default search action
Yingjiu Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j93]Yangguang Tian, Yingjiu Li, Robert H. Deng, Guomin Yang, Nan Li:
Policy-Based Remote User Authentication From Multi-Biometrics. Comput. J. 67(5): 1814-1825 (2024) - [j92]Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, HweeHwa Pang, Robert H. Deng:
AnoPas: Practical anonymous transit pass from group signatures with time-bound keys. J. Syst. Archit. 153: 103184 (2024) - [j91]Yang Yang, Wenyi Xue, Yonghua Zhan, Minming Huang, Yingjiu Li, Robert H. Deng:
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential. IEEE Trans. Dependable Secur. Comput. 21(4): 1621-1638 (2024) - [j90]Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, Guozhen Shi, HweeHwa Pang, Robert H. Deng:
Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures. IEEE Trans. Dependable Secur. Comput. 21(4): 2585-2602 (2024) - [j89]Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou:
Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting. IEEE Trans. Inf. Forensics Secur. 19: 1756-1766 (2024) - [j88]Yang Yang, Wenyi Xue, Jianfei Sun, Guomin Yang, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication. IEEE Trans. Inf. Forensics Secur. 19: 6097-6112 (2024) - [c104]Sanidhay Arora, Yingjiu Li, Yebo Feng, Jiahua Xu:
SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks. AsiaCCS 2024 - [c103]Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng:
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. NDSS 2024 - [i16]Sanidhay Arora, Yingjiu Li, Yebo Feng, Jiahua Xu:
SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks. CoRR abs/2401.08520 (2024) - [i15]Xunguang Wang, Daoyuan Wu, Zhenlan Ji, Zongjie Li, Pingchuan Ma, Shuai Wang, Yingjiu Li, Yang Liu, Ning Liu, Juergen Rahmel:
SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner. CoRR abs/2406.05498 (2024) - [i14]Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng:
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. IACR Cryptol. ePrint Arch. 2024: 1783 (2024) - 2023
- [j87]Yuxian Li, Jian Weng, Wei Wu, Ming Li, Yingjiu Li, Haoxin Tu, Yongdong Wu, Robert H. Deng:
PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability. J. Parallel Distributed Comput. 180: 104721 (2023) - [j86]Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control. IEEE Trans. Dependable Secur. Comput. 20(1): 53-67 (2023) - [j85]Tao Xue, Yu Wen, Bo Luo, Gang Li, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng:
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. IEEE Trans. Dependable Secur. Comput. 20(2): 1104-1123 (2023) - [j84]Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Hualong Ma, Yue Zhao, Yingjiu Li:
A Robustness-Assured White-Box Watermark in Neural Networks. IEEE Trans. Dependable Secur. Comput. 20(6): 5214-5229 (2023) - [j83]Shengmin Xu, Xinyi Huang, Jiaming Yuan, Yingjiu Li, Robert H. Deng:
Accountable and Fine-Grained Controllable Rewriting in Blockchains. IEEE Trans. Inf. Forensics Secur. 18: 101-116 (2023) - [j82]Wenyi Xue, Yang Yang, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
ACB-Vote: Efficient, Flexible, and Privacy- Preserving Blockchain-Based Score Voting With Anonymously Convertible Ballots. IEEE Trans. Inf. Forensics Secur. 18: 3720-3734 (2023) - [j81]Bowen Zhao, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Yingjiu Li, Robert H. Deng:
CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics. IEEE Trans. Inf. Forensics Secur. 18: 5416-5430 (2023) - [j80]Bowen Zhao, Yingjiu Li, Ximeng Liu, Xiaoguo Li, HweeHwa Pang, Robert H. Deng:
Identifiable, But Not Visible: A Privacy-Preserving Person Reidentification Scheme. IEEE Trans. Reliab. 72(4): 1295-1307 (2023) - [j79]Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
Threshold Attribute-Based Credentials With Redactable Signature. IEEE Trans. Serv. Comput. 16(5): 3751-3765 (2023) - [c102]Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen:
A Practical Forward-Secure DualRing. CANS 2023: 516-537 - 2022
- [j78]Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng, Zheng Yang:
Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification. Comput. J. 65(10): 2570-2588 (2022) - [j77]Shengmin Xu, Yingjiu Li, Robert H. Deng, Yinghui Zhang, Xiangyang Luo, Ximeng Liu:
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things. IEEE Trans. Cloud Comput. 10(1): 474-490 (2022) - [j76]Yao Cheng, Chang Xu, Zhen Hai, Yingjiu Li:
