| 2009 |
| 41 | EE | Haibing Lu,
Yingjiu Li,
Vijayalakshmi Atluri,
Jaideep Vaidya:
An efficient online auditing approach to limit private data disclosure.
EDBT 2009: 636-647 |
| 40 | EE | Shaoying Cai,
Tieyan Li,
Yingjiu Li,
Robert H. Deng:
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.
ISPEC 2009: 372-383 |
| 39 | EE | Shaoying Cai,
Yingjiu Li,
Tieyan Li,
Robert H. Deng:
Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
WISEC 2009: 51-58 |
| 2008 |
| 38 | EE | Daryl Walleck,
Yingjiu Li,
Shouhuai Xu:
Empirical Analysis of Certificate Revocation Lists.
DBSec 2008: 159-174 |
| 37 | EE | Yingjiu Li,
Haibing Lu:
Disclosure Analysis and Control in Statistical Databases.
ESORICS 2008: 146-160 |
| 36 | EE | Tong-Lee Lim,
Tieyan Li,
Yingjiu Li:
A Security and Performance Evaluation of Hash-Based RFID Protocols.
Inscrypt 2008: 406-424 |
| 35 | EE | Haibing Lu,
Yingjiu Li:
Practical Inference Control for Data Cubes.
IEEE Trans. Dependable Sec. Comput. 5(2): 87-98 (2008) |
| 34 | EE | Ling Qiu,
Yingjiu Li,
Xintao Wu:
Protecting business intelligence and customer privacy while outsourcing data mining tasks.
Knowl. Inf. Syst. 17(1): 99-120 (2008) |
| 33 | EE | Songtao Guo,
Xintao Wu,
Yingjiu Li:
Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining.
Knowl. Inf. Syst. 17(2): 217-240 (2008) |
| 2007 |
| 32 | EE | Yingjiu Li,
Xuhua Ding:
Protecting RFID communications in supply chains.
ASIACCS 2007: 234-241 |
| 31 | EE | Yanjiang Yang,
Yingjiu Li,
Robert H. Deng:
New Paradigm of Inference Control with Trusted Computing.
DBSec 2007: 243-258 |
| 30 | EE | Huiping Guo,
Yingjiu Li,
Sushil Jajodia:
Chaining watermarks for detecting malicious modifications to streaming data.
Inf. Sci. 177(1): 281-298 (2007) |
| 29 | EE | Ling Qiu,
Yingjiu Li,
Xintao Wu:
Preserving privacy in association rule mining with bloom filters.
J. Intell. Inf. Syst. 29(3): 253-278 (2007) |
| 28 | EE | Lingyu Wang,
Yingjiu Li,
Sushil Jajodia,
Duminda Wijesekera:
Parity-based inference control for multi-dimensional range sum queries.
Journal of Computer Security 15(4): 417-445 (2007) |
| 2006 |
| 27 | EE | Yingjiu Li,
Robert Huijie Deng:
Publicly verifiable ownership protection for relational databases.
ASIACCS 2006: 78-89 |
| 26 | EE | Songtao Guo,
Xintao Wu,
Yingjiu Li:
Deriving Private Information from Perturbed Data Using IQR Based Approach.
ICDE Workshops 2006: 92 |
| 25 | EE | Ling Qiu,
Yingjiu Li,
Xintao Wu:
An Approach to Outsourcing Data Mining Tasks while Protecting Business Intelligence and Customer Privacy.
ICDM Workshops 2006: 551-558 |
| 24 | EE | Haibing Lu,
Yingjiu Li,
Xintao Wu:
Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract).
ICISS 2006: 349-352 |
| 23 | EE | Yingjiu Li,
Haibing Lu,
Robert H. Deng:
Practical Inference Control for Data Cubes (Extended Abstract).
IEEE Symposium on Security and Privacy 2006: 115-120 |
| 22 | EE | Jie Guo,
Yingjiu Li,
Robert H. Deng,
Kefei Chen:
Rights Protection for Data Cubes.
ISC 2006: 359-372 |
| 21 | EE | Songtao Guo,
Xintao Wu,
Yingjiu Li:
On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining.
PKDD 2006: 520-527 |
| 20 | EE | Haibing Lu,
Yingjiu Li,
Xintao Wu:
Disclosure Analysis for Two-Way Contingency Tables.
Privacy in Statistical Databases 2006: 57-67 |
| 19 | EE | Xintao Wu,
Songtao Guo,
Yingjiu Li:
Towards value disclosure analysis in modeling general databases.
SAC 2006: 617-621 |
| 18 | EE | Huiping Guo,
Yingjiu Li,
Anyi Liu,
Sushil Jajodia:
A fragile watermarking scheme for detecting malicious modifications of database relations.
Inf. Sci. 176(10): 1350-1378 (2006) |
| 17 | EE | Yingjiu Li,
Sencun Zhu,
Xiaoyang Sean Wang,
Sushil Jajodia:
Looking into the seeds of time: Discovering temporal patterns in large transaction sets.
Inf. Sci. 176(8): 1003-1031 (2006) |
| 2005 |
| 16 | EE | Xinwen Zhang,
Yingjiu Li,
Divya Nalla:
An attribute-based access matrix model.
SAC 2005: 359-363 |
| 15 | | Xintao Wu,
Ying Wu,
Yongge Wang,
Yingjiu Li:
Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining.
SDM 2005 |
| 14 | EE | Yingjiu Li,
Xinwen Zhang:
Securing credit card transactions with one-time payment scheme.
Electronic Commerce Research and Applications 4(4): 413-426 (2005) |
| 13 | EE | Yingjiu Li,
Vipin Swarup,
Sushil Jajodia:
Fingerprinting Relational Databases: Schemes and Specialties.
IEEE Trans. Dependable Sec. Comput. 2(1): 34-45 (2005) |
| 2004 |
| 12 | | Yingjiu Li,
Vipin Swarup,
Sushil Jajodia:
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases.
DBSec 2004: 81-94 |
| 11 | EE | Yingjiu Li,
Huiping Guo,
Sushil Jajodia:
Tamper detection and localization for categorical data using fragile watermarks.
Digital Rights Management Workshop 2004: 73-82 |
| 10 | EE | Yingjiu Li,
Xinwen Zhang:
A Security-Enhanced One-Time Payment Scheme for Credit Card.
RIDE 2004: 40-47 |
| 2003 |
| 9 | EE | Yingjiu Li,
Vipin Swarup,
Sushil Jajodia:
Constructing a virtual primary key for fingerprinting relational data.
Digital Rights Management Workshop 2003: 133-141 |
| 8 | EE | Lingyu Wang,
Yingjiu Li,
Duminda Wijesekera,
Sushil Jajodia:
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches.
ESORICS 2003: 100-115 |
| 7 | | Yingjiu Li,
Peng Ning,
Xiaoyang Sean Wang,
Sushil Jajodia:
Discovering calendar-based temporal association rules.
Data Knowl. Eng. 44(2): 193-218 (2003) |
| 2002 |
| 6 | EE | Yingjiu Li,
Lingyu Wang,
Xiaoyang Sean Wang,
Sushil Jajodia:
Auditing Interval-Based Inference.
CAiSE 2002: 553-567 |
| 5 | EE | Yingjiu Li,
Sencun Zhu,
Lingyu Wang,
Sushil Jajodia:
A Privacy-Enhanced Microaggregation Method.
FoIKS 2002: 148-159 |
| 4 | EE | Yingjiu Li,
Lingyu Wang,
Sushil Jajodia:
Preventing Interval-Based Inference by Random Data Perturbation.
Privacy Enhancing Technologies 2002: 160-170 |
| 3 | | Yingjiu Li,
Ningning Wu,
Xiaoyang Sean Wang,
Sushil Jajodia:
Enhancing Profiles for Anomaly Detection Using Time Granularities.
Journal of Computer Security 10(1/2): 137-158 (2002) |
| 2001 |
| 2 | EE | Yingjiu Li,
Peng Ning,
Xiaoyang Sean Wang,
Sushil Jajodia:
Discovering Calendar-based Temporal Association Rules.
TIME 2001: 111-118 |
| 2000 |
| 1 | EE | Yingjiu Li,
Xiaoyang Sean Wang,
Sushil Jajodia:
Discovering Temporal Patterns in Multiple Granularities.
TSDM 2000: 5-19 |