Constructing and comparing user mobility profiles for location-based services X Chen, J Pang, R Xue Proceedings of the 28th Annual ACM Symposium on Applied Computing, 261-266, 2013 | 59 | 2013 |
Measuring query privacy in location-based services X Chen, J Pang Proceedings of the second ACM conference on Data and Application Security …, 2012 | 59 | 2012 |
Constructing and comparing user mobility profiles X Chen, J Pang, R Xue ACM Transactions on the Web (TWEB) 8 (4), 1-25, 2014 | 57 | 2014 |
A Group Signature Based Electronic Toll Pricing System X Chen, G Lenzini, S Mauw, J Pang Arxiv preprint arXiv:1108.0574, 2011 | 49 | 2011 |
Protecting query privacy in location-based services X Chen, J Pang GeoInformatica 18 (1), 95-133, 2014 | 37 | 2014 |
Fuzzy dynamic programming based trusted routing decision in mobile Ad Hoc networks Z Qin, Z Jia, X Chen Embedded Computing, 2008. SEC'08. Fifth IEEE International Symposium on, 180-185, 2008 | 32* | 2008 |
Publishing community-preserving attributed social graphs with a differential privacy guarantee X Chen, S Mauw, Y Ramírez-Cruz arXiv preprint arXiv:1909.00280, 2019 | 24 | 2019 |
Measuring user similarity with trajectory patterns: Principles and new metrics X Chen, R Lu, X Ma, J Pang Web Technologies and Applications: 16th Asia-Pacific Web Conference, APWeb …, 2014 | 21 | 2014 |
MinUS: Mining User Similarity with Trajectory Patterns X Chen, P Kordy, R Lu, J Pang Machine Learning and Knowledge Discovery in Databases: European Conference …, 2014 | 17 | 2014 |
Activity tracking: A new attack on location privacy X Chen, A Mizera, J Pang 2015 IEEE Conference on Communications and Network Security (CNS), 22-30, 2015 | 15 | 2015 |
A multilingual dataset of COVID-19 vaccination attitudes on Twitter N Chen, X Chen, J Pang Data in Brief 44, 108503, 2022 | 14 | 2022 |
Design and formal analysis of a group signature based electronic toll pricing system X Chen, G Lenzini, S Mauw, J Pang Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013 | 12 | 2013 |
Improving automatic verification of security protocols with xor X Chen, T van Deursen, J Pang Formal Methods and Software Engineering: 11th International Conference on …, 2009 | 12 | 2009 |
A trust framework for evaluating GNSS signal integrity X Chen, G Lenzini, M Martins, S Mauw, J Pang 2013 IEEE 26th Computer Security Foundations Symposium, 179-192, 2013 | 11 | 2013 |
Exploring dependency for query privacy protection in location-based services X Chen, J Pang Proceedings of the third ACM conference on Data and application security and …, 2013 | 11 | 2013 |
The burden of being a bridge: analysing subjective well-being of Twitter users during the COVID-19 pandemic N Chen, X Chen, Z Zhong, J Pang Joint European Conference on Machine Learning and Knowledge Discovery in …, 2022 | 10 | 2022 |
Exploring spillover effects for COVID-19 cascade prediction N Chen, X Chen, Z Zhong, J Pang Entropy 24 (2), 222, 2022 | 8 | 2022 |
Post-hoc user traceability analysis in electronic toll pricing systems X Chen, D Fonkwe, J Pang International Workshop on Data Privacy Management, 29-42, 2012 | 5 | 2012 |
Measuring COVID-19 vaccine hesitancy: Consistency of social media with surveys N Chen, X Chen, J Pang, LG Borga, C D’Ambrosio, C Vögele International Conference on Social Informatics, 196-210, 2022 | 4 | 2022 |
Active re-identification attacks on periodically released dynamic social graphs X Chen, E Këpuska, S Mauw, Y Ramírez-Cruz Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 4 | 2020 |