2009 |
28 | EE | Qihua Wang,
Hongxia Jin:
Selective message distribution with people-tagging in user-collaborative environments.
CHI Extended Abstracts 2009: 4549-4554 |
27 | EE | Hongxia Jin,
Jeffrey B. Lotspiech:
Defending against the Pirate Evolution Attack.
ISPEC 2009: 147-158 |
26 | EE | Hongxia Jin:
Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution.
IJDCF 1(1): 59-74 (2009) |
2008 |
25 | EE | Hongxia Jin,
Jeffrey B. Lotspiech,
Michael Nelson,
Nimrod Megiddo:
Adaptive traitor tracing for large anonymous attack.
Digital Rights Management Workshop 2008: 1-8 |
24 | EE | Avinash L. Varna,
Hongxia Jin:
Generalized traitor tracing for nested codes.
ICME 2008: 561-564 |
23 | EE | Hongxia Jin,
Jeffery Lotspiech,
Nimrod Megiddo:
Efficient Coalition Detection in Traitor Tracing.
SEC 2008: 365-380 |
22 | EE | Hongxia Jin,
Vladimir Zbarsky:
Enabling secure digital marketplace.
WWW 2008: 1217-1218 |
2007 |
21 | | Philip Zigoris,
Hongxia Jin:
Adaptive Traitor Tracing with Bayesian Networks.
AAAI 2007: 1833-1839 |
20 | EE | Philip Zigoris,
Hongxia Jin:
Bayesian Methods for Practical Traitor Tracing.
ACNS 2007: 194-206 |
19 | EE | Hongxia Jin,
Jeffery Lotspiech:
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack.
ESORICS 2007: 563-577 |
18 | EE | Hongxia Jin,
Ginger Myles:
A technique for self-certifying tamper resistant software.
QoP 2007: 12-14 |
17 | EE | Hongxia Jin,
Jianna Zhao,
Xiaoxuan Chen:
The Application of Neuro-Fuzzy Decision Tree in Optimal Selection of Teconological Innovation Projects.
SNPD (3) 2007: 438-443 |
16 | EE | Hongxia Jin,
Mario Blaum:
Combinatorial Properties for Traceability Codes Using Error Correcting Codes.
IEEE Transactions on Information Theory 53(2): 804-808 (2007) |
2006 |
15 | EE | Hongxia Jin,
Jeffery Lotspiech:
Hybrid Traitor Tracing.
ICME 2006: 1329-1332 |
14 | EE | Hongxia Jin,
Jeffery Lotspiech:
Practical Forensic Analysis in Advanced Access Content System.
ISPEC 2006: 302-313 |
13 | EE | Hongxia Jin:
Privacy, traceability, and anonymity for content protection.
PST 2006: 63 |
12 | | Hongxia Jin,
Jeffrey B. Lotspiech,
Mario Blaum:
Traitor Tracing for Subscription-Based Systems.
SECRYPT 2006: 223-228 |
11 | EE | Hongxia Jin:
Higher Dependability and Security for Mobile Applications.
SPC 2006: 89-103 |
2005 |
10 | EE | Hongxia Jin,
Jeffery Lotspiech:
Flexible Traitor Tracing for Anonymous Attacks.
Communications and Multimedia Security 2005: 269-270 |
9 | EE | Hongxia Jin,
Jeffery Lotspiech:
Attacks and Forensic Analysis for Multimedia Content Protection.
ICME 2005: 1392-1395 |
8 | EE | Hongxia Jin,
Ginger Myles,
Jeffery Lotspiech:
Towards Better Software Tamper Resistance.
ISC 2005: 417-430 |
7 | EE | Ginger Myles,
Hongxia Jin:
Self-validating Branch-Based Software Watermarking.
Information Hiding 2005: 342-356 |
2004 |
6 | EE | Hongxia Jin,
Jeffery Lotspiech,
Stefan Nusser:
Traitor tracing for prerecorded and recordable media.
Digital Rights Management Workshop 2004: 83-90 |
2003 |
5 | EE | Hongxia Jin,
Jeffery Lotspiech:
Proactive Software Tampering Detection.
ISC 2003: 352-365 |
4 | EE | Hongxia Jin,
Jeffery Lotspiech:
Forensic Analysis for Tamper Resistant Software.
ISSRE 2003: 133-142 |
3 | EE | Hongxia Jin,
Gregory F. Sullivan,
Gerald M. Masson:
Software Tamper Resistance Using Program Certificates.
SAFECOMP 2003: 144-158 |
2001 |
2 | EE | Hongxia Jin,
Peter Santhanam:
An Approach to Higher Reliability Using Software Components.
ISSRE 2001: 2-11 |
1999 |
1 | | Hongxia Jin,
Gregory F. Sullivan,
Gerald M. Masson:
Run-time Result Certification for Distributed Computations.
PDPTA 1999: 890-895 |