default search action
Zhen Tu
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Yali Fan, Zhen Tu, Tong Li, Hancheng Cao, Tong Xia, Yong Li, Xiang Chen, Lin Zhang:
Understanding the Long-Term Dynamics of Mobile App Usage Context via Graph Embedding. IEEE Trans. Knowl. Data Eng. 35(3): 3180-3194 (2023) - [c5]Yingrong Qin, Chen Gao, Zhen Tu, Hongsheng Wu, Shuangqing Wei, Yue Wang, Lin Zhang, Yong Li:
Modeling Multi-Grained User Preference in Location Visitation. SIGSPATIAL/GIS 2023: 78:1-78:10 - 2022
- [j13]Tong Li, Tong Xia, Huandong Wang, Zhen Tu, Sasu Tarkoma, Zhu Han, Pan Hui:
Smartphone App Usage Analysis: Datasets, Methods, and Applications. IEEE Commun. Surv. Tutorials 24(2): 937-966 (2022) - [j12]Zhen Tu, Liang Qiao, Robert M. Nowak, Haibin Lv, Zhihan Lv:
Digital Twins-Based Automated Pilot for Energy-Efficiency Assessment of Intelligent Transportation Infrastructure. IEEE Trans. Intell. Transp. Syst. 23(11): 22320-22330 (2022) - 2021
- [j11]Zhen Tu, Hancheng Cao, Eemil Lagerspetz, Yali Fan, Huber Flores, Sasu Tarkoma, Petteri Nurmi, Yong Li:
Demographics of mobile app usage: long-term analysis of mobile app usage. CCF Trans. Pervasive Comput. Interact. 3(3): 235-252 (2021) - [j10]Zhenyu Han, Haohao Fu, Fengli Xu, Zhen Tu, Yang Yu, Pan Hui, Yong Li:
Who Will Survive and Revive Undergoing the Epidemic: Analyses about POI Visit Behavior in Wuhan via Check-in Records. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(2): 64:1-64:20 (2021) - [j9]Fengli Xu, Yong Li, Zhen Tu, Shuhao Chang, Hongjia Huang:
No More than What I Post: Preventing Linkage Attacks on Check-in Services. IEEE Trans. Mob. Comput. 20(2): 620-633 (2021) - [c4]Kun Wei, Pengcheng Guo, Hang Lv, Zhen Tu, Lei Xie:
Context-aware RNNLM Rescoring for Conversational Speech Recognition. ISCSLP 2021: 1-5 - 2020
- [j8]Zhen Tu, Yong Li, Pan Hui, Li Su, Depeng Jin:
Personalized Mobile App Recommendation by Learning User's Interest from Social Media. IEEE Trans. Mob. Comput. 19(11): 2670-2683 (2020) - [j7]Fengli Xu, Zhen Tu, Yong Li:
Connecting the Dots: User Privacy is not Preserved in ID-Removed Cellular Data. IEEE Trans. Netw. Serv. Manag. 17(1): 147-159 (2020) - [i2]Kun Wei, Pengcheng Guo, Hang Lv, Zhen Tu, Lei Xie:
Context-aware RNNLM Rescoring for Conversational Speech Recognition. CoRR abs/2011.09301 (2020)
2010 – 2019
- 2019
- [j6]Zhen Tu, Yali Fan, Yong Li, Xiang Chen, Li Su, Depeng Jin:
From Fingerprint to Footprint: Cold-start Location Recommendation by Learning User Interest from App Data. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(1): 26:1-26:22 (2019) - [j5]Yali Fan, Zhen Tu, Yong Li, Xiang Chen, Hui Gao, Lin Zhang, Li Su, Depeng Jin:
Personalized Context-aware Collaborative Online Activity Prediction. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(4): 132:1-132:28 (2019) - [j4]Zhen Tu, Kai Zhao, Fengli Xu, Yong Li, Li Su, Depeng Jin:
Protecting Trajectory From Semantic Attack Considering ${k}$ -Anonymity, ${l}$ -Diversity, and ${t}$ -Closeness. IEEE Trans. Netw. Serv. Manag. 16(1): 264-278 (2019) - [j3]Kai Zhao, Zhen Tu, Fengli Xu, Yong Li, Pengyu Zhang, Dan Pei, Li Su, Depeng Jin:
Walking Without Friends: Publishing Anonymized Trajectory Dataset Without Leaking Social Relationships. IEEE Trans. Netw. Serv. Manag. 16(3): 1212-1225 (2019) - [c3]Fengli Xu, Zhen Tu, Hongjia Huang, Shuhao Chang, Funing Sun, Diansheng Guo, Yong Li:
No More than What I Post: Preventing Linkage Attacks on Check-in Services. WWW 2019: 3405-3412 - 2018
- [j2]Zhen Tu, Runtong Li, Yong Li, Gang Wang, Di Wu, Pan Hui, Li Su, Depeng Jin:
Your Apps Give You Away: Distinguishing Mobile Users by Their App Usage Fingerprints. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(3): 138:1-138:23 (2018) - [j1]Zhen Tu, Fengli Xu, Yong Li, Pengyu Zhang, Depeng Jin:
A New Privacy Breach: User Trajectory Recovery From Aggregated Mobility Data. IEEE/ACM Trans. Netw. 26(3): 1446-1459 (2018) - 2017
- [c2]Zhen Tu, Kai Zhao, Fengli Xu, Yong Li, Li Su, Depeng Jin:
Beyond K-Anonymity: Protect Your Trajectory from Semantic Attack. SECON 2017: 1-9 - [c1]Fengli Xu, Zhen Tu, Yong Li, Pengyu Zhang, Xiaoming Fu, Depeng Jin:
Trajectory Recovery From Ash: User Privacy Is NOT Preserved in Aggregated Mobility Data. WWW 2017: 1241-1250 - [i1]Fengli Xu, Zhen Tu, Yong Li, Pengyu Zhang, Xiaoming Fu, Depeng Jin:
Trajectory Recovery From Ash: User Privacy Is NOT Preserved in Aggregated Mobility Data. CoRR abs/1702.06270 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint