AR-miner: mining informative reviews for developers from mobile app marketplace N Chen, J Lin, SCH Hoi, X Xiao, B Zhang Proceedings of the 36th International Conference on Software Engineering …, 2014 | 701 | 2014 |
Expectation and purpose: Understanding users’ mental models of mobile app privacy through crowdsourcing J Lin, S Amini, J Hong, N Sadeh, J Lindqvist, J Zhang Proceedings of the 14th ACM International Conference on Ubiquitous Computing, 2012 | 674 | 2012 |
A framework of energy efficient mobile sensing for automatic user state recognition Y Wang, J Lin, M Annavaram, QA Jacobson, J Hong, B Krishnamachari, ... Proceedings of the 7th international conference on Mobile systems …, 2009 | 630 | 2009 |
Why people hate your app: Making sense of user feedback in a mobile app store B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013 | 576 | 2013 |
Modeling Users’ Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings J Lin, B Liu, N Sadeh, JI Hong Symposium on Usable Privacy and Security (SOUPS), 2014 | 374 | 2014 |
The privacy and security behaviors of smartphone app developers R Balebako, A Marsh, J Lin, J Hong, LF Cranor Workshop on Usable Security, 1-10, 2014 | 232 | 2014 |
Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing KP Tang, J Lin, JI Hong, DP Siewiorek, N Sadeh Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010 | 229 | 2010 |
Reconciling Mobile App Privacy and Usability on Smartphones: Could User Privacy Profiles Help? B Liu, J Lin, N Sadeh Proceedings of the 23rd international conference on World wide web (WWW'14 …, 2014 | 224 | 2014 |
Caché: caching location-enhanced content to improve user privacy S Amini, J Lindqvist, J Hong, J Lin, E Toch, N Sadeh Proceedings of the 9th international conference on Mobile systems …, 2011 | 116 | 2011 |
Modeling people's place naming preferences in location sharing J Lin, G Xiang, JI Hong, N Sadeh Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010 | 83 | 2010 |
A comparative study of location-sharing privacy preferences in the United States and China J Lin, M Benisch, N Sadeh, J Niu, J Hong, B Lu, S Guo Personal and ubiquitous computing 17, 697-711, 2013 | 48 | 2013 |
SIDA: self-organized ID assignment in wireless sensor networks J Lin, Y Liu, LM Ni 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, 1-8, 2007 | 45 | 2007 |
Understanding and capturing people’s mobile app privacy preferences J Lin Carnegie Mellon University, 2013 | 36 | 2013 |
Mobile application evaluation using automation and crowdsourcing S Amini, J Lin, JI Hong, J Lindqvist, J Zhang Carnegie Mellon University, 2013 | 17 | 2013 |
Stroke++: A new Chinese input method for touch screen mobile phones J Niu, Y Liu, J Lin, L Zhu, K Wang International journal of human-computer studies 72 (4), 440-450, 2014 | 13 | 2014 |
Improving users’ consistency when recalling location sharing preferences J Venkatanathan, D Ferreira, M Benisch, J Lin, E Karapanos, V Kostakos, ... Human-Computer Interaction–INTERACT 2011: 13th IFIP TC 13 International …, 2011 | 11 | 2011 |
Who, when, where: Obfuscation preferences in location-sharing applications J Venkatanathan, J Lin, M Benisch, D Ferreira, E Karapanos, V Kostakos, ... INST Softw. Res. Internat, Carnegie Mellon Univ., Pittsburgh, PA, USA, Tech …, 2011 | 2 | 2011 |
Understanding People’s Place Naming Preferences in Location Sharing J Lin, J Hong, N Sadeh | 1 | 2010 |
MobiSys 2011 S Martinez-Bea, J Lin, S Amini IEEE Pervasive Computing 11 (1), 84-88, 2011 | | 2011 |
MobiSys 2010 Conference Report E Cuervo, J Lin IEEE Pervasive Computing 10 (1), 94-97, 2010 | | 2010 |