Author of the publication

No More than What I Post: Preventing Linkage Attacks on Check-in Services.

, , , , , , and . WWW, page 3405-3412. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

No More than What I Post: Preventing Linkage Attacks on Check-in Services., , , , , , and . WWW, page 3405-3412. ACM, (2019)Understanding the Long-Term Dynamics of Mobile App Usage Context via Graph Embedding., , , , , , , and . IEEE Trans. Knowl. Data Eng., 35 (3): 3180-3194 (March 2023)Who Will Survive and Revive Undergoing the Epidemic: Analyses about POI Visit Behavior in Wuhan via Check-in Records., , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 5 (2): 64:1-64:20 (2021)Context-aware RNNLM Rescoring for Conversational Speech Recognition., , , , and . CoRR, (2020)Context-aware RNNLM Rescoring for Conversational Speech Recognition., , , , and . ISCSLP, page 1-5. IEEE, (2021)Modeling Multi-Grained User Preference in Location Visitation., , , , , , , and . SIGSPATIAL/GIS, page 78:1-78:10. ACM, (2023)Trajectory Recovery From Ash: User Privacy Is NOT Preserved in Aggregated Mobility Data., , , , , and . WWW, page 1241-1250. ACM, (2017)Connecting the Dots: User Privacy is not Preserved in ID-Removed Cellular Data., , and . IEEE Trans. Network and Service Management, 17 (1): 147-159 (2020)No More than What I Post: Preventing Linkage Attacks on Check-in Services., , , , and . IEEE Trans. Mob. Comput., 20 (2): 620-633 (2021)Walking Without Friends: Publishing Anonymized Trajectory Dataset Without Leaking Social Relationships., , , , , , , and . IEEE Trans. Network and Service Management, 16 (3): 1212-1225 (2019)