关注
Zhen Tu
Zhen Tu
Department Of Electronic Engineering, Tsinghua University, China
在 mails.tsinghua.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data
F Xu, Z Tu, Y Li, P Zhang, X Fu, D Jin
Proceedings of the 26th international conference on world wide web, 1241-1250, 2017
2042017
Protecting Trajectory From Semantic Attack Considering -Anonymity, -Diversity, and -Closeness
Z Tu, K Zhao, F Xu, Y Li, L Su, D Jin
IEEE Transactions on Network and Service Management 16 (1), 264-278, 2018
1042018
Smartphone app usage analysis: datasets, methods, and applications
T Li, T Xia, H Wang, Z Tu, S Tarkoma, Z Han, P Hui
IEEE Communications Surveys & Tutorials 24 (2), 937-966, 2022
832022
Your apps give you away: distinguishing mobile users by their app usage fingerprints
Z Tu, R Li, Y Li, G Wang, D Wu, P Hui, L Su, D Jin
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
782018
A new privacy breach: User trajectory recovery from aggregated mobility data
Z Tu, F Xu, Y Li, P Zhang, D Jin
IEEE/ACM Transactions on Networking 26 (3), 1446-1459, 2018
462018
Beyond k-anonymity: protect your trajectory from semantic attack
Z Tu, K Zhao, F Xu, Y Li, L Su, D Jin
2017 14th annual IEEE international conference on sensing, communication …, 2017
422017
Personalized mobile App recommendation by learning user's interest from social media
Z Tu, Y Li, P Hui, L Su, D Jin
IEEE Transactions on Mobile Computing 19 (11), 2670-2683, 2019
212019
From fingerprint to footprint: Cold-start location recommendation by learning user interest from app data
Z Tu, Y Fan, Y Li, X Chen, L Su, D Jin
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019
212019
Personalized context-aware collaborative online activity prediction
Y Fan, Z Tu, Y Li, X Chen, H Gao, L Zhang, L Su, D Jin
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019
182019
Demographics of mobile app usage: Long-term analysis of mobile app usage
Z Tu, H Cao, E Lagerspetz, Y Fan, H Flores, S Tarkoma, P Nurmi, Y Li
CCF Transactions on Pervasive Computing and Interaction 3, 235-252, 2021
152021
Walking without friends: Publishing anonymized trajectory dataset without leaking social relationships
K Zhao, Z Tu, F Xu, Y Li, P Zhang, D Pei, L Su, D Jin
IEEE Transactions on Network and Service Management 16 (3), 1212-1225, 2019
112019
No more than what I post: Preventing linkage attacks on check-in services
F Xu, Z Tu, H Huang, S Chang, F Sun, D Guo, Y Li
The World Wide Web Conference, 3405-3412, 2019
102019
Who will survive and revive undergoing the epidemic: Analyses about poi visit behavior in Wuhan via check-in records
Z Han, H Fu, F Xu, Z Tu, Y Yu, P Hui, Y Li
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2021
92021
Understanding the long-term dynamics of mobile app usage context via graph embedding
Y Fan, Z Tu, T Li, H Cao, T Xia, Y Li, X Chen, L Zhang
IEEE Transactions on Knowledge and Data Engineering 35 (3), 3180-3194, 2021
22021
Connecting the Dots: User Privacy is not Preserved in ID-Removed Cellular Data
F Xu, Z Tu, Y Li
IEEE Transactions on Network and Service Management 17 (1), 147-159, 2019
12019
Modeling Multi-Grained User Preference in Location Visitation
Y Qin, C Gao, Z Tu, H Wu, S Wei, Y Wang, L Zhang, Y Li
Proceedings of the 31st ACM International Conference on Advances in …, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–16