Follow
Jiayi Chen
Title
Cited by
Cited by
Year
Expanding EV charging networks considering transportation pattern and power supply limit
Y Zhang, J Chen, L Cai, J Pan
IEEE transactions on smart grid 10 (6), 6332-6342, 2019
512019
EV charging network design with transportation and power grid constraints
Y Zhang, J Chen, L Cai, J Pan
IEEE INFOCOM 2018-IEEE conference on computer communications, 2492-2500, 2018
222018
Disclose more and risk less: Privacy preserving online social network data sharing
J Chen, J He, L Cai, J Pan
IEEE Transactions on Dependable and Secure Computing 17 (6), 1173-1187, 2018
212018
Poster: Locmask: A location privacy protection framework in android system
Q Xiao, J Chen, L Yu, H Li, H Zhu, M Li, K Ren
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
202014
Profiling online social network users via relationships and network characteristics
J Chen, J He, L Cai, J Pan
2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016
132016
Chaperone: Real-time locking and loss prevention for smartphones
J Chen, U Hengartner, H Khan, M Mannan
29th USENIX Security Symposium (USENIX Security 20), 325-342, 2020
92020
Sharing without scaring: enabling smartphones to become aware of temporary sharing
J Chen, U Hengartner, H Khan
Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 671-685, 2022
42022
Defending against inference attack in online social networks
J Chen
22017
SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems
J Chen, U Hengartner, H Khan
Computers & Security 137, 103594, 2024
2024
MRAAC: A Multi-Stage Risk-Aware Adaptive Authentication and Access Control Framework for Android
J Chen, U Hengartner, H Khan
ACM Transactions on Privacy and Security, 2024
2024
Adaptive User Authentication on Mobile Devices
J Chen
University of Waterloo, 2022
2022
An Analysis of Travis CI Builds Through TravisTorrent
J Chen, M Mirsafian, Y Xue
The system can't perform the operation now. Try again later.
Articles 1–12