Yingjiu Li, Ph.D. - Publications

Affiliations: 
2003 George Mason University, Washington, DC 
Area:
Computer Science

54 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2021 Li Y, Cheng Y, Meng W, Li Y, Deng RH. Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices Ieee Transactions On Information Forensics and Security. 16: 307-321. DOI: 10.1109/Tifs.2020.3013212  0.37
2020 Tian Y, Li Y, Deng RH, Li N, Wu P, Liu A. A new framework for privacy-preserving biometric-based remote user authentication Journal of Computer Security. 28: 469-498. DOI: 10.3233/Jcs-191336  0.396
2020 Xu S, Ning J, Li Y, Zhang Y, Xu G, Huang X, Deng RH. Match in my way: Fine-grained bilateral access control for secure cloud-fog computing Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.3001557  0.34
2020 Cheng Y, Xu C, Hai Z, Li Y. DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.2987025  0.406
2020 Yang Y, Liu X, Deng RH, Li Y. Lightweight Sharable and Traceable Secure Mobile Health System Ieee Transactions On Dependable and Secure Computing. 17: 78-91. DOI: 10.1109/Tdsc.2017.2729556  0.431
2020 Sengupta B, Li Y, Tian Y, Deng RH. Editing-Enabled Signatures: A New Tool for Editing Authenticated Data Ieee Internet of Things Journal. 7: 4997-5007. DOI: 10.1109/Jiot.2020.2972741  0.422
2020 Tian Y, Li Y, Sengupta B, Li N, Su C. Leakage-resilient biometric-based remote user authentication with fuzzy extractors Theoretical Computer Science. 814: 223-233. DOI: 10.1016/J.Tcs.2020.02.001  0.432
2020 Xu S, Yuan J, Xu G, Li Y, Liu X, Zhang Y, Ying Z. Efficient ciphertext-policy attribute-based encryption with blackbox traceability Information Sciences. 538: 19-38. DOI: 10.1016/J.Ins.2020.05.115  0.439
2019 Tian Y, Li Y, Yang G, Susilo W, Mu Y, Cui H, Zhang Y. DABKE: Secure deniable attribute-based key exchange framework Journal of Computer Security. 27: 259-275. DOI: 10.3233/Jcs-181201  0.44
2019 Liu A, Fu H, Hong Y, Liu J, Li Y. $LiveForen$ : Ensuring Live Forensic Integrity in the Cloud Ieee Transactions On Information Forensics and Security. 14: 2749-2764. DOI: 10.1109/Tifs.2019.2898841  0.392
2019 Cui H, Deng RH, Li Y, Wu G. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Ieee Transactions On Big Data. 5: 330-342. DOI: 10.1109/Tbdata.2017.2656120  0.438
2019 Liu X, Li Y, Deng RH, Chang B, Li S. When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks Computers & Security. 80: 90-107. DOI: 10.1016/J.Cose.2018.09.003  0.425
2018 Chang B, Li Y, Wang Q, Zhu WT, Deng RH. Making a good thing better: enhancing password/PIN-based user authentication with smartwatch Cybersecurity. 1: 1-13. DOI: 10.1186/S42400-018-0009-4  0.385
2018 Bu K, Li Y. Every Step You Take, I’ll Be Watching You: Practical StepAuth-Entication of RFID Paths Ieee Transactions On Information Forensics and Security. 13: 834-849. DOI: 10.1109/Tifs.2017.2768022  0.337
2018 Li Y, Li Y, Xu K, Yan Q, Deng RH. Empirical Study of Face Authentication Systems Under OSNFD Attacks Ieee Transactions On Dependable and Secure Computing. 15: 231-245. DOI: 10.1109/Tdsc.2016.2550459  0.331
2018 Cui H, Deng RH, Li Y. Attribute-based cloud storage with secure provenance over encrypted data Future Generation Computer Systems. 79: 461-472. DOI: 10.1016/J.Future.2017.10.010  0.458
