Follow
Zhen Tu
Zhen Tu
Department Of Electronic Engineering, Tsinghua University, China
Verified email at mails.tsinghua.edu.cn
Title
Cited by
Cited by
Year
Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data
F Xu, Z Tu, Y Li, P Zhang, X Fu, D Jin
Proceedings of the 26th international conference on world wide web, 1241-1250, 2017
1512017
Protecting Trajectory From Semantic Attack Considering -Anonymity, -Diversity, and -Closeness
Z Tu, K Zhao, F Xu, Y Li, L Su, D Jin
IEEE Transactions on Network and Service Management 16 (1), 264-278, 2018
562018
Your apps give you away: distinguishing mobile users by their app usage fingerprints
Z Tu, R Li, Y Li, G Wang, D Wu, P Hui, L Su, D Jin
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
502018
Beyond k-anonymity: protect your trajectory from semantic attack
Z Tu, K Zhao, F Xu, Y Li, L Su, D Jin
2017 14th Annual IEEE International Conference on Sensing, Communication …, 2017
332017
A new privacy breach: User trajectory recovery from aggregated mobility data
Z Tu, F Xu, Y Li, P Zhang, D Jin
IEEE/ACM Transactions on Networking 26 (3), 1446-1459, 2018
322018
From fingerprint to footprint: Cold-start location recommendation by learning user interest from app data
Z Tu, Y Fan, Y Li, X Chen, L Su, D Jin
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019
162019
Personalized context-aware collaborative online activity prediction
Y Fan, Z Tu, Y Li, X Chen, H Gao, L Zhang, L Su, D Jin
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019
92019
Walking without friends: Publishing anonymized trajectory dataset without leaking social relationships
K Zhao, Z Tu, F Xu, Y Li, P Zhang, D Pei, L Su, D Jin
IEEE Transactions on Network and Service Management 16 (3), 1212-1225, 2019
92019
No more than what I post: Preventing linkage attacks on check-in services
F Xu, Y Li, Z Tu, S Chang, H Huang
IEEE Transactions on Mobile Computing 20 (2), 620-633, 2019
72019
Personalized Mobile App Recommendation by Learning User's Interest from Social Media
Z Tu, Y Li, P Hui, L Su, D Jin
IEEE Transactions on Mobile Computing 19 (11), 2670-2683, 2019
62019
Demographics of mobile app usage: Long-term analysis of mobile app usage
Z Tu, H Cao, E Lagerspetz, Y Fan, H Flores, S Tarkoma, P Nurmi, Y Li
CCF Transactions on Pervasive Computing and Interaction 3 (3), 235-252, 2021
42021
Understanding the Long-term Dynamics of Mobile App Usage Context via Graph Embedding
Y Fan, Z Tu, T Li, H Cao, T Xia, Y Li, X Chen, L Zhang
IEEE Transactions on Knowledge and Data Engineering, 2021
12021
Smartphone App Usage Analysis: Datasets, Methods, and Applications
T Li, T Xia, H Wang, Z Tu, S Tarkoma, Z Han, P Hui
IEEE Communications Surveys & Tutorials, 2022
2022
Who Will Survive and Revive Undergoing the Epidemic: Analyses about POI Visit Behavior in Wuhan via Check-in Records
Z Han, H Fu, F Xu, Z Tu, Y Yu, P Hui, Y Li
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2021
2021
Connecting the Dots: User Privacy is not Preserved in ID-Removed Cellular Data
F Xu, Z Tu, Y Li
IEEE Transactions on Network and Service Management 17 (1), 147-159, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–15