​
Login / Signup
Lei Jin
ORCID
Publication Activity (10 Years)
Years Active: 2010-2024
Publications (10 Years): 7
Top Topics
Complexity Analysis
Social Ties
Location Privacy
Social Networks
Top Venues
CoRR
Comput. Secur.
GeoPrivacy
Inf. Process. Lett.
</>
Publications
</>
Chen Min
,
Dawei Zhao
,
Liang Xiao
,
Jian Zhao
,
Xinli Xu
,
Zheng Zhu
,
Lei Jin
,
Jianshu Li
,
Yulan Guo
,
Junliang Xing
,
Liping Jing
,
Yiming Nie
,
Bin Dai
DriveWorld: 4D Pre-trained Scene Understanding via World Models for Autonomous Driving.
CoRR
(2024)
Jian Zhao
,
Lei Jin
,
Jianshu Li
,
Zheng Zhu
,
Yinglei Teng
,
Jiaojiao Zhao
,
Sadaf Gulshad
,
Zheng Wang
,
Bo Zhao
,
Xiangbo Shu
,
Yunchao Wei
,
Xuecheng Nie
,
Xiaojie Jin
,
Xiaodan Liang
,
Shin'ichi Satoh
,
Yandong Guo
,
Cewu Lu
,
Junliang Xing
,
Jane Shengmei Shen
The SkatingVerse Workshop & Challenge: Methods and Results.
CoRR
(2024)
Xuechao Zou
,
Kai Li
,
Junliang Xing
,
Yu Zhang
,
Shiying Wang
,
Lei Jin
,
Pin Tao
DiffCR: A Fast Conditional Diffusion Framework for Cloud Removal From Optical Satellite Images.
IEEE Trans. Geosci. Remote. Sens.
62 (2024)
Tao Niu
,
Yinglei Teng
,
Lei Jin
,
Panpan Zou
,
Yiding Liu
clustering.
Image Vis. Comput.
136 (2023)
Lei Jin
,
Chao Li
,
Balaji Palanisamy
,
James Joshi
: Location injection attack-resilient anonymization for location privacy.
Comput. Secur.
78 (2018)
Lei Jin
,
Ke Zhang
,
Jianfeng Lu
,
Yu-Ru Lin
Towards understanding the gamification upon users' scores in a location-based social network.
Multim. Tools Appl.
75 (15) (2016)
Lei Jin
,
Xuelian Long
,
Ke Zhang
,
Yu-Ru Lin
,
James B. D. Joshi
Characterizing users' check-in activities using their scores in a location-based social network.
Multim. Syst.
22 (1) (2016)
Jianfeng Lu
,
James B. D. Joshi
,
Lei Jin
,
Yiding Liu
Towards complexity analysis of User Authorization Query problem in RBAC.
Comput. Secur.
48 (2015)
Lei Jin
,
Hassan Takabi
,
Xuelian Long
,
James B. D. Joshi
Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links.
WPES
(2014)
Lei Jin
,
Balaji Palanisamy
,
James B. D. Joshi
POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks.
CCS
(2014)
Jianfeng Lu
,
Dewu Xu
,
Lei Jin
,
Jianmin Han
,
Hao Peng
On the complexity of role updating feasibility problem in RBAC.
Inf. Process. Lett.
114 (11) (2014)
Lei Jin
,
Hassan Takabi
Venue attacks in location-based social networks.
GeoPrivacy
(2014)
Xuelian Long
,
Lei Jin
,
James Joshi
Towards understanding traveler behavior in Location-based Social Networks.
GLOBECOM
(2013)
Lei Jin
,
James B. D. Joshi
,
Mohd Anwar
Mutual-friend based attacks in social network systems.
Comput. Secur.
37 (2013)
Xuelian Long
,
Lei Jin
,
James Joshi
Understanding venue popularity in Foursquare.
CollaborateCom
(2013)
Lei Jin
,
Xuelian Long
,
James B. D. Joshi
Towards understanding residential privacy by analyzing users' activities in foursquare.
BADGERS@CCS
(2012)
Xuelian Long
,
Lei Jin
,
James Joshi
Exploring trajectory-driven local geographic topics in foursquare.
UbiComp
(2012)
Lei Jin
,
Xuelian Long
,
James B. D. Joshi
,
Mohd Anwar
Analysis of access control mechanisms for users' check-ins in Location-Based Social Network Systems.
IRI
(2012)
Lei Jin
,
Hassan Takabi
,
James B. D. Joshi
Analysing security and privacy issues of using e-mail address as identity.
Int. J. Inf. Priv. Secur. Integr.
1 (1) (2011)
Lei Jin
,
Hassan Takabi
,
James B. D. Joshi
Towards active detection of identity clone attacks on online social networks.
CODASPY
(2011)
Lei Jin
,
Hassan Takabi
,
James B. D. Joshi
Security and Privacy Risks of Using E-mail Address as an Identity.
SocialCom/PASSAT
(2010)