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model. IEEE Trans. Dependable Secur. Comput. 19(1): 77-90 (2022) - [j75]Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. IEEE Trans. Dependable Secur. Comput. 19(2): 1064-1077 (2022) - [j74]Jiayun Xu, Yingjiu Li, Robert H. Deng, Ke Xu:
SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering. IEEE Trans. Dependable Secur. Comput. 19(2): 1149-1163 (2022) - [j73]Shengmin Xu, Jianting Ning, Xinyi Huang, Yingjiu Li, Guowen Xu:
Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud. IEEE Trans. Dependable Secur. Comput. 19(6): 3759-3773 (2022) - [j72]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Yingjiu Li, Robert H. Deng:
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning. IEEE Trans. Inf. Forensics Secur. 17: 1639-1654 (2022) - [c101]Bowen Zhao, Yingjiu Li, Ximeng Liu, HweeHwa Pang, Robert H. Deng:
FREED: An Efficient Privacy-Preserving Solution for Person Re-IDentification. DSC 2022: 1-8 - [c100]Jiaming Yuan, Yingjiu Li, Jianting Ning, Robert H. Deng:
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption. ISPEC 2022: 606-623 - [c99]Li Song, Qiongxiao Wang, Jingqiang Lin, Shijie Jia, Yingjiu Li, Yikai Chen:
Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme. WCNC 2022: 1010-1015 - [i13]Shaoying Cai, Yingjiu Li, Changshe Ma, Sherman S. M. Chow, Robert H. Deng:
Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication. CoRR abs/2210.10244 (2022) - 2021
- [j71]Yangguang Tian, Yingjiu Li, Yi Mu, Guomin Yang:
Unlinkable and Revocable Secret Handshake. Comput. J. 64(8): 1303-1314 (2021) - [j70]Kai Bu, Avery Laird, Yutian Yang, Linfeng Cheng, Jiaqing Luo, Yingjiu Li, Kui Ren:
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation. ACM Comput. Surv. 53(5): 104:1-104:34 (2021) - [j69]Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang:
Lattice-based remote user authentication from reusable fuzzy signature. J. Comput. Secur. 29(3): 273-298 (2021) - [j68]Yan Li, Yao Cheng, Weizhi Meng, Yingjiu Li, Robert H. Deng:
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices. IEEE Trans. Inf. Forensics Secur. 16: 307-321 (2021) - [c98]Ximing Liu, Yingjiu Li, Robert H. Deng:
UltraPIN: Inferring PIN Entries via Ultrasound. AsiaCCS 2021: 944-957 - [c97]Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, Robert H. Deng:
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. CCS 2021: 2307-2320 - [c96]Jiayun Xu, Yingjiu Li, Robert H. Deng:
Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection. NDSS 2021 - [i12]Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Yue Zhao, Yingjiu Li:
HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks. CoRR abs/2103.13628 (2021) - [i11]Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou:
Accountable Fine-grained Blockchain Rewriting in the Permissionless Setting. CoRR abs/2104.13543 (2021) - [i10]Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen:
A Practical Forward-Secure DualRing. IACR Cryptol. ePrint Arch. 2021: 1483 (2021) - 2020
- [j67]Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Guomin Yang, Zheng Yang:
A New Construction for Linkable Secret Handshake. Comput. J. 63(4): 536-548 (2020) - [j66]Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng:
Editing-Enabled Signatures: A New Tool for Editing Authenticated Data. IEEE Internet Things J. 7(6): 4997-5007 (2020) - [j65]Shengmin Xu, Jiaming Yuan, Guowen Xu, Yingjiu Li, Ximeng Liu, Yinghui Zhang, Zuobin Ying:
Efficient ciphertext-policy attribute-based encryption with blackbox traceability. Inf. Sci. 538: 19-38 (2020) - [j64]Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Pengfei Wu, Anyi Liu:
A new framework for privacy-preserving biometric-based remote user authentication. J. Comput. Secur. 28(4): 469-498 (2020) - [j63]Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Chunhua Su:
Leakage-resilient biometric-based remote user authentication with fuzzy extractors. Theor. Comput. Sci. 814: 223-233 (2020) - [j62]Yang Yang, Ximeng Liu, Robert H. Deng, Yingjiu Li:
Lightweight Sharable and Traceable Secure Mobile Health System. IEEE Trans. Dependable Secur. Comput. 17(1): 78-91 (2020) - [j61]Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng:
Privacy-preserving Network Path Validation. ACM Trans. Internet Techn. 20(1): 5:1-5:27 (2020) - [c95]Tao Xue, Yu Wen, Bo Luo, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li, Dan Meng:
