Volgen
Yingjiu Li
Yingjiu Li
Ripple Professor, Computer Science Department, University of Oregon
Geverifieerd e-mailadres voor uoregon.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Discovering calendar-based temporal association rules
Y Li, P Ning, XS Wang, S Jajodia
Data & Knowledge Engineering 44 (2), 193-218, 2003
4062003
Fully secure cipertext-policy hiding CP-ABE
J Lai, RH Deng, Y Li
Information Security Practice and Experience: 7th International Conference …, 2011
2432011
Expressive CP-ABE with partially hidden access structures
J Lai, RH Deng, Y Li
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
2402012
ICCDetector: ICC-based malware detection on Android
K Xu, Y Li, RH Deng
IEEE Transactions on Information Forensics and Security 11 (6), 1252-1264, 2016
2272016
Fingerprinting relational databases: Schemes and specialties
Y Li, V Swarup, S Jajodia
IEEE Transactions on Dependable and Secure Computing 2 (1), 34-45, 2005
2132005
Permission based Android security: Issues and countermeasures
Z Fang, W Han, Y Li
Computers & Security 43, 205-218, 2014
1962014
DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks
K Xu, Y Li, RH Deng, K Chen
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 473-487, 2018
1832018
ShieldFL: Mitigating model poisoning attacks in privacy-preserving federated learning
Z Ma, J Ma, Y Miao, Y Li, RH Deng
IEEE Transactions on Information Forensics and Security 17, 1639-1654, 2022
1702022
Tamper detection and localization for categorical data using fragile watermarks
Y Li, H Guo, S Jajodia
Proceedings of the 4th ACM workshop on Digital rights management, 73-82, 2004
1672004
DroidEvolver: Self-Evolving Android Malware Detection System
K Xu, Y Li, RH Deng, K Chen, J Xu
IEEE European Symposium on Security and Privacy, 47-62, 2019
1612019
A fragile watermarking scheme for detecting malicious modifications of database relations
H Guo, Y Li, A Liu, S Jajodia
Information Sciences 176 (10), 1350-1378, 2006
1552006
Protecting RFID communications in supply chains
Y Li, X Ding
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1482007
Lightweight sharable and traceable secure mobile health system
Y Yang, X Liu, RH Deng, Y Li
IEEE Transactions on Dependable and Secure Computing 17 (1), 78-91, 2017
1292017
Server-aided revocable attribute-based encryption
H Cui, RH Deng, Y Li, B Qin
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
1262016
Chaining watermarks for detecting malicious modifications to streaming data
H Guo, Y Li, S Jajodia
Information Sciences 177 (1), 281-298, 2007
1262007
Attribute-based storage supporting secure deduplication of encrypted data in cloud
H Cui, RH Deng, Y Li, G Wu
IEEE Transactions on Big Data 5 (3), 330-342, 2017
1192017
Efficient and expressive keyword search over encrypted data in cloud
H Cui, Z Wan, RH Deng, G Wang, Y Li
IEEE Transactions on Dependable and Secure Computing 15 (3), 409-422, 2016
1102016
A new framework for RFID privacy
RH Deng, Y Li, M Yung, Y Zhao
European Symposium on Research in Computer Security, 1-18, 2010
1102010
An attribute-based access matrix model
X Zhang, Y Li, D Nalla
Proceedings of the 2005 ACM symposium on Applied computing, 359-363, 2005
1062005
Privacy leakage analysis in online social networks
Y Li, Y Li, Q Yan, RH Deng
Computers & Security 49, 239-254, 2015
1042015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20