dblp.uni-trier.dewww.uni-trier.de

Yingjiu Li

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
41EEHaibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaideep Vaidya: An efficient online auditing approach to limit private data disclosure. EDBT 2009: 636-647
40EEShaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng: Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. ISPEC 2009: 372-383
39EEShaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng: Attacks and improvements to an RIFD mutual authentication protocol and its extensions. WISEC 2009: 51-58
2008
38EEDaryl Walleck, Yingjiu Li, Shouhuai Xu: Empirical Analysis of Certificate Revocation Lists. DBSec 2008: 159-174
37EEYingjiu Li, Haibing Lu: Disclosure Analysis and Control in Statistical Databases. ESORICS 2008: 146-160
36EETong-Lee Lim, Tieyan Li, Yingjiu Li: A Security and Performance Evaluation of Hash-Based RFID Protocols. Inscrypt 2008: 406-424
35EEHaibing Lu, Yingjiu Li: Practical Inference Control for Data Cubes. IEEE Trans. Dependable Sec. Comput. 5(2): 87-98 (2008)
34EELing Qiu, Yingjiu Li, Xintao Wu: Protecting business intelligence and customer privacy while outsourcing data mining tasks. Knowl. Inf. Syst. 17(1): 99-120 (2008)
33EESongtao Guo, Xintao Wu, Yingjiu Li: Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining. Knowl. Inf. Syst. 17(2): 217-240 (2008)
2007
32EEYingjiu Li, Xuhua Ding: Protecting RFID communications in supply chains. ASIACCS 2007: 234-241
31EEYanjiang Yang, Yingjiu Li, Robert H. Deng: New Paradigm of Inference Control with Trusted Computing. DBSec 2007: 243-258
30EEHuiping Guo, Yingjiu Li, Sushil Jajodia: Chaining watermarks for detecting malicious modifications to streaming data. Inf. Sci. 177(1): 281-298 (2007)
29EELing Qiu, Yingjiu Li, Xintao Wu: Preserving privacy in association rule mining with bloom filters. J. Intell. Inf. Syst. 29(3): 253-278 (2007)
28EELingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007)
2006
27EEYingjiu Li, Robert Huijie Deng: Publicly verifiable ownership protection for relational databases. ASIACCS 2006: 78-89
26EESongtao Guo, Xintao Wu, Yingjiu Li: Deriving Private Information from Perturbed Data Using IQR Based Approach. ICDE Workshops 2006: 92
25EELing Qiu, Yingjiu Li, Xintao Wu: An Approach to Outsourcing Data Mining Tasks while Protecting Business Intelligence and Customer Privacy. ICDM Workshops 2006: 551-558
24EEHaibing Lu, Yingjiu Li, Xintao Wu: Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract). ICISS 2006: 349-352
23EEYingjiu Li, Haibing Lu, Robert H. Deng: Practical Inference Control for Data Cubes (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 115-120
22EEJie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen: Rights Protection for Data Cubes. ISC 2006: 359-372
21EESongtao Guo, Xintao Wu, Yingjiu Li: On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining. PKDD 2006: 520-527
20EEHaibing Lu, Yingjiu Li, Xintao Wu: Disclosure Analysis for Two-Way Contingency Tables. Privacy in Statistical Databases 2006: 57-67
19EEXintao Wu, Songtao Guo, Yingjiu Li: Towards value disclosure analysis in modeling general databases. SAC 2006: 617-621
18EEHuiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176(10): 1350-1378 (2006)
17EEYingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia: Looking into the seeds of time: Discovering temporal patterns in large transaction sets. Inf. Sci. 176(8): 1003-1031 (2006)
2005
16EEXinwen Zhang, Yingjiu Li, Divya Nalla: An attribute-based access matrix model. SAC 2005: 359-363
15 Xintao Wu, Ying Wu, Yongge Wang, Yingjiu Li: Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining. SDM 2005
14EEYingjiu Li, Xinwen Zhang: Securing credit card transactions with one-time payment scheme. Electronic Commerce Research and Applications 4(4): 413-426 (2005)
13EEYingjiu Li, Vipin Swarup, Sushil Jajodia: Fingerprinting Relational Databases: Schemes and Specialties. IEEE Trans. Dependable Sec. Comput. 2(1): 34-45 (2005)
2004
12 Yingjiu Li, Vipin Swarup, Sushil Jajodia: Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. DBSec 2004: 81-94
11EEYingjiu Li, Huiping Guo, Sushil Jajodia: Tamper detection and localization for categorical data using fragile watermarks. Digital Rights Management Workshop 2004: 73-82
10EEYingjiu Li, Xinwen Zhang: A Security-Enhanced One-Time Payment Scheme for Credit Card. RIDE 2004: 40-47
2003
9EEYingjiu Li, Vipin Swarup, Sushil Jajodia: Constructing a virtual primary key for fingerprinting relational data. Digital Rights Management Workshop 2003: 133-141
8EELingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115
7 Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering calendar-based temporal association rules. Data Knowl. Eng. 44(2): 193-218 (2003)
2002
6EEYingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Auditing Interval-Based Inference. CAiSE 2002: 553-567
5EEYingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159
4EEYingjiu Li, Lingyu Wang, Sushil Jajodia: Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170
3 Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia: Enhancing Profiles for Anomaly Detection Using Time Granularities. Journal of Computer Security 10(1/2): 137-158 (2002)
2001
2EEYingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Calendar-based Temporal Association Rules. TIME 2001: 111-118
2000
1EEYingjiu Li, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Temporal Patterns in Multiple Granularities. TSDM 2000: 5-19

Coauthor Index

1Vijayalakshmi Atluri (Vijay Atluri) [41]
2Shaoying Cai [39] [40]
3Kefei Chen [22]
4Robert H. Deng (Robert Huijie Deng) [22] [23] [27] [31] [39] [40]
5Xuhua Ding [32]
6Huiping Guo [11] [18] [30]
7Jie Guo [22]
8Songtao Guo [19] [21] [26] [33]
9Sushil Jajodia [1] [2] [3] [4] [5] [6] [7] [8] [9] [11] [12] [13] [17] [18] [28] [30]
10Tieyan Li [36] [39] [40]
11Tong-Lee Lim [36]
12Anyi Liu [18]
13Haibing Lu [20] [23] [24] [35] [37] [41]
14Divya Nalla [16]
15Peng Ning [2] [7]
16Ling Qiu [25] [29] [34]
17Vipin Swarup [9] [12] [13]
18Jaideep Vaidya [41]
19Daryl Walleck [38]
20Lingyu Wang [4] [5] [6] [8] [28]
21Xiaoyang Sean Wang [1] [2] [3] [6] [7] [17]
22Yongge Wang [15]
23Duminda Wijesekera [8] [28]
24Ningning Wu [3]
25Xintao Wu [15] [19] [20] [21] [24] [25] [26] [29] [33] [34]
26Ying Wu [15]
27Shouhuai Xu [38]
28Yanjiang Yang [31]
29Xinwen Zhang [10] [14] [16]
30Sencun Zhu [5] [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)