Match!
Jinxue Zhang
Arizona State University
Internet privacyComputer networkComputer securityComputer scienceSocial network
21Publications
10H-index
321Citations
What is this?
Publications 18
Newest
#1Jinxue Zhang (ASU: Arizona State University)H-Index: 10
#2Rui Zhang (UD: University of Delaware)H-Index: 20
Last. Guanhua Yan (Binghamton University)H-Index: 25
view all 4 authors...
Online social networks (OSNs) are increasingly threatened by social bot s which are software-controlled OSN accounts that mimic human users with malicious intentions. A social botnet refers to a group of social bots under the control of a single botmaster , which collaborate to conduct malicious behavior while mimicking the interactions among normal OSN users to reduce their individual risk of being detected. We demonstrate the effectiveness and advantages of exploiting a social botnet for spam ...
16 CitationsSource
Apr 1, 2018 in INFOCOM (International Conference on Computer Communications)
#1Jinxue Zhang (ASU: Arizona State University)H-Index: 10
#2Jingchao Sun (ASU: Arizona State University)H-Index: 11
Last. Xia Hu (A&M: Texas A&M University)H-Index: 29
view all 5 authors...
User-generated social media data are exploding and of high demand in public and private sectors. The disclosure of intact social media data exacerbates the threats to user privacy. In this paper, we first identify a text-based user-linkage attack on current data outsourcing practices, in which the real users in an anonymized dataset can be pinpointed based on the users' unprotected text data. Then we propose a framework for differentially privacy-preserving social media data outsourcing for the ...
9 CitationsSource
#1Jinxue ZhangH-Index: 10
#2Jingchao SunH-Index: 11
Last. Xia HuH-Index: 29
view all 5 authors...
User-generated social media data are exploding and also of high demand in public and private sectors. The disclosure of complete and intact social media data exacerbates the threats to user privacy. In this paper, we first identify a text-based user-linkage attack on current social media data publishing practices, in which the real users of anonymous IDs in a published dataset can be pinpointed based on the users' unprotected text data. Then we propose a framework for differentially privacy-pres...
1 Citations
#1Jinxue Zhang (ASU: Arizona State University)H-Index: 10
#2Rui Zhang (UH: University of Hawaii)H-Index: 20
Last. Chi Zhang (USTC: University of Science and Technology of China)H-Index: 30
view all 5 authors...
Influential users have great potential for accelerating information dissemination and acquisition on Twitter. How to measure the influence of Twitter users has attracted significant academic and industrial attention. Existing influence measurement techniques are vulnerable to sybil users that are thriving on Twitter. Although sybil defenses for online social networks have been extensively investigated, they commonly assume unique mappings from human-established trust relationships to online soci...
20 CitationsSource
#1Jingchao Sun (ASU: Arizona State University)H-Index: 11
#2Rui Zhang (UH: University of Hawaii)H-Index: 20
Last. Yanchao Zhang (ASU: Arizona State University)H-Index: 37
view all 4 authors...
Distributed stream monitoring has numerous potential applications in future smart cities. Communication efficiency, and data privacy are two main challenges for distributed stream monitoring services. In this paper, we propose PriStream, the first communication-efficient and privacy-preserving distributed stream monitoring system for thresholded PERCENTILE aggregates. PriStream allows the monitoring service provider to evaluate an arbitrary function over a desired percentile of i distributed dat...
6 CitationsSource
Mar 31, 2016 in ICWSM (International Conference on Weblogs and Social Media)
#1Jinxue Zhang (ASU: Arizona State University)H-Index: 10
#2Xia Hu (A&M: Texas A&M University)H-Index: 29
Last. Huan LiuH-Index: 88
view all 4 authors...
Microblogging systems such as Twitter have seen explosive use in public and private sectors. The age information of microbloggers can be very useful for many applications such as viral marketing and social studies/surveys. Current microblogging systems, however, have very sparse age information. In this paper, we present MAIF, a novel framework that explores public content and interaction information in microblogging systems to explore the hidden ages of microbloggers. We thoroughly evaluate the...
18 Citations
#1Jinxue ZhangH-Index: 10
Jan 1, 2016 in NDSS (Network and Distributed System Security Symposium)
#1Jingchao Sun (ASU: Arizona State University)H-Index: 11
#2Xiaocong Jin (ASU: Arizona State University)H-Index: 8
Last. Rui Zhang (UH: University of Hawaii)H-Index: 20
view all 6 authors...
24 CitationsSource
Sep 1, 2015 in CNS (Communications and Networking Symposium)
#1Jinxue Zhang (ASU: Arizona State University)H-Index: 10
#2Jingchao Sun (ASU: Arizona State University)H-Index: 11
Last. Yanchao Zhang (ASU: Arizona State University)H-Index: 37
view all 4 authors...
Twitter is an extremely popular social networking platform. Most Twitter users do not disclose their locations due to privacy concerns. Although inferring the location of an individual Twitter user has been extensively studied, it is still missing to effectively find the majority of the users in a specific geographical area without scanning the whole Twittersphere, and obtaining these users will result in both positive and negative significance. In this paper, we propose LocInfer, a novel and li...
8 CitationsSource
Oct 1, 2014 in CNS (Communications and Networking Symposium)
#1Jingchao Sun (ASU: Arizona State University)H-Index: 11
#2Rui Zhang (UH: University of Hawaii)H-Index: 20
Last. Yanchao Zhang (ASU: Arizona State University)H-Index: 37
view all 4 authors...
Mobile authentication is indispensable for preventing unauthorized access to multi-touch mobile devices. Existing mobile authentication techniques are often cumbersome to use and also vulnerable to shoulder-surfing and smudge attacks. This paper focuses on designing, implementing, and evaluating TouchIn, a two-factor authentication system on multi-touch mobile devices. TouchIn works by letting a user draw on the touchscreen with one or multiple fingers to unlock his mobile device, and the user i...
45 CitationsSource
12