Search the dblp DataBase
Yingjiu Li :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yingjiu Li , Lingyu Wang , Xiaoyang Sean Wang , Sushil Jajodia Auditing Interval-Based Inference. [Citation Graph (0, 0)][DBLP ] CAiSE, 2002, pp:553-567 [Conf ] Yingjiu Li , Robert Huijie Deng Publicly verifiable ownership protection for relational databases. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:78-89 [Conf ] Yingjiu Li , Xuhua Ding Protecting RFID communications in supply chains. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:234-241 [Conf ] Yingjiu Li , Vipin Swarup , Sushil Jajodia Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:81-94 [Conf ] Yingjiu Li , Huiping Guo , Sushil Jajodia Tamper detection and localization for categorical data using fragile watermarks. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2004, pp:73-82 [Conf ] Yingjiu Li , Vipin Swarup , Sushil Jajodia Constructing a virtual primary key for fingerprinting relational data. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:133-141 [Conf ] Lingyu Wang , Yingjiu Li , Duminda Wijesekera , Sushil Jajodia Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. [Citation Graph (0, 0)][DBLP ] ESORICS, 2003, pp:100-115 [Conf ] Yingjiu Li , Sencun Zhu , Lingyu Wang , Sushil Jajodia A Privacy-Enhanced Microaggregation Method. [Citation Graph (0, 0)][DBLP ] FoIKS, 2002, pp:148-159 [Conf ] Songtao Guo , Xintao Wu , Yingjiu Li Deriving Private Information from Perturbed Data Using IQR Based Approach. [Citation Graph (0, 0)][DBLP ] ICDE Workshops, 2006, pp:92- [Conf ] Ling Qiu , Yingjiu Li , Xintao Wu An Approach to Outsourcing Data Mining Tasks while Protecting Business Intelligence and Customer Privacy. [Citation Graph (0, 0)][DBLP ] ICDM Workshops, 2006, pp:551-558 [Conf ] Haibing Lu , Yingjiu Li , Xintao Wu Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ICISS, 2006, pp:349-352 [Conf ] Jie Guo , Yingjiu Li , Robert H. Deng , Kefei Chen Rights Protection for Data Cubes. [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:359-372 [Conf ] Yingjiu Li , Lingyu Wang , Sushil Jajodia Preventing Interval-Based Inference by Random Data Perturbation. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:160-170 [Conf ] Songtao Guo , Xintao Wu , Yingjiu Li On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP ] PKDD, 2006, pp:520-527 [Conf ] Haibing Lu , Yingjiu Li , Xintao Wu Disclosure Analysis for Two-Way Contingency Tables. [Citation Graph (0, 0)][DBLP ] Privacy in Statistical Databases, 2006, pp:57-67 [Conf ] Yingjiu Li , Xinwen Zhang A Security-Enhanced One-Time Payment Scheme for Credit Card. [Citation Graph (0, 0)][DBLP ] RIDE, 2004, pp:40-47 [Conf ] Xintao Wu , Songtao Guo , Yingjiu Li Towards value disclosure analysis in modeling general databases. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:617-621 [Conf ] Xinwen Zhang , Yingjiu Li , Divya Nalla An attribute-based access matrix model. [Citation Graph (0, 0)][DBLP ] SAC, 2005, pp:359-363 [Conf ] Xintao Wu , Ying Wu , Yongge Wang , Yingjiu Li Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining. [Citation Graph (0, 0)][DBLP ] SDM, 2005, pp:- [Conf ] Yingjiu Li , Haibing Lu , Robert H. Deng Practical Inference Control for Data Cubes (Extended Abstract). [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:115-120 [Conf ] Yingjiu Li , Peng Ning , Xiaoyang Sean Wang , Sushil Jajodia Discovering Calendar-based Temporal Association Rules. [Citation Graph (0, 0)][DBLP ] TIME, 2001, pp:111-118 [Conf ] Yingjiu Li , Xiaoyang Sean Wang , Sushil Jajodia Discovering Temporal Patterns in Multiple Granularities. [Citation Graph (0, 0)][DBLP ] TSDM, 2000, pp:5-19 [Conf ] Yingjiu Li , Peng Ning , Xiaoyang Sean Wang , Sushil Jajodia Discovering calendar-based temporal association rules. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2003, v:44, n:2, pp:193-218 [Journal ] Yingjiu Li , Xinwen Zhang Securing credit card transactions with one-time payment scheme. [Citation Graph (0, 0)][DBLP ] Electronic Commerce Research and Applications, 2005, v:4, n:4, pp:413-426 [Journal ] Huiping Guo , Yingjiu Li , Anyi Liu , Sushil Jajodia A fragile watermarking scheme for detecting malicious modifications of database relations. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2006, v:176, n:10, pp:1350-1378 [Journal ] Yingjiu Li , Sencun Zhu , Xiaoyang Sean Wang , Sushil Jajodia Looking into the seeds of time: Discovering temporal patterns in large transaction sets. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2006, v:176, n:8, pp:1003-1031 [Journal ] Huiping Guo , Yingjiu Li , Sushil Jajodia Chaining watermarks for detecting malicious modifications to streaming data. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:1, pp:281-298 [Journal ] Yingjiu Li , Ningning Wu , Xiaoyang Sean Wang , Sushil Jajodia Enhancing Profiles for Anomaly Detection Using Time Granularities. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2002, v:10, n:1/2, pp:137-158 [Journal ] Yingjiu Li , Vipin Swarup , Sushil Jajodia Fingerprinting Relational Databases: Schemes and Specialties. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:1, pp:34-45 [Journal ] Yanjiang Yang , Yingjiu Li , Robert H. Deng New Paradigm of Inference Control with Trusted Computing. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:243-258 [Conf ] Revisiting Unpredictability-Based RFID Privacy Models. [Citation Graph (, )][DBLP ] An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification. [Citation Graph (, )][DBLP ] RFID privacy: relation between two notions, minimal condition, and efficient construction. [Citation Graph (, )][DBLP ] A Security and Performance Evaluation of Hash-Based RFID Protocols. [Citation Graph (, )][DBLP ] Empirical Analysis of Certificate Revocation Lists. [Citation Graph (, )][DBLP ] An efficient online auditing approach to limit private data disclosure. [Citation Graph (, )][DBLP ] Disclosure Analysis and Control in Statistical Databases. [Citation Graph (, )][DBLP ] A New Framework for RFID Privacy. [Citation Graph (, )][DBLP ] Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. [Citation Graph (, )][DBLP ] On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. [Citation Graph (, )][DBLP ] A Robust Damage Assessment Model for Corrupted Database Systems. [Citation Graph (, )][DBLP ] Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. [Citation Graph (, )][DBLP ] Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data. [Citation Graph (, )][DBLP ] Self-enforcing Private Inference Control. [Citation Graph (, )][DBLP ] Attacks and improvements to an RIFD mutual authentication protocol and its extensions. [Citation Graph (, )][DBLP ] Vulnerability analysis of RFID protocols for tag ownership transfer. [Citation Graph (, )][DBLP ] Efficient discrete logarithm based multi-signature scheme in the plain public key model. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.008secs