2008 |
61 | EE | Xiaoming Liu,
Ting Yu,
Thomas Sebastian,
Peter Tu:
Boosted deformable model for human body alignment.
CVPR 2008 |
60 | EE | Ting Yu,
Ying Wu,
Nils Krahnstoever,
Peter H. Tu:
Distributed data association and filtering for multiple target tracking.
CVPR 2008 |
59 | EE | Peter Tu,
Thomas Sebastian,
Gianfranco Doretto,
Nils Krahnstoever,
Jens Rittscher,
Ting Yu:
Unified Crowd Segmentation.
ECCV (4) 2008: 691-704 |
58 | EE | Qing Zhang,
Ting Yu:
On the Modeling of Honest Players in Reputation Systems.
ICDCS Workshops 2008: 249-254 |
57 | EE | Keith Irwin,
Ting Yu,
William H. Winsborough:
Enforcing security properties in task-based systems.
SACMAT 2008: 41-50 |
56 | EE | Heshan Lin,
Xiaosong Ma,
Jiangtian Li,
Ting Yu,
Nagiza F. Samatova:
Adaptive Request Scheduling for Parallel Scientific Web Services.
SSDBM 2008: 276-294 |
55 | EE | Keith Irwin,
Ting Yu,
William H. Winsborough:
Avoiding information leakage in security-policy-aware planning.
WPES 2008: 85-94 |
54 | EE | Qing Zhang,
Ting Yu,
Peng Ning:
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks.
ACM Trans. Inf. Syst. Secur. 11(3): (2008) |
53 | EE | Graham Cormode,
Divesh Srivastava,
Ting Yu,
Qing Zhang:
Anonymizing bipartite graph data using safe groupings.
PVLDB 1(1): 833-844 (2008) |
52 | EE | Adam J. Lee,
Ting Yu:
Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007).
SIGMOD Record 37(1): 56-58 (2008) |
2007 |
51 | | Peng Ning,
Ting Yu:
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007
ACM 2007 |
50 | | Ting Yu,
Sushil Jajodia:
Secure Data Management in Decentralized Systems
Springer 2007 |
49 | EE | Ming Yang,
Ting Yu,
Ying Wu:
Game-Theoretic Multiple Target Tracking.
ICCV 2007: 1-8 |
48 | EE | Xiaoming Liu,
Ting Yu:
Gradient Feature Selection for Online Boosting.
ICCV 2007: 1-8 |
47 | EE | Qing Zhang,
Nick Koudas,
Divesh Srivastava,
Ting Yu:
Aggregate Query Answering on Anonymized Tables.
ICDE 2007: 116-125 |
46 | EE | Ting Yu,
Tony Jan,
Simeon J. Simoff,
John K. Debenham:
A Hierarchical VQSVM for Imbalanced Data Sets.
IJCNN 2007: 518-523 |
45 | EE | Ting Yu,
Simeon J. Simoff,
Donald Stokes:
Incorporating Prior Domain Knowledge into a Kernel Based Feature Selection Algorithm.
PAKDD 2007: 1064-1071 |
44 | EE | Qihua Wang,
Ting Yu,
Ninghui Li,
Jorge Lobo,
Elisa Bertino,
Keith Irwin,
Ji-Won Byun:
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
VLDB 2007: 555-566 |
43 | EE | Yuming Ou,
Longbing Cao,
Ting Yu,
Chengqi Zhang:
Detecting Turning Points of Trading Price and Return Volatility for Market Surveillance Agents.
Web Intelligence/IAT Workshops 2007: 491-494 |
42 | EE | Adam J. Lee,
Kent E. Seamons,
Marianne Winslett,
Ting Yu:
Automated Trust Negotiation in Open Systems.
Secure Data Management in Decentralized Systems 2007: 217-258 |
41 | EE | Sushil Jajodia,
Ting Yu:
Basic Security Concepts.
Secure Data Management in Decentralized Systems 2007: 3-20 |
40 | EE | Annie I. Antón,
Elisa Bertino,
Ninghui Li,
Ting Yu:
A roadmap for comprehensive online privacy policy management.
Commun. ACM 50(7): 109-116 (2007) |
2006 |
39 | EE | Keith Irwin,
Ting Yu,
William H. Winsborough:
On the modeling and analysis of obligations.
ACM Conference on Computer and Communications Security 2006: 134-143 |
38 | EE | Zhimin Fan,
Ming Yang,
Ying Wu,
Gang Hua,
Ting Yu:
Efficient Optimal Kernel Placement for Reliable Visual Tracking.
CVPR (1) 2006: 658-665 |
37 | EE | Ting Yu,
Ying Wu:
Differential Tracking based on Spatial-Appearance Model (SAM).
CVPR (1) 2006: 720-727 |
36 | EE | Evan Martin,
Tao Xie,
Ting Yu:
Defining and Measuring Policy Coverage in Testing Access Control Policies.
ICICS 2006: 139-158 |
35 | EE | Ting Yu,
John K. Debenham,
Tony Jan,
Simeon J. Simoff:
Combine Vector Quantization and Support Vector Machine for Imbalanced Datasets.
IFIP AI 2006: 81-88 |
34 | EE | Ting Yu,
Tony Jan,
John K. Debenham,
Simeon J. Simoff:
Classify Unexpected News Impacts to Stock Price by Incorporating Time Series Analysis into Support Vector Machine.
IJCNN 2006: 2993-2998 |
33 | EE | Sudipto Guha,
H. V. Jagadish,
Nick Koudas,
Divesh Srivastava,
Ting Yu:
Integrating XML data sources using approximate joins.
ACM Trans. Database Syst. 31(1): 161-207 (2006) |
32 | EE | Ying Wu,
Ting Yu:
A Field Model for Human Detection and Tracking.
IEEE Trans. Pattern Anal. Mach. Intell. 28(5): 753-765 (2006) |
2005 |
31 | EE | Keith Irwin,
Ting Yu:
Preventing attribute information leakage in automated trust negotiation.
ACM Conference on Computer and Communications Security 2005: 36-45 |
30 | EE | Ying Wu,
Ting Yu,
Gang Hua:
A Statistical Field Model for Pedestrian Detection.
CVPR (1) 2005: 1023-1030 |
29 | EE | Ting Yu,
Ying Wu:
Decentralized Multiple Target Tracking Using Netted Collaborative Autonomous Trackers.
CVPR (1) 2005: 939-946 |
28 | EE | Keith Irwin,
Ting Yu:
Determining user privacy preferences by asking the right questions: an automated approach.
WPES 2005: 47-50 |
2004 |
27 | EE | Ting Yu,
Ying Wu:
Collaborative Tracking of Multiple Targets.
CVPR (1) 2004: 834-841 |
26 | EE | Nick Koudas,
Michael Rabinovich,
Divesh Srivastava,
Ting Yu:
Routing XML Queries.
ICDE 2004: 844 |
25 | EE | Qing Zhang,
Ting Yu:
A Classification Scheme for Trust Functions in Reputation-Based Trust Management.
ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004 |
24 | EE | Travis Leithead,
Wolfgang Nejdl,
Daniel Olmedilla,
Kent E. Seamons,
Marianne Winslett,
Ting Yu,
Charles C. Zhang:
How to Exploit Ontologies for Trust Negotiation.
ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004 |
23 | EE | Ting Yu,
Ninghui Li,
Annie I. Antón:
A formal semantics for P3P.
SWS 2004: 1-8 |
22 | EE | Keith Irwin,
Ting Yu:
An identifiability-based access control model for privacy protection in open systems.
WPES 2004: 43 |
21 | EE | Ting Yu,
Divesh Srivastava,
Laks V. S. Lakshmanan,
H. V. Jagadish:
A compressed accessibility map for XML.
ACM Trans. Database Syst. 29(2): 363-402 (2004) |
2003 |
20 | EE | Ying Wu,
Gang Hua,
Ting Yu:
Switching Observation Models for Contour Tracking in Clutter.
CVPR (1) 2003: 295-304 |
19 | EE | Ying Wu,
Ting Yu,
Gang Hua:
Tracking Appearances with Occlusions.
CVPR (1) 2003: 789-795 |
18 | EE | Kent E. Seamons,
Marianne Winslett,
Ting Yu,
Thomas Chan,
Evan Child,
Michael Halcrow,
Adam Hess,
Jason E. Holt,
Jared Jacobson,
Ryan Jarvis,
Bryan Smith,
Tore Sundelin,
Lina Yu:
Trust Negotiation in Dynamic Coalitions.
DISCEX (2) 2003: 240-245 |
17 | EE | Ying Wu,
Gang Hua,
Ting Yu:
Tracking Articulated Body by Dynamic Markov Network.
ICCV 2003: 1094-1101 |
16 | EE | Sudipto Guha,
Nick Koudas,
Divesh Srivastava,
Ting Yu:
Index-Based Approximate XML Joins.
ICDE 2003: 708-710 |
15 | EE | Ting Yu,
Marianne Winslett:
A Unified Scheme for Resource Protection in Automated Trust Negotiation.
IEEE Symposium on Security and Privacy 2003: 110-122 |
14 | EE | Ting Yu,
Marianne Winslett:
Policy migration for sensitive credentials in trust negotiation.
WPES 2003: 9-20 |
13 | EE | Ting Yu,
Marianne Winslett,
Kent E. Seamons:
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.
ACM Trans. Inf. Syst. Secur. 6(1): 1-42 (2003) |
12 | EE | Ting Yu,
Marianne Winslett,
Jason E. Holt:
Two Security Symposia.
IEEE Security & Privacy 1(4): 50-52 (2003) |
11 | EE | Marianne Winslett,
Xiaosong Ma,
Ting Yu:
Two-Body Job Searches.
SIGMOD Record 32(2): 107-112 (2003) |
2002 |
10 | EE | Kent E. Seamons,
Marianne Winslett,
Ting Yu,
Bryan Smith,
Evan Child,
Jared Jacobson,
Hyrum Mills,
Lina Yu:
Requirements for Policy Languages for Trust Negotiation.
POLICY 2002: 68-79 |
9 | EE | Kent E. Seamons,
Marianne Winslett,
Ting Yu,
Lina Yu,
Ryan Jarvis:
Protecting Privacy during On-Line Trust Negotiation.
Privacy Enhancing Technologies 2002: 129-143 |
8 | EE | Sudipto Guha,
H. V. Jagadish,
Nick Koudas,
Divesh Srivastava,
Ting Yu:
Approximate XML joins.
SIGMOD Conference 2002: 287-298 |
7 | EE | Ting Yu,
Divesh Srivastava,
Laks V. S. Lakshmanan,
H. V. Jagadish:
Compressed Accessibility Map: Efficient Access Control for XML.
VLDB 2002: 478-489 |
6 | EE | Marianne Winslett,
Ting Yu,
Kent E. Seamons,
Adam Hess,
Jared Jacobson,
Ryan Jarvis,
Bryan Smith,
Lina Yu:
Negotiating Trust on the Web.
IEEE Internet Computing 6(6): 30-37 (2002) |
2001 |
5 | EE | Ting Yu,
Marianne Winslett,
Kent E. Seamons:
Interoperable strategies in automated trust negotiation.
ACM Conference on Computer and Communications Security 2001: 146-155 |
4 | EE | Kent E. Seamons,
Marianne Winslett,
Ting Yu:
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
NDSS 2001 |
2000 |
3 | EE | Ting Yu,
Xiaosong Ma,
Marianne Winslett:
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet.
ACM Conference on Computer and Communications Security 2000: 210-219 |
1997 |
2 | EE | Ting Yu,
Owen Kaser:
A Note on "On the Conversion of Indirect to Direct Recursion".
ACM Trans. Program. Lang. Syst. 19(6): 1085-1087 (1997) |
1995 |
1 | EE | Benjamin W. Wah,
Arthur Ieumwananonthachai,
Shu Yao,
Ting Yu:
Statistical generalization: theory and applications.
ICCD 1995: 4- |