Hongxia Jin
Citeras av
Citeras av
Dimensionality of information disclosure behavior
BP Knijnenburg, A Kobsa, H Jin
International Journal of Human-Computer Studies 71 (12), 1144-1162, 2013
Tamper-resistant trusted java virtual machine and method of using the same
H Jin, DE Leake, JB Lotspiech, SI Nin, WE Plouffe
US Patent 7,516,331, 2009
System, method, and service for detecting improper manipulation of an application
H Jin, G Myles
US Patent 8,056,138, 2011
Efficient privilege de-escalation for ad libraries in mobile apps
B Liu, B Liu, H Jin, R Govindan
Proceedings of the 13th annual international conference on mobile systems …, 2015
Personalized mobile app recommendation: Reconciling app functionality and user privacy preference
B Liu, D Kong, L Cen, NZ Gong, H Jin, H Xiong
Proceedings of the eighth ACM international conference on web search and …, 2015
Differentially private k-means clustering
D Su, J Cao, N Li, E Bertino, H Jin
Proceedings of the sixth ACM conference on data and application security and …, 2016
Generalizing DTW to the multi-dimensional case requires an adaptive approach
M Shokoohi-Yekta, B Hu, H Jin, J Wang, E Keogh
Data mining and knowledge discovery 31 (1), 1-31, 2017
System and method for assigning sequence keys to a media player to enable hybrid traitor tracing
JB Lotspiech, H Jin
US Patent 7,630,497, 2009
Private spatial data aggregation in the local setting
R Chen, H Li, AK Qin, SP Kasiviswanathan, H Jin
2016 IEEE 32nd International Conference on Data Engineering (ICDE), 289-300, 2016
Quantified risk-adaptive access control for patient privacy protection in health information systems
Q Wang, H Jin
Proceedings of the 6th ACM symposium on information, computer and …, 2011
Exploring online social activities for adaptive search personalization
Q Wang, H Jin
Proceedings of the 19th ACM international conference on Information and …, 2010
Traitor tracing for prerecorded and recordable media
H Jin, J Lotspiech, S Nusser
Proceedings of the 4th ACM workshop on Digital rights management, 83-90, 2004
Preference-based location sharing: are more privacy options really better?
BP Knijnenburg, A Kobsa, H Jin
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
Personalized data search utilizing social activities
H Jin, Q Wang
US Patent 8,538,959, 2013
Autoreb: Automatically understanding the review-to-behavior fidelity in android applications
D Kong, L Cen, H Jin
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Location sharing privacy preference: analysis and personalized recommendation
J Xie, BP Knijnenburg, H Jin
Proceedings of the 19th international conference on Intelligent User …, 2014
A bi-model based rnn semantic frame parsing model for intent detection and slot filling
Y Wang, Y Shen, H Jin
arXiv preprint arXiv:1812.10235, 2018
Double clutch transmission and method for controlling an automated double clutch transmission
A Schamscha
US Patent 6,675,668, 2004
Privacy-preserving personalized recommendation: An instance-based approach via differential privacy
Y Shen, H Jin
2014 IEEE International Conference on Data Mining, 540-549, 2014
Counteracting the negative effect of form auto-completion on the privacy calculus
BP Knijnenburg, A Kobsa, H Jin
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20