关注
Tianyi Wang
Tianyi Wang
ByteDance
在 bytedance.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Understanding user behavior in online social networks: A survey
L Jin, Y Chen, T Wang, P Hui, AV Vasilakos
IEEE communications magazine 51 (9), 144-150, 2013
3892013
Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers
G Wang, T Wang, H Zheng, BY Zhao
23rd USENIX Security Symposium (USENIX Security 14), 239-254, 2014
2402014
Defending against sybil devices in crowdsourced mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th annual international conference on mobile systems …, 2016
1512016
Whispers in the dark: analysis of an anonymous social network
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 2014 conference on internet measurement conference, 137-150, 2014
1382014
Understanding graph sampling algorithms for social network analysis
T Wang, Y Chen, Z Zhang, T Xu, L Jin, P Hui, B Deng, X Li
Distributed Computing Systems Workshops (ICDCSW), 2011 31st International …, 2011
1352011
Crowds on wall street: Extracting value from collaborative investing platforms
G Wang, T Wang, B Wang, D Sambasivan, Z Zhang, H Zheng, BY Zhao
Proceedings of the 18th ACM conference on computer supported cooperative …, 2015
98*2015
DeepScan: Exploiting deep learning for malicious account detection in location-based social networks
Q Gong, Y Chen, X He, Z Zhuang, T Wang, H Huang, X Wang, X Fu
IEEE Communications Magazine 56 (11), 21-27, 2018
862018
Albatross sampling: robust and effective hybrid vertex sampling for social graphs
L Jin, Y Chen, P Hui, C Ding, T Wang, AV Vasilakos, B Deng, X Li
Proceedings of the 3rd ACM international workshop on MobiArch, 11-16, 2011
642011
Demand driven store site selection via multiple spatial-temporal data
M Xu, T Wang, Z Wu, J Zhou, J Li, H Wu
Proceedings of the 24th acm sigspatial international conference on advances …, 2016
58*2016
Ghost riders: Sybil attacks on crowdsourced mobile mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
IEEE/ACM transactions on networking 26 (3), 1123-1136, 2018
552018
Unbiased sampling in directed social graph
T Wang, Y Chen, Z Zhang, P Sun, B Deng, X Li
ACM SIGCOMM Computer Communication Review 40 (4), 401-402, 2010
492010
Formation of condensable organic vapors from anthropogenic and biogenic VOCs is strongly perturbed by NOx in eastern China
Y Liu, W Nie, Y Li, D Ge, C Liu, Z Xu, L Chen, T Wang, L Wang, P Sun, ...
Atmospheric Chemistry and Physics Discussions 2021, 1-44, 2021
332021
Characterizing and detecting malicious crowdsourcing
T Wang, G Wang, X Li, H Zheng, BY Zhao
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 537-538, 2013
292013
Value and misinformation in collaborative investing platforms
T Wang, G Wang, B Wang, D Sambasivan, Z Zhang, X Li, H Zheng, ...
ACM Transactions on the Web (TWEB) 11 (2), 1-32, 2017
222017
The power of comments: fostering social interactions in microblog networks
T Wang, Y Chen, Y Wang, B Wang, G Wang, X Li, H Zheng, BY Zhao
Frontiers of Computer Science 10 (5), 889-907, 2016
152016
Deep learning-based malicious account detection in the momo social network
J Wang, X He, Q Gong, Y Chen, T Wang, X Wang
2018 27th International Conference on Computer Communication and Networks …, 2018
42018
Poster: Defending against sybil devices in crowdsourced mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
22016
Method and apparatus for matching wireless hotspot with POI
W Tianyi, C Li, H Wu
US Patent 10,694,324, 2020
12020
Method and apparatus for determining a location of a point of interest
H Wu, W Tianyi, T Zhang
US Patent 10,473,475, 2019
2019
MOBILE BIG DATA FOR URBAN ANALYTICS
M Chen, J Yang, L Hu, MS Hossain, G Muhammad, Q Gong, Y Chen, ...
IEEE Communications Magazine, 2, 2018
2018
系统目前无法执行此操作,请稍后再试。
文章 1–20