It has been one year since I wrote any blogs, how time flies. Recently, I read Li Li's project on who the top researchers are in software engineering and security field, so I want to do a similar one on security myself. As a computer security researcher, your goal is to get your paper in the... Continue Reading →
I have participated computational social science winter symposium (#CSSWS15) at Cologne for the past three days. It is organized by GESIS located in Cologne. #CSSWS15 invites a lot of superstars to give great talks, half of the participants are with socialogy backgrounds. I keep some notes here about #CSSWS15. 1) Professor Sune Lehmann's work on... Continue Reading →
To mine a social network, the most important thing is the data.(it is only my opinion...) I have been mining locaiton-based social network for a while. I have used other people's data and I also collect data myself. With some experience, I think I can summarize a bit about the area. First of all, I'm... Continue Reading →
2015 is about to finish, and I'm in an extreme busy mode. (Well, that's why I decide to write another blog? ) Life is better compared to this time last year when I was alone in Luxembourg and didn't to know what to do in the future. Well, it still doesn't change that much, Marcela is... Continue Reading →
The Times Higher Education (THE) Rankings believes that University of Luxemboug is the 193th (98th) best university in the whole world (Europe). This is a very exciting news for people in UL (me included) and an interesting news for me. UL is right above Texas A&M and 4 places under ASU. The reason for UL... Continue Reading →
Our paper on community-based location prediction has been accepted by conference on online social networks (COSN 2015')!
I have been to many famous cities in the world (it is not that hard when you live in europe since the city density here is significantly higher than other parts of the world). Among all of them, I love Taipei city the most. I spent my summer there in 2010. Taipei has the best... Continue Reading →
In popular social networks such as Facebook, users can decide who can access their photos. A user may only allow his friends to view his photos or friends of friends to see his profile. This is the so-called relationship-based access control schemes where a user can only access a resource if he is in a certain... Continue Reading →