Year |
Citation |
Score |
2021 |
Li Y, Cheng Y, Meng W, Li Y, Deng RH. Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices Ieee Transactions On Information Forensics and Security. 16: 307-321. DOI: 10.1109/Tifs.2020.3013212 |
0.37 |
|
2020 |
Tian Y, Li Y, Deng RH, Li N, Wu P, Liu A. A new framework for privacy-preserving biometric-based remote user authentication Journal of Computer Security. 28: 469-498. DOI: 10.3233/Jcs-191336 |
0.396 |
|
2020 |
Xu S, Ning J, Li Y, Zhang Y, Xu G, Huang X, Deng RH. Match in my way: Fine-grained bilateral access control for secure cloud-fog computing Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.3001557 |
0.34 |
|
2020 |
Cheng Y, Xu C, Hai Z, Li Y. DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.2987025 |
0.406 |
|
2020 |
Yang Y, Liu X, Deng RH, Li Y. Lightweight Sharable and Traceable Secure Mobile Health System Ieee Transactions On Dependable and Secure Computing. 17: 78-91. DOI: 10.1109/Tdsc.2017.2729556 |
0.431 |
|
2020 |
Sengupta B, Li Y, Tian Y, Deng RH. Editing-Enabled Signatures: A New Tool for Editing Authenticated Data Ieee Internet of Things Journal. 7: 4997-5007. DOI: 10.1109/Jiot.2020.2972741 |
0.422 |
|
2020 |
Tian Y, Li Y, Sengupta B, Li N, Su C. Leakage-resilient biometric-based remote user authentication with fuzzy extractors Theoretical Computer Science. 814: 223-233. DOI: 10.1016/J.Tcs.2020.02.001 |
0.432 |
|
2020 |
Xu S, Yuan J, Xu G, Li Y, Liu X, Zhang Y, Ying Z. Efficient ciphertext-policy attribute-based encryption with blackbox traceability Information Sciences. 538: 19-38. DOI: 10.1016/J.Ins.2020.05.115 |
0.439 |
|
2019 |
Tian Y, Li Y, Yang G, Susilo W, Mu Y, Cui H, Zhang Y. DABKE: Secure deniable attribute-based key exchange framework Journal of Computer Security. 27: 259-275. DOI: 10.3233/Jcs-181201 |
0.44 |
|
2019 |
Liu A, Fu H, Hong Y, Liu J, Li Y. $LiveForen$ : Ensuring Live Forensic Integrity in the Cloud Ieee Transactions On Information Forensics and Security. 14: 2749-2764. DOI: 10.1109/Tifs.2019.2898841 |
0.392 |
|
2019 |
Cui H, Deng RH, Li Y, Wu G. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Ieee Transactions On Big Data. 5: 330-342. DOI: 10.1109/Tbdata.2017.2656120 |
0.438 |
|
2019 |
Liu X, Li Y, Deng RH, Chang B, Li S. When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks Computers & Security. 80: 90-107. DOI: 10.1016/J.Cose.2018.09.003 |
0.425 |
|
2018 |
Chang B, Li Y, Wang Q, Zhu WT, Deng RH. Making a good thing better: enhancing password/PIN-based user authentication with smartwatch Cybersecurity. 1: 1-13. DOI: 10.1186/S42400-018-0009-4 |
0.385 |
|
2018 |
Bu K, Li Y. Every Step You Take, I’ll Be Watching You: Practical StepAuth-Entication of RFID Paths Ieee Transactions On Information Forensics and Security. 13: 834-849. DOI: 10.1109/Tifs.2017.2768022 |
0.337 |
|
2018 |
Li Y, Li Y, Xu K, Yan Q, Deng RH. Empirical Study of Face Authentication Systems Under OSNFD Attacks Ieee Transactions On Dependable and Secure Computing. 15: 231-245. DOI: 10.1109/Tdsc.2016.2550459 |
0.331 |
|
2018 |
Cui H, Deng RH, Li Y. Attribute-based cloud storage with secure provenance over encrypted data Future Generation Computer Systems. 79: 461-472. DOI: 10.1016/J.Future.2017.10.010 |
0.458 |
|
2018 |
Chang B, Cheng Y, Chen B, Zhang F, Zhu WT, Li Y, Wang Z. User-friendly deniable storage for mobile devices Computers & Security. 72: 163-174. DOI: 10.1016/J.Cose.2017.09.005 |
0.408 |
|
2017 |
Liu X, Qin B, Deng RH, Li Y. An Efficient Privacy-Preserving Outsourced Computation over Public Data Ieee Transactions On Services Computing. 10: 756-770. DOI: 10.1109/Tsc.2015.2511008 |
0.415 |
|
2017 |
Wang D, Yao H, Li Y, Jin H, Zou D, Deng RH. A Secure, Usable, and Transparent Middleware for Permission Managers on Android Ieee Transactions On Dependable and Secure Computing. 14: 350-362. DOI: 10.1109/Tdsc.2015.2479613 |
0.347 |
|
2017 |
Su C, Santoso B, Li Y, Deng RH, Huang X. Universally Composable RFID Mutual Authentication Ieee Transactions On Dependable and Secure Computing. 14: 83-94. DOI: 10.1109/Tdsc.2015.2434376 |
0.418 |
|
2017 |
Yu X, Wang Z, Li Y, Li L, Zhu WT, Song L. EvoPass: Evolvable graphical password against shoulder-surfing attacks ☆ Computers & Security. 70: 179-198. DOI: 10.1016/J.Cose.2017.05.006 |
0.393 |
|
2016 |
Xu K, Li Y, Deng RH. ICCDetector: ICC-Based Malware Detection on Android Ieee Transactions On Information Forensics and Security. 11: 1252-1264. DOI: 10.1109/Tifs.2016.2523912 |
0.35 |
|
2016 |
Cui H, Wan Z, Deng RH, Wang G, Li Y. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud Ieee Transactions On Dependable and Secure Computing. 15: 409-422. DOI: 10.1109/Tdsc.2016.2599883 |
0.442 |
|
2016 |
Liu L, Lai J, Deng RH, Li Y. Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment Security and Communication Networks. 9: 4897-4913. DOI: 10.1002/Sec.1663 |
0.42 |
|
2015 |
Lu H, Vaidya J, Atluri V, Li Y. Statistical database auditing without query denial threat Informs Journal On Computing. 27: 20-34. DOI: 10.1287/Ijoc.2014.0607 |
0.334 |
|
2015 |
Li Y, Yan Q, Deng RH. Privacy leakage analysis in online social networks Computers and Security. 49: 239-254. DOI: 10.1016/J.Cose.2014.10.012 |
0.354 |
|
2015 |
Yan Q, Han J, Li Y, Zhou J, Deng RH. Leakage-resilient password entry: Challenges, design, and evaluation Computers and Security. 48: 196-211. DOI: 10.1016/J.Cose.2014.10.008 |
0.403 |
|
2014 |
Chien H, Li Y, Lo N. Innovative Applications and Security of Internet of Things International Journal of Distributed Sensor Networks. 10: 717898. DOI: 10.1155/2014/717898 |
0.38 |
|
2014 |
Lai J, Li Y, Deng RH, Weng J, Guan C, Yan Q. Towards semantically secure outsourcing of association rule mining on categorical data Information Sciences. 267: 267-286. DOI: 10.1016/J.Ins.2014.01.040 |
0.381 |
|
2014 |
Fang Z, Han W, Li Y. Permission based Android security: Issues and countermeasures Computers & Security. 43: 205-218. DOI: 10.1016/J.Cose.2014.02.007 |
0.431 |
|
2014 |
Yeh K, Lo N, Tsai K, Li Y, Winata E. A Novel RFID Tag Identification Protocol: Adaptive $$n$$n-Resolution and $$k$$k-Collision Arbitration Wireless Personal Communications. 77: 1775-1800. DOI: 10.1007/S11277-014-1608-3 |
0.322 |
|
2012 |
Shi J, Li Y, Deng RH. A secure and efficient discovery service system in EPCglobal network Computers & Security. 31: 870-885. DOI: 10.1016/J.Cose.2012.08.005 |
0.408 |
|
2012 |
Shi J, Li Y, He W, Sim D. SecTTS: A secure track & trace system for RFID-enabled supply chains Computers in Industry. 63: 574-585. DOI: 10.1016/J.Compind.2012.03.006 |
0.36 |
|
2011 |
Deng RH, Li Y, Yung M, Zhao Y. A zero-knowledge based framework for RFID privacy Journal of Computer Security. 19: 1109-1146. DOI: 10.3233/Jcs-2011-0440 |
0.409 |
|
2011 |
Chen Y, Yeh K, Lo N, Li Y, Winata E. Adaptive collision resolution for efficient RFID tag identification Eurasip Journal On Wireless Communications and Networking. 2011: 139. DOI: 10.1186/1687-1499-2011-139 |
0.376 |
|
2011 |
Li Y, Deng RH, Lai J, Ma C. On two RFID privacy notions and their relations Acm Transactions On Information and System Security. 14: 30. DOI: 10.1145/2043628.2043631 |
0.404 |
|
2011 |
LI Y, LU H. PRIVACY RISK ASSESSMENT WITH BOUNDS DEDUCED FROM BOUNDS International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 19: 685-715. DOI: 10.1142/S0218488511007180 |
0.315 |
|
2011 |
Yeh K, Lo NW, Li Y. Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture International Journal of Communication Systems. 24: 829-836. DOI: 10.1002/Dac.1184 |
0.463 |
|
2010 |
Cai S, Li Y, Li T, Deng RH, Yao H. Achieving high security and efficiency in RFID-tagged supply chains International Journal of Applied Cryptography. 2: 3-12. DOI: 10.1504/Ijact.2010.033794 |
0.347 |
|
2010 |
Yang Y, Li Y, Deng RH, Bao F. Shifting Inference Control to User Side: Architecture and Protocol Ieee Transactions On Dependable and Secure Computing. 7: 189-202. DOI: 10.1109/Tdsc.2008.70 |
0.427 |
|
2010 |
Yeh K, Su C, Lo NW, Li Y, Hung Y. Two robust remote user authentication protocols using smart cards Journal of Systems and Software. 83: 2556-2565. DOI: 10.1016/J.Jss.2010.07.062 |
0.442 |
|
2010 |
Peris-Lopez P, Hernandez-Castro JC, Tapiador JME, Li T, Li Y. Vulnerability analysis of RFID protocols for tag ownership transfer Computer Networks. 54: 1502-1508. DOI: 10.1016/J.Comnet.2009.11.007 |
0.372 |
|
2010 |
Ma C, Weng J, Li Y, Deng R. Efficient discrete logarithm based multi-signature scheme in the plain public key model Designs, Codes and Cryptography. 54: 121-133. DOI: 10.1007/S10623-009-9313-Z |
0.397 |
|
2009 |
Hu N, Tayi GK, Ma C, Li Y. Certificate revocation release policies Journal of Computer Security. 17: 127-157. DOI: 10.3233/Jcs-2009-0330 |
0.346 |
|
2009 |
Hu N, Huang J, Liu L, Li Y, Ma D. Wake up or fall asleep-value implication of trusted computing Information Technology and Management. 10: 177-192. DOI: 10.1007/S10799-009-0060-7 |
0.309 |
|
2008 |
Li Y, Guo H, Wang S. A Multiple-Bits Watermark for Relational Data Journal of Database Management. 19: 1-21. DOI: 10.4018/Jdm.2008070101 |
0.422 |
|
2008 |
Lu H, Li Y. Practical Inference Control for Data Cubes Ieee Transactions On Dependable and Secure Computing. 5: 87-98. DOI: 10.1109/Tdsc.2007.70217 |
0.356 |
|
2007 |
Wang L, Li Y, Jajodia S, Wijesekera D. Parity-based inference control for multi-dimensional range sum queries Journal of Computer Security. 15: 417-445. DOI: 10.3233/Jcs-2007-15401 |
0.518 |
|
2007 |
Guo H, Li Y, Jajodia S. Chaining watermarks for detecting malicious modifications to streaming data Information Sciences. 177: 281-298. DOI: 10.1016/J.Ins.2006.03.014 |
0.561 |
|
2006 |
Guo H, Li Y, Liu A, Jajodia S. A fragile watermarking scheme for detecting malicious modifications of database relations Information Sciences. 176: 1350-1378. DOI: 10.1016/J.Ins.2005.06.003 |
0.566 |
|
2006 |
Li Y, Zhu S, Wang XS, Jajodia S. Looking into the seeds of time: Discovering temporal patterns in large transaction sets Information Sciences. 176: 1003-1031. DOI: 10.1016/J.Ins.2005.01.019 |
0.513 |
|
2005 |
Li Y, Swarup V, Jajodia S. Fingerprinting relational databases: schemes and specialties Ieee Transactions On Dependable and Secure Computing. 2: 34-45. DOI: 10.1109/Tdsc.2005.12 |
0.545 |
|
2005 |
Li Y, Zhang X. Securing credit card transactions with one-time payment scheme Electronic Commerce Research and Applications. 4: 413-426. DOI: 10.1016/J.Elerap.2005.06.002 |
0.423 |
|
2002 |
Li Y, Wu N, Sean Wang X, Jajodia S. Enhancing profiles for anomaly detection using time granularities Journal of Computer Security. 10: 137-157. DOI: 10.3233/Jcs-2002-101-206 |
0.61 |
|
Show low-probability matches. |