Follow
Xihui Chen
Title
Cited by
Cited by
Year
Constructing and comparing user mobility profiles for location-based services
X Chen, J Pang, R Xue
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 261-266, 2013
592013
Constructing and comparing user mobility profiles
X Chen, J Pang, R Xue
ACM Transactions on the Web (TWEB) 8 (4), 1-25, 2014
552014
Measuring query privacy in location-based services
X Chen, J Pang
Proceedings of the second ACM conference on Data and Application Security …, 2012
542012
A Group Signature Based Electronic Toll Pricing System
X Chen, G Lenzini, S Mauw, J Pang
Arxiv preprint arXiv:1108.0574, 2011
482011
Protecting query privacy in location-based services
X Chen, J Pang
GeoInformatica 18 (1), 95-133, 2014
342014
Fuzzy dynamic programming based trusted routing decision in mobile Ad Hoc networks
Z Qin, Z Jia, X Chen
Embedded Computing, 2008. SEC'08. Fifth IEEE International Symposium on, 180-185, 2008
32*2008
Publishing community-preserving attributed social graphs with a differential privacy guarantee
X Chen, S Mauw, Y Ramírez-Cruz
arXiv preprint arXiv:1909.00280, 2019
242019
Measuring user similarity with trajectory patterns: Principles and new metrics
X Chen, R Lu, X Ma, J Pang
Web Technologies and Applications: 16th Asia-Pacific Web Conference, APWeb …, 2014
212014
MinUS: Mining User Similarity with Trajectory Patterns
X Chen, P Kordy, R Lu, J Pang
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2014
172014
Activity tracking: A new attack on location privacy
X Chen, A Mizera, J Pang
2015 IEEE Conference on Communications and Network Security (CNS), 22-30, 2015
152015
A multilingual dataset of COVID-19 vaccination attitudes on Twitter
N Chen, X Chen, J Pang
Data in Brief 44, 108503, 2022
122022
Design and formal analysis of a group signature based electronic toll pricing system
X Chen, G Lenzini, S Mauw, J Pang
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
122013
Improving automatic verification of security protocols with xor
X Chen, T van Deursen, J Pang
Formal Methods and Software Engineering: 11th International Conference on …, 2009
122009
Exploring dependency for query privacy protection in location-based services
X Chen, J Pang
Proceedings of the third ACM conference on Data and application security and …, 2013
112013
A trust framework for evaluating GNSS signal integrity
X Chen, G Lenzini, M Martins, S Mauw, J Pang
2013 IEEE 26th Computer Security Foundations Symposium, 179-192, 2013
102013
The burden of being a bridge: analysing subjective well-being of Twitter users during the COVID-19 pandemic
N Chen, X Chen, Z Zhong, J Pang
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2022
72022
Exploring spillover effects for COVID-19 cascade prediction
N Chen, X Chen, Z Zhong, J Pang
Entropy 24 (2), 222, 2022
72022
Active re-identification attacks on periodically released dynamic social graphs
X Chen, E Këpuska, S Mauw, Y Ramírez-Cruz
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
52020
Post-hoc user traceability analysis in electronic toll pricing systems
X Chen, D Fonkwe, J Pang
International Workshop on Data Privacy Management, 29-42, 2012
52012
Quantifying location privacy revisited: Preliminary report
X Chen, A Mizera, J Pang
University of Luxembourg, Tech. Rep, 2014
42014
The system can't perform the operation now. Try again later.
Articles 1–20