Lei Jin

Affiliations:
  • University of Pittsburgh, School of Information Sciences, PA, USA
  • Tsinghua University, Beijing, China (former)


According to our database1, Lei Jin authored at least 18 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Pruning-and-distillation: One-stage joint compression framework for CNNs <i>via</i> clustering.
Image Vis. Comput., August, 2023

2018
<i>k-Trustee</i>: Location injection attack-resilient anonymization for location privacy.
Comput. Secur., 2018

2016
Towards understanding the gamification upon users' scores in a location-based social network.
Multim. Tools Appl., 2016

Characterizing users' check-in activities using their scores in a location-based social network.
Multim. Syst., 2016

2015
Towards complexity analysis of User Authorization Query problem in RBAC.
Comput. Secur., 2015

2014
On the complexity of role updating feasibility problem in RBAC.
Inf. Process. Lett., 2014

Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Venue attacks in location-based social networks.
Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis, 2014

POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Mutual-friend based attacks in social network systems.
Comput. Secur., 2013

Towards understanding traveler behavior in Location-based Social Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Understanding venue popularity in Foursquare.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
Analysis of access control mechanisms for users' check-ins in Location-Based Social Network Systems.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Exploring trajectory-driven local geographic topics in foursquare.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

Towards understanding residential privacy by analyzing users' activities in foursquare.
Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security, 2012

2011
Analysing security and privacy issues of using e-mail address as identity.
Int. J. Inf. Priv. Secur. Integr., 2011

Towards active detection of identity clone attacks on online social networks.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Security and Privacy Risks of Using E-mail Address as an Identity.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010


  Loading...