2010 | ||
---|---|---|
49 | Changshe Ma, Jian Weng, Yingjiu Li, Robert H. Deng: Efficient discrete logarithm based multi-signature scheme in the plain public key model. Des. Codes Cryptography 54(2): 121-133 (2010) | |
2009 | ||
48 | Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li: RFID privacy: relation between two notions, minimal condition, and efficient construction. ACM Conference on Computer and Communications Security 2009: 54-65 | |
47 | Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaideep Vaidya: An efficient online auditing approach to limit private data disclosure. EDBT 2009: 636-647 | |
46 | Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng: Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. ICICS 2009: 150-164 | |
45 | Ge Fu, Hong Zhu, Yingjiu Li: A Robust Damage Assessment Model for Corrupted Database Systems. ICISS 2009: 237-251 | |
44 | Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng: On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. ICISS 2009: 71-85 | |
43 | Shaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng: Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. ISPEC 2009: 372-383 | |
42 | Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zhou, Feng Bao: Self-enforcing Private Inference Control. ProvSec 2009: 260-274 | |
41 | Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng: Attacks and improvements to an RIFD mutual authentication protocol and its extensions. WISEC 2009: 51-58 | |
40 | Kevin Chiew, Yingjiu Li: Multistage Off-Line Permutation Packet Routing on a Mesh: An Approach with Elementary Mathematics. J. Comput. Sci. Technol. 24(1): 175-180 (2009) | |
39 | Nan Hu, Giri Kumar Tayi, Chengyu Ma, Yingjiu Li: Certificate revocation release policies. Journal of Computer Security 17(2): 127-157 (2009) | |
2008 | ||
38 | Daryl Walleck, Yingjiu Li, Shouhuai Xu: Empirical Analysis of Certificate Revocation Lists. DBSec 2008: 159-174 | |
37 | Yingjiu Li, Haibing Lu: Disclosure Analysis and Control in Statistical Databases. ESORICS 2008: 146-160 | |
36 | Tong-Lee Lim, Tieyan Li, Yingjiu Li: A Security and Performance Evaluation of Hash-Based RFID Protocols. Inscrypt 2008: 406-424 | |
35 | Haibing Lu, Yingjiu Li: Practical Inference Control for Data Cubes. IEEE Trans. Dependable Sec. Comput. 5(2): 87-98 (2008) | |
34 | Ling Qiu, Yingjiu Li, Xintao Wu: Protecting business intelligence and customer privacy while outsourcing data mining tasks. Knowl. Inf. Syst. 17(1): 99-120 (2008) | |
33 | Songtao Guo, Xintao Wu, Yingjiu Li: Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining. Knowl. Inf. Syst. 17(2): 217-240 (2008) | |
2007 | ||
32 | Yingjiu Li, Xuhua Ding: Protecting RFID communications in supply chains. ASIACCS 2007: 234-241 | |
31 | Yanjiang Yang, Yingjiu Li, Robert H. Deng: New Paradigm of Inference Control with Trusted Computing. DBSec 2007: 243-258 | |
30 | Huiping Guo, Yingjiu Li, Sushil Jajodia: Chaining watermarks for detecting malicious modifications to streaming data. Inf. Sci. 177(1): 281-298 (2007) | |
29 | Ling Qiu, Yingjiu Li, Xintao Wu: Preserving privacy in association rule mining with bloom filters. J. Intell. Inf. Syst. 29(3): 253-278 (2007) | |
28 | Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007) | |
2006 | ||
27 | Yingjiu Li, Robert Huijie Deng: Publicly verifiable ownership protection for relational databases. ASIACCS 2006: 78-89 | |
26 | Songtao Guo, Xintao Wu, Yingjiu Li: Deriving Private Information from Perturbed Data Using IQR Based Approach. ICDE Workshops 2006: 92 | |
25 | Ling Qiu, Yingjiu Li, Xintao Wu: An Approach to Outsourcing Data Mining Tasks while Protecting Business Intelligence and Customer Privacy. ICDM Workshops 2006: 551-558 | |
24 | Haibing Lu, Yingjiu Li, Xintao Wu: Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract). ICISS 2006: 349-352 | |
23 | Yingjiu Li, Haibing Lu, Robert H. Deng: Practical Inference Control for Data Cubes (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 115-120 | |
22 | Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen: Rights Protection for Data Cubes. ISC 2006: 359-372 | |
21 | Songtao Guo, Xintao Wu, Yingjiu Li: On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining. PKDD 2006: 520-527 | |
20 | Haibing Lu, Yingjiu Li, Xintao Wu: Disclosure Analysis for Two-Way Contingency Tables. Privacy in Statistical Databases 2006: 57-67 | |
19 | Xintao Wu, Songtao Guo, Yingjiu Li: Towards value disclosure analysis in modeling general databases. SAC 2006: 617-621 | |
18 | Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176(10): 1350-1378 (2006) | |
17 | Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia: Looking into the seeds of time: Discovering temporal patterns in large transaction sets. Inf. Sci. 176(8): 1003-1031 (2006) | |
2005 | ||
16 | Xinwen Zhang, Yingjiu Li, Divya Nalla: An attribute-based access matrix model. SAC 2005: 359-363 | |
15 | Xintao Wu, Ying Wu, Yongge Wang, Yingjiu Li: Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining. SDM 2005 | |
14 | Yingjiu Li, Xinwen Zhang: Securing credit card transactions with one-time payment scheme. Electronic Commerce Research and Applications 4(4): 413-426 (2005) | |
13 | Yingjiu Li, Vipin Swarup, Sushil Jajodia: Fingerprinting Relational Databases: Schemes and Specialties. IEEE Trans. Dependable Sec. Comput. 2(1): 34-45 (2005) | |
2004 | ||
12 | Yingjiu Li, Vipin Swarup, Sushil Jajodia: Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. DBSec 2004: 81-94 | |
11 | Yingjiu Li, Huiping Guo, Sushil Jajodia: Tamper detection and localization for categorical data using fragile watermarks. Digital Rights Management Workshop 2004: 73-82 | |
10 | Yingjiu Li, Xinwen Zhang: A Security-Enhanced One-Time Payment Scheme for Credit Card. RIDE 2004: 40-47 | |
2003 | ||
9 | Yingjiu Li, Vipin Swarup, Sushil Jajodia: Constructing a virtual primary key for fingerprinting relational data. Digital Rights Management Workshop 2003: 133-141 | |
8 | Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115 | |
7 | Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering calendar-based temporal association rules. Data Knowl. Eng. 44(2): 193-218 (2003) | |
2002 | ||
6 | Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Auditing Interval-Based Inference. CAiSE 2002: 553-567 | |
5 | Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159 | |
4 | Yingjiu Li, Lingyu Wang, Sushil Jajodia: Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170 | |
3 | Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia: Enhancing Profiles for Anomaly Detection Using Time Granularities. Journal of Computer Security 10(1/2): 137-158 (2002) | |
2001 | ||
2 | Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Calendar-based Temporal Association Rules. TIME 2001: 111-118 | |
2000 | ||
1 | Yingjiu Li, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Temporal Patterns in Multiple Granularities. TSDM 2000: 5-19 |