Yingjiu Li
TitleCited byYear
Discovering calendar-based temporal association rules
Y Li, P Ning, XS Wang, S Jajodia
Data & Knowledge Engineering 44 (2), 193-218, 2003
3522003
Fingerprinting relational databases: Schemes and specialties
Y Li, V Swarup, S Jajodia
IEEE Transactions on Dependable and Secure Computing 2 (1), 34-45, 2005
1692005
Protecting RFID communications in supply chains
Y Li, X Ding
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1292007
Tamper detection and localization for categorical data using fragile watermarks
Y Li, H Guo, S Jajodia
Proceedings of the 4th ACM workshop on Digital rights management, 73-82, 2004
1282004
A fragile watermarking scheme for detecting malicious modifications of database relations
H Guo, Y Li, A Liu, S Jajodia
Information Sciences 176 (10), 1350-1378, 2006
1222006
Fully secure cipertext-policy hiding CP-ABE
J Lai, RH Deng, Y Li
International Conference on Information Security Practice and Experience, 24-39, 2011
1172011
Permission based Android security: Issues and countermeasures
Z Fang, W Han, Y Li
Computers & Security 43, 205-218, 2014
1122014
Expressive CP-ABE with partially hidden access structures
J Lai, RH Deng, Y Li
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
982012
A new framework for RFID privacy
RH Deng, Y Li, M Yung, Y Zhao
European Symposium on Research in Computer Security, 1-18, 2010
902010
Chaining watermarks for detecting malicious modifications to streaming data
H Guo, Y Li, S Jajodia
Information Sciences 177 (1), 281-298, 2007
882007
Two robust remote user authentication protocols using smart cards
KH Yeh, C Su, NW Lo, Y Li, YX Hung
Journal of Systems and Software 83 (12), 2556-2565, 2010
772010
An attribute-based access matrix model
X Zhang, Y Li, D Nalla
Proceedings of the 2005 ACM symposium on Applied computing, 359-363, 2005
762005
ICCDetector: ICC-based malware detection on Android
K Xu, Y Li, RH Deng
IEEE Transactions on Information Forensics and Security 11 (6), 1252-1264, 2016
752016
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
S Cai, Y Li, T Li, RH Deng
Proceedings of the second ACM conference on Wireless network security, 51-58, 2009
752009
RFID privacy: relation between two notions, minimal condition, and efficient construction
C Ma, Y Li, RH Deng, T Li
Proceedings of the 16th ACM conference on Computer and communications …, 2009
702009
Information technology diffusion with influentials, imitators, and opponents
H Cavusoglu, N Hu, Y Li, D Ma
Journal of Management Information Systems 27 (2), 305-334, 2010
692010
Protecting business intelligence and customer privacy while outsourcing data mining tasks
L Qiu, Y Li, X Wu
Knowledge and information systems 17 (1), 99-120, 2008
672008
Constructing a virtual primary key for fingerprinting relational data
Y Li, V Swarup, S Jajodia
Proceedings of the 3rd ACM workshop on Digital rights management, 133-141, 2003
662003
An intrusion response decision-making model based on hierarchical task network planning
C Mu, Y Li
Expert systems with applications 37 (3), 2465-2472, 2010
622010
Designing leakage-resilient password entry on touchscreen mobile devices
Q Yan, J Han, Y Li, J Zhou, RH Deng
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
552013
The system can't perform the operation now. Try again later.
Articles 1–20