Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data F Xu, Z Tu, Y Li, P Zhang, X Fu, D Jin Proceedings of the 26th international conference on world wide web, 1241-1250, 2017 | 204 | 2017 |
Protecting Trajectory From Semantic Attack Considering -Anonymity, -Diversity, and -Closeness Z Tu, K Zhao, F Xu, Y Li, L Su, D Jin IEEE Transactions on Network and Service Management 16 (1), 264-278, 2018 | 104 | 2018 |
Smartphone app usage analysis: datasets, methods, and applications T Li, T Xia, H Wang, Z Tu, S Tarkoma, Z Han, P Hui IEEE Communications Surveys & Tutorials 24 (2), 937-966, 2022 | 83 | 2022 |
Your apps give you away: distinguishing mobile users by their app usage fingerprints Z Tu, R Li, Y Li, G Wang, D Wu, P Hui, L Su, D Jin Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018 | 78 | 2018 |
A new privacy breach: User trajectory recovery from aggregated mobility data Z Tu, F Xu, Y Li, P Zhang, D Jin IEEE/ACM Transactions on Networking 26 (3), 1446-1459, 2018 | 46 | 2018 |
Beyond k-anonymity: protect your trajectory from semantic attack Z Tu, K Zhao, F Xu, Y Li, L Su, D Jin 2017 14th annual IEEE international conference on sensing, communication …, 2017 | 42 | 2017 |
Personalized mobile App recommendation by learning user's interest from social media Z Tu, Y Li, P Hui, L Su, D Jin IEEE Transactions on Mobile Computing 19 (11), 2670-2683, 2019 | 21 | 2019 |
From fingerprint to footprint: Cold-start location recommendation by learning user interest from app data Z Tu, Y Fan, Y Li, X Chen, L Su, D Jin Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019 | 21 | 2019 |
Personalized context-aware collaborative online activity prediction Y Fan, Z Tu, Y Li, X Chen, H Gao, L Zhang, L Su, D Jin Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019 | 18 | 2019 |
Demographics of mobile app usage: Long-term analysis of mobile app usage Z Tu, H Cao, E Lagerspetz, Y Fan, H Flores, S Tarkoma, P Nurmi, Y Li CCF Transactions on Pervasive Computing and Interaction 3, 235-252, 2021 | 15 | 2021 |
Walking without friends: Publishing anonymized trajectory dataset without leaking social relationships K Zhao, Z Tu, F Xu, Y Li, P Zhang, D Pei, L Su, D Jin IEEE Transactions on Network and Service Management 16 (3), 1212-1225, 2019 | 11 | 2019 |
No more than what I post: Preventing linkage attacks on check-in services F Xu, Z Tu, H Huang, S Chang, F Sun, D Guo, Y Li The World Wide Web Conference, 3405-3412, 2019 | 10 | 2019 |
Who will survive and revive undergoing the epidemic: Analyses about poi visit behavior in Wuhan via check-in records Z Han, H Fu, F Xu, Z Tu, Y Yu, P Hui, Y Li Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2021 | 9 | 2021 |
Understanding the long-term dynamics of mobile app usage context via graph embedding Y Fan, Z Tu, T Li, H Cao, T Xia, Y Li, X Chen, L Zhang IEEE Transactions on Knowledge and Data Engineering 35 (3), 3180-3194, 2021 | 2 | 2021 |
Connecting the Dots: User Privacy is not Preserved in ID-Removed Cellular Data F Xu, Z Tu, Y Li IEEE Transactions on Network and Service Management 17 (1), 147-159, 2019 | 1 | 2019 |
Modeling Multi-Grained User Preference in Location Visitation Y Qin, C Gao, Z Tu, H Wu, S Wei, Y Wang, L Zhang, Y Li Proceedings of the 31st ACM International Conference on Advances in …, 2023 | | 2023 |