2018 Chang B, Cheng Y, Chen B, Zhang F, Zhu WT, Li Y, Wang Z. User-friendly deniable storage for mobile devices Computers & Security. 72: 163-174. DOI: 10.1016/J.Cose.2017.09.005  0.408
2017 Liu X, Qin B, Deng RH, Li Y. An Efficient Privacy-Preserving Outsourced Computation over Public Data Ieee Transactions On Services Computing. 10: 756-770. DOI: 10.1109/Tsc.2015.2511008  0.415
2017 Wang D, Yao H, Li Y, Jin H, Zou D, Deng RH. A Secure, Usable, and Transparent Middleware for Permission Managers on Android Ieee Transactions On Dependable and Secure Computing. 14: 350-362. DOI: 10.1109/Tdsc.2015.2479613  0.347
2017 Su C, Santoso B, Li Y, Deng RH, Huang X. Universally Composable RFID Mutual Authentication Ieee Transactions On Dependable and Secure Computing. 14: 83-94. DOI: 10.1109/Tdsc.2015.2434376  0.418
2017 Yu X, Wang Z, Li Y, Li L, Zhu WT, Song L. EvoPass: Evolvable graphical password against shoulder-surfing attacks ☆ Computers & Security. 70: 179-198. DOI: 10.1016/J.Cose.2017.05.006  0.393
2016 Xu K, Li Y, Deng RH. ICCDetector: ICC-Based Malware Detection on Android Ieee Transactions On Information Forensics and Security. 11: 1252-1264. DOI: 10.1109/Tifs.2016.2523912  0.35
2016 Cui H, Wan Z, Deng RH, Wang G, Li Y. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud Ieee Transactions On Dependable and Secure Computing. 15: 409-422. DOI: 10.1109/Tdsc.2016.2599883  0.442
2016 Liu L, Lai J, Deng RH, Li Y. Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment Security and Communication Networks. 9: 4897-4913. DOI: 10.1002/Sec.1663  0.42
2015 Lu H, Vaidya J, Atluri V, Li Y. Statistical database auditing without query denial threat Informs Journal On Computing. 27: 20-34. DOI: 10.1287/Ijoc.2014.0607  0.334
2015 Li Y, Yan Q, Deng RH. Privacy leakage analysis in online social networks Computers and Security. 49: 239-254. DOI: 10.1016/J.Cose.2014.10.012  0.354
2015 Yan Q, Han J, Li Y, Zhou J, Deng RH. Leakage-resilient password entry: Challenges, design, and evaluation Computers and Security. 48: 196-211. DOI: 10.1016/J.Cose.2014.10.008  0.403
2014 Chien H, Li Y, Lo N. Innovative Applications and Security of Internet of Things International Journal of Distributed Sensor Networks. 10: 717898. DOI: 10.1155/2014/717898  0.38
2014 Lai J, Li Y, Deng RH, Weng J, Guan C, Yan Q. Towards semantically secure outsourcing of association rule mining on categorical data Information Sciences. 267: 267-286. DOI: 10.1016/J.Ins.2014.01.040  0.381
2014 Fang Z, Han W, Li Y. Permission based Android security: Issues and countermeasures Computers & Security. 43: 205-218. DOI: 10.1016/J.Cose.2014.02.007  0.431
2014 Yeh K, Lo N, Tsai K, Li Y, Winata E. A Novel RFID Tag Identification Protocol: Adaptive $$n$$n-Resolution and $$k$$k-Collision Arbitration Wireless Personal Communications. 77: 1775-1800. DOI: 10.1007/S11277-014-1608-3  0.322
2012 Shi J, Li Y, Deng RH. A secure and efficient discovery service system in EPCglobal network Computers & Security. 31: 870-885. DOI: 10.1016/J.Cose.2012.08.005  0.408
2012 Shi J, Li Y, He W, Sim D. SecTTS: A secure track & trace system for RFID-enabled supply chains Computers in Industry. 63: 574-585. DOI: 10.1016/J.Compind.2012.03.006  0.36
2011 Deng RH, Li Y, Yung M, Zhao Y. A zero-knowledge based framework for RFID privacy Journal of Computer Security. 19: 1109-1146. DOI: 10.3233/Jcs-2011-0440  0.409
2011 Chen Y, Yeh K, Lo N, Li Y, Winata E. Adaptive collision resolution for efficient RFID tag identification Eurasip Journal On Wireless Communications and Networking. 2011: 139. DOI: 10.1186/1687-1499-2011-139  0.376
2011 Li Y, Deng RH, Lai J, Ma C. On two RFID privacy notions and their relations Acm Transactions On Information and System Security. 14: 30. DOI: 10.1145/2043628.2043631  0.404
2011 LI Y, LU H. PRIVACY RISK ASSESSMENT WITH BOUNDS DEDUCED FROM BOUNDS International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 19: 685-715. DOI: 10.1142/S0218488511007180  0.315
2011 Yeh K, Lo NW, Li Y. Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture International Journal of Communication Systems. 24: 829-836. DOI: 10.1002/Dac.1184  0.463
2010 Cai S, Li Y, Li T, Deng RH, Yao H. Achieving high security and efficiency in RFID-tagged supply chains International Journal of Applied Cryptography. 2: 3-12. DOI: 10.1504/Ijact.2010.033794  0.347
2010 Yang Y, Li Y, Deng RH, Bao F. Shifting Inference Control to User Side: Architecture and Protocol Ieee Transactions On Dependable and Secure Computing. 7: 189-202. DOI: 10.1109/Tdsc.2008.70  0.427
2010 Yeh K, Su C, Lo NW, Li Y, Hung Y. Two robust remote user authentication protocols using smart cards Journal of Systems and Software. 83: 2556-2565. DOI: 10.1016/J.Jss.2010.07.062  0.442
2010 Peris-Lopez P, Hernandez-Castro JC, Tapiador JME, Li T, Li Y. Vulnerability analysis of RFID protocols for tag ownership transfer Computer Networks. 54: 1502-1508. DOI: 10.1016/J.Comnet.2009.11.007  0.372
2010 Ma C, Weng J, Li Y, Deng R. Efficient discrete logarithm based multi-signature scheme in the plain public key model Designs, Codes and Cryptography. 54: 121-133. DOI: 10.1007/S10623-009-9313-Z  0.397
2009 Hu N, Tayi GK, Ma C, Li Y. Certificate revocation release policies Journal of Computer Security. 17: 127-157. DOI: 10.3233/Jcs-2009-0330  0.346
2009 Hu N, Huang J, Liu L, Li Y, Ma D. Wake up or fall asleep-value implication of trusted computing Information Technology and Management. 10: 177-192. DOI: 10.1007/S10799-009-0060-7  0.309
2008 Li Y, Guo H, Wang S. A Multiple-Bits Watermark for Relational Data Journal of Database Management. 19: 1-21. DOI: 10.4018/Jdm.2008070101  0.422
2008 Lu H, Li Y. Practical Inference Control for Data Cubes Ieee Transactions On Dependable and Secure Computing. 5: 87-98. DOI: 10.1109/Tdsc.2007.70217  0.356
2007 Wang L, Li Y, Jajodia S, Wijesekera D. Parity-based inference control for multi-dimensional range sum queries Journal of Computer Security. 15: 417-445. DOI: 10.3233/Jcs-2007-15401  0.518
2007 Guo H, Li Y, Jajodia S. Chaining watermarks for detecting malicious modifications to streaming data Information Sciences. 177: 281-298. DOI: 10.1016/J.Ins.2006.03.014  0.561
2006 Guo H, Li Y, Liu A, Jajodia S. A fragile watermarking scheme for detecting malicious modifications of database relations Information Sciences. 176: 1350-1378. