Expanding EV charging networks considering transportation pattern and power supply limit Y Zhang, J Chen, L Cai, J Pan IEEE transactions on smart grid 10 (6), 6332-6342, 2019 | 58 | 2019 |
EV charging network design with transportation and power grid constraints Y Zhang, J Chen, L Cai, J Pan IEEE INFOCOM 2018-IEEE conference on computer communications, 2492-2500, 2018 | 21 | 2018 |
Disclose more and risk less: Privacy preserving online social network data sharing J Chen, J He, L Cai, J Pan IEEE Transactions on Dependable and Secure Computing 17 (6), 1173-1187, 2018 | 20 | 2018 |
Poster: Locmask: A location privacy protection framework in android system Q Xiao, J Chen, L Yu, H Li, H Zhu, M Li, K Ren Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 20 | 2014 |
Profiling online social network users via relationships and network characteristics J Chen, J He, L Cai, J Pan 2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016 | 13 | 2016 |
Chaperone: Real-time locking and loss prevention for smartphones J Chen, U Hengartner, H Khan, M Mannan 29th USENIX Security Symposium (USENIX Security 20), 325-342, 2020 | 11 | 2020 |
Sharing without scaring: Enabling smartphones to become aware of temporary sharing J Chen, U Hengartner, H Khan Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 671-685, 2022 | 5 | 2022 |
Defending against inference attack in online social networks J Chen | 2 | 2017 |
MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android J Chen, U Hengartner, H Khan ACM Transactions on Privacy and Security 27 (2), 1-30, 2024 | | 2024 |
SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems J Chen, U Hengartner, H Khan Computers & Security 137, 103594, 2024 | | 2024 |
Adaptive User Authentication on Mobile Devices J Chen University of Waterloo, 2022 | | 2022 |
An Analysis of Travis CI Builds Through TravisTorrent J Chen, M Mirsafian, Y Xue | | |