Constructing and comparing user mobility profiles for location-based services X Chen, J Pang, R Xue Proceedings of the 28th Annual ACM Symposium on Applied Computing, 261-266, 2013 | 55 | 2013 |
Measuring query privacy in location-based services X Chen, J Pang Proceedings of the second ACM conference on Data and Application Security …, 2012 | 52 | 2012 |
Constructing and comparing user mobility profiles X Chen, J Pang, R Xue ACM Transactions on the Web (TWEB) 8 (4), 1-25, 2014 | 46 | 2014 |
A Group Signature Based Electronic Toll Pricing System X Chen, G Lenzini, S Mauw, J Pang Arxiv preprint arXiv:1108.0574, 2011 | 43 | 2011 |
Fuzzy dynamic programming based trusted routing decision in mobile Ad Hoc networks Z Qin, Z Jia, X Chen Embedded Computing, 2008. SEC'08. Fifth IEEE International Symposium on, 180-185, 2008 | 31* | 2008 |
Protecting query privacy in location-based services X Chen, J Pang GeoInformatica 18 (1), 95-133, 2014 | 29 | 2014 |
Measuring user similarity with trajectory patterns: Principles and new metrics X Chen, R Lu, X Ma, J Pang Asia-Pacific Web Conference, 437-448, 2014 | 19 | 2014 |
MinUS: Mining User Similarity with Trajectory Patterns X Chen, P Kordy, R Lu, J Pang Joint European Conference on Machine Learning and Knowledge Discovery in …, 2014 | 15 | 2014 |
Activity tracking: A new attack on location privacy X Chen, A Mizera, J Pang 2015 IEEE Conference on Communications and Network Security (CNS), 22-30, 2015 | 12 | 2015 |
Improving automatic verification of security protocols with xor X Chen, T Deursen, J Pang International Conference on Formal Engineering Methods, 107-126, 2009 | 12 | 2009 |
Publishing community-preserving attributed social graphs with a differential privacy guarantee X Chen, S Mauw, Y Ramírez-Cruz arXiv preprint arXiv:1909.00280, 2019 | 11 | 2019 |
Exploring dependency for query privacy protection in location-based services X Chen, J Pang Proceedings of the third ACM conference on Data and application security and …, 2013 | 11 | 2013 |
A trust framework for evaluating GNSS signal integrity X Chen, G Lenzini, M Martins, S Mauw, J Pang 2013 IEEE 26th Computer Security Foundations Symposium, 179-192, 2013 | 10 | 2013 |
Design and formal analysis of a group signature based electronic toll pricing system X Chen, G Lenzini, S Mauw, J Pang Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013 | 10 | 2013 |
Quantifying location privacy revisited: Preliminary report X Chen, A Mizera, J Pang University of Luxembourg, Tech. Rep, 2014 | 4 | 2014 |
Implementation and validation of a Localisation Assurance service provider X Chen, C Harpes, G Lenzini, M Martins, S Mauw, J Pang 2012 6th ESA Workshop on Satellite Navigation Technologies (Navitec 2012 …, 2012 | 4 | 2012 |
Post-hoc user traceability analysis in electronic toll pricing systems X Chen, D Fonkwe, J Pang Data Privacy Management and Autonomous Spontaneous Security, 29-42, 2012 | 4 | 2012 |
Exploring spillover effects for covid-19 cascade prediction N Chen, X Chen, Z Zhong, J Pang Entropy 24 (2), 222, 2022 | 1 | 2022 |
Pattern recognition and reconstruction: detecting malicious deletions in textual communications AA Solanke, X Chen, Y Ramírez-Cruz 2021 IEEE International Conference on Big Data (Big Data), 2574-2582, 2021 | 1 | 2021 |
From# jobsearch to# mask: improving COVID-19 cascade prediction with spillover effects N Chen, X Chen, Z Zhong, J Pang Proceedings of the 2021 IEEE/ACM International Conference on Advances in …, 2021 | 1 | 2021 |