Jinxue (Gene) Zhang


Phone: (480)395-3328
Email:  jxzhang at         

I am now a Fraud Engineer at Uber. My CV is here; LinkedIn profile is here; GitHub link is here.

I graduated from School of Electrical, Computer, and Energy Engineering (ECEE) at Arizona State University at May 2016. I was fortunate to work with  Prof. Yanchao Zhang and other members in CNSG@ASU.  I got M.E. in Software Engineering from Tsinghua University at 2011 and B.E. in Communication Engineering from Nanjing University at 2006, both from China.

Research Interests at Ph.D. Phase

I was focusing on tackling digital-world security, privacy, abuse/fraud problems by large-scale measurement and big-data analysis, insightful algorithm design and theoretical analysis, concrete system implementation, and comprehensive experimental-evaluation. The finished projects include investigating the impact and the countermeasure of social botnets, sybil-resilient influence measurement, uncovering the Twitter users in a specific area, inferring the user age in microblogging services, and privacy-preserving profile-matching for mobile social networks. My research root in large-scale data analysis, machine learning, graph theory, and system design/implementation.


  1. Jinxue Zhang, Jingchao Sun, Rui Zhang, Yanchao Zhang, and Xia Hu, “Privacy-preserving social media data outsourcing,” IEEE International Conference on Computer Communications (INFOCOM'18), Honolulu, HI, April 2018.
  2. Jinxue Zhang, Xia Hu, Yanchao Zhang, and Huan Liu. Your age is no secret: Inferring microbloggers’ ages via content and interaction analysis, International AAAI Conference on Web and Social Media (ICWSM’2016), Cologne, Germany, May 2016 [PDF] [Dataset]
  3. Jinxue Zhang, Rui Zhang, Yanchao Zhang, and Guanhua Yan. The Rise of Social Botnets: Attacks and Countermeasures, Accepted by IEEE Transactions on Dependable and Secure Computing (TDSC), April 2016 [PDF]
  4. Jingchao Sun, Rui Zhang, Jinxue Zhang, and Yanchao Zhang, PriStream: privacy-preserving distributed stream monitoring of thresholded percentile statistics, IEEE International Conference on Computer Communications (INFOCOM’16), San Francisco, CA, April 2016 [PDF]
  5. Jingchao Sun, Xiaocong Jin, Yimin Chen, Jinxue Zhang, Rui Zhang, and Yanchao Zhang. VISIBLE: Video-assisted keystroke inference from tablet backside motion. ISOC Network and Distributed System Security Symposium (NDSS’16), San Diego, California, February 2016 [PDF]
  6. Jinxue Zhang, Rui Zhang, Jingchao Sun, Yanchao Zhang, and Chi Zhang. TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter.  Accepted by IEEE/ACM Transactions on Networking (TON), October 2015 [PDF]
  7. Jinxue Zhang, Jingchao Sun, Rui Zhang, and Yanchao Zhang. Your Actions Tell Where You Are: Uncovering Twitter Users in a Metropolitan Area. The 3rd IEEE Conference on Communications and Network Security (CNS 2015), Florence, September 2015 [PDF]
  8. Jingchao Sun, Rui Zhang, Jinxue Zhang, and Yanchao Zhang. TouchIn: Sightless Two-factor Authentication on Multi-touch Mobile Devices. The 2nd IEEE Conference on Communications and Network Security (CNS 2014), San Francisco, USA, October 2014 [PDF]
  9. Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan Zhang. SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks. IEEE International Conference on Computer Communications (INFOCOM'14), Toronto, Canada, April 2014 [PDF]
  10. Jinxue Zhang, Rui Zhang, Yanchao Zhang, and Guanhua Yan. On the Impact of Social Botnets for Spam Distribution and Digital-influence Manipulation. The 1st IEEE Conference on Communications and Network Security (CNS 2013), Washington D.C., USA, October 2013 [PDF][Slides]
  11. Rui Zhang, Jinxue Zhang, Yanchao Zhang, and Chi Zhang. Secure crowdsourcing-based cooperative spectrum sensing. The 32nd IEEE International Conference on Computer Communications (INFOCOM'13), Turlin, Italy, April 2013 [PDF]
  12. Rui Zhang, Jinxue Zhang, Yanchao Zhang, Jinyuan Sun, and Guanhua Yan.  Privacy-preserving profile matching for proximity-based mobile social networking. IEEE Journal on Selected Areas in Communications (JSAC'12), Special Issue on Emerging Technologies, 2012 [PDF]

Professional Activities

  • Journal Reviews
    • IEEE Transactions on Wireless Communications (TWC), IEEE Transactions on Vehicular Technology, IEEE Wireless Communications Magazine, IEEE Transactions on Network Science and Engineering
  • Conference Reviews
    • WCNC 2017, SDM 2016, CNS 2016|2015|2014, AsiaCCS 2015, MobiHoc 2015, WiSec 2015, PerCom 2015, Infocom 2015|2014, ICNP 2014, TrustCol 2014, GlobeCom 2014, ICDCS 2014, NDSS 2013, MASS 2013, ICC 2013, WASA 2012


  • Hiking. I highly enjoy the harmony with the nature. Some sites that I have hiked are listed by locations as follows: 
    • United States: Yosemite, Flagstaff, Canyon Lake, Sedona, A-Mountain near ASU, Prescott
    • China:  The Great Wall, Fragrance Hill, The Ancient Hui Hang Caravan Trail, Tzu-chin Mountain
  • Jogging, Mathron. I finished the Beijing 2010 Marathon with 4h16m46s, and the Beijing 2008 half-Marathon with 1h49m. I usually go to gym 3 times a week
  • PingPong, Basketball, Swimming, Badminton
  • Chinese Calligraphy
  • Music.  I like the concordance from inner heart with wonderful music, such as New Age music (e.g. Bandari) and pop music (e.g. Top 100 at BillBoard)