2010 | ||
---|---|---|
74 | Graham Cormode, Divesh Srivastava, Ting Yu, Qing Zhang: Anonymizing bipartite graph data using safe groupings. VLDB J. 19(1): 115-139 (2010) | |
2009 | ||
73 | Wei Wei, Juan Du, Ting Yu, Xiaohui Gu: SecureMR: A Service Integrity Assurance Framework for MapReduce. ACSAC 2009: 73-82 | |
72 | Ting Yu, Manfred Lenzen, Blanca Gallego, John K. Debenham: A Data Mining System for Estimating a Largesize Matrix for the Environmental Accounting. AIAI Workshops 2009: 260-269 | |
71 | Nils Krahnstoever, Peter H. Tu, Ting Yu, Kedar A. Patwardhan, D. Hamilton, B. Yu, C. Greco, Gianfranco Doretto: Intelligent Video for Protecting Crowded Sports Venues. AVSS 2009: 116-121 | |
70 | Ting Yu, Ser Nam Lim, Kedar A. Patwardhan, Nils Krahnstoever: Monitoring, recognizing and discovering social networks. CVPR 2009: 1462-1469 | |
69 | Ting Yu, Manfred Lenzen, Chris Dey, Jeremy Badcock: Automatically Estimating and Updating Input-Output Tables. KES (2) 2009: 42-49 | |
68 | Adam J. Lee, Ting Yu: Towards a dynamic and composable model of trust. SACMAT 2009: 217-226 | |
67 | Juan Du, Wei Wei, Xiaohui Gu, Ting Yu: Towards secure dataflow processing in open distributed systems. STC 2009: 67-72 | |
66 | Dongwon Lee, Ting Yu: XML Access Control. Encyclopedia of Database Systems 2009: 3573-3576 | |
65 | Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu: Denial of service attacks and defenses in decentralized trust management. Int. J. Inf. Sec. 8(2): 89-101 (2009) | |
64 | Qing Zhang, Wei Wei, Ting Yu: On the Modeling of Honest Players in Reputation Systems. J. Comput. Sci. Technol. 24(5): 808-819 (2009) | |
63 | Nick Koudas, Divesh Srivastava, Ting Yu, Qing Zhang: Distribution-based Microdata Anonymization. PVLDB 2(1): 958-969 (2009) | |
2008 | ||
62 | Xiaoming Liu, Ting Yu, Thomas Sebastian, Peter H. Tu: Boosted deformable model for human body alignment. CVPR 2008 | |
61 | Ting Yu, Ying Wu, Nils Krahnstoever, Peter H. Tu: Distributed data association and filtering for multiple target tracking. CVPR 2008 | |
60 | Peter H. Tu, Thomas Sebastian, Gianfranco Doretto, Nils Krahnstoever, Jens Rittscher, Ting Yu: Unified Crowd Segmentation. ECCV (4) 2008: 691-704 | |
59 | Qing Zhang, Ting Yu: On the Modeling of Honest Players in Reputation Systems. ICDCS Workshops 2008: 249-254 | |
58 | Keith Irwin, Ting Yu, William H. Winsborough: Enforcing security properties in task-based systems. SACMAT 2008: 41-50 | |
57 | Heshan Lin, Xiaosong Ma, Jiangtian Li, Ting Yu, Nagiza F. Samatova: Adaptive Request Scheduling for Parallel Scientific Web Services. SSDBM 2008: 276-294 | |
56 | Keith Irwin, Ting Yu, William H. Winsborough: Avoiding information leakage in security-policy-aware planning. WPES 2008: 85-94 | |
55 | Qing Zhang, Ting Yu, Peng Ning: A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): (2008) | |
54 | Graham Cormode, Divesh Srivastava, Ting Yu, Qing Zhang: Anonymizing bipartite graph data using safe groupings. PVLDB 1(1): 833-844 (2008) | |
53 | Adam J. Lee, Ting Yu: Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007). SIGMOD Record 37(1): 56-58 (2008) | |
2007 | ||
52 | Peng Ning, Ting Yu: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007 ACM 2007 | |
51 | Ting Yu, Sushil Jajodia: Secure Data Management in Decentralized Systems Springer 2007 | |
50 | Xiaoming Liu, Nils Krahnstoever, Ting Yu, Peter H. Tu: What are customers looking at? AVSS 2007: 405-410 | |
49 | Ming Yang, Ting Yu, Ying Wu: Game-Theoretic Multiple Target Tracking. ICCV 2007: 1-8 | |
48 | Xiaoming Liu, Ting Yu: Gradient Feature Selection for Online Boosting. ICCV 2007: 1-8 | |
47 | Qing Zhang, Nick Koudas, Divesh Srivastava, Ting Yu: Aggregate Query Answering on Anonymized Tables. ICDE 2007: 116-125 | |
46 | Ting Yu, Tony Jan, Simeon J. Simoff, John K. Debenham: A Hierarchical VQSVM for Imbalanced Data Sets. IJCNN 2007: 518-523 | |
45 | Ting Yu, Simeon J. Simoff, Donald Stokes: Incorporating Prior Domain Knowledge into a Kernel Based Feature Selection Algorithm. PAKDD 2007: 1064-1071 | |
44 | Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun: On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566 | |
43 | Yuming Ou, Longbing Cao, Ting Yu, Chengqi Zhang: Detecting Turning Points of Trading Price and Return Volatility for Market Surveillance Agents. Web Intelligence/IAT Workshops 2007: 491-494 | |
42 | Adam J. Lee, Kent E. Seamons, Marianne Winslett, Ting Yu: Automated Trust Negotiation in Open Systems. Secure Data Management in Decentralized Systems 2007: 217-258 | |
41 | Sushil Jajodia, Ting Yu: Basic Security Concepts. Secure Data Management in Decentralized Systems 2007: 3-20 | |
40 | Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu: A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007) | |
2006 | ||
39 | Keith Irwin, Ting Yu, William H. Winsborough: On the modeling and analysis of obligations. ACM Conference on Computer and Communications Security 2006: 134-143 | |
38 | Zhimin Fan, Ming Yang, Ying Wu, Gang Hua, Ting Yu: Efficient Optimal Kernel Placement for Reliable Visual Tracking. CVPR (1) 2006: 658-665 | |
37 | Ting Yu, Ying Wu: Differential Tracking based on Spatial-Appearance Model (SAM). CVPR (1) 2006: 720-727 | |
36 | Evan Martin, Tao Xie, Ting Yu: Defining and Measuring Policy Coverage in Testing Access Control Policies. ICICS 2006: 139-158 | |
35 | Ting Yu, John K. Debenham, Tony Jan, Simeon J. Simoff: Combine Vector Quantization and Support Vector Machine for Imbalanced Datasets. IFIP AI 2006: 81-88 | |
34 | Ting Yu, Tony Jan, John K. Debenham, Simeon J. Simoff: Classify Unexpected News Impacts to Stock Price by Incorporating Time Series Analysis into Support Vector Machine. IJCNN 2006: 2993-2998 | |
33 | Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, Ting Yu: Integrating XML data sources using approximate joins. ACM Trans. Database Syst. 31(1): 161-207 (2006) | |
32 | Ying Wu, Ting Yu: A Field Model for Human Detection and Tracking. IEEE Trans. Pattern Anal. Mach. Intell. 28(5): 753-765 (2006) | |
2005 | ||
31 | Keith Irwin, Ting Yu: Preventing attribute information leakage in automated trust negotiation. ACM Conference on Computer and Communications Security 2005: 36-45 | |
30 | Ying Wu, Ting Yu, Gang Hua: A Statistical Field Model for Pedestrian Detection. CVPR (1) 2005: 1023-1030 | |
29 | Ting Yu, Ying Wu: Decentralized Multiple Target Tracking Using Netted Collaborative Autonomous Trackers. CVPR (1) 2005: 939-946 | |
28 | Keith Irwin, Ting Yu: Determining user privacy preferences by asking the right questions: an automated approach. WPES 2005: 47-50 | |
2004 | ||
27 | Ting Yu, Ying Wu: Collaborative Tracking of Multiple Targets. CVPR (1) 2004: 834-841 | |
26 | Nick Koudas, Michael Rabinovich, Divesh Srivastava, Ting Yu: Routing XML Queries. ICDE 2004: 844 | |
25 | Qing Zhang, Ting Yu: A Classification Scheme for Trust Functions in Reputation-Based Trust Management. ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004 | |
24 | Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, Charles C. Zhang: How to Exploit Ontologies for Trust Negotiation. ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004 | |
23 | Ting Yu, Ninghui Li, Annie I. Antón: A formal semantics for P3P. SWS 2004: 1-8 | |
22 | Keith Irwin, Ting Yu: An identifiability-based access control model for privacy protection in open systems. WPES 2004: 43 | |
21 | Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan, H. V. Jagadish: A compressed accessibility map for XML. ACM Trans. Database Syst. 29(2): 363-402 (2004) | |
2003 | ||
20 | Ying Wu, Gang Hua, Ting Yu: Switching Observation Models for Contour Tracking in Clutter. CVPR (1) 2003: 295-304 | |
19 | Ying Wu, Ting Yu, Gang Hua: Tracking Appearances with Occlusions. CVPR (1) 2003: 789-795 | |
18 | Kent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu: Trust Negotiation in Dynamic Coalitions. DISCEX (2) 2003: 240-245 | |
17 | Ying Wu, Gang Hua, Ting Yu: Tracking Articulated Body by Dynamic Markov Network. ICCV 2003: 1094-1101 | |
16 | Sudipto Guha, Nick Koudas, Divesh Srivastava, Ting Yu: Index-Based Approximate XML Joins. ICDE 2003: 708-710 | |
15 | Ting Yu, Marianne Winslett: A Unified Scheme for Resource Protection in Automated Trust Negotiation. IEEE Symposium on Security and Privacy 2003: 110-122 | |
14 | Ting Yu, Marianne Winslett: Policy migration for sensitive credentials in trust negotiation. WPES 2003: 9-20 | |
13 | Ting Yu, Marianne Winslett, Kent E. Seamons: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6(1): 1-42 (2003) | |
12 | Ting Yu, Marianne Winslett, Jason E. Holt: Two Security Symposia. IEEE Security & Privacy 1(4): 50-52 (2003) | |
11 | Marianne Winslett, Xiaosong Ma, Ting Yu: Two-Body Job Searches. SIGMOD Record 32(2): 107-112 (2003) | |
2002 | ||
10 | Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, Lina Yu: Requirements for Policy Languages for Trust Negotiation. POLICY 2002: 68-79 | |
9 | Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis: Protecting Privacy during On-Line Trust Negotiation. Privacy Enhancing Technologies 2002: 129-143 | |
8 | Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, Ting Yu: Approximate XML joins. SIGMOD Conference 2002: 287-298 | |
7 | Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan, H. V. Jagadish: Compressed Accessibility Map: Efficient Access Control for XML. VLDB 2002: 478-489 | |
6 | Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, Lina Yu: Negotiating Trust on the Web. IEEE Internet Computing 6(6): 30-37 (2002) | |
2001 | ||
5 | Ting Yu, Marianne Winslett, Kent E. Seamons: Interoperable strategies in automated trust negotiation. ACM Conference on Computer and Communications Security 2001: 146-155 | |
4 | Kent E. Seamons, Marianne Winslett, Ting Yu: Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. NDSS 2001 | |
2000 | ||
3 | Ting Yu, Xiaosong Ma, Marianne Winslett: PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet. ACM Conference on Computer and Communications Security 2000: 210-219 | |
1997 | ||
2 | Ting Yu, Owen Kaser: A Note on "On the Conversion of Indirect to Direct Recursion". ACM Trans. Program. Lang. Syst. 19(6): 1085-1087 (1997) | |
1995 | ||
1 | Benjamin W. Wah, Arthur Ieumwananonthachai, Shu Yao, Ting Yu: Statistical generalization: theory and applications. ICCD 1995: 4- |