关注
Jiefeng (Terence) Chen
Jiefeng (Terence) Chen
Data Scientist - Telstra
在 nicta.com.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
Censorship in the wild: Analyzing Internet filtering in Syria
A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar
Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014
1182014
Is More Always Merrier? A Deep Dive Into Online Social Footprints
T Chen, MA Kaafar, A Friedman, R Boreli
Workshop on Online Social Networks, 67-72, 2012
782012
The where and when of finding new friends: Analysis of a location-based social discovery network
T Chen, M Kaafar, R Boreli
Proceedings of the International AAAI Conference on Web and Social Media 7 …, 2013
582013
Information Leakage through Mobile Analytics Services
T Chen, I Ullah, MA Kaafar, R Boreli
The 15th International Workshop on Mobile Computing Systems and Applications, 6, 2014
572014
Trusted routing for VANET
T Chen, O Mehani, R Boreli
Intelligent Transport Systems Telecommunications,(ITST), 2009 9th …, 2009
522009
Cross social networks interests predictions based ongraph features
A Tiroshi, S Berkovsky, MA Kaafar, T Chen, T Kuflik
Proceedings of the 7th ACM Conference on Recommender Systems, 319-322, 2013
432013
How much is too much? Leveraging ads audience estimation to evaluate public profile uniqueness
T Chen, A Chaabane, PU Tournoux, MA Kaafar, R Boreli
International symposium on privacy enhancing technologies symposium, 225-244, 2013
352013
On the effectiveness of obfuscation techniques in online social networks
T Chen, R Boreli, MA Kaafar, A Friedman
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014
342014
Improving business rating predictions using graph based features
A Tiroshi, S Berkovsky, MA Kaafar, D Vallet, T Chen, T Kuflik
Proceedings of the 19th international conference on Intelligent User …, 2014
312014
Improving the efficiency of anonymous routing for MANETs
J Chen, R Boreli, V Sivaraman
Computer Communications 35 (5), 619, 2012
172012
Securing mobile network prefix provisioning for NEMO based vehicular networks
JH Lee, JT Chen, T Ernst
Mathematical and Computer Modelling 55 (1-2), 170-187, 2012
172012
Taro: Trusted anonymous routing for manets
J Chen, R Boreli, V Sivaraman
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010
102010
Anonymous communication: A survey
Y Wu, W Wang, J Chen
MINIMICRO SYSTEMS-SHENYANG- 28 (4), 583, 2007
42007
Why are they hiding? Study of an anonymous file sharing system
M Cunche, MA Kaafar, J Chen, R Boreli, A Mahanti
2012 IEEE First AESS European Conference on Satellite Telecommunications …, 2012
32012
Censorship in the wild: Analyzing web filtering in syria
A Chaabane, M Cunche, T Chen, A Friedman, ED Cristofaro, MA Kaafar
arXiv preprint arXiv:1402.3401, 2014
22014
Characterizing and quantifying privacy in internet services
J Chen
UNSW Sydney, 2014
2014
A cross layer scheme for maximising the combination of wireless VoIP capacity and quality
T Chen, R Boreli, T Iyer
Proceedings of the 2009 International Conference on Wireless Communications …, 2009
2009
Also in this Issue
AS Cacciapuoti, M Caleffi, M Ji, J Llorca, AM Tulino, Q Wu, Z Li, G Tyson, ...
系统目前无法执行此操作,请稍后再试。
文章 1–18