Skip to main content

Research Repository

Advanced Search

Venue2Vec: An efficient embedding model for fine-grained user location prediction in geo-social networks (2019)
Journal Article

Geo-Social Networks (GSN) significantly improve location-aware capability of services by offering geo-located content based on the huge volumes of data generated in the GSN. The problem of user location prediction based on user-generated data in GSN... Read More about Venue2Vec: An efficient embedding model for fine-grained user location prediction in geo-social networks.

Privacy and security for resource-constrained IOT devices and networks: Research challenges and opportunities (2019)
Journal Article

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. With the exponential growth of the Internet of Things (IoT) and cyber-physical systems (CPS), a wide range of IoT applications have been developed and deployed in recent years. To match the he... Read More about Privacy and security for resource-constrained IOT devices and networks: Research challenges and opportunities.

Behavior rhythm: A new model for behavior visualization and its application in system security management (2018)
Journal Article

© 2018 IEEE. The widespread use of social media, cloud computing, and Internet of Things generates massive behavior data recorded by system logs, and how to utilize these data to improve the stability and security of these systems becomes more and mo... Read More about Behavior rhythm: A new model for behavior visualization and its application in system security management.

A comparative study of android users’ privacy preferences under the runtime permission model (2017)
Presentation / Conference Contribution

© Springer International Publishing AG 2017. Android users recently were given the ability to selectively grant access to sensitive resources of their mobile devices when apps request them at runtime. The Android fine-grained runtime permission model... Read More about A comparative study of android users’ privacy preferences under the runtime permission model.