Yingjiu Li

According to our database1, Yingjiu Li authored at least 147 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
DABKE: Secure deniable attribute-based key exchange framework.
Journal of Computer Security, 2019

When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks.
Computers & Security, 2019

2018
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices.
IEEE Trans. Industrial Informatics, 2018

Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths.
IEEE Trans. Information Forensics and Security, 2018

Empirical Study of Face Authentication Systems Under OSNFD Attacks.
IEEE Trans. Dependable Sec. Comput., 2018

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud.
IEEE Trans. Dependable Sec. Comput., 2018

Attribute-based cloud storage with secure provenance over encrypted data.
Future Generation Comp. Syst., 2018

Making a good thing better: enhancing password/PIN-based user authentication with smartwatch.
Cybersecurity, 2018

User-friendly deniable storage for mobile devices.
Computers & Security, 2018

Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience.
Proceedings of the Security and Privacy in Communication Networks, 2018

DSH: Deniable Secret Handshake Framework.
Proceedings of the Information Security Practice and Experience, 2018

DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Privacy-Preserving Remote User Authentication with k-Times Untraceability.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
An Efficient Privacy-Preserving Outsourced Computation over Public Data.
IEEE Trans. Services Computing, 2017

A Secure, Usable, and Transparent Middleware for Permission Managers on Android.
IEEE Trans. Dependable Sec. Comput., 2017

Universally Composable RFID Mutual Authentication.
IEEE Trans. Dependable Sec. Comput., 2017

A study on a feasible no-root approach on Android.
Journal of Computer Security, 2017

EvoPass: Evolvable graphical password against shoulder-surfing attacks.
Computers & Security, 2017

Employing Smartwatch for Enhanced Password Authentication.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Attribute-Based Secure Messaging in the Public Cloud.
Proceedings of the A Systems Approach to Cyber Security, 2017

Fair deposits against double-spending for Bitcoin transactions.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Attribute-Based Encryption with Expressive and Authorized Keyword Search.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
ICCDetector: ICC-Based Malware Detection on Android.
IEEE Trans. Information Forensics and Security, 2016

Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment.
Security and Communication Networks, 2016

Attribute-Based Encryption with Granular Revocation.
Proceedings of the Security and Privacy in Communication Networks, 2016

Attacking Android smartphone systems without permissions.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Dissecting developer policy violating apps: characterization and detection.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

Efficient Tag Path Authentication Protocol with Less Tag Memory.
Proceedings of the Information Security Practice and Experience, 2016

Server-Aided Revocable Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2016, 2016

A Feasible No-Root Approach on Android.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Leakage Resilient Password Systems
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-17503-4, 2015

Statistical Database Auditing Without Query Denial Threat.
INFORMS Journal on Computing, 2015

Leakage-resilient password entry: Challenges, design, and evaluation.
Computers & Security, 2015

Privacy leakage analysis in online social networks.
Computers & Security, 2015

CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Server-Aided Revocable Identity-Based Encryption.
Proceedings of the Computer Security - ESORICS 2015, 2015

Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
On RFID False Authentications.
Proceedings of the Big Data and Internet of Things: A Roadmap for Smart Environments, 2014

A Novel RFID Tag Identification Protocol: Adaptive $$n$$ n -Resolution and $$k$$ k -Collision Arbitration.
Wireless Personal Communications, 2014

Towards semantically secure outsourcing of association rule mining on categorical data.
Inf. Sci., 2014

Risk balance defense approach against intrusions for network server.
Int. J. Inf. Sec., 2014

Innovative Applications and Security of Internet of Things.
IJDSN, 2014

Permission based Android security: Issues and countermeasures.
Computers & Security, 2014

Batch Clone Detection in RFID-enabled supply chain.
Proceedings of the IEEE International Conference on RFID, 2014

Detecting Camouflaged Applications on Mobile Application Markets.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Authorized Keyword Search on Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

Understanding OSN-based facial disclosure against face authentication systems.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
RFID Security and Privacy
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2013

Attack and defense mechanisms of malicious EPC event injection in EPC discovery service.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks.
Proceedings of the Information Security Practice and Experience, 2013

Designing leakage-resilient password entry on touchscreen mobile devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Expressive search on encrypted data.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Launching Generic Attacks on iOS with Approved Third-Party Applications.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Guest Editor's Preface.
Journal of Computer Security, 2012

A Survey on Privacy Frameworks for RFID Authentication.
IEICE Transactions, 2012

A secure and efficient discovery service system in EPCglobal network.
Computers & Security, 2012

SecTTS: A secure track & trace system for RFID-enabled supply chains.
Computers in Industry, 2012

Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains.
Proceedings of the Information Security and Privacy Research, 2012

On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

SecDS: a secure EPC discovery service system in EPCglobal network.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Expressive CP-ABE with partially hidden access structures.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

A New Framework for Privacy of RFID Path Authentication.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
On two RFID privacy notions and their relations.
ACM Trans. Inf. Syst. Secur., 2011

Guest editors' preface.
Journal of Computer Security, 2011

A zero-knowledge based framework for RFID privacy.
Journal of Computer Security, 2011

Privacy Risk Assessment with Bounds Deduced from Bounds.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2011

Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture.
Int. J. Communication Systems, 2011

Adaptive collision resolution for efficient RFID tag identification.
EURASIP J. Wireless Comm. and Networking, 2011

Secure and Practical Key Distribution for RFID-Enabled Supply Chains.
Proceedings of the Security and Privacy in Communication Networks, 2011

Fully Secure Cipertext-Policy Hiding CP-ABE.
Proceedings of the Information Security Practice and Experience, 2011

A software-based root-of-trust primitive on multicore platforms.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Shifting Inference Control to User Side: Architecture and Protocol.
IEEE Trans. Dependable Sec. Comput., 2010

Two robust remote user authentication protocols using smart cards.
Journal of Systems and Software, 2010

Information Technology Diffusion with Influentials, Imitators, and Opponents.
J. of Management Information Systems, 2010

Achieving high security and efficiency in RFID-tagged supply chains.
IJACT, 2010

A New Framework for RFID Privacy.
IACR Cryptology ePrint Archive, 2010

An intrusion response decision-making model based on hierarchical task network planning.
Expert Syst. Appl., 2010

Efficient discrete logarithm based multi-signature scheme in the plain public key model.
Des. Codes Cryptography, 2010

Vulnerability analysis of RFID protocols for tag ownership transfer.
Computer Networks, 2010

Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data.
Proceedings of the Privacy in Statistical Databases, 2010

Time cost evaluation for executing RFID authentication protocols.
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010

Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains.
Proceedings of the Information Systems Security - 6th International Conference, 2010

A New Framework for RFID Privacy.
Proceedings of the Computer Security, 2010

An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Revisiting Unpredictability-Based RFID Privacy Models.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

A Multiple-Bits Watermark for Relational Data.
Proceedings of the Principle Advancements in Database Management Technologies: New Applications and Frameworks, 2010

2009
Multistage Off-Line Permutation Packet Routing on a Mesh: An Approach with Elementary Mathematics.
J. Comput. Sci. Technol., 2009

Certificate revocation release policies.
Journal of Computer Security, 2009

Wake up or fall asleep-value implication of trusted computing.
Information Technology and Management, 2009

Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Self-enforcing Private Inference Control.
Proceedings of the Provable Security, Third International Conference, 2009

Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.
Proceedings of the Information Security Practice and Experience, 2009

On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.
Proceedings of the Information Systems Security, 5th International Conference, 2009

A Robust Damage Assessment Model for Corrupted Database Systems.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Insights into Malware Detection and Prevention on Mobile Phones.
Proceedings of the Security Technology, 2009

An efficient online auditing approach to limit private data disclosure.
Proceedings of the EDBT 2009, 2009

RFID privacy: relation between two notions, minimal condition, and efficient construction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

A Multiple-Bits Watermark for Relational Data.
Proceedings of the Database Technologies: Concepts, 2009

2008
Database Watermarking: A Systematic View.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Practical Inference Control for Data Cubes.
IEEE Trans. Dependable Sec. Comput., 2008

Protecting business intelligence and customer privacy while outsourcing data mining tasks.
Knowl. Inf. Syst., 2008

Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining.
Knowl. Inf. Syst., 2008

Disclosure Analysis and Control in Statistical Databases.
Proceedings of the Computer Security, 2008

Empirical Analysis of Certificate Revocation Lists.
Proceedings of the Data and Applications Security XXII, 2008

A Security and Performance Evaluation of Hash-Based RFID Protocols.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Preserving privacy in association rule mining with bloom filters.
J. Intell. Inf. Syst., 2007

Parity-based inference control for multi-dimensional range sum queries.
Journal of Computer Security, 2007

Chaining watermarks for detecting malicious modifications to streaming data.
Inf. Sci., 2007

New Paradigm of Inference Control with Trusted Computing.
Proceedings of the Data and Applications Security XXI, 2007

Protecting RFID communications in supply chains.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Looking into the seeds of time: Discovering temporal patterns in large transaction sets.
Inf. Sci., 2006

A fragile watermarking scheme for detecting malicious modifications of database relations.
Inf. Sci., 2006

On the Release of CRLs in Public Key Infrastructure.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Practical Inference Control for Data Cubes (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Towards value disclosure analysis in modeling general databases.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Disclosure Analysis for Two-Way Contingency Tables.
Proceedings of the Privacy in Statistical Databases, 2006

On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining.
Proceedings of the Knowledge Discovery in Databases: PKDD 2006, 2006

Rights Protection for Data Cubes.
Proceedings of the Information Security, 9th International Conference, 2006

Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract).
Proceedings of the Information Systems Security, Second International Conference, 2006

An Approach to Outsourcing Data Mining Tasks while Protecting Business Intelligence and Customer Privacy.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

Deriving Private Information from Perturbed Data Using IQR Based Approach.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

Publicly verifiable ownership protection for relational databases.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Optimal CRL Releasing Strategy in Public Key Infrastructure.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Fingerprinting Relational Databases: Schemes and Specialties.
IEEE Trans. Dependable Sec. Comput., 2005

Securing credit card transactions with one-time payment scheme.
Electronic Commerce Research and Applications, 2005

Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining.
Proceedings of the 2005 SIAM International Conference on Data Mining, 2005

An attribute-based access matrix model.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

A Generic Protocol for Controlling Access to Mobile Services.
Proceedings of the Applied Public Key Infrastructure, 2005

2004
A Security-Enhanced One-Time Payment Scheme for Credit Card.
Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE-WS-ECEG 2004), 2004

Tamper detection and localization for categorical data using fragile watermarks.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches.
Proceedings of the Computer Security, 2003

Constructing a virtual primary key for fingerprinting relational data.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

2002
Enhancing Profiles for Anomaly Detection Using Time Granularities.
Journal of Computer Security, 2002

Preventing Interval-Based Inference by Random Data Perturbation.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

A Privacy-Enhanced Microaggregation Method.
Proceedings of the Foundations of Information and Knowledge Systems, 2002

Auditing Interval-Based Inference.
Proceedings of the Advanced Information Systems Engineering, 14th International Conference, 2002

2001
Discovering Calendar-based Temporal Association Rules.
Proceedings of the Eigth International Symposium on Temporal Representation and Reasoning, 2001

2000
Discovering Temporal Patterns in Multiple Granularities.
Proceedings of the Temporal, 2000


  Loading...