Yingjiu Li
Yingjiu Li
Ripple Professor, Computer and Information Science Department, University of Oregon
Dirección de correo verificada de uoregon.edu - Página principal
Título
Citado por
Citado por
Año
Discovering calendar-based temporal association rules
Y Li, P Ning, XS Wang, S Jajodia
Data & Knowledge Engineering 44 (2), 193-218, 2003
3552003
Fingerprinting relational databases: Schemes and specialties
Y Li, V Swarup, S Jajodia
IEEE Transactions on Dependable and Secure Computing 2 (1), 34-45, 2005
1712005
Tamper detection and localization for categorical data using fragile watermarks
Y Li, H Guo, S Jajodia
Proceedings of the 4th ACM workshop on Digital rights management, 73-82, 2004
1322004
Protecting RFID communications in supply chains
Y Li, X Ding
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1312007
Fully secure cipertext-policy hiding CP-ABE
J Lai, RH Deng, Y Li
International Conference on Information Security Practice and Experience, 24-39, 2011
1262011
A fragile watermarking scheme for detecting malicious modifications of database relations
H Guo, Y Li, A Liu, S Jajodia
Information Sciences 176 (10), 1350-1378, 2006
1252006
Permission based Android security: Issues and countermeasures
Z Fang, W Han, Y Li
Computers & Security 43, 205-218, 2014
1202014
Expressive CP-ABE with partially hidden access structures
J Lai, RH Deng, Y Li
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
1092012
Chaining watermarks for detecting malicious modifications to streaming data
H Guo, Y Li, S Jajodia
Information Sciences 177 (1), 281-298, 2007
952007
A new framework for RFID privacy
RH Deng, Y Li, M Yung, Y Zhao
European Symposium on Research in Computer Security, 1-18, 2010
912010
ICCDetector: ICC-based malware detection on Android
K Xu, Y Li, RH Deng
IEEE Transactions on Information Forensics and Security 11 (6), 1252-1264, 2016
882016
Two robust remote user authentication protocols using smart cards
KH Yeh, C Su, NW Lo, Y Li, YX Hung
Journal of Systems and Software 83 (12), 2556-2565, 2010
792010
An attribute-based access matrix model
X Zhang, Y Li, D Nalla
Proceedings of the 2005 ACM symposium on Applied computing, 359-363, 2005
772005
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
S Cai, Y Li, T Li, RH Deng
Proceedings of the second ACM conference on Wireless network security, 51-58, 2009
752009
RFID privacy: relation between two notions, minimal condition, and efficient construction
C Ma, Y Li, RH Deng, T Li
Proceedings of the 16th ACM conference on Computer and communications …, 2009
712009
Protecting business intelligence and customer privacy while outsourcing data mining tasks
L Qiu, Y Li, X Wu
Knowledge and information systems 17 (1), 99-120, 2008
702008
Information technology diffusion with influentials, imitators, and opponents
H Cavusoglu, N Hu, Y Li, D Ma
Journal of Management Information Systems 27 (2), 305-334, 2010
692010
Constructing a virtual primary key for fingerprinting relational data
Y Li, V Swarup, S Jajodia
Proceedings of the 3rd ACM workshop on Digital rights management, 133-141, 2003
672003
An intrusion response decision-making model based on hierarchical task network planning
C Mu, Y Li
Expert systems with applications 37 (3), 2465-2472, 2010
652010
Expressive search on encrypted data
J Lai, X Zhou, RH Deng, Y Li, K Chen
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
612013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20