The SCEAS System
Navigation Menu

Search the dblp DataBase


Yingjiu Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia
    Auditing Interval-Based Inference. [Citation Graph (0, 0)][DBLP]
    CAiSE, 2002, pp:553-567 [Conf]
  2. Yingjiu Li, Robert Huijie Deng
    Publicly verifiable ownership protection for relational databases. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:78-89 [Conf]
  3. Yingjiu Li, Xuhua Ding
    Protecting RFID communications in supply chains. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:234-241 [Conf]
  4. Yingjiu Li, Vipin Swarup, Sushil Jajodia
    Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:81-94 [Conf]
  5. Yingjiu Li, Huiping Guo, Sushil Jajodia
    Tamper detection and localization for categorical data using fragile watermarks. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2004, pp:73-82 [Conf]
  6. Yingjiu Li, Vipin Swarup, Sushil Jajodia
    Constructing a virtual primary key for fingerprinting relational data. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:133-141 [Conf]
  7. Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia
    Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:100-115 [Conf]
  8. Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia
    A Privacy-Enhanced Microaggregation Method. [Citation Graph (0, 0)][DBLP]
    FoIKS, 2002, pp:148-159 [Conf]
  9. Songtao Guo, Xintao Wu, Yingjiu Li
    Deriving Private Information from Perturbed Data Using IQR Based Approach. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2006, pp:92- [Conf]
  10. Ling Qiu, Yingjiu Li, Xintao Wu
    An Approach to Outsourcing Data Mining Tasks while Protecting Business Intelligence and Customer Privacy. [Citation Graph (0, 0)][DBLP]
    ICDM Workshops, 2006, pp:551-558 [Conf]
  11. Haibing Lu, Yingjiu Li, Xintao Wu
    Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:349-352 [Conf]
  12. Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen
    Rights Protection for Data Cubes. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:359-372 [Conf]
  13. Yingjiu Li, Lingyu Wang, Sushil Jajodia
    Preventing Interval-Based Inference by Random Data Perturbation. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:160-170 [Conf]
  14. Songtao Guo, Xintao Wu, Yingjiu Li
    On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP]
    PKDD, 2006, pp:520-527 [Conf]
  15. Haibing Lu, Yingjiu Li, Xintao Wu
    Disclosure Analysis for Two-Way Contingency Tables. [Citation Graph (0, 0)][DBLP]
    Privacy in Statistical Databases, 2006, pp:57-67 [Conf]
  16. Yingjiu Li, Xinwen Zhang
    A Security-Enhanced One-Time Payment Scheme for Credit Card. [Citation Graph (0, 0)][DBLP]
    RIDE, 2004, pp:40-47 [Conf]
  17. Xintao Wu, Songtao Guo, Yingjiu Li
    Towards value disclosure analysis in modeling general databases. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:617-621 [Conf]
  18. Xinwen Zhang, Yingjiu Li, Divya Nalla
    An attribute-based access matrix model. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:359-363 [Conf]
  19. Xintao Wu, Ying Wu, Yongge Wang, Yingjiu Li
    Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining. [Citation Graph (0, 0)][DBLP]
    SDM, 2005, pp:- [Conf]
  20. Yingjiu Li, Haibing Lu, Robert H. Deng
    Practical Inference Control for Data Cubes (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:115-120 [Conf]
  21. Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia
    Discovering Calendar-based Temporal Association Rules. [Citation Graph (0, 0)][DBLP]
    TIME, 2001, pp:111-118 [Conf]
  22. Yingjiu Li, Xiaoyang Sean Wang, Sushil Jajodia
    Discovering Temporal Patterns in Multiple Granularities. [Citation Graph (0, 0)][DBLP]
    TSDM, 2000, pp:5-19 [Conf]
  23. Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia
    Discovering calendar-based temporal association rules. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2003, v:44, n:2, pp:193-218 [Journal]
  24. Yingjiu Li, Xinwen Zhang
    Securing credit card transactions with one-time payment scheme. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research and Applications, 2005, v:4, n:4, pp:413-426 [Journal]
  25. Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia
    A fragile watermarking scheme for detecting malicious modifications of database relations. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:10, pp:1350-1378 [Journal]
  26. Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia
    Looking into the seeds of time: Discovering temporal patterns in large transaction sets. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:8, pp:1003-1031 [Journal]
  27. Huiping Guo, Yingjiu Li, Sushil Jajodia
    Chaining watermarks for detecting malicious modifications to streaming data. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:1, pp:281-298 [Journal]
  28. Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia
    Enhancing Profiles for Anomaly Detection Using Time Granularities. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:1/2, pp:137-158 [Journal]
  29. Yingjiu Li, Vipin Swarup, Sushil Jajodia
    Fingerprinting Relational Databases: Schemes and Specialties. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:1, pp:34-45 [Journal]
  30. Yanjiang Yang, Yingjiu Li, Robert H. Deng
    New Paradigm of Inference Control with Trusted Computing. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:243-258 [Conf]

  31. Revisiting Unpredictability-Based RFID Privacy Models. [Citation Graph (, )][DBLP]

  32. An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification. [Citation Graph (, )][DBLP]

  33. RFID privacy: relation between two notions, minimal condition, and efficient construction. [Citation Graph (, )][DBLP]

  34. A Security and Performance Evaluation of Hash-Based RFID Protocols. [Citation Graph (, )][DBLP]

  35. Empirical Analysis of Certificate Revocation Lists. [Citation Graph (, )][DBLP]

  36. An efficient online auditing approach to limit private data disclosure. [Citation Graph (, )][DBLP]

  37. Disclosure Analysis and Control in Statistical Databases. [Citation Graph (, )][DBLP]

  38. A New Framework for RFID Privacy. [Citation Graph (, )][DBLP]

  39. Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. [Citation Graph (, )][DBLP]

  40. On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. [Citation Graph (, )][DBLP]

  41. A Robust Damage Assessment Model for Corrupted Database Systems. [Citation Graph (, )][DBLP]

  42. Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. [Citation Graph (, )][DBLP]

  43. Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data. [Citation Graph (, )][DBLP]

  44. Self-enforcing Private Inference Control. [Citation Graph (, )][DBLP]

  45. Attacks and improvements to an RIFD mutual authentication protocol and its extensions. [Citation Graph (, )][DBLP]

  46. Vulnerability analysis of RFID protocols for tag ownership transfer. [Citation Graph (, )][DBLP]

  47. Efficient discrete logarithm based multi-signature scheme in the plain public key model. [Citation Graph (, )][DBLP]

Search in 0.150secs, Finished in 0.153secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002