
Proceedings of the 7th ACM Conference on Recommender Systems, 319-322, 2013
332013
Improving business rating predictions using graph based features
A Tiroshi, S Berkovsky, MA Kaafar, D Vallet, T Chen, T Kuflik
Proceedings of the 19th international conference on Intelligent User …, 2014
222014
Securing mobile network prefix provisioning for NEMO based vehicular networks
JH Lee, JT Chen, T Ernst
Mathematical and computer modelling 55 (1-2), 170-187, 2012
162012
How much is too much? Leveraging ads audience estimation to evaluate public profile uniqueness
T Chen, A Chaabane, PU Tournoux, MA Kaafar, R Boreli
International Symposium on Privacy Enhancing Technologies Symposium, 225-244, 2013
152013
Improving the efficiency of anonymous routing for MANETs
J Chen, R Boreli, V Sivaraman
Computer Communications 35 (5), 619, 2012
142012
On the effectiveness of obfuscation techniques in online social networks
T Chen, R Boreli, MA Kaafar, A Friedman
International Symposium on Privacy Enhancing Technologies Symposium, 42-62, 2014
122014
Taro: Trusted anonymous routing for manets
J Chen, R Boreli, V Sivaraman
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010
92010
Anonymous communication: A survey
Y Wu, W Wang, J Chen
MINIMICRO SYSTEMS-SHENYANG- 28 (4), 583, 2007
42007
Why are they hiding? Study of an anonymous file sharing system
M Cunche, MA Kaafar, J Chen, R Boreli, A Mahanti
2012 IEEE First AESS European Conference on Satellite Telecommunications …, 2012
32012
Censorship in the wild: Analyzing web filtering in syria
A Chaabane, M Cunche, T Chen, A Friedman, ED Cristofaro, MA Kaafar
arXiv preprint arXiv:1402.3401, 2014
22014
A cross layer scheme for maximising the combination of wireless VoIP capacity and quality
T Chen, R Boreli, T Iyer
Proceedings of the 2009 International Conference on Wireless Communications …, 2009
2009
Also in this Issue
AS Cacciapuoti, M Caleffi, M Ji, J Llorca, AM Tulino, Q Wu, Z Li, G Tyson, ...
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–17