Tianyi Wang
TitleCited byYear
Understanding user behavior in online social networks: A survey
L Jin, Y Chen, T Wang, P Hui, AV Vasilakos
IEEE Communications Magazine 51 (9), 144-150, 2013
2612013
Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers
G Wang, T Wang, H Zheng, BY Zhao
23rd {USENIX} Security Symposium ({USENIX} Security 14), 239-254, 2014
1262014
Whispers in the dark: analysis of an anonymous social network
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 2014 Conference on Internet Measurement Conference, 137-150, 2014
862014
Understanding graph sampling algorithms for social network analysis
T Wang, Y Chen, Z Zhang, T Xu, L Jin, P Hui, B Deng, X Li
Distributed Computing Systems Workshops (ICDCSW), 2011 31st International …, 2011
792011
Defending against sybil devices in crowdsourced mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
752016
Crowds on wall street: Extracting value from collaborative investing platforms
G Wang, T Wang, B Wang, D Sambasivan, Z Zhang, H Zheng, BY Zhao
Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015
48*2015
Albatross sampling: robust and effective hybrid vertex sampling for social graphs
L Jin, Y Chen, P Hui, C Ding, T Wang, AV Vasilakos, B Deng, X Li
Proceedings of the 3rd ACM international workshop on MobiArch, 11-16, 2011
422011
Unbiased sampling in directed social graph
T Wang, Y Chen, Z Zhang, P Sun, B Deng, X Li
ACM SIGCOMM Computer Communication Review 40 (4), 401-402, 2010
382010
DeepScan: Exploiting deep learning for malicious account detection in location-based social networks
Q Gong, Y Chen, X He, Z Zhuang, T Wang, H Huang, X Wang, X Fu
IEEE Communications Magazine 56 (11), 21-27, 2018
252018
Demand driven store site selection via multiple spatial-temporal data
M Xu, T Wang, Z Wu, J Zhou, J Li, H Wu
Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances …, 2016
20*2016
Characterizing and detecting malicious crowdsourcing
T Wang, G Wang, X Li, H Zheng, BY Zhao
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 537-538, 2013
162013
Ghost riders: Sybil attacks on crowdsourced mobile mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
IEEE/ACM transactions on networking 26 (3), 1123-1136, 2018
102018
Value and misinformation in collaborative investing platforms
T Wang, G Wang, B Wang, D Sambasivan, Z Zhang, X Li, H Zheng, ...
ACM Transactions on the Web (TWEB) 11 (2), 1-32, 2017
72017
The power of comments: fostering social interactions in microblog networks
T Wang, Y Chen, Y Wang, B Wang, G Wang, X Li, H Zheng, BY Zhao
Frontiers of Computer Science 10 (5), 889-907, 2016
62016
Method and apparatus for determining a location of a point of interest
H Wu, W Tianyi, T Zhang
US Patent 10,473,475, 2019
2019
MOBILE BIG DATA FOR URBAN ANALYTICS
M Chen, J Yang, L Hu, MS Hossain, G Muhammad, Q Gong, Y Chen, ...
IEEE Communications Magazine, 2, 2018
2018
Deep Learning-Based Malicious Account Detection in the Momo Social Network
J Wang, X He, Q Gong, Y Chen, T Wang, X Wang
2018 27th International Conference on Computer Communication and Networks …, 2018
2018
Method and apparatus for matching wireless hotspot with poi
W Tianyi, C Li, H Wu
US Patent App. 15/425,316, 2018
2018
Data processing method, data query method in a database, and corresponding device
K Wang, W Tianyi, Y Yuan, Z Yue, J Zou
US Patent 9,471,612, 2016
2016
Poster: Defending against Sybil Devices in Crowdsourced Mapping Services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20