Lei Jin
Lei Jin
Tsinghua University; School of Information Sciences, University of Pittsburgh
Verified email at - Homepage
Cited by
Cited by
Towards active detection of identity clone attacks on online social networks
L Jin, H Takabi, JBD Joshi
Proceedings of the first ACM conference on Data and application security and …, 2011
Exploring Trajectory-Driven Local Geographic Topics in Foursquare
X Long, L Jin, J Joshi
Proc LBSN'12, 2012
Mutual-friend based attacks in social network systems
L Jin, JBD Joshi, M Anwar
Computers & security 37, 15-30, 2013
Towards Understanding Residential Privacy by Analyzing Users' Activities in Foursquare
L Jin, X Long, JBD Joshi
Proceedings of the 2012 ACM Workshop on Building analysis datasets and …, 2012
Towards Understanding the Gamification upon Users' Scores in a Location-based Social Network
YRL Lei Jin, Ke Zhang, Jianfeng Lu
Multimedia Tools and Applications, 2014
Towards Understanding Traveler Behavior in Location-Based Social Networks
X Long, L Jin, J Joshi
GLOBECOM'13, 3182 - 3187, 2013
Security and privacy risks of using e-mail address as an identity
L Jin, H Takabi, JBD Joshi
2010 IEEE Second International Conference on Social Computing, 906-913, 2010
Characterizing Users' Check-in Activities Using Their Scores in a Location-based Social Network
L Jin, X Long, K Zhang, YR Lin, JBD Joshi
Multimedia Systems, pp. 1-12, 2014
Towards complexity analysis of user authorization query problem in RBAC
J Lu, JBD Joshi, L Jin, Y Liu
Computers & Security 48, 116-130, 2015
Software piracy prevention: splitting on client
Y Zhang, L Jin, X Ye, D Chen
2008 International Conference on Security Technology, 62-65, 2008
Understanding venue popularity in Foursquare
X Long, L Jin, J Joshi
9th IEEE International Conference on Collaborative Computing: Networking …, 2013
Sybil Attacks VS Identity Clone Attacks in Online Social Networks
L Jin, X Long, H Takabi, JBD Joshi
ISA 2012, 2012
An extensible data model with security support for dataspace management
L Jin, Y Zhang, X Ye
2008 10th IEEE International Conference on High Performance Computing and …, 2008
k-trustee: Location injection attack-resilient anonymization for location privacy
L Jin, C Li, B Palanisamy, J Joshi
Computers & Security 78, 212-230, 2018
Analysis of access control mechanisms for users' check-ins in location-based social network systems
L Jin, X Long, JBD Joshi, M Anwar
Information Reuse and Integration (IRI), 2012 IEEE 13th International …, 2012
Analyzing security and privacy issues of using e-mail address as identity
L Jin, H Takabi, JBD Joshi
International Journal of Information Privacy, Security and Integrity 1 (1 …, 2011
A Multi-Dimensional K-Anonymity Model for Hierarchical Data
X Ye, L Jin, B Li
Electronic Commerce and Security, 2008 International Symposium on, 327-332, 2008
Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks
L Jin, B Palanisamy, J Joshi
CCS'14, 0
On the complexity of role updating feasibility problem in RBAC
J Lu, D Xu, L Jin, J Han, H Peng
Information Processing Letters 114 (11), 597-602, 2014
Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links
L Jin, H Takabi, X Long, J Joshi
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
The system can't perform the operation now. Try again later.
Articles 1–20