2009 |
41 | EE | Haibing Lu,
Yingjiu Li,
Vijayalakshmi Atluri,
Jaideep Vaidya:
An efficient online auditing approach to limit private data disclosure.
EDBT 2009: 636-647 |
40 | EE | Shaoying Cai,
Tieyan Li,
Yingjiu Li,
Robert H. Deng:
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.
ISPEC 2009: 372-383 |
39 | EE | Shaoying Cai,
Yingjiu Li,
Tieyan Li,
Robert H. Deng:
Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
WISEC 2009: 51-58 |
2008 |
38 | EE | Daryl Walleck,
Yingjiu Li,
Shouhuai Xu:
Empirical Analysis of Certificate Revocation Lists.
DBSec 2008: 159-174 |
37 | EE | Yingjiu Li,
Haibing Lu:
Disclosure Analysis and Control in Statistical Databases.
ESORICS 2008: 146-160 |
36 | EE | Tong-Lee Lim,
Tieyan Li,
Yingjiu Li:
A Security and Performance Evaluation of Hash-Based RFID Protocols.
Inscrypt 2008: 406-424 |
35 | EE | Haibing Lu,
Yingjiu Li:
Practical Inference Control for Data Cubes.
IEEE Trans. Dependable Sec. Comput. 5(2): 87-98 (2008) |
34 | EE | Ling Qiu,
Yingjiu Li,
Xintao Wu:
Protecting business intelligence and customer privacy while outsourcing data mining tasks.
Knowl. Inf. Syst. 17(1): 99-120 (2008) |
33 | EE | Songtao Guo,
Xintao Wu,
Yingjiu Li:
Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining.
Knowl. Inf. Syst. 17(2): 217-240 (2008) |
2007 |
32 | EE | Yingjiu Li,
Xuhua Ding:
Protecting RFID communications in supply chains.
ASIACCS 2007: 234-241 |
31 | EE | Yanjiang Yang,
Yingjiu Li,
Robert H. Deng:
New Paradigm of Inference Control with Trusted Computing.
DBSec 2007: 243-258 |
30 | EE | Huiping Guo,
Yingjiu Li,
Sushil Jajodia:
Chaining watermarks for detecting malicious modifications to streaming data.
Inf. Sci. 177(1): 281-298 (2007) |
29 | EE | Ling Qiu,
Yingjiu Li,
Xintao Wu:
Preserving privacy in association rule mining with bloom filters.
J. Intell. Inf. Syst. 29(3): 253-278 (2007) |
28 | EE | Lingyu Wang,
Yingjiu Li,
Sushil Jajodia,
Duminda Wijesekera:
Parity-based inference control for multi-dimensional range sum queries.
Journal of Computer Security 15(4): 417-445 (2007) |
2006 |
27 | EE | Yingjiu Li,
Robert Huijie Deng:
Publicly verifiable ownership protection for relational databases.
ASIACCS 2006: 78-89 |
26 | EE | Songtao Guo,
Xintao Wu,
Yingjiu Li:
Deriving Private Information from Perturbed Data Using IQR Based Approach.
ICDE Workshops 2006: 92 |
25 | EE | Ling Qiu,
Yingjiu Li,
Xintao Wu:
An Approach to Outsourcing Data Mining Tasks while Protecting Business Intelligence and Customer Privacy.
ICDM Workshops 2006: 551-558 |
24 | EE | Haibing Lu,
Yingjiu Li,
Xintao Wu:
Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract).
ICISS 2006: 349-352 |
23 | EE | Yingjiu Li,
Haibing Lu,
Robert H. Deng:
Practical Inference Control for Data Cubes (Extended Abstract).
IEEE Symposium on Security and Privacy 2006: 115-120 |
22 | EE | Jie Guo,
Yingjiu Li,
Robert H. Deng,
Kefei Chen:
Rights Protection for Data Cubes.
ISC 2006: 359-372 |
21 | EE | Songtao Guo,
Xintao Wu,
Yingjiu Li:
On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining.
PKDD 2006: 520-527 |
20 | EE | Haibing Lu,
Yingjiu Li,
Xintao Wu:
Disclosure Analysis for Two-Way Contingency Tables.
Privacy in Statistical Databases 2006: 57-67 |
19 | EE | Xintao Wu,
Songtao Guo,
Yingjiu Li:
Towards value disclosure analysis in modeling general databases.
SAC 2006: 617-621 |
18 | EE | Huiping Guo,
Yingjiu Li,
Anyi Liu,
Sushil Jajodia:
A fragile watermarking scheme for detecting malicious modifications of database relations.
Inf. Sci. 176(10): 1350-1378 (2006) |
17 | EE | Yingjiu Li,
Sencun Zhu,
Xiaoyang Sean Wang,
Sushil Jajodia:
Looking into the seeds of time: Discovering temporal patterns in large transaction sets.
Inf. Sci. 176(8): 1003-1031 (2006) |
2005 |
16 | EE | Xinwen Zhang,
Yingjiu Li,
Divya Nalla:
An attribute-based access matrix model.
SAC 2005: 359-363 |
15 | | Xintao Wu,
Ying Wu,
Yongge Wang,
Yingjiu Li:
Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining.
SDM 2005 |
14 | EE | Yingjiu Li,
Xinwen Zhang:
Securing credit card transactions with one-time payment scheme.
Electronic Commerce Research and Applications 4(4): 413-426 (2005) |
13 | EE | Yingjiu Li,
Vipin Swarup,
Sushil Jajodia:
Fingerprinting Relational Databases: Schemes and Specialties.
IEEE Trans. Dependable Sec. Comput. 2(1): 34-45 (2005) |
2004 |
12 | | Yingjiu Li,
Vipin Swarup,
Sushil Jajodia:
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases.
DBSec 2004: 81-94 |
11 | EE | Yingjiu Li,
Huiping Guo,
Sushil Jajodia:
Tamper detection and localization for categorical data using fragile watermarks.
Digital Rights Management Workshop 2004: 73-82 |
10 | EE | Yingjiu Li,
Xinwen Zhang:
A Security-Enhanced One-Time Payment Scheme for Credit Card.
RIDE 2004: 40-47 |
2003 |
9 | EE | Yingjiu Li,
Vipin Swarup,
Sushil Jajodia:
Constructing a virtual primary key for fingerprinting relational data.
Digital Rights Management Workshop 2003: 133-141 |
8 | EE | Lingyu Wang,
Yingjiu Li,
Duminda Wijesekera,
Sushil Jajodia:
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches.
ESORICS 2003: 100-115 |
7 | | Yingjiu Li,
Peng Ning,
Xiaoyang Sean Wang,
Sushil Jajodia:
Discovering calendar-based temporal association rules.
Data Knowl. Eng. 44(2): 193-218 (2003) |
2002 |
6 | EE | Yingjiu Li,
Lingyu Wang,
Xiaoyang Sean Wang,
Sushil Jajodia:
Auditing Interval-Based Inference.
CAiSE 2002: 553-567 |
5 | EE | Yingjiu Li,
Sencun Zhu,
Lingyu Wang,
Sushil Jajodia:
A Privacy-Enhanced Microaggregation Method.
FoIKS 2002: 148-159 |
4 | EE | Yingjiu Li,
Lingyu Wang,
Sushil Jajodia:
Preventing Interval-Based Inference by Random Data Perturbation.
Privacy Enhancing Technologies 2002: 160-170 |
3 | | Yingjiu Li,
Ningning Wu,
Xiaoyang Sean Wang,
Sushil Jajodia:
Enhancing Profiles for Anomaly Detection Using Time Granularities.
Journal of Computer Security 10(1/2): 137-158 (2002) |
2001 |
2 | EE | Yingjiu Li,
Peng Ning,
Xiaoyang Sean Wang,
Sushil Jajodia:
Discovering Calendar-based Temporal Association Rules.
TIME 2001: 111-118 |
2000 |
1 | EE | Yingjiu Li,
Xiaoyang Sean Wang,
Sushil Jajodia:
Discovering Temporal Patterns in Multiple Granularities.
TSDM 2000: 5-19 |