Yingjiu Li
Orcid: 0000-0001-8256-6988
According to our database1,
Yingjiu Li
authored at least 209 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures.
IEEE Trans. Dependable Secur. Comput., 2024
J. Syst. Archit., 2024
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications.
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Reliab., December, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Inf. Forensics Secur., 2023
ACB-Vote: Efficient, Flexible, and Privacy- Preserving Blockchain-Based Score Voting With Anonymously Convertible Ballots.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability.
J. Parallel Distributed Comput., 2023
2022
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2022
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2022
Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud.
IEEE Trans. Dependable Secur. Comput., 2022
SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things.
IEEE Trans. Cloud Comput., 2022
Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification.
Comput. J., 2022
Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
2021
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices.
IEEE Trans. Inf. Forensics Secur., 2021
J. Comput. Secur., 2021
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation.
ACM Comput. Surv., 2021
HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks.
CoRR, 2021
Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Theor. Comput. Sci., 2020
J. Comput. Secur., 2020
Inf. Sci., 2020
IEEE Internet Things J., 2020
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Big Data, 2019
Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log.
EAI Endorsed Trans. Security Safety, 2019
Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin.
J. Comput. Secur., 2019
J. Comput. Secur., 2019
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks.
Comput. Secur., 2019
Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy.
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the IEEE International Conference on RFID, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices.
IEEE Trans. Ind. Informatics, 2018
Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths.
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Future Gener. Comput. Syst., 2018
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch.
Cybersecur., 2018
Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience.
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Information Security Practice and Experience, 2018
DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IEEE Trans. Serv. Comput., 2017
IEEE Trans. Dependable Secur. Comput., 2017
IEEE Trans. Dependable Secur. Comput., 2017
Comput. Secur., 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the A Systems Approach to Cyber Security, 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment.
Secur. Commun. Networks, 2016
SecComp: Towards Practically Defending Against Component Hijacking in Android Applications.
CoRR, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-17503-4, 2015
SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network.
CoRR, 2015
Comput. Secur., 2015
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Big Data and Internet of Things: A Roadmap for Smart Environments, 2014
A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration.
Wirel. Pers. Commun., 2014
Towards semantically secure outsourcing of association rule mining on categorical data.
Inf. Sci., 2014
Int. J. Inf. Sec., 2014
Int. J. Distributed Sens. Networks, 2014
Proceedings of the IEEE RFID Technology and Applications Conference, 2014
Proceedings of the IEEE International Conference on RFID, 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02340-8, 2013
Attack and defense mechanisms of malicious EPC event injection in EPC discovery service.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
IEICE Trans. Inf. Syst., 2012
Comput. Secur., 2012
Comput. Ind., 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Radio Frequency Identification System Security, 2012
On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2011
Int. J. Commun. Syst., 2011
EURASIP J. Wirel. Commun. Netw., 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
J. Syst. Softw., 2010
J. Manag. Inf. Syst., 2010
Int. J. Appl. Cryptogr., 2010
An intrusion response decision-making model based on hierarchical task network planning.
Expert Syst. Appl., 2010
Efficient discrete logarithm based multi-signature scheme in the plain public key model.
Des. Codes Cryptogr., 2010
Comput. Networks, 2010
Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data.
Proceedings of the Privacy in Statistical Databases, 2010
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
Proceedings of the Principle Advancements in Database Management Technologies: New Applications and Frameworks, 2010
2009
Multistage Off-Line Permutation Packet Routing on a Mesh: An Approach with Elementary Mathematics.
J. Comput. Sci. Technol., 2009
Inf. Technol. Manag., 2009
Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Information Security Practice and Experience, 2009
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Security Technology, 2009
Proceedings of the EDBT 2009, 2009
RFID privacy: relation between two notions, minimal condition, and efficient construction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the Database Technologies: Concepts, 2009
2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
IEEE Trans. Dependable Secur. Comput., 2008
Protecting business intelligence and customer privacy while outsourcing data mining tasks.
Knowl. Inf. Syst., 2008
Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining.
Knowl. Inf. Syst., 2008
Proceedings of the Computer Security, 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
J. Intell. Inf. Syst., 2007
J. Comput. Secur., 2007
Inf. Sci., 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
Looking into the seeds of time: Discovering temporal patterns in large transaction sets.
Inf. Sci., 2006
A fragile watermarking scheme for detecting malicious modifications of database relations.
Inf. Sci., 2006
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the Privacy in Statistical Databases, 2006
On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining.
Proceedings of the Knowledge Discovery in Databases: PKDD 2006, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
An Approach to Outsourcing Data Mining Tasks while Protecting Business Intelligence and Customer Privacy.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
2005
IEEE Trans. Dependable Secur. Comput., 2005
Electron. Commer. Res. Appl., 2005
Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining.
Proceedings of the 2005 SIAM International Conference on Data Mining, 2005
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
Proceedings of the Applied Public Key Infrastructure, 2005
2004
Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE-WS-ECEG 2004), 2004
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
2003
Discovering calendar-based temporal association rules.
Data Knowl. Eng., 2003
Proceedings of the Computer Security, 2003
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003
2002
J. Comput. Secur., 2002
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002
Proceedings of the Foundations of Information and Knowledge Systems, 2002
Proceedings of the Advanced Information Systems Engineering, 14th International Conference, 2002
2000
Proceedings of the Temporal, 2000