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. ACSAC 2020: 582-596 - [c94]Yangguang Tian, Nan Li, Yingjiu Li, Pawel Szalachowski, Jianying Zhou:
Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability. ACSAC 2020: 813-828 - [i9]Yao Cheng, Chang Xu, Zhen Hai, Yingjiu Li:
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model. CoRR abs/2006.13462 (2020)
2010 – 2019
- 2019
- [j60]Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li:
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Comput. Secur. 80: 90-107 (2019) - [j59]Yangguang Tian, Yingjiu Li, Guomin Yang, Willy Susilo, Yi Mu, Hui Cui, Yinghui Zhang:
DABKE: Secure deniable attribute-based key exchange framework. J. Comput. Secur. 27(2): 259-275 (2019) - [j58]Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, Robert Huijie Deng:
Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin. J. Comput. Secur. 27(3): 375-403 (2019) - [j57]Anyi Liu, Selena Haidar, Yuan Cheng, Yingjiu Li:
Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log. EAI Endorsed Trans. Security Safety 6(20): e3 (2019) - [j56]Hui Cui, Robert H. Deng, Yingjiu Li, Guowei Wu:
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud. IEEE Trans. Big Data 5(3): 330-342 (2019) - [j55]Anyi Liu, Huirong Fu, Yuan Hong, Jigang Liu, Yingjiu Li:
LiveForen: Ensuring Live Forensic Integrity in the Cloud. IEEE Trans. Inf. Forensics Secur. 14(10): 2749-2764 (2019) - [c93]Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Yong Yu:
Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion. CANS 2019: 512-524 - [c92]Yan Li, Zilong Wang, Yingjiu Li, Robert H. Deng, Binbin Chen, Weizhi Meng, Hui Li:
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication. AsiaCCS 2019: 241-246 - [c91]Shengmin Xu, Jiaming Yuan, Yingjiu Li, Ximeng Liu, Yinghui Zhang:
Super Payment Channel for Decentralized Cryptocurrencies. DSC 2019: 1-8 - [c90]Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen, Jiayun Xu:
DroidEvolver: Self-Evolving Android Malware Detection System. EuroS&P 2019: 47-62 - [c89]Pamela Hui Ting Chua, Yingjiu Li, Wei He:
Adopting Hyperledger Fabric Blockchain for EPCglobal Network. RFID 2019: 1-8 - [c88]Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang:
Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy. SecureComm (2) 2019: 184-204 - [i8]Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng:
Privacy-Preserving Network Path Validation. IACR Cryptol. ePrint Arch. 2019: 407 (2019) - [i7]Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang:
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature. IACR Cryptol. ePrint Arch. 2019: 743 (2019) - 2018
- [j54]Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen Tao Zhu, Yingjiu Li, Zhan Wang:
User-friendly deniable storage for mobile devices. Comput. Secur. 72: 163-174 (2018) - [j53]Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen Tao Zhu, Robert H. Deng:
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch. Cybersecur. 1(1): 7 (2018) - [j52]Hui Cui, Robert H. Deng, Yingjiu Li:
Attribute-based cloud storage with secure provenance over encrypted data. Future Gener. Comput. Syst. 79: 461-472 (2018) - [j51]Yan Li, Yingjiu Li, Ke Xu, Qiang Yan, Robert H. Deng:
Empirical Study of Face Authentication Systems Under OSNFD Attacks. IEEE Trans. Dependable Secur. Comput. 15(2): 231-245 (2018) - [j50]Hui Cui, Zhiguo Wan, Robert H. Deng, Guilin Wang, Yingjiu Li:
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud. IEEE Trans. Dependable Secur. Comput. 15(3): 409-422 (2018) - [j49]Kai Bu, Yingjiu Li:
Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths. IEEE Trans. Inf. Forensics Secur. 13(4): 834-849 (2018) - [j48]Hui Cui, Robert H. Deng, Joseph K. Liu, Xun Yi, Yingjiu Li:
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices. IEEE Trans. Ind. Informatics 14(8): 3724-3732 (2018) - [c87]Ximing Liu, Yingjiu Li, Robert H. Deng:
Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings. ACSAC 2018: 53-65 - [c86]Yangguang Tian, Yingjiu Li, Binanda Sengupta, Robert Huijie Deng, Albert Ching, Weiwei Liu:
Privacy-Preserving Remote User Authentication with k-Times Untraceability. Inscrypt 2018: 647-657 - [c85]Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng:
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. CODASPY 2018: 299-306 - [c84]Yangguang Tian, Yingjiu Li, Ximeng Liu, Robert H. Deng, Binanda Sengupta:
PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication. DSC 2018: 1-8 - [c83]Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen Tao Zhu, Yangguang Tian, Zhan Wang, Albert Ching:
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices. DSN 2018: 454-465 - [c82]Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen:
DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks. EuroS&P 2018: 473-487 - [c81]Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu:
DSH: Deniable Secret Handshake Framework. ISPEC 2018: 341-353 - [c80]Yangguang Tian, Yingjiu Li, Rongmao Chen, Nan Li, Ximeng Liu, Bing Chang, Xingjie Yu:
Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience. SecureComm (1) 2018: 112-132 - [e5]Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 254, Springer 2018, ISBN 978-3-030-01700-2 [contents] - [e4]Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 255, Springer 2018, ISBN 978-3-030-01703-3 [contents] - [i6]Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng:
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. CoRR abs/1801.04372 (2018) - [i5]Kai Bu, Yutian Yang, Avery Laird, Jiaqing Luo, Yingjiu Li, Kui Ren:
What's (Not) Validating Network Paths: A Survey. CoRR abs/1804.03385 (2018) - [i4]Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li:
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. CoRR abs/1810.07665 (2018) - 2017
- [j47]Xingjie Yu, Zhan Wang, Yingjiu Li, Liang Li, Wen Tao Zhu, Li Song:
EvoPass: Evolvable graphical password against shoulder-surfing attacks. Comput. Secur. 70: 179-198 (2017) - [j46]Yao Cheng, Yingjiu Li, Robert H. Deng, Lingyun Ying, Wei He:
A study on a feasible no-root approach on Android. J. Comput. Secur. 25(3): 231-253 (2017) - [j45]Chunhua Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, Xinyi Huang:
Universally Composable RFID Mutual Authentication. IEEE Trans. Dependable Secur. Comput. 14(1): 83-94 (2017) - [j44]Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng:
A Secure, Usable, and Transparent Middleware for Permission Managers on Android. IEEE Trans. Dependable Secur. Comput. 14(4): 350-362 (2017) - [j43]Ximeng Liu, Baodong Qin, Robert H. Deng, Yingjiu Li:
An Efficient Privacy-Preserving Outsourced Computation over Public Data. IEEE Trans. Serv. Comput. 10(5): 756-770 (2017) - [c79]Hui Cui, Robert H. Deng, Joseph K. Liu, Yingjiu Li:
Attribute-Based Encryption with Expressive and Authorized Keyword Search. ACISP (1) 2017: 106-126 - [c78]Yan Li, Yao Cheng, Yingjiu Li, Robert H. Deng:
What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses. AsiaCCS 2017: 327-333 - [c77]Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, Robert Huijie Deng:
Fair deposits against double-spending for Bitcoin transactions. DSC 2017: 44-51 - [c76]Zhi Yuan Poh, Hui Cui, Robert H. Deng, Yingjiu Li:
Attribute-Based Secure Messaging in the Public Cloud. SG-CRC 2017: 86-96 - [c75]Bing Chang, Ximing Liu, Yingjiu Li, Pingjian Wang, Wen Tao Zhu, Zhan Wang:
Employing Smartwatch for Enhanced Password Authentication. WASA 2017: 691-703 - 2016
- [j42]Lixian Liu, Junzuo Lai, Robert H. Deng, Yingjiu Li:
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Secur. Commun. Networks 9(18): 4897-4913 (2016) - [j41]Ke Xu, Yingjiu Li, Robert H. Deng:
ICCDetector: ICC-Based Malware Detection on Android. IEEE Trans. Inf. Forensics Secur. 11(6): 1252-1264 (2016) - [c74]Yao Cheng, Yingjiu Li, Robert H. Deng:
A Feasible No-Root Approach on Android. ACISP (2) 2016: 481-489 - [c73]Hui Cui, Robert H. Deng, Yingjiu Li, Baodong Qin:
Server-Aided Revocable Attribute-Based Encryption. ESORICS (2) 2016: 570-587 - [c72]Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao:
Efficient Tag Path Authentication Protocol with Less Tag Memory. ISPEC 2016: 255-270 - [c71]Su Mon Kywe, Yingjiu Li, Jason I. Hong, Cheng Yao:
Dissecting developer policy violating apps: characterization and detection. MALWARE 2016: 10-19 - [c70]Su Mon Kywe, Yingjiu Li, Kunal Petal, Michael Grace:
Attacking Android smartphone systems without permissions. PST 2016: 147-156 - [c69]Hui Cui, Robert H. Deng, Xuhua Ding, Yingjiu Li:
Attribute-Based Encryption with Granular Revocation. SecureComm 2016: 165-181 - [i3]Daoyuan Wu, Debin Gao, Yingjiu Li, Robert H. Deng:
SecComp: Towards Practically Defending Against Component Hijacking in Android Applications. CoRR abs/1609.03322 (2016) - 2015
- [b2]Yingjiu Li, Qiang Yan, Robert H. Deng:
Leakage Resilient Password Systems. Springer Briefs in Computer Science, Springer 2015, ISBN 978-3-319-17502-7, pp. 1-64 - [j40]Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou, Robert H. Deng:
Leakage-resilient password entry: Challenges, design, and evaluation. Comput. Secur. 48: 196-211 (2015) - [j39]Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng:
Privacy leakage analysis in online social networks. Comput. Secur. 49: 239-254 (2015) - [j38]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yingjiu Li:
Statistical Database Auditing Without Query Denial Threat. INFORMS J. Comput. 27(1): 20-34 (2015) - [c68]Yan Li, Yingjiu Li, Qiang Yan, Hancong Kong, Robert H. Deng:
Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication. CCS 2015: 1558-1569 - [c67]Baodong Qin, Robert H. Deng, Yingjiu Li, Shengli Liu:
Server-Aided Revocable Identity-Based Encryption. ESORICS (1) 2015: 286-304 - [c66]Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng:
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers. WISEC 2015: 6:1-6:6 - [i2]Roy Ka-Wei Lee, Yingjiu Li:
SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network. CoRR abs/1509.05582 (2015) - 2014
- [j37]Zheran Fang, Weili Han, Yingjiu Li:
Permission based Android security: Issues and countermeasures. Comput. Secur. 43: 205-218 (2014) - [j36]Hung-Yu Chien, Yingjiu Li, Nai-Wei Lo:
Innovative Applications and Security of Internet of Things. Int. J. Distributed Sens. Networks 10 (2014) - [j35]Chengpo Mu, Meng Yu, Yingjiu Li, Wanyu Zang:
Risk balance defense approach against intrusions for network server. Int. J. Inf. Sec. 13(3): 255-269 (2014) - [j34]Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng, Chaowen Guan, Qiang Yan:
Towards semantically secure outsourcing of association rule mining on categorical data. Inf. Sci. 267: 267-286 (2014) - [j33]Kuo-Hui Yeh, Nai-Wei Lo, Kuo-Yu Tsai, Yingjiu Li, Enrico Winata:
A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration. Wirel. Pers. Commun. 77(3): 1775-1800 (2014) - [c65]Junzuo Lai, Robert H. Deng, Yingjiu Li, Jian Weng:
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. AsiaCCS 2014: 239-248 - [c64]Yan Li, Ke Xu, Qiang Yan, Yingjiu Li, Robert H. Deng:
Understanding OSN-based facial disclosure against face authentication systems. AsiaCCS 2014: 413-424 - [c63]Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng:
Authorized Keyword Search on Encrypted Data. ESORICS (1) 2014: 419-435 - [c62]Su Mon Kywe, Yingjiu Li, Robert H. Deng, Jason I. Hong:
Detecting Camouflaged Applications on Mobile Application Markets. ICISC 2014: 241-254 - [c61]Jie Shi, Su Mon Kywe, Yingjiu Li:
Batch Clone Detection in RFID-enabled supply chain. IEEE RFID 2014: 118-125 - [c60]Gaurang Torvekar, Yingjiu Li:
AnonEPC - making the querying user anonymous in EPCglobal network. RFID-TA 2014: 283-288 - [p4]Kevin Chiew, Yingjiu Li, Congfu Xu:
On RFID False Authentications. Big Data and Internet of Things 2014: 91-110 - [e3]Nai-Wei Lo, Yingjiu Li, Kuo-Hui Yeh:
Radio Frequency Identification System Security - RFIDsec'14 Asia Workshop Proceedings, Hualien, Taiwan, November 27-28, 2014. Cryptology and Information Security Series 12, IOS Press 2014, ISBN 978-1-61499-461-9 [contents] - 2013
- [b1]Yingjiu Li, Robert H. Deng, Elisa Bertino:
RFID Security and Privacy. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 978-3-031-01212-9 - [c59]Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng, Debin Gao, Yingjiu Li, Jianying Zhou:
Launching Generic Attacks on iOS with Approved Third-Party Applications. ACNS 2013: 272-289 - [c58]Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou, Robert H. Deng:
Designing leakage-resilient password entry on touchscreen mobile devices. AsiaCCS 2013: 37-48 - [c57]Junzuo Lai, Xuhua Zhou, Robert Huijie Deng, Yingjiu Li, Kefei Chen:
Expressive search on encrypted data. AsiaCCS 2013: 243-252 - [c56]Divyan Munirathnam Konidala, Robert H. Deng, Yingjiu Li, Hoong Chuin Lau, Stephen E. Fienberg:
Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks. ISPEC 2013: 174-188 - [c55]Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng:
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks. NSS 2013: 671-677 - [c54]Su Mon Kywe, Yingjiu Li, Jie Shi:
Attack and defense mechanisms of malicious EPC event injection in EPC discovery service. RFID-TA 2013: 1-6 - 2012
- [j32]Jie Shi, Yingjiu Li, Wei He, Darren Sim:
SecTTS: A secure track & trace system for RFID-enabled supply chains. Comput. Ind. 63(6): 574-585 (2012) - [j31]Jie Shi, Yingjiu Li, Robert H. Deng:
A secure and efficient discovery service system in EPCglobal network. Comput. Secur. 31(8): 870-885 (2012) - [j30]Chunhua Su, Yingjiu Li, Yunlei Zhao, Robert H. Deng, Yiming Zhao, Jianying Zhou:
A Survey on Privacy Frameworks for RFID Authentication. IEICE Trans. Inf. Syst. 95-D(1): 2-11 (2012) - [j29]Yingjiu Li:
Guest Editor's Preface. J. Comput. Secur. 20(5): 461-462 (2012) - [c53]Shaoying Cai, Robert H. Deng, Yingjiu Li, Yunlei Zhao:
A New Framework for Privacy of RFID Path Authentication. ACNS 2012: 473-488 - [c52]Junzuo Lai, Robert H. Deng, Yingjiu Li:
Expressive CP-ABE with partially hidden access structures. AsiaCCS 2012: 18-19 - [c51]Jie Shi, Darren Sim, Yingjiu Li, Robert Huijie Deng:
SecDS: a secure EPC discovery service system in EPCglobal network. CODASPY 2012: 267-274 - [c50]Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng:
On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability. NDSS 2012 - [c49]Jie Shi, Yingjiu Li, Robert H. Deng, Kevin Chiew:
Design and Implementation of a Secure Prototype for EPCglobal Network Services. RFIDSec Asia 2012: 45-56 - [c48]Shaoying Cai, Yingjiu Li, Yunlei Zhao:
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains. SEC 2012: 501-512 - [e2]Nai-Wei Lo, Yingjiu Li:
Radio Frequency Identification System Security - RFIDsec'12 Asia Workshop Proceedings, Taipei, Taiwan, November 8-9, 2012. Cryptology and Information Security Series 8, IOS Press 2012, ISBN 978-1-61499-142-7 [contents] - 2011
- [j28]Yung-Chun Chen, Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li, Enrico Winata:
Adaptive collision resolution for efficient RFID tag identification. EURASIP J. Wirel. Commun. Netw. 2011: 139 (2011) - [j27]Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li:
Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture. Int. J. Commun. Syst. 24(7): 829-836 (2011) - [j26]Yingjiu Li, Haibing Lu:
Privacy Risk Assessment with Bounds Deduced from Bounds. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 19(4): 685-715 (2011) - [j25]Yingjiu Li, Jianying Zhou:
Guest editors' preface. J. Comput. Secur. 19(2): 227-228 (2011) - [j24]Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao:
A zero-knowledge based framework for RFID privacy. J. Comput. Secur. 19(6): 1109-1146 (2011) - [j23]Yingjiu Li, Robert H. Deng, Junzuo Lai, Changshe Ma:
On two RFID privacy notions and their relations. ACM Trans. Inf. Syst. Secur. 14(4): 30:1-30:23 (2011) - [c47]Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng, Tieyan Li:
A software-based root-of-trust primitive on multicore platforms. AsiaCCS 2011: 334-343 - [c46]Junzuo Lai, Robert H. Deng, Yingjiu Li:
Fully Secure Cipertext-Policy Hiding CP-ABE. ISPEC 2011: 24-39 - [c45]Tieyan Li, Yingjiu Li, Guilin Wang:
Secure and Practical Key Distribution for RFID-Enabled Supply Chains. SecureComm 2011: 356-372 - [e1]Yingjiu Li:
Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings. Lecture Notes in Computer Science 6818, Springer 2011, ISBN 978-3-642-22347-1 [contents] - 2010
- [j22]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Tieyan Li, Yingjiu Li:
Vulnerability analysis of RFID protocols for tag ownership transfer. Comput. Networks 54(9): 1502-1508 (2010) - [j21]Changshe Ma, Jian Weng, Yingjiu Li, Robert H. Deng:
Efficient discrete logarithm based multi-signature scheme in the plain public key model. Des. Codes Cryptogr. 54(2): 121-133 (2010) - [j20]Chengpo Mu, Yingjiu Li:
An intrusion response decision-making model based on hierarchical task network planning. Expert Syst. Appl. 37(3): 2465-2472 (2010) - [j19]Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng, Haixia Yao:
Achieving high security and efficiency in RFID-tagged supply chains. Int. J. Appl. Cryptogr. 2(1): 3-12 (2010) - [j18]Hasan Cavusoglu, Nan Hu, Yingjiu Li, Dan Ma:
Information Technology Diffusion with Influentials, Imitators, and Opponents. J. Manag. Inf. Syst. 27(2): 305-334 (2010) - [j17]Kuo-Hui Yeh, Chunhua Su, Nai-Wei Lo, Yingjiu Li, Yi-Xiang Hung:
Two robust remote user authentication protocols using smart cards. J. Syst. Softw. 83(12): 2556-2565 (2010) - [j16]Yanjiang Yang, Yingjiu Li, Robert H. Deng, Feng Bao:
Shifting Inference Control to User Side: Architecture and Protocol. IEEE Trans. Dependable Secur. Comput. 7(2): 189-202 (2010) - [c44]Junzuo Lai, Robert H. Deng, Yingjiu Li:
Revisiting Unpredictability-Based RFID Privacy Models. ACNS 2010: 475-492 - [c43]Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li, Enrico Winata:
An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification. AINA Workshops 2010: 335-338 - [c42]Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao:
A New Framework for RFID Privacy. ESORICS 2010: 1-18 - [c41]Shaoying Cai, Chunhua Su, Yingjiu Li, Robert H. Deng, Tieyan Li:
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains. ICISS 2010: 246-260 - [c40]Kevin Chiew, Yingjiu Li, Tieyan Li, Robert H. Deng, Manfred Aigner:
Time cost evaluation for executing RFID authentication protocols. IOT 2010 - [c39]Bing Liang, Kevin Chiew, Yingjiu Li, Yanjiang Yang:
Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data. Privacy in Statistical Databases 2010: 1-16 - [p3]Yingjiu Li, Huiping Guo, Shuhong Wang:
A Multiple-Bits Watermark for Relational Data. Principle Advancements in Database Management Technologies 2010: 1-22 - [i1]Robert H. Deng, Yingjiu Li, Andrew C. Yao, Moti Yung, Yunlei Zhao:
A New Framework for RFID Privacy. IACR Cryptol. ePrint Arch. 2010: 59 (2010)
2000 – 2009
- 2009
- [j15]Nan Hu, Jianhui Huang, Ling Liu, Yingjiu Li, Dan Ma:
Wake up or fall asleep-value implication of trusted computing. Inf. Technol. Manag. 10(4): 177-192 (2009) - [j14]Nan Hu, Giri Kumar Tayi, Chengyu Ma, Yingjiu Li:
Certificate revocation release policies. J. Comput. Secur. 17(2): 127-157 (2009) - [j13]Kevin Chiew, Yingjiu Li:
Multistage Off-Line Permutation Packet Routing on a Mesh: An Approach with Elementary Mathematics. J. Comput. Sci. Technol. 24(1): 175-180 (2009) - [c38]Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li:
RFID privacy: relation between two notions, minimal condition, and efficient construction. CCS 2009: 54-65 - [c37]Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaideep Vaidya:
An efficient online auditing approach to limit private data disclosure. EDBT 2009: 636-647 - [c36]Qiang Yan, Yingjiu Li, Tieyan Li, Robert H. Deng:
Insights into Malware Detection and Prevention on Mobile Phones. FGIT-SecTech 2009: 242-249 - [c35]Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng:
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. ICICS 2009: 150-164 - [c34]Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng:
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. ICISS 2009: 71-85 - [c33]Ge Fu, Hong Zhu, Yingjiu Li:
A Robust Damage Assessment Model for Corrupted Database Systems. ICISS 2009: 237-251 - [c32]Shaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng:
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. ISPEC 2009: 372-383 - [c31]Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zhou, Feng Bao:
Self-enforcing Private Inference Control. ProvSec 2009: 260-274 - [c30]Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng:
Attacks and improvements to an RIFD mutual authentication protocol and its extensions. WISEC 2009: 51-58 - [p2]Yingjiu Li, Huiping Guo, Shuhong Wang:
A Multiple-Bits Watermark for Relational Data. Database Technologies: Concepts, Methodologies, Tools, and Applications 2009: 2223-2244 - 2008
- [j12]Ling Qiu, Yingjiu Li, Xintao Wu:
Protecting business intelligence and customer privacy while outsourcing data mining tasks. Knowl. Inf. Syst. 17(1): 99-120 (2008) - [j11]Songtao Guo, Xintao Wu, Yingjiu Li:
Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining. Knowl. Inf. Syst. 17(2): 217-240 (2008) - [j10]Haibing Lu, Yingjiu Li:
Practical Inference Control for Data Cubes. IEEE Trans. Dependable Secur. Comput. 5(2): 87-98 (2008) - [c29]Tong-Lee Lim, Tieyan Li, Yingjiu Li:
A Security and Performance Evaluation of Hash-Based RFID Protocols. Inscrypt 2008: 406-424 - [c28]Daryl Walleck, Yingjiu Li, Shouhuai Xu:
Empirical Analysis of Certificate Revocation Lists. DBSec 2008: 159-174 - [c27]Yingjiu Li, Haibing Lu:
Disclosure Analysis and Control in Statistical Databases. ESORICS 2008: 146-160 - [p1]Yingjiu Li:
Database Watermarking: A Systematic View. Handbook of Database Security 2008: 329-355 - 2007
- [j9]Huiping Guo, Yingjiu Li, Sushil Jajodia:
Chaining watermarks for detecting malicious modifications to streaming data. Inf. Sci. 177(1): 281-298 (2007) - [j8]Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera:
Parity-based inference control for multi-dimensional range sum queries. J. Comput. Secur. 15(4): 417-445 (2007) - [j7]Ling Qiu, Yingjiu Li, Xintao Wu:
Preserving privacy in association rule mining with bloom filters. J. Intell. Inf. Syst. 29(3): 253-278 (2007) - [c26]Yingjiu Li, Xuhua Ding:
Protecting RFID communications in supply chains. AsiaCCS 2007: 234-241 - [c25]Yanjiang Yang, Yingjiu Li, Robert H. Deng:
New Paradigm of Inference Control with Trusted Computing. DBSec 2007: 243-258 - 2006
- [j6]Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia:
Looking into the seeds of time: Discovering temporal patterns in large transaction sets. Inf. Sci. 176(8): 1003-1031 (2006) - [j5]Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia:
A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176(10): 1350-1378 (2006) - [c24]Chengyu Ma, Nan Hu, Yingjiu Li:
Optimal CRL Releasing Strategy in Public Key Infrastructure. AMCIS 2006: 401 - [c23]Yingjiu Li, Robert Huijie Deng:
Publicly verifiable ownership protection for relational databases. AsiaCCS 2006: 78-89 - [c22]Songtao Guo, Xintao Wu, Yingjiu Li:
Deriving Private Information from Perturbed Data Using IQR Based Approach. ICDE Workshops 2006: 92 - [c21]Ling Qiu, Yingjiu Li, Xintao Wu:
An Approach to Outsourcing Data Mining Tasks while Protecting Business Intelligence and Customer Privacy. ICDM Workshops 2006: 551-558 - [c20]Haibing Lu, Yingjiu Li, Xintao Wu:
Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract). ICISS 2006: 349-352 - [c19]Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen:
Rights Protection for Data Cubes. ISC 2006: 359-372 - [c18]Songtao Guo, Xintao Wu, Yingjiu Li:
On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining. PKDD 2006: 520-527 - [c17]Haibing Lu, Yingjiu Li, Xintao Wu:
Disclosure Analysis for Two-Way Contingency Tables. Privacy in Statistical Databases 2006: 57-67 - [c16]Xintao Wu, Songtao Guo, Yingjiu Li:
Towards value disclosure analysis in modeling general databases. SAC 2006: 617-621 - [c15]Yingjiu Li, Haibing Lu, Robert H. Deng:
Practical Inference Control for Data Cubes (Extended Abstract). S&P 2006: 115-120 - [c14]Chengyu Ma, Nan Hu, Yingjiu Li:
On the Release of CRLs in Public Key Infrastructure. USENIX Security Symposium 2006 - 2005
- [j4]Yingjiu Li, Xinwen Zhang:
Securing credit card transactions with one-time payment scheme. Electron. Commer. Res. Appl. 4(4): 413-426 (2005) - [j3]Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Fingerprinting Relational Databases: Schemes and Specialties. IEEE Trans. Dependable Secur. Comput. 2(1): 34-45 (2005) - [c13]Shuhong Wang, Yingjiu Li, Bo Zhu, Nan Hu:
A Generic Protocol for Controlling Access to Mobile Services. IWAP 2005: 95-110 - [c12]Xinwen Zhang, Yingjiu Li, Divya Nalla:
An attribute-based access matrix model. SAC 2005: 359-363 - [c11]Xintao Wu, Ying Wu, Yongge Wang, Yingjiu Li:
Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining. SDM 2005: 103-114 - 2004
- [c10]Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. DBSec 2004: 81-94 - [c9]Yingjiu Li, Huiping Guo, Sushil Jajodia:
Tamper detection and localization for categorical data using fragile watermarks. Digital Rights Management Workshop 2004: 73-82 - [c8]Yingjiu Li, Xinwen Zhang:
A Security-Enhanced One-Time Payment Scheme for Credit Card. RIDE 2004: 40-47 - 2003
- [j2]Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
Discovering calendar-based temporal association rules. Data Knowl. Eng. 44(2): 193-218 (2003) - [c7]Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Constructing a virtual primary key for fingerprinting relational data. Digital Rights Management Workshop 2003: 133-141 - [c6]Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia:
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115 - 2002
- [j1]Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia:
Enhancing Profiles for Anomaly Detection Using Time Granularities. J. Comput. Secur. 10(1/2): 137-158 (2002) - [c5]Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia:
Auditing Interval-Based Inference. CAiSE 2002: 553-567 - [c4]Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia:
A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159 - [c3]Yingjiu Li, Lingyu Wang, Sushil Jajodia:
Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170 - 2001
- [c2]Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
Discovering Calendar-based Temporal Association Rules. TIME 2001: 111-118 - 2000
- [c1]Yingjiu Li, Xiaoyang Sean Wang, Sushil Jajodia:
Discovering Temporal Patterns in Multiple Granularities. TSDM 2000: 5-19
Coauthor Index
aka: Robert Huijie Deng
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint