Ting Yu

Orcid: 0000-0002-7054-5773

Affiliations:
  • Hamad Bin Khalifa University, Qatar Computing Research Institute, Doha, Qatar (since 2013)
  • North Carolina State University, Department of Computer Science, Raleigh, NC, USA
  • University of Illinois at Urbana-Champaign, IL, USA (PhD 2003)


According to our database1, Ting Yu authored at least 135 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023

DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference.
ACM Trans. Priv. Secur., 2023

2022
Ten Years after ImageNet: A 360° Perspective on AI.
CoRR, 2022

Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior.
CoRR, 2022

A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
CoRR, 2022

SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Finding MNEMON: Reviving Memories of Node Embeddings.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Permutation-Invariant Subgraph Discovery.
CoRR, 2021

Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs.
Proceedings of the 30th USENIX Security Symposium, 2021

EOSAFE: Security Analysis of EOSIO Smart Contracts.
Proceedings of the 30th USENIX Security Symposium, 2021

CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference.
ACM Trans. Priv. Secur., 2020

Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users.
CoRR, 2020

Security Analysis of EOSIO Smart Contracts.
CoRR, 2020

Mobile Device Usage Recommendation based on User Context Inference Using Embedded Sensors.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference.
CoRR, 2019

Towards Large-Scale Hunting for Android Negative-Day Malware.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
XML Access Control.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

k-Skyband query answering with differential privacy.
J. Comput. Secur., 2018

A Survey on Malicious Domains Detection through DNS Data Analysis.
ACM Comput. Surv., 2018

A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Exact Detection of Information Leakage: Decidability and Complexity.
Trans. Large Scale Data Knowl. Centered Syst., 2017

Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis.
J. Comput. Secur., 2017

Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage.
CoRR, 2017

Distributed Cardinality Estimation of Set Operations with Differential Privacy.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Differentially Private K-Skyband Query Answering Through Adaptive Spatial Decomposition.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Generating Synthetic Decentralized Social Graphs with Local Differential Privacy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Dynamic and Efficient Private Keyword Search over Inverted Index-Based Encrypted Data.
ACM Trans. Internet Techn., 2016

DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud.
IEEE Trans. Multim., 2016

Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data.
Proceedings of the Information Security Theory and Practice, 2016

Publishing Attributed Social Graphs with Formal Privacy Guarantees.
Proceedings of the 2016 International Conference on Management of Data, 2016

PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data.
Proceedings of the IEEE International Conference on Web Services, 2016

Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Discovering Malicious Domains through Passive DNS Data Graph Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Privacy and Access Control: How are These Two concepts Related?
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Interactive preference-aware query optimization.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Conservative or liberal? Personalized differential privacy.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Exact Detection of Information Leakage in Database Access Control.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2015

Dimensions of Risk in Mobile Applications: A User Study.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

WaveCluster with Differential Privacy.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

2014
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds.
IEEE Trans. Parallel Distributed Syst., 2014

Obtaining Information about Queries behind Views and Dependencies.
CoRR, 2014

Revealing and incorporating implicit communities to improve recommender systems.
Proceedings of the ACM Conference on Economics and Computation, 2014

PAQO: Preference-aware query optimization for decentralized database systems.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Data Anonymization: The Challenge from Theory to Practice.
Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), 2014

A Privacy-Preserving Framework for Personalized, Social Recommendations.
Proceedings of the 17th International Conference on Extending Database Technology, 2014

Integrity Assurance for Outsourced Databases without DBMS Modification.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

COMPARS: toward an empirical approach for comparing the resilience of reputation systems.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Protecting Sensitive Labels in Social Network Data Anonymization.
IEEE Trans. Knowl. Data Eng., 2013

PAQO: A Preference-Aware Query Optimizer for PostgreSQL.
Proc. VLDB Endow., 2013

Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

Enabling intensional access control via preference-aware query optimization.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Mining frequent graph patterns with differential privacy.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Empirical privacy and empirical utility of anonymized data.
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

iBigTable: practical data integrity for bigtable in public cloud.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

UMicS: from anonymized data to usable microdata.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking in SOA.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Ensuring authorization privileges for cascading user obligations.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Aggregate Query Answering on Possibilistic Data with Cardinality Constraints.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Differentially Private Spatial Decompositions.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Bounding trust in reputation systems with incomplete information.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Differentially Private Spatial Decompositions
CoRR, 2011

Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

On the management of user obligations.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

EMFS: Email-based Personal Cloud Storage.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing.
Proceedings of the Computer Security - ESORICS 2011, 2011

Identity management for cloud computing: developments and directions.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

On mouse dynamics as a behavioral biometric for authentication.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Poster: on trust evaluation with missing information in reputation systems.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
A Timed Logic for Modeling and Reasoning about Security Protocols.
IACR Cryptol. ePrint Arch., 2010

Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles.
IACR Cryptol. ePrint Arch., 2010

Investigating privacy-aware distributed query evaluation.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Failure Feedback for User Obligation Systems.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Enhancing personalized ranking quality through multidimensional modeling of inter-item competition.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Toward practical authorization-dependent user obligation systems.
Proceedings of the 5th ACM Symposium on Information, 2010

Effective trust management through a hybrid logical and relational approach.
Proceedings of the 5th ACM Symposium on Information, 2010

RunTest: assuring integrity of dataflow processing in cloud computing infrastructures.
Proceedings of the 5th ACM Symposium on Information, 2010

On verifying stateful dataflow processing services in large-scale cloud systems.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
XML Access Control.
Proceedings of the Encyclopedia of Database Systems, 2009

Distribution-based Microdata Anonymization.
Proc. VLDB Endow., 2009

On the Modeling of Honest Players in Reputation Systems.
J. Comput. Sci. Technol., 2009

Denial of service attacks and defenses in decentralized trust management.
Int. J. Inf. Sec., 2009

Towards a dynamic and composable model of trust.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Security policy testing via automated program code generation.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Towards secure dataflow processing in open distributed systems.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

SecureMR: A Service Integrity Assurance Framework for MapReduce.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007).
SIGMOD Rec., 2008

Anonymizing bipartite graph data using safe groupings.
Proc. VLDB Endow., 2008

Avoiding information leakage in security-policy-aware planning.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Adaptive Request Scheduling for Parallel Scientific Web Services.
Proceedings of the Scientific and Statistical Database Management, 2008

Enforcing security properties in task-based systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Assigning Responsibility for Failed Obligations.
Proceedings of the Trust Management II, 2008

On the Modeling of Honest Players in Reputation Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

2007
Automated Trust Negotiation in Open Systems.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Basic Security Concepts.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

A roadmap for comprehensive online privacy policy management.
Commun. ACM, 2007

On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Aggregate Query Answering on Anonymized Tables.
Proceedings of the 23rd International Conference on Data Engineering, 2007

2006
Integrating XML data sources using approximate joins.
ACM Trans. Database Syst., 2006

A semantics based approach to privacy languages.
Comput. Syst. Sci. Eng., 2006

A Framework for Identifying Compromised Nodes in Sensor Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Defining and Measuring Policy Coverage in Testing Access Control Policies.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

On the modeling and analysis of obligations.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Determining user privacy preferences by asking the right questions: an automated approach.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Preventing attribute information leakage in automated trust negotiation.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
A compressed accessibility map for XML.
ACM Trans. Database Syst., 2004

An identifiability-based access control model for privacy protection in open systems.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

A formal semantics for P3P.
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004

A Classification Scheme for Trust Functions in Reputation-Based Trust Management.
Proceedings of the ISWC*04 Workshop on Trust, 2004

How to Exploit Ontologies for Trust Negotiation.
Proceedings of the ISWC*04 Workshop on Trust, 2004

Routing XML Queries.
Proceedings of the 20th International Conference on Data Engineering, 2004

2003
Automated Trust Establishment in Open Systems
PhD thesis, 2003

Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.
ACM Trans. Inf. Syst. Secur., 2003

Two-Body Job Searches.
SIGMOD Rec., 2003

Two Security Symposia.
IEEE Secur. Priv., 2003

Policy migration for sensitive credentials in trust negotiation.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

A Unified Scheme for Resource Protection in Automated Trust Negotiation.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Index-Based Approximate XML Joins.
Proceedings of the 19th International Conference on Data Engineering, 2003

Trust Negotiation in Dynamic Coalitions.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Negotiating Trust on the Web.
IEEE Internet Comput., 2002

Compressed Accessibility Map: Efficient Access Control for XML.
Proceedings of 28th International Conference on Very Large Data Bases, 2002

Approximate XML joins.
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, 2002

Requirements for Policy Languages for Trust Negotiation.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

Protecting Privacy during On-Line Trust Negotiation.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

2001
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
Proceedings of the Network and Distributed System Security Symposium, 2001

Interoperable strategies in automated trust negotiation.
Proceedings of the CCS 2001, 2001

2000
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet.
Proceedings of the CCS 2000, 2000


  Loading...