Towards active detection of identity clone attacks on online social networks L Jin, H Takabi, JBD Joshi Proceedings of the first ACM conference on Data and application security and …, 2011 | 161 | 2011 |
Exploring Trajectory-Driven Local Geographic Topics in Foursquare X Long, L Jin, J Joshi Proc LBSN'12, 2012 | 124 | 2012 |
Mutual-friend based attacks in social network systems L Jin, JBD Joshi, M Anwar Computers & security 37, 15-30, 2013 | 49 | 2013 |
Towards Understanding Residential Privacy by Analyzing Users' Activities in Foursquare L Jin, X Long, JBD Joshi Proceedings of the 2012 ACM Workshop on Building analysis datasets and …, 2012 | 26 | 2012 |
Towards Understanding the Gamification upon Users' Scores in a Location-based Social Network YRL Lei Jin, Ke Zhang, Jianfeng Lu Multimedia Tools and Applications, 2014 | 19* | 2014 |
Security and privacy risks of using e-mail address as an identity L Jin, H Takabi, JBD Joshi 2010 IEEE Second International Conference on Social Computing, 906-913, 2010 | 18 | 2010 |
Towards Understanding Traveler Behavior in Location-Based Social Networks X Long, L Jin, J Joshi GLOBECOM'13, 3182 - 3187, 2013 | 17 | 2013 |
Towards complexity analysis of user authorization query problem in RBAC J Lu, JBD Joshi, L Jin, Y Liu Computers & Security 48, 116-130, 2015 | 16 | 2015 |
Characterizing Users' Check-in Activities Using Their Scores in a Location-based Social Network L Jin, X Long, K Zhang, YR Lin, JBD Joshi Multimedia Systems, pp. 1-12, 2014 | 16 | 2014 |
Software piracy prevention: splitting on client Y Zhang, L Jin, X Ye, D Chen 2008 International Conference on Security Technology, 62-65, 2008 | 14 | 2008 |
Understanding venue popularity in Foursquare X Long, L Jin, J Joshi 9th IEEE International Conference on Collaborative Computing: Networking …, 2013 | 12 | 2013 |
Sybil Attacks VS Identity Clone Attacks in Online Social Networks L Jin, X Long, H Takabi, JBD Joshi ISA 2012, 2012 | 11 | 2012 |
An extensible data model with security support for dataspace management L Jin, Y Zhang, X Ye 2008 10th IEEE International Conference on High Performance Computing and …, 2008 | 10 | 2008 |
k-trustee: Location injection attack-resilient anonymization for location privacy L Jin, C Li, B Palanisamy, J Joshi Computers & Security 78, 212-230, 2018 | 9 | 2018 |
Analysis of access control mechanisms for users' check-ins in location-based social network systems L Jin, X Long, JBD Joshi, M Anwar Information Reuse and Integration (IRI), 2012 IEEE 13th International …, 2012 | 7 | 2012 |
Analyzing security and privacy issues of using e-mail address as identity L Jin, H Takabi, JBD Joshi International Journal of Information Privacy, Security and Integrity 1 (1 …, 2011 | 7 | 2011 |
A Multi-Dimensional K-Anonymity Model for Hierarchical Data X Ye, L Jin, B Li Electronic Commerce and Security, 2008 International Symposium on, 327-332, 2008 | 7 | 2008 |
Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks L Jin, B Palanisamy, J Joshi CCS'14, 0 | 7* | |
On the complexity of role updating feasibility problem in RBAC J Lu, D Xu, L Jin, J Han, H Peng Information Processing Letters 114 (11), 597-602, 2014 | 6 | 2014 |
Venue attacks in location-based social networks L Jin, H Takabi Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in …, 2014 | 5 | 2014 |