Constructing and comparing user mobility profiles for location-based services X Chen, J Pang, R Xue Proceedings of the 28th Annual ACM Symposium on Applied Computing, 261-266, 2013 | 56 | 2013 |
Measuring query privacy in location-based services X Chen, J Pang Proceedings of the second ACM conference on Data and Application Security …, 2012 | 56 | 2012 |
Constructing and comparing user mobility profiles X Chen, J Pang, R Xue ACM Transactions on the Web (TWEB) 8 (4), 1-25, 2014 | 53 | 2014 |
A Group Signature Based Electronic Toll Pricing System X Chen, G Lenzini, S Mauw, J Pang Arxiv preprint arXiv:1108.0574, 2011 | 45 | 2011 |
Protecting query privacy in location-based services X Chen, J Pang GeoInformatica 18 (1), 95-133, 2014 | 31 | 2014 |
Fuzzy dynamic programming based trusted routing decision in mobile Ad Hoc networks Z Qin, Z Jia, X Chen Embedded Computing, 2008. SEC'08. Fifth IEEE International Symposium on, 180-185, 2008 | 31* | 2008 |
Measuring user similarity with trajectory patterns: Principles and new metrics X Chen, R Lu, X Ma, J Pang Web Technologies and Applications: 16th Asia-Pacific Web Conference, APWeb …, 2014 | 21 | 2014 |
MinUS: Mining User Similarity with Trajectory Patterns X Chen, P Kordy, R Lu, J Pang Machine Learning and Knowledge Discovery in Databases: European Conference …, 2014 | 17 | 2014 |
Publishing community-preserving attributed social graphs with a differential privacy guarantee X Chen, S Mauw, Y Ramírez-Cruz Proceedings on Privacy Enhancing Technologies 2020 (4), 131-152, 2020 | 14 | 2020 |
Activity tracking: A new attack on location privacy X Chen, A Mizera, J Pang 2015 IEEE Conference on Communications and Network Security (CNS), 22-30, 2015 | 13 | 2015 |
Improving automatic verification of security protocols with xor X Chen, T van Deursen, J Pang Formal Methods and Software Engineering: 11th International Conference on …, 2009 | 12 | 2009 |
Exploring dependency for query privacy protection in location-based services X Chen, J Pang Proceedings of the third ACM conference on Data and application security and …, 2013 | 11 | 2013 |
A trust framework for evaluating GNSS signal integrity X Chen, G Lenzini, M Martins, S Mauw, J Pang 2013 IEEE 26th Computer Security Foundations Symposium, 179-192, 2013 | 10 | 2013 |
Design and formal analysis of a group signature based electronic toll pricing system X Chen, G Lenzini, S Mauw, J Pang Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013 | 10 | 2013 |
Exploring spillover effects for COVID-19 cascade prediction N Chen, X Chen, Z Zhong, J Pang Entropy 24 (2), 222, 2022 | 4 | 2022 |
Quantifying location privacy revisited: Preliminary report X Chen, A Mizera, J Pang University of Luxembourg, Tech. Rep, 2014 | 4 | 2014 |
Implementation and validation of a Localisation Assurance service provider X Chen, C Harpes, G Lenzini, M Martins, S Mauw, J Pang 2012 6th ESA Workshop on Satellite Navigation Technologies (Navitec 2012 …, 2012 | 4 | 2012 |
Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems. X Chen, D Fonkwe, J Pang DPM/SETOP, 29-42, 2012 | 4 | 2012 |
Pattern recognition and reconstruction: detecting malicious deletions in textual communications AA Solanke, X Chen, Y Ramírez-Cruz 2021 IEEE International Conference on Big Data (Big Data), 2574-2582, 2021 | 3 | 2021 |
From# jobsearch to# mask: improving COVID-19 cascade prediction with spillover effects N Chen, X Chen, Z Zhong, J Pang Proceedings of the 2021 IEEE/ACM International Conference on Advances in …, 2021 | 2 | 2021 |