Censorship in the wild: Analyzing Internet filtering in Syria A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014 | 118 | 2014 |
Is More Always Merrier? A Deep Dive Into Online Social Footprints T Chen, MA Kaafar, A Friedman, R Boreli Workshop on Online Social Networks, 67-72, 2012 | 78 | 2012 |
The where and when of finding new friends: Analysis of a location-based social discovery network T Chen, M Kaafar, R Boreli Proceedings of the International AAAI Conference on Web and Social Media 7 …, 2013 | 58 | 2013 |
Information Leakage through Mobile Analytics Services T Chen, I Ullah, MA Kaafar, R Boreli The 15th International Workshop on Mobile Computing Systems and Applications, 6, 2014 | 57 | 2014 |
Trusted routing for VANET T Chen, O Mehani, R Boreli Intelligent Transport Systems Telecommunications,(ITST), 2009 9th …, 2009 | 52 | 2009 |
Cross social networks interests predictions based ongraph features A Tiroshi, S Berkovsky, MA Kaafar, T Chen, T Kuflik Proceedings of the 7th ACM Conference on Recommender Systems, 319-322, 2013 | 43 | 2013 |
How much is too much? Leveraging ads audience estimation to evaluate public profile uniqueness T Chen, A Chaabane, PU Tournoux, MA Kaafar, R Boreli International symposium on privacy enhancing technologies symposium, 225-244, 2013 | 35 | 2013 |
On the effectiveness of obfuscation techniques in online social networks T Chen, R Boreli, MA Kaafar, A Friedman Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014 | 34 | 2014 |
Improving business rating predictions using graph based features A Tiroshi, S Berkovsky, MA Kaafar, D Vallet, T Chen, T Kuflik Proceedings of the 19th international conference on Intelligent User …, 2014 | 31 | 2014 |
Improving the efficiency of anonymous routing for MANETs J Chen, R Boreli, V Sivaraman Computer Communications 35 (5), 619, 2012 | 17 | 2012 |
Securing mobile network prefix provisioning for NEMO based vehicular networks JH Lee, JT Chen, T Ernst Mathematical and Computer Modelling 55 (1-2), 170-187, 2012 | 17 | 2012 |
Taro: Trusted anonymous routing for manets J Chen, R Boreli, V Sivaraman 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010 | 10 | 2010 |
Anonymous communication: A survey Y Wu, W Wang, J Chen MINIMICRO SYSTEMS-SHENYANG- 28 (4), 583, 2007 | 4 | 2007 |
Why are they hiding? Study of an anonymous file sharing system M Cunche, MA Kaafar, J Chen, R Boreli, A Mahanti 2012 IEEE First AESS European Conference on Satellite Telecommunications …, 2012 | 3 | 2012 |
Censorship in the wild: Analyzing web filtering in syria A Chaabane, M Cunche, T Chen, A Friedman, ED Cristofaro, MA Kaafar arXiv preprint arXiv:1402.3401, 2014 | 2 | 2014 |
Characterizing and quantifying privacy in internet services J Chen UNSW Sydney, 2014 | | 2014 |
A cross layer scheme for maximising the combination of wireless VoIP capacity and quality T Chen, R Boreli, T Iyer Proceedings of the 2009 International Conference on Wireless Communications …, 2009 | | 2009 |
Also in this Issue AS Cacciapuoti, M Caleffi, M Ji, J Llorca, AM Tulino, Q Wu, Z Li, G Tyson, ... | | |