default search action
Ting Yu 0001
Person information
- affiliation (since 2013): Hamad Bin Khalifa University, Qatar Computing Research Institute, Doha, Qatar
- affiliation: North Carolina State University, Department of Computer Science, Raleigh, NC, USA
- affiliation (PhD 2003): University of Illinois at Urbana-Champaign, IL, USA
Other persons with the same name
- Ting Yu — disambiguation page
- Ting Yu 0002 — JiaXing Nanhu University, Jiaxing, China (and 2 more)
- Ting Yu 0003 — Google Cloud, Sunnyvale, CA, USA (and 3 more)
- Ting Yu 0004 — Zhejiang Lab, Hangzhou, China (and 1 more)
- Ting Yu 0005 — Pukyong National University, Department of Food and Life Science, Busan, Republic of Korea
- Ting Yu 0006 — Stevens Institute of Technology, Department of Physics, Center for Quantum Science and Engineering, Hoboken, NJ, USA (and 1 more)
- Ting Yu 0007 — University of Illinois at Urbana-Champaign, Department of ECE, Urbana-Champaign, IL, USA
- Ting Yu 0008 — University of Sydney, Centre for Integrated Sustainability Analysis, Sydney, Australia (and 1 more)
- Ting Yu 0010 — Shandong University, Research Center for Mathematics and Interdisciplinary Sciences, Qingdao, China (and 1 more)
- Ting Yu 0011 — Chinese Academy of Sciences, Shenzhen Institutes of Advanced Technology, Department of Integrated Electronics, Shenzhen, China
- Ting Yu 0012 — University of Auckland, Department of Electrical and Computer Engineering, Parallel and Reconfigurable Computing Group, New Zealand (and 1 more)
- Ting Yu 0014 — Huazhong University of Science and Technology, Union Hospital, Tongji Medical College, Wuhan, China
- Ting Yu 0015 — Tianjin University, College of Management and Economics, China
- Ting Yu 0016 — Hangzhou Normal University, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c97]Chaojie Lv, Xiaokui Xiao, Lan Zhang, Ting Yu:
Publishing Common Neighbors Histograms of Social Networks under Edge Differential Privacy. AsiaCCS 2024 - [c96]Euijin Choo, Mohamed Nabeel, Doowon Kim, Ravindu De Silva, Ting Yu, Issa Khalil:
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. SIGMETRICS/Performance (Abstracts) 2024: 55-56 - [c95]Saravanan Thirumuruganathan, Fatih Deniz, Issa Khalil, Ting Yu, Mohamed Nabeel, Mourad Ouzzani:
Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled Data. USENIX Security Symposium 2024 - [i19]Hanxiang Xu, Shenao Wang, Ningke Li, Kailong Wang, Yanjie Zhao, Kai Chen, Ting Yu, Yang Liu, Haoyu Wang:
Large Language Models for Cyber Security: A Systematic Literature Review. CoRR abs/2405.04760 (2024) - 2023
- [j27]Euijin Choo, Mohamed Nabeel, Doowon Kim, Ravindu De Silva, Ting Yu, Issa Khalil:
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. Proc. ACM Meas. Anal. Comput. Syst. 7(3): 59:1-59:26 (2023) - [j26]Euijin Choo, Mohamed Nabeel, Mashael AlSabah, Issa Khalil, Ting Yu, Wei Wang:
DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference. ACM Trans. Priv. Secur. 26(1): 9:1-9:32 (2023) - [i18]Jiandong Liu, Lan Zhang, Chaojie Lv, Ting Yu, Nikolaos M. Freris, Xiangyang Li:
TPMDP: Threshold Personalized Multi-party Differential Privacy via Optimal Gaussian Mechanism. CoRR abs/2305.11192 (2023) - 2022
- [c94]Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. CCS 2022: 2643-2657 - [c93]Saravanan Thirumuruganathan, Mohamed Nabeel, Euijin Choo, Issa Khalil, Ting Yu:
SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors. SP 2022: 507-521 - [i17]Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. CoRR abs/2204.06963 (2022) - [i16]Euijin Choo, Mohamed Nabeel, Ravindu De Silva, Ting Yu, Issa Khalil:
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. CoRR abs/2205.13155 (2022) - [i15]Enes Altinisik, Husrev Taha Sencar, Mohamed Nabeel, Issa Khalil, Ting Yu:
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior. CoRR abs/2206.05679 (2022) - [i14]Sanjay Chawla, Preslav Nakov, Ahmed Ali, Wendy Hall, Issa Khalil, Xiaosong Ma, Husrev Taha Sencar, Ingmar Weber, Michael A. Wooldridge, Ting Yu:
Ten Years after ImageNet: A 360° Perspective on AI. CoRR abs/2210.01797 (2022) - 2021
- [c92]Pengcheng Xia, Mohamed Nabeel, Issa Khalil, Haoyu Wang, Ting Yu:
Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns. CODASPY 2021: 209-220 - [c91]Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu:
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users. DSN 2021: 250-262 - [c90]Mohamed Nabeel, Enes Altinisik, Haipei Sun, Issa Khalil, Wendy Hui Wang, Ting Yu:
CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security. RAID 2021: 205-219 - [c89]Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
EOSAFE: Security Analysis of EOSIO Smart Contracts. USENIX Security Symposium 2021: 1271-1288 - [c88]Ravindu De Silva, Mohamed Nabeel, Charith Elvitigala, Issa Khalil, Ting Yu, Chamath Keppitiyagama:
Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs. USENIX Security Symposium 2021: 3721-3738 - [i13]Raghvendra Mall, Shameem Ahamed Puthiya Parambath, Han Yufei, Ting Yu, Sanjay Chawla:
Permutation-Invariant Subgraph Discovery. CoRR abs/2104.01063 (2021) - 2020
- [j25]Mohamed Nabeel, Issa M. Khalil, Bei Guan, Ting Yu:
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference. ACM Trans. Priv. Secur. 23(4): 17:1-17:36 (2020) - [c87]Cong Shi, Xiaonan Guo, Ting Yu, Yingying Chen, Yucheng Xie, Jian Liu:
Mobile Device Usage Recommendation based on User Context Inference Using Embedded Sensors. ICCCN 2020: 1-9 - [i12]Ningyu He, Ruiyi Zhang, Lei Wu, Haoyu Wang, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
Security Analysis of EOSIO Smart Contracts. CoRR abs/2003.06568 (2020) - [i11]Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu:
Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users. CoRR abs/2012.13971 (2020)
2010 – 2019
- 2019
- [c86]Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Wendy Hui Wang, Ting Yu:
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy. CCS 2019: 703-717 - [c85]Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, Sencun Zhu:
Towards Large-Scale Hunting for Android Negative-Day Malware. RAID 2019: 533-545 - [i10]Euijin Choo, Mohamed Nabeel, Mashael AlSabah, Issa Khalil, Ting Yu, Wei Wang:
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference. CoRR abs/1911.12080 (2019) - 2018
- [j24]Yury Zhauniarovich, Issa Khalil, Ting Yu, Marc Dacier:
A Survey on Malicious Domains Detection through DNS Data Analysis. ACM Comput. Surv. 51(4): 67:1-67:36 (2018) - [j23]Ling Chen, Ting Yu, Rada Chirkova:
k-Skyband query answering with differential privacy. J. Comput. Secur. 26(5): 647-676 (2018) - [c84]Haipei Sun, Boxiang Dong, Wendy Hui Wang, Ting Yu, Zhan Qin:
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. IEEE BigData 2018: 488-497 - [c83]Issa M. Khalil, Bei Guan, Mohamed Nabeel, Ting Yu:
A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference. CODASPY 2018: 330-341 - [r2]Dongwon Lee, Ting Yu:
XML Access Control. Encyclopedia of Database Systems (2nd ed.) 2018 - [i9]Yury Zhauniarovich, Issa Khalil, Ting Yu, Marc Dacier:
A Survey on Malicious Domains Detection through DNS Data Analysis. CoRR abs/1805.08426 (2018) - [i8]Haipei Sun, Boxiang Dong, Hui Wang, Ting Yu, Zhan Qin:
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. CoRR abs/1808.08181 (2018) - 2017
- [j22]Euijin Choo, Ting Yu, Min Chi:
Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis. J. Comput. Secur. 25(3): 283-318 (2017) - [j21]Rada Chirkova, Ting Yu:
Exact Detection of Information Leakage: Decidability and Complexity. Trans. Large Scale Data Knowl. Centered Syst. 32: 1-23 (2017) - [c82]Zhan Qin, Ting Yu, Yin Yang, Issa Khalil, Xiaokui Xiao, Kui Ren:
Generating Synthetic Decentralized Social Graphs with Local Differential Privacy. CCS 2017: 425-438 - [c81]Ling Chen, Ting Yu, Rada Chirkova:
Differentially Private K-Skyband Query Answering Through Adaptive Spatial Decomposition. DBSec 2017: 142-163 - [c80]Rade Stanojevic, Mohamed Nabeel, Ting Yu:
Distributed Cardinality Estimation of Set Operations with Differential Privacy. PAC 2017: 37-48 - [i7]Issa Khalil, Bei Guan, Mohamed Nabeel, Ting Yu:
Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage. CoRR abs/1711.00300 (2017) - 2016
- [j20]Zhan Qin, Kui Ren, Ting Yu, Jian Weng:
DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud. IEEE Trans. Multim. 18(5): 929-939 (2016) - [j19]Rui Zhang, Rui Xue, Ting Yu, Ling Liu:
Dynamic and Efficient Private Keyword Search over Inverted Index-Based Encrypted Data. ACM Trans. Internet Techn. 16(3): 21:1-21:20 (2016) - [c79]Zhan Qin, Yin Yang, Ting Yu, Issa Khalil, Xiaokui Xiao, Kui Ren:
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy. CCS 2016: 192-203 - [c78]Issa Khalil, Ting Yu, Bei Guan:
Discovering Malicious Domains through Passive DNS Data Graph Analysis. AsiaCCS 2016: 663-674 - [c77]Rui Zhang, Rui Xue, Ting Yu, Ling Liu:
PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data. ICWS 2016: 428-435 - [c76]Zach Jorgensen, Ting Yu, Graham Cormode:
Publishing Attributed Social Graphs with Formal Privacy Guarantees. SIGMOD Conference 2016: 107-122 - [c75]Ling Chen, Ting Yu, Rada Chirkova:
Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data. WISTP 2016: 187-203 - 2015
- [c74]Ling Chen, Ting Yu, Rada Chirkova:
WaveCluster with Differential Privacy. CIKM 2015: 1011-1020 - [c73]Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu:
Dimensions of Risk in Mobile Applications: A User Study. CODASPY 2015: 49-60 - [c72]Farid Alborzi, Rada Chirkova, Ting Yu:
Exact Detection of Information Leakage in Database Access Control. DaWaK 2015: 403-415 - [c71]Euijin Choo, Ting Yu, Min Chi:
Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis. DBSec 2015: 170-187 - [c70]Zach Jorgensen, Ting Yu, Graham Cormode:
Conservative or liberal? Personalized differential privacy. ICDE 2015: 1023-1034 - [c69]N. R. Ong, S. E. Rojcewicz, Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu:
Interactive preference-aware query optimization. ICDE 2015: 1512-1515 - [c68]Anna Cinzia Squicciarini, Ting Yu:
Privacy and Access Control: How are These Two concepts Related? SACMAT 2015: 197-198 - [i6]Ling Chen, Ting Yu, Rada Chirkova:
WaveCluster with Differential Privacy. CoRR abs/1508.00192 (2015) - 2014
- [j18]Juan Du, Daniel Joseph Dean, Yongmin Tan, Xiaohui Gu, Ting Yu:
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds. IEEE Trans. Parallel Distributed Syst. 25(3): 730-739 (2014) - [c67]Euijin Choo, Jianchun Jiang, Ting Yu:
COMPARS: toward an empirical approach for comparing the resilience of reputation systems. CODASPY 2014: 87-98 - [c66]Wei Wei, Ting Yu:
Integrity Assurance for Outsourced Databases without DBMS Modification. DBSec 2014: 1-16 - [c65]Ting Yu:
Data Anonymization: The Challenge from Theory to Practice. EDBT/ICDT Workshops 2014: 415 - [c64]Zach Jorgensen, Ting Yu:
A Privacy-Preserving Framework for Personalized, Social Recommendations. EDBT 2014: 571-582 - [c63]Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu:
PAQO: Preference-aware query optimization for decentralized database systems. ICDE 2014: 424-435 - [c62]Euijin Choo, Ting Yu, Min Chi, Yan Sun:
Revealing and incorporating implicit communities to improve recommender systems. EC 2014: 489-506 - [i5]Rada Chirkova, Ting Yu:
Obtaining Information about Queries behind Views and Dependencies. CoRR abs/1403.5199 (2014) - 2013
- [j17]Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu:
PAQO: A Preference-Aware Query Optimizer for PostgreSQL. Proc. VLDB Endow. 6(12): 1334-1337 (2013) - [j16]Mingxuan Yuan, Lei Chen, Philip S. Yu, Ting Yu:
Protecting Sensitive Labels in Social Network Data Anonymization. IEEE Trans. Knowl. Data Eng. 25(3): 633-647 (2013) - [c61]Graham Cormode, Entong Shen, Xi Gong, Ting Yu, Cecilia M. Procopiuc, Divesh Srivastava:
UMicS: from anonymized data to usable microdata. CIKM 2013: 2255-2260 - [c60]Wei Wei, Ting Yu, Rui Xue:
iBigTable: practical data integrity for bigtable in public cloud. CODASPY 2013: 341-352 - [c59]Graham Cormode, Cecilia M. Procopiuc, Entong Shen, Divesh Srivastava, Ting Yu:
Empirical privacy and empirical utility of anonymized data. ICDE Workshops 2013: 77-82 - [c58]Entong Shen, Ting Yu:
Mining frequent graph patterns with differential privacy. KDD 2013: 545-553 - [c57]Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu:
Enabling intensional access control via preference-aware query optimization. SACMAT 2013: 189-192 - [c56]Xi Gong, Ting Yu, Adam J. Lee:
Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems. WAIM 2013: 643-648 - [i4]Entong Shen, Ting Yu:
Mining Frequent Graph Patterns with Differential Privacy. CoRR abs/1301.7015 (2013) - 2012
- [c55]Xi Gong, Ting Yu, Adam J. Lee:
Bounding trust in reputation systems with incomplete information. CODASPY 2012: 125-132 - [c54]Graham Cormode, Cecilia M. Procopiuc, Divesh Srivastava, Entong Shen, Ting Yu:
Differentially Private Spatial Decompositions. ICDE 2012: 20-31 - [c53]Graham Cormode, Divesh Srivastava, Entong Shen, Ting Yu:
Aggregate Query Answering on Possibilistic Data with Cardinality Constraints. ICDE 2012: 258-269 - [c52]Omar Chowdhury, Murillo Pontual, William H. Winsborough, Ting Yu, Keith Irwin, Jianwei Niu:
Ensuring authorization privileges for cascading user obligations. SACMAT 2012: 33-44 - [c51]Jianchun Jiang, Liping Ding, Ennan Zhai, Ting Yu:
VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking in SOA. SERE 2012: 61-70 - [e8]Ting Yu, George Danezis, Virgil D. Gligor:
the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012. ACM 2012, ISBN 978-1-4503-1651-4 [contents] - [e7]Ting Yu, V. N. Venkatakrishan, Apu Kapadia:
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012. ACM 2012, ISBN 978-1-4503-1664-4 [contents] - [e6]Ting Yu, Mihai Christodorescu:
Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security, BADGERS '12, Raleigh, North Carolina, USA, October 15, 2012. ACM 2012, ISBN 978-1-4503-1661-3 [contents] - [e5]Ting Yu, Srdjan Capkun, Seny Kamara:
Proceedings of the 2012 ACM Workshop on Cloud computing security, CCSW 2012, Raleigh, NC, USA, October 19, 2012. ACM 2012, ISBN 978-1-4503-1665-1 [contents] - [e4]Ting Yu, William Enck, Xuxian Jiang:
SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2012, October 19, 2012, Raleigh, NC, USA. ACM 2012, ISBN 978-1-4503-1666-8 [contents] - [e3]Ting Yu, Nikita Borisov:
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, WPES 2012, Raleigh, NC, USA, October 15, 2012. ACM 2012, ISBN 978-1-4503-1663-7 [contents] - 2011
- [c50]Zach Jorgensen, Ting Yu:
On mouse dynamics as a behavioral biometric for authentication. AsiaCCS 2011: 476-482 - [c49]Xi Gong, Ting Yu, Adam J. Lee:
Poster: on trust evaluation with missing information in reputation systems. CCS 2011: 773-776 - [c48]Kevin W. Hamlen, Peng Liu, Murat Kantarcioglu, Bhavani Thuraisingham, Ting Yu:
Identity management for cloud computing: developments and directions. CSIIRW 2011: 32 - [c47]Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu:
Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing. ESORICS 2011: 628-647 - [c46]Xinfeng Lei, Rui Xue, Ting Yu:
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles. ICICS 2011: 29-41 - [c45]Jagan Srinivasan, Wei Wei, Xiaosong Ma, Ting Yu:
EMFS: Email-based Personal Cloud Storage. NAS 2011: 248-257 - [c44]Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin:
On the management of user obligations. SACMAT 2011: 175-184 - [c43]Yuhong Liu, Yan Sun, Ting Yu:
Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems. SocialCom/PASSAT 2011: 425-434 - [i3]Graham Cormode, Magda Procopiuc, Entong Shen, Divesh Srivastava, Ting Yu:
Differentially Private Spatial Decompositions. CoRR abs/1103.5170 (2011) - 2010
- [j15]Graham Cormode, Divesh Srivastava, Ting Yu, Qing Zhang:
Anonymizing bipartite graph data using safe groupings. VLDB J. 19(1): 115-139 (2010) - [c42]Adam J. Lee, Ting Yu, Yann Le Gall:
Effective trust management through a hybrid logical and relational approach. AsiaCCS 2010: 169-179 - [c41]Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin:
Toward practical authorization-dependent user obligation systems. AsiaCCS 2010: 180-191 - [c40]Juan Du, Wei Wei, Xiaohui Gu, Ting Yu:
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures. AsiaCCS 2010: 293-304 - [c39]Juan Du, Xiaohui Gu, Ting Yu:
On verifying stateful dataflow processing services in large-scale cloud systems. CCS 2010: 672-674 - [c38]Qinyuan Feng, Ling Liu, Yan Sun, Ting Yu, Yafei Dai:
Enhancing personalized ranking quality through multidimensional modeling of inter-item competition. CollaborateCom 2010: 1-10 - [c37]Adam J. Lee, Ting Yu:
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques. CSF 2010: 139-153 - [c36]Murillo Pontual, Keith Irwin, Omar Chowdhury, William H. Winsborough, Ting Yu:
Failure Feedback for User Obligation Systems. SocialCom/PASSAT 2010: 713-720 - [c35]Wei Wei, Ting Yu:
The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition. SocialCom/PASSAT 2010: 873-880 - [c34]Nicholas L. Farnan, Adam J. Lee, Ting Yu:
Investigating privacy-aware distributed query evaluation. WPES 2010: 43-52 - [i2]Xinfeng Lei, Rui Xue, Ting Yu:
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles. IACR Cryptol. ePrint Arch. 2010: 467 (2010) - [i1]Xinfeng Lei, Rui Xue, Ting Yu:
A Timed Logic for Modeling and Reasoning about Security Protocols. IACR Cryptol. ePrint Arch. 2010: 645 (2010)
2000 – 2009
- 2009
- [j14]Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu:
Denial of service attacks and defenses in decentralized trust management. Int. J. Inf. Sec. 8(2): 89-101 (2009) - [j13]Qing Zhang, Wei Wei, Ting Yu:
On the Modeling of Honest Players in Reputation Systems. J. Comput. Sci. Technol. 24(5): 808-819 (2009) - [j12]Nick Koudas, Divesh Srivastava, Ting Yu, Qing Zhang:
Distribution-based Microdata Anonymization. Proc. VLDB Endow. 2(1): 958-969 (2009) - [c33]Wei Wei, Juan Du, Ting Yu, Xiaohui Gu:
SecureMR: A Service Integrity Assurance Framework for MapReduce. ACSAC 2009: 73-82 - [c32]Juan Du, Wei Wei, Xiaohui Gu, Ting Yu:
Towards secure dataflow processing in open distributed systems. STC 2009: 67-72 - [c31]Ting Yu, Dhivya Sivasubramanian, Tao Xie:
Security policy testing via automated program code generation. CSIIRW 2009: 13 - [c30]Adam J. Lee, Ting Yu:
Towards a dynamic and composable model of trust. SACMAT 2009: 217-226 - [r1]Dongwon Lee, Ting Yu:
XML Access Control. Encyclopedia of Database Systems 2009: 3573-3576 - 2008
- [j11]Graham Cormode, Divesh Srivastava, Ting Yu, Qing Zhang:
Anonymizing bipartite graph data using safe groupings. Proc. VLDB Endow. 1(1): 833-844 (2008) - [j10]Adam J. Lee, Ting Yu:
Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007). SIGMOD Rec. 37(1): 56-58 (2008) - [j9]Qing Zhang, Ting Yu, Peng Ning:
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): 12:1-12:37 (2008) - [c29]Qing Zhang, Ting Yu:
On the Modeling of Honest Players in Reputation Systems. ICDCS Workshops 2008: 249-254 - [c28]Keith Irwin, Ting Yu, William H. Winsborough:
Assigning Responsibility for Failed Obligations. IFIPTM 2008: 327-342 - [c27]Keith Irwin, Ting Yu, William H. Winsborough:
Enforcing security properties in task-based systems. SACMAT 2008: 41-50 - [c26]Heshan Lin, Xiaosong Ma, Jiangtian Li, Ting Yu, Nagiza F. Samatova:
Adaptive Request Scheduling for Parallel Scientific Web Services. SSDBM 2008: 276-294 - [c25]Keith Irwin, Ting Yu, William H. Winsborough:
Avoiding information leakage in security-policy-aware planning. WPES 2008: 85-94 - 2007
- [j8]Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu:
A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007) - [c24]Qing Zhang, Nick Koudas, Divesh Srivastava, Ting Yu:
Aggregate Query Answering on Anonymized Tables. ICDE 2007: 116-125 - [c23]Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun:
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566 - [p2]Sushil Jajodia, Ting Yu:
Basic Security Concepts. Secure Data Management in Decentralized Systems 2007: 3-20 - [p1]Adam J. Lee, Kent E. Seamons, Marianne Winslett, Ting Yu:
Automated Trust Negotiation in Open Systems. Secure Data Management in Decentralized Systems 2007: 217-258 - [e2]Peng Ning, Ting Yu:
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007. ACM 2007, ISBN 978-1-59593-883-1 [contents] - [e1]Ting Yu, Sushil Jajodia:
Secure Data Management in Decentralized Systems. Advances in Information Security 33, Springer 2007, ISBN 978-0-387-27694-6 [contents] - 2006
- [j7]Ninghui Li, Ting Yu, Annie I. Antón:
A semantics based approach to privacy languages. Comput. Syst. Sci. Eng. 21(5) (2006) - [j6]Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, Ting Yu:
Integrating XML data sources using approximate joins. ACM Trans. Database Syst. 31(1): 161-207 (2006) - [c22]Keith Irwin, Ting Yu, William H. Winsborough:
On the modeling and analysis of obligations. CCS 2006: 134-143 - [c21]Evan Martin, Tao Xie, Ting Yu:
Defining and Measuring Policy Coverage in Testing Access Control Policies. ICICS 2006: 139-158 - [c20]Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu:
Denial of Service Attacks and Defenses in Decentralized Trust Management. SecureComm 2006: 1-12 - [c19]Qing Zhang, Ting Yu, Peng Ning:
A Framework for Identifying Compromised Nodes in Sensor Networks. SecureComm 2006: 1-10 - 2005
- [c18]Keith Irwin, Ting Yu:
Preventing attribute information leakage in automated trust negotiation. CCS 2005: 36-45 - [c17]Keith Irwin, Ting Yu:
Determining user privacy preferences by asking the right questions: an automated approach. WPES 2005: 47-50 - 2004
- [j5]Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan, H. V. Jagadish:
A compressed accessibility map for XML. ACM Trans. Database Syst. 29(2): 363-402 (2004) - [c16]Nick Koudas, Michael Rabinovich, Divesh Srivastava, Ting Yu:
Routing XML Queries. ICDE 2004: 844 - [c15]Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, Charles C. Zhang:
How to Exploit Ontologies for Trust Negotiation. Trust@ISWC 2004 - [c14]Qing Zhang, Ting Yu:
A Classification Scheme for Trust Functions in Reputation-Based Trust Management. Trust@ISWC 2004 - [c13]Ting Yu, Ninghui Li, Annie I. Antón:
A formal semantics for P3P. SWS 2004: 1-8 - [c12]Keith Irwin, Ting Yu:
An identifiability-based access control model for privacy protection in open systems. WPES 2004: 43 - 2003
- [b1]Ting Yu:
Automated Trust Establishment in Open Systems. University of Illinois Urbana-Champaign, USA, 2003 - [j4]Ting Yu, Marianne Winslett, Jason E. Holt:
Two Security Symposia. IEEE Secur. Priv. 1(4): 50-52 (2003) - [j3]Marianne Winslett, Xiaosong Ma, Ting Yu:
Two-Body Job Searches. SIGMOD Rec. 32(2): 107-112 (2003) - [j2]Ting Yu, Marianne Winslett, Kent E. Seamons:
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6(1): 1-42 (2003) - [c11]Kent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu:
Trust Negotiation in Dynamic Coalitions. DISCEX (2) 2003: 240-245 - [c10]Sudipto Guha, Nick Koudas, Divesh Srivastava, Ting Yu:
Index-Based Approximate XML Joins. ICDE 2003: 708-710 - [c9]Ting Yu, Marianne Winslett:
A Unified Scheme for Resource Protection in Automated Trust Negotiation. S&P 2003: 110-122 - [c8]Ting Yu, Marianne Winslett:
Policy migration for sensitive credentials in trust negotiation. WPES 2003: 9-20 - 2002
- [j1]Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, Lina Yu:
Negotiating Trust on the Web. IEEE Internet Comput. 6(6): 30-37 (2002) - [c7]Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis:
Protecting Privacy during On-Line Trust Negotiation. Privacy Enhancing Technologies 2002: 129-143 - [c6]Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, Lina Yu:
Requirements for Policy Languages for Trust Negotiation. POLICY 2002: 68-79 - [c5]Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, Ting Yu:
Approximate XML joins. SIGMOD Conference 2002: 287-298 - [c4]Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan, H. V. Jagadish:
Compressed Accessibility Map: Efficient Access Control for XML. VLDB 2002: 478-489 - 2001
- [c3]Ting Yu, Marianne Winslett, Kent E. Seamons:
Interoperable strategies in automated trust negotiation. CCS 2001: 146-155 - [c2]Kent E. Seamons, Marianne Winslett, Ting Yu:
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. NDSS 2001 - 2000
- [c1]Ting Yu, Xiaosong Ma, Marianne Winslett:
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet. CCS 2000: 210-219
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint