Follow
Tianyi Wang
Title
Cited by
Cited by
Year
Understanding user behavior in online social networks: A survey
L Jin, Y Chen, T Wang, P Hui, AV Vasilakos
IEEE communications magazine 51 (9), 144-150, 2013
3452013
Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers
G Wang, T Wang, H Zheng, BY Zhao
23rd USENIX Security Symposium (USENIX Security 14), 239-254, 2014
1942014
Defending against sybil devices in crowdsourced mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th annual international conference on mobile systems …, 2016
1202016
Whispers in the dark: analysis of an anonymous social network
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 2014 conference on internet measurement conference, 137-150, 2014
1172014
Understanding graph sampling algorithms for social network analysis
T Wang, Y Chen, Z Zhang, T Xu, L Jin, P Hui, B Deng, X Li
Distributed Computing Systems Workshops (ICDCSW), 2011 31st International …, 2011
1052011
Crowds on wall street: Extracting value from collaborative investing platforms
G Wang, T Wang, B Wang, D Sambasivan, Z Zhang, H Zheng, BY Zhao
Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015
79*2015
DeepScan: Exploiting deep learning for malicious account detection in location-based social networks
Q Gong, Y Chen, X He, Z Zhuang, T Wang, H Huang, X Wang, X Fu
IEEE Communications Magazine 56 (11), 21-27, 2018
612018
Albatross sampling: robust and effective hybrid vertex sampling for social graphs
L Jin, Y Chen, P Hui, C Ding, T Wang, AV Vasilakos, B Deng, X Li
Proceedings of the 3rd ACM international workshop on MobiArch, 11-16, 2011
562011
Unbiased sampling in directed social graph
T Wang, Y Chen, Z Zhang, P Sun, B Deng, X Li
ACM SIGCOMM Computer Communication Review 40 (4), 401-402, 2010
482010
Demand driven store site selection via multiple spatial-temporal data
M Xu, T Wang, Z Wu, J Zhou, J Li, H Wu
Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances …, 2016
45*2016
Ghost riders: Sybil attacks on crowdsourced mobile mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
IEEE/ACM transactions on networking 26 (3), 1123-1136, 2018
332018
Characterizing and detecting malicious crowdsourcing
T Wang, G Wang, X Li, H Zheng, BY Zhao
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 537-538, 2013
242013
Value and misinformation in collaborative investing platforms
T Wang, G Wang, B Wang, D Sambasivan, Z Zhang, X Li, H Zheng, ...
ACM Transactions on the Web (TWEB) 11 (2), 1-32, 2017
142017
The power of comments: fostering social interactions in microblog networks
T Wang, Y Chen, Y Wang, B Wang, G Wang, X Li, H Zheng, BY Zhao
Frontiers of Computer Science 10 (5), 889-907, 2016
122016
Multifunctional products of isoprene oxidation in polluted atmosphere and their contribution to SOA
ZN Xu, W Nie, YL Liu, P Sun, DD Huang, C Yan, J Krechmer, PL Ye, Z Xu, ...
Geophysical Research Letters 48 (1), e2020GL089276, 2021
92021
Formation of condensable organic vapors from anthropogenic and biogenic volatile organic compounds (VOCs) is strongly perturbed by NOx in eastern China
Y Liu, W Nie, Y Li, D Ge, C Liu, Z Xu, L Chen, T Wang, L Wang, P Sun, ...
Atmospheric Chemistry and Physics 21 (19), 14789-14814, 2021
42021
Deep learning-based malicious account detection in the momo social network
J Wang, X He, Q Gong, Y Chen, T Wang, X Wang
2018 27th International Conference on Computer Communication and Networks …, 2018
42018
Method and apparatus for matching wireless hotspot with POI
W Tianyi, C Li, H Wu
US Patent 10,694,324, 2020
2020
Method and apparatus for determining a location of a point of interest
H Wu, W Tianyi, T Zhang
US Patent 10,473,475, 2019
2019
MOBILE BIG DATA FOR URBAN ANALYTICS
M Chen, J Yang, L Hu, MS Hossain, G Muhammad, Q Gong, Y Chen, ...
IEEE Communications Magazine, 2, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20