| 2009 |
| 28 | EE | Qihua Wang,
Hongxia Jin:
Selective message distribution with people-tagging in user-collaborative environments.
CHI Extended Abstracts 2009: 4549-4554 |
| 27 | EE | Hongxia Jin,
Jeffrey B. Lotspiech:
Defending against the Pirate Evolution Attack.
ISPEC 2009: 147-158 |
| 26 | EE | Hongxia Jin:
Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution.
IJDCF 1(1): 59-74 (2009) |
| 2008 |
| 25 | EE | Hongxia Jin,
Jeffrey B. Lotspiech,
Michael Nelson,
Nimrod Megiddo:
Adaptive traitor tracing for large anonymous attack.
Digital Rights Management Workshop 2008: 1-8 |
| 24 | EE | Avinash L. Varna,
Hongxia Jin:
Generalized traitor tracing for nested codes.
ICME 2008: 561-564 |
| 23 | EE | Hongxia Jin,
Jeffery Lotspiech,
Nimrod Megiddo:
Efficient Coalition Detection in Traitor Tracing.
SEC 2008: 365-380 |
| 22 | EE | Hongxia Jin,
Vladimir Zbarsky:
Enabling secure digital marketplace.
WWW 2008: 1217-1218 |
| 2007 |
| 21 | | Philip Zigoris,
Hongxia Jin:
Adaptive Traitor Tracing with Bayesian Networks.
AAAI 2007: 1833-1839 |
| 20 | EE | Philip Zigoris,
Hongxia Jin:
Bayesian Methods for Practical Traitor Tracing.
ACNS 2007: 194-206 |
| 19 | EE | Hongxia Jin,
Jeffery Lotspiech:
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack.
ESORICS 2007: 563-577 |
| 18 | EE | Hongxia Jin,
Ginger Myles:
A technique for self-certifying tamper resistant software.
QoP 2007: 12-14 |
| 17 | EE | Hongxia Jin,
Jianna Zhao,
Xiaoxuan Chen:
The Application of Neuro-Fuzzy Decision Tree in Optimal Selection of Teconological Innovation Projects.
SNPD (3) 2007: 438-443 |
| 16 | EE | Hongxia Jin,
Mario Blaum:
Combinatorial Properties for Traceability Codes Using Error Correcting Codes.
IEEE Transactions on Information Theory 53(2): 804-808 (2007) |
| 2006 |
| 15 | EE | Hongxia Jin,
Jeffery Lotspiech:
Hybrid Traitor Tracing.
ICME 2006: 1329-1332 |
| 14 | EE | Hongxia Jin,
Jeffery Lotspiech:
Practical Forensic Analysis in Advanced Access Content System.
ISPEC 2006: 302-313 |
| 13 | EE | Hongxia Jin:
Privacy, traceability, and anonymity for content protection.
PST 2006: 63 |
| 12 | | Hongxia Jin,
Jeffrey B. Lotspiech,
Mario Blaum:
Traitor Tracing for Subscription-Based Systems.
SECRYPT 2006: 223-228 |
| 11 | EE | Hongxia Jin:
Higher Dependability and Security for Mobile Applications.
SPC 2006: 89-103 |
| 2005 |
| 10 | EE | Hongxia Jin,
Jeffery Lotspiech:
Flexible Traitor Tracing for Anonymous Attacks.
Communications and Multimedia Security 2005: 269-270 |
| 9 | EE | Hongxia Jin,
Jeffery Lotspiech:
Attacks and Forensic Analysis for Multimedia Content Protection.
ICME 2005: 1392-1395 |
| 8 | EE | Hongxia Jin,
Ginger Myles,
Jeffery Lotspiech:
Towards Better Software Tamper Resistance.
ISC 2005: 417-430 |
| 7 | EE | Ginger Myles,
Hongxia Jin:
Self-validating Branch-Based Software Watermarking.
Information Hiding 2005: 342-356 |
| 2004 |
| 6 | EE | Hongxia Jin,
Jeffery Lotspiech,
Stefan Nusser:
Traitor tracing for prerecorded and recordable media.
Digital Rights Management Workshop 2004: 83-90 |
| 2003 |
| 5 | EE | Hongxia Jin,
Jeffery Lotspiech:
Proactive Software Tampering Detection.
ISC 2003: 352-365 |
| 4 | EE | Hongxia Jin,
Jeffery Lotspiech:
Forensic Analysis for Tamper Resistant Software.
ISSRE 2003: 133-142 |
| 3 | EE | Hongxia Jin,
Gregory F. Sullivan,
Gerald M. Masson:
Software Tamper Resistance Using Program Certificates.
SAFECOMP 2003: 144-158 |
| 2001 |
| 2 | EE | Hongxia Jin,
Peter Santhanam:
An Approach to Higher Reliability Using Software Components.
ISSRE 2001: 2-11 |
| 1999 |
| 1 | | Hongxia Jin,
Gregory F. Sullivan,
Gerald M. Masson:
Run-time Result Certification for Distributed Computations.
PDPTA 1999: 890-895 |