Ting Yu
Orcid: 0000-0002-7054-5773Affiliations:
- Hamad Bin Khalifa University, Qatar Computing Research Institute, Doha, Qatar (since 2013)
- North Carolina State University, Department of Computer Science, Raleigh, NC, USA
- University of Illinois at Urbana-Champaign, IL, USA (PhD 2003)
According to our database1,
Ting Yu
authored at least 139 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on hbku.edu.qa
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Publishing Common Neighbors Histograms of Social Networks under Edge Differential Privacy.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023
DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference.
ACM Trans. Priv. Secur., 2023
TPMDP: Threshold Personalized Multi-party Differential Privacy via Optimal Gaussian Mechanism.
CoRR, 2023
2022
CoRR, 2022
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
CoRR, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference.
ACM Trans. Priv. Secur., 2020
Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users.
CoRR, 2020
Mobile Device Usage Recommendation based on User Context Inference Using Embedded Sensors.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
2019
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference.
CoRR, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
ACM Comput. Surv., 2018
A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Trans. Large Scale Data Knowl. Centered Syst., 2017
Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis.
J. Comput. Secur., 2017
Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage.
CoRR, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Differentially Private K-Skyband Query Answering Through Adaptive Spatial Decomposition.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Dynamic and Efficient Private Keyword Search over Inverted Index-Based Encrypted Data.
ACM Trans. Internet Techn., 2016
IEEE Trans. Multim., 2016
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the 2016 International Conference on Management of Data, 2016
PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data.
Proceedings of the IEEE International Conference on Web Services, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the Big Data Analytics and Knowledge Discovery, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
Proceedings of the ACM Conference on Economics and Computation, 2014
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), 2014
Proceedings of the 17th International Conference on Extending Database Technology, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
COMPARS: toward an empirical approach for comparing the resilience of reputation systems.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
2013
IEEE Trans. Knowl. Data Eng., 2013
Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
2012
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011
Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing.
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Enhancing personalized ranking quality through multidimensional modeling of inter-item competition.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures.
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
J. Comput. Sci. Technol., 2009
Int. J. Inf. Sec., 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
SIGMOD Rec., 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the Scientific and Statistical Database Management, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the Trust Management II, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the 23rd International Conference on Data Engineering, 2007
2006
ACM Trans. Database Syst., 2006
A semantics based approach to privacy languages.
Comput. Syst. Sci. Eng., 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Determining user privacy preferences by asking the right questions: an automated approach.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
An identifiability-based access control model for privacy protection in open systems.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004
Proceedings of the ISWC*04 Workshop on Trust, 2004
Proceedings of the ISWC*04 Workshop on Trust, 2004
Proceedings of the 20th International Conference on Data Engineering, 2004
2003
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.
ACM Trans. Inf. Syst. Secur., 2003
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the 19th International Conference on Data Engineering, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Proceedings of 28th International Conference on Very Large Data Bases, 2002
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, 2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002
2001
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
Proceedings of the Network and Distributed System Security Symposium, 2001
Proceedings of the CCS 2001, 2001
2000
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet.
Proceedings of the CCS 2000, 2000