Publications
SaToSS
»
Members
»
Xihui Chen
» Publications
SaToSS home
Xihui Chen
About
Publications
Teaching
Activities
A list of my
publications
from the
DBLP Bibliography Server
.
Patents
Location Assurance Framework
. Luxembourg Patent No. 92064.
International Journals
“Double vaccinated, 5G boosted!": Learning Attitudes Towards COVID-19 Vaccination from Social Media.
Ninghan Chen
,
Xihui Chen
,
Zhiqiang Zhong
and
Jun Pang
ACM Transactions on the Web
, open access, 2024.
Bridging Performance of X (formerly known as Twitter) Users: A Predictor of Subjective Well-Being During the Pandemic.
Ninghan Chen
,
Xihui Chen
,
Zhiqiang Zhong
and
Jun Pang
ACM Transactions on the Web
, Article 15, 23 pages, open access, 2024.
A Tale of Two Roles: Exploring Topic-specific Susceptibility and Influence in Cascade Prediction.
Ninghan Chen
,
Xihui Chen
,
Zhiqiang Zhong
and
Jun Pang
Data Mining and Knowledge Discovery
, open access, 2023.
A Multilingual Dataset of COVID-19 Vaccination Attitudes on Twitter.
Ninghan Chen
,
Xihui Chen
and
Jun Pang
Data in Brief
, open access, 2022.
Exploring Spillover Effects for COVID-19 Cascade Prediction.
Ninghan Chen
,
Xihui Chen
,
Zhiqiang Zhong
and
Jun Pang
Special Issue Analysis and Applications of Complex Social Networks 24(2)
, 2022.
Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee
.
Xihui Chen
,
Sjouke Mauw
and
Yunior Ramirez-Cruz
Proceedings on Privacy Enhancing Technologies (PoPETs) 2020(4): 131-152
, 2020.
Constructing and Comparing User Mobility Profiles
.
Xihui Chen
,
Jun Pang
and
Ran Xue
ACM Transactions on the Web 8(4): article 21
, 2014.
Protecting query privacy in location-based services
.
Xihui Chen
and
Jun Pang
.
GeoInformatica
18(1): 95-133,
2014.
Design and formal analysis of a group signature based electronic toll pricing system
.
Xihui Chen
,
Gabriele Lenzini
,
Sjouke Mauw
and
Jun Pang
.
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
4(1):55-75,
, 2013.
International Conference and Workshop Proceedings
Measuring COVID-19 Vaccine Hesitancy: Consistency of Social Media with Surveys.
Ninghan Chen
,
Xihui Chen
,
Jun Pang
,
Liyousew G. Borga
, and
Conchita D'Ambrosio
.
In
Proc. 13th International Conference on Social Informatics (SocInfo)
,
Lecture Notes in Computer Science, ©Springer-Verlag, to appear
2022.
The Burden of Being a Bridge: Analysing Subjective Well-Being of Twitter Users during the COVID-19 Pandemic.
Ninghan Chen
,
Xihui Chen
,
Zhiqiang Zhong
, and
Jun Pang
.
In
Proc. European Conference on Maching Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD)
,
Lecture Notes in Computer Science, ©Springer-Verlag, to appear
2022.
Pattern Recognition and Reconstruction: Detecting Malicious Deletions in Textual Communications.
Abiodun Abdulahi Solanke
,
Xihui Chen
, and
Yunior Ramirez-Cruz
.
In
Proc. 5th International Workshop on Big Data Analytic for Cybercrime Investigation and Prevention (BDACCIP)
,
to appear,
2021.
From #Jobsearch to #Mask: Improving COVID-19 Cascade Prediction with Spillover Effects.
Ninghan Chen
,
Xihui Chen
,
Zhiqiang Zhong
, and
Jun Pang
.
In
Proc. Workshop on Social Influence (SI21)
,
to appear,
2021.
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs.
Xihui Chen
,
Sjouke Mauw
, and
Yunior Ramirez-Cruz
.
In
Proc. 25th European Symposium on Research in Computer Security (ESORICS20)
,
Lecture Notes in Computer Science, ©Springer-Verlag, pp. 185-205
2020.
Activity Tracking: A new attack on location privacy.
Xihui Chen
,
Andrzej Mizera
, and
Jun Pang
.
In
Proc. 3rd IEEE Conference on Communications and Network Security - CNS'15
,
pp. 22-30, ©IEEE Computer Society,
2015.
MinUS: Mining user similarity with trajectory patterns.
Xihui Chen
,
Piotr Kordy
,
Ruipeng Lu
, and
Jun Pang
.
In
Proc. 7th European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases - ECML PKDD'14
,
Lecture Notes in Computer Science 8726, pp. 436-439, ©Springer-Verlag,
2014.
Measuring user similarity with trajectory patterns: principles and new metrics.
Xihui Chen
,
Ruipeng Lu
,
Xiaoxing Ma
, and
Jun Pang
.
In
Proc. 16th Aisa-Pacific Web Conference - APWEB'14
,
Lecture Notes in Computer Science 8709, pp. 437-448, ©Springer-Verlag,
2013.
DEMO: Demonstrating a trust framework for evaluating GNSS signal integrity.
Xihui Chen
,
Carlo Harpes
,
Gabriele Lenzini
,
Miguel Martins
,
Sjouke Mauw
, and
Jun Pang
.
In
Proc. 20th ACM Conference on Computer and Communications Security - CCS'13
,
pp. 1329-1332, ACM Press
2013.
A trust framework for evaluating GNSS signal integrity.
Xihui Chen
,
Gabriele Lenzini
,
Miguel Martins
,
Sjouke Mauw
, and
Jun Pang
.
In
Proc. 26th IEEE Computer Security Foundations Symposium - CSF'13
,
pp.179-192. ©IEEE Computer Society,
2013.
Exploring dependency for query privacy protection in location-based services.
Xihui Chen
and
Jun Pang
.
In
Proc. 3nd ACM Conference on Data and Application Security and Privacy - CODASPY'13
,
pp.37-47, ACM Press,
2013
(Outstanding Paper Award)
).
Constructing and Comparing User Mobility Profiles for Location-based Services.
Xihui Chen
,
Jun Pang
, and
Ran Xue
.
In
Proc. ACM Symposium on Applied Computing - SAC'13
,
pp.264-269, ACM Press,
2013.
Post-hoc user traceability analysis in electronic toll pricing systems.
Xihui Chen
,
David Fonkwe
, and
Jun Pang
.
In
Proc. 7th International Workshop on Data Privacy Management - DPM'12
,
Lecture Notes in Computer Science 7731, pp. 29-42, ©Springer-Verlag,
2013.
Implementation and validation of a localisation assurance service provider.
Carlo Harpes
,
Miguel Martins
,
Xihui Chen
,
Gabriele Lenzini
,
Sjouke Mauw
and
Jun Pang
.
In
Proc. 6th ESA Workshop on Satellite Navigation Technologies - NAVITEC'12
,
pp. 1-8, ©IEEE Computer Society,
2012.
A group signature based electronic toll pricing system.
Xihui Chen
,
Gabriele Lenzini
,
Sjouke Mauw
and
Jun Pang
.
In
Proc. 7th International Conference on Availability, Reliability and Security - ARES'12
,
pp. 85-93, ©IEEE Computer Society
, 2012.
Measuring query privacy in location-based services.
Xihui Chen
and
Jun Pang
.
In
Proc. 2nd ACM Conference on Data and Application Security and Privacy - CODASPY'12
,
pp. 49-60, ACM Press,
2012.
Improving automatic verification of security protocols with XOR.
Xihui Chen
,
Ton van Deursen
, and
Jun Pang
.
In
Proc. 11th Conference on Formal Engineering Methods - ICFEM'09
,
Lecture Notes in Computer Science 5885, pp. 107-126. ©Springer-Verlag,
2009.
Fuzzy dynamic programming based trusted routing decision in mobile ad hoc networks.
Zhiwei Qin
,
Zhiping Jia
, and
Xihui Chen
.
In
Proc. 5th IEEE International Symposium on Embedded Computing- SEC'09
,
pp. 180-185, ©IEEE Computer Society,
2009.
Technical Reports
Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee
.
Xihui Chen
,
Sjouke Mauw
and
Yunior Ramirez-Cruz
ArXiv:1909.00280
, 2019