Yingjiu Li
Yingjiu Li
Ripple Professor, Computer and Information Science Department, University of Oregon
Dirección de correo verificada de uoregon.edu - Página principal
Citado por
Citado por
Discovering calendar-based temporal association rules
Y Li, P Ning, XS Wang, S Jajodia
Data & Knowledge Engineering 44 (2), 193-218, 2003
Fingerprinting relational databases: Schemes and specialties
Y Li, V Swarup, S Jajodia
IEEE Transactions on Dependable and Secure Computing 2 (1), 34-45, 2005
Tamper detection and localization for categorical data using fragile watermarks
Y Li, H Guo, S Jajodia
Proceedings of the 4th ACM workshop on Digital rights management, 73-82, 2004
Protecting RFID communications in supply chains
Y Li, X Ding
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Fully secure cipertext-policy hiding CP-ABE
J Lai, RH Deng, Y Li
International Conference on Information Security Practice and Experience, 24-39, 2011
A fragile watermarking scheme for detecting malicious modifications of database relations
H Guo, Y Li, A Liu, S Jajodia
Information Sciences 176 (10), 1350-1378, 2006
Permission based Android security: Issues and countermeasures
Z Fang, W Han, Y Li
Computers & Security 43, 205-218, 2014
Expressive CP-ABE with partially hidden access structures
J Lai, RH Deng, Y Li
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
Chaining watermarks for detecting malicious modifications to streaming data
H Guo, Y Li, S Jajodia
Information Sciences 177 (1), 281-298, 2007
A new framework for RFID privacy
RH Deng, Y Li, M Yung, Y Zhao
European Symposium on Research in Computer Security, 1-18, 2010
ICCDetector: ICC-based malware detection on Android
K Xu, Y Li, RH Deng
IEEE Transactions on Information Forensics and Security 11 (6), 1252-1264, 2016
Two robust remote user authentication protocols using smart cards
KH Yeh, C Su, NW Lo, Y Li, YX Hung
Journal of Systems and Software 83 (12), 2556-2565, 2010
An attribute-based access matrix model
X Zhang, Y Li, D Nalla
Proceedings of the 2005 ACM symposium on Applied computing, 359-363, 2005
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
S Cai, Y Li, T Li, RH Deng
Proceedings of the second ACM conference on Wireless network security, 51-58, 2009
RFID privacy: relation between two notions, minimal condition, and efficient construction
C Ma, Y Li, RH Deng, T Li
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Protecting business intelligence and customer privacy while outsourcing data mining tasks
L Qiu, Y Li, X Wu
Knowledge and information systems 17 (1), 99-120, 2008
Information technology diffusion with influentials, imitators, and opponents
H Cavusoglu, N Hu, Y Li, D Ma
Journal of Management Information Systems 27 (2), 305-334, 2010
Constructing a virtual primary key for fingerprinting relational data
Y Li, V Swarup, S Jajodia
Proceedings of the 3rd ACM workshop on Digital rights management, 133-141, 2003
An intrusion response decision-making model based on hierarchical task network planning
C Mu, Y Li
Expert systems with applications 37 (3), 2465-2472, 2010
Expressive search on encrypted data
J Lai, X Zhou, RH Deng, Y Li, K Chen
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20