Tianyi Wang
Cited by
Cited by
Understanding user behavior in online social networks: A survey
L Jin, Y Chen, T Wang, P Hui, AV Vasilakos
IEEE communications magazine 51 (9), 144-150, 2013
Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers
G Wang, T Wang, H Zheng, BY Zhao
23rd USENIX Security Symposium (USENIX Security 14), 239-254, 2014
Defending against sybil devices in crowdsourced mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th annual international conference on mobile systems …, 2016
Whispers in the dark: analysis of an anonymous social network
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 2014 conference on internet measurement conference, 137-150, 2014
Understanding graph sampling algorithms for social network analysis
T Wang, Y Chen, Z Zhang, T Xu, L Jin, P Hui, B Deng, X Li
Distributed Computing Systems Workshops (ICDCSW), 2011 31st International …, 2011
Crowds on wall street: Extracting value from collaborative investing platforms
G Wang, T Wang, B Wang, D Sambasivan, Z Zhang, H Zheng, BY Zhao
Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015
DeepScan: Exploiting deep learning for malicious account detection in location-based social networks
Q Gong, Y Chen, X He, Z Zhuang, T Wang, H Huang, X Wang, X Fu
IEEE Communications Magazine 56 (11), 21-27, 2018
Albatross sampling: robust and effective hybrid vertex sampling for social graphs
L Jin, Y Chen, P Hui, C Ding, T Wang, AV Vasilakos, B Deng, X Li
Proceedings of the 3rd ACM international workshop on MobiArch, 11-16, 2011
Demand driven store site selection via multiple spatial-temporal data
M Xu, T Wang, Z Wu, J Zhou, J Li, H Wu
Proceedings of the 24th acm sigspatial international conference on advances …, 2016
Ghost riders: Sybil attacks on crowdsourced mobile mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
IEEE/ACM transactions on networking 26 (3), 1123-1136, 2018
Unbiased sampling in directed social graph
T Wang, Y Chen, Z Zhang, P Sun, B Deng, X Li
ACM SIGCOMM Computer Communication Review 40 (4), 401-402, 2010
Characterizing and detecting malicious crowdsourcing
T Wang, G Wang, X Li, H Zheng, BY Zhao
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 537-538, 2013
Value and misinformation in collaborative investing platforms
T Wang, G Wang, B Wang, D Sambasivan, Z Zhang, X Li, H Zheng, ...
ACM Transactions on the Web (TWEB) 11 (2), 1-32, 2017
The power of comments: fostering social interactions in microblog networks
T Wang, Y Chen, Y Wang, B Wang, G Wang, X Li, H Zheng, BY Zhao
Frontiers of Computer Science 10 (5), 889-907, 2016
Method and apparatus for matching wireless hotspot with POI
W Tianyi, C Li, H Wu
US Patent 10,694,324, 2020
Deep learning-based malicious account detection in the momo social network
J Wang, X He, Q Gong, Y Chen, T Wang, X Wang
2018 27th International Conference on Computer Communication and Networks …, 2018
Poster: Defending against Sybil Devices in Crowdsourced Mapping Services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
Method and apparatus for determining a location of a point of interest
H Wu, W Tianyi, T Zhang
US Patent 10,473,475, 2019
M Chen, J Yang, L Hu, MS Hossain, G Muhammad, Q Gong, Y Chen, ...
IEEE Communications Magazine, 2, 2018
Data processing method, data query method in a database, and corresponding device
K Wang, W Tianyi, Y Yuan, Z Yue, J Zou
US Patent 9,471,612, 2016
The system can't perform the operation now. Try again later.
Articles 1–20