Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jinxue Zhang is active.

Publication


Featured researches published by Jinxue Zhang.


communications and networking symposium | 2014

TouchIn: Sightless two-factor authentication on multi-touch mobile devices

Jingchao Sun; Rui Zhang; Jinxue Zhang; Yanchao Zhang

Mobile authentication is indispensable for preventing unauthorized access to multi-touch mobile devices. Existing mobile authentication techniques are often cumbersome to use and also vulnerable to shoulder-surfing and smudge attacks. This paper focuses on designing, implementing, and evaluating TouchIn, a two-factor authentication system on multi-touch mobile devices. TouchIn works by letting a user draw on the touchscreen with one or multiple fingers to unlock his mobile device, and the user is authenticated based on the geometric properties of his drawn curves as well as his behavioral and physiological characteristics. TouchIn allows the user to draw on arbitrary regions on the touchscreen without looking at it. This nice sightless feature makes TouchIn very easy to use and also robust to shoulder-surfing and smudge attacks. Comprehensive experiments on Android devices confirm the high security and usability of TouchIn.


international conference on computer communications | 2013

Secure crowdsourcing-based cooperative pectrum sensing

Rui Zhang; Jinxue Zhang; Yanchao Zhang; Chi Zhang

Cooperative (spectrum) sensing is a key function for dynamic spectrum access and is essential for avoiding interference with licensed primary users and identifying spectrum holes. A promising approach for effective cooperative sensing over a large geographic region is to rely on special spectrum-sensing providers (SSPs), which outsource spectrum-sensing tasks to distributed mobile users. Its feasibility is deeply rooted in the ubiquitous penetration of mobile devices into everyday life. Crowdsourcing-based cooperative spectrum sensing is, however, vulnerable to malicious sensing data injection attack, in which a malicious CR users submit false sensing reports containing power measurements much larger (or smaller) than the true value to inflate (or deflate) the final average, in which case the SSP may falsely determine that the channel is busy (or vacant). In this paper, we propose a novel scheme to enable secure crowdsourcing-based cooperative spectrum sensing by jointly considering the instantaneous trustworthiness of mobile detectors in combination with their reputation scores during data fusion. Our scheme can enable robust cooperative sensing even if the malicious CR users are the majority. The efficacy and efficiency of our scheme have been confirmed by extensive simulation studies.


communications and networking symposium | 2013

On the impact of social botnets for spam distribution and digital-influence manipulation

Jinxue Zhang; Rui Zhang; Yanchao Zhang; Guanhua Yan

Online social networks (OSNs) are increasingly threatened by social bots which are software-controlled OSN accounts that mimic human users with malicious intentions. A social botnet refers to a group of social bots under the control of a single botmaster, which collaborate to conduct malicious behavior, while at the same time mimicking the interactions among normal OSN users to reduce their individual risk of being detected. We demonstrate the effectiveness and advantages of exploiting a social botnet for spam distribution and digital-influence manipulation through real experiments on Twitter and also trace-driven simulations. Our results can help understand the potentially detrimental effects of social botnets and help OSNs improve their bot(net) detection systems.


international conference on computer communications | 2014

SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks

Jingchao Sun; Xu Chen; Jinxue Zhang; Yanchao Zhang; Junshan Zhang

This paper studies secret key establishment between two adjacent mobile nodes, which is crucial for securing emerging device-to-device (D2D) communication. As a promising method, cooperative key generation allows two mobile nodes to select some common neighbors as relays and directly extract a secret key from the wireless channels among them. A challenging issue that has been overlooked is that mobile nodes are often self-interested and reluctant to act as relays without adequate reward in return. We propose SYNERGY, a game-theoretical approach for stimulating cooperative key generation. The underlying idea of SYNERGY is to partition a group of mobile nodes into disjoint coalitions such that the nodes in each coalition fully collaborate on cooperative key generation. We formulate the group partitioning as a coalitional game and design centralized and also distributed protocols for obtaining the core solution to the game. The performance of SYNERGY is evaluated by extensive simulations.


IEEE ACM Transactions on Networking | 2016

TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter

Jinxue Zhang; Rui Zhang; Jingchao Sun; Yanchao Zhang; Chi Zhang

Influential users have great potential for accelerating information dissemination and acquisition on Twitter. How to measure the influence of Twitter users has attracted significant academic and industrial attention. Existing influence measurement techniques are vulnerable to sybil users that are thriving on Twitter. Although sybil defenses for online social networks have been extensively investigated, they commonly assume unique mappings from human-established trust relationships to online social associations and thus do not apply to Twitter where users can freely follow each other. This paper presents TrueTop, the first sybil-resilient system to measure the influence of Twitter users. TrueTop is rooted in two observations from real Twitter datasets. First, although non-sybil users may incautiously follow strangers, they tend to be more careful and selective in retweeting, replying to, and mentioning other users. Second, influential users usually get much more retweets, replies, and mentions than non-influential users. Detailed theoretical studies and synthetic simulations show that TrueTop can generate very accurate influence measurement results with strong resilience to sybil attacks.


IEEE Transactions on Dependable and Secure Computing | 2016

The Rise of Social Botnets: Attacks and Countermeasures

Jinxue Zhang; Rui Zhang; Yanchao Zhang; Guanhua Yan

Online social networks (OSNs) are increasingly threatened by social bots which are software-controlled OSN accounts that mimic human users with malicious intentions. A social botnet refers to a group of social bots under the control of a single botmaster, which collaborate to conduct malicious behavior while mimicking the interactions among normal OSN users to reduce their individual risk of being detected. We demonstrate the effectiveness and advantages of exploiting a social botnet for spam distribution and digital-influence manipulation through real experiments on Twitter and also trace-driven simulations. We also propose the corresponding countermeasures and evaluate their effectiveness. Our results can help understand the potentially detrimental effects of social botnets and help OSNs improve their bot(net) detection systems.


communications and networking symposium | 2015

Your actions tell where you are: Uncovering Twitter users in a metropolitan area

Jinxue Zhang; Jingchao Sun; Rui Zhang; Yanchao Zhang

Twitter is an extremely popular social networking platform. Most Twitter users do not disclose their locations due to privacy concerns. Although inferring the location of an individual Twitter user has been extensively studied, it is still missing to effectively find the majority of the users in a specific geographical area without scanning the whole Twittersphere, and obtaining these users will result in both positive and negative significance. In this paper, we propose LocInfer, a novel and lightweight system to tackle this problem. LocInfer explores the fact that user communications in Twitter exhibit strong geographic locality, which we validate through large-scale datasets. Based on the experiments from four representative metropolitan areas in U.S., LocInfer can discover on average 86.6% of the users with 73.2% accuracy in each area by only checking a small set of candidate users. We also present a countermeasure to the users highly sensitive to location privacy and show its efficacy by simulations.


ieee international conference computer and communications | 2016

PriStream: Privacy-preserving distributed stream monitoring of thresholded PERCENTILE statistics

Jingchao Sun; Rui Zhang; Jinxue Zhang; Yanchao Zhang

Distributed stream monitoring has numerous potential applications in future smart cities. Communication efficiency, and data privacy are two main challenges for distributed stream monitoring services. In this paper, we propose PriStream, the first communication-efficient and privacy-preserving distributed stream monitoring system for thresholded PERCENTILE aggregates. PriStream allows the monitoring service provider to evaluate an arbitrary function over a desired percentile of distributed data reports and monitor when the output exceeds a predetermined system threshold. Detailed theoretical analysis and evaluations show that PriStream has high accuracy and communication efficiency, and differential privacy guarantees under a strong adversary model.


IEEE Journal on Selected Areas in Communications | 2013

Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking

Rui Zhang; Jinxue Zhang; Yanchao Zhang; Jinyuan Sun; Guanhua Yan


network and distributed system security symposium | 2016

VISIBLE: Video-Assisted Keystroke Inference from Tablet Backside Motion.

Jingchao Sun; Xiaocong Jin; Yimin Chen; Jinxue Zhang; Yanchao Zhang; Rui Zhang

Collaboration


Dive into the Jinxue Zhang's collaboration.

Top Co-Authors

Avatar

Yanchao Zhang

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Rui Zhang

University of Delaware

View shared research outputs
Top Co-Authors

Avatar

Jingchao Sun

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Guanhua Yan

Los Alamos National Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chi Zhang

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Huan Liu

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Jinyuan Sun

University of Tennessee

View shared research outputs
Top Co-Authors

Avatar

Xiaocong Jin

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Xu Chen

Arizona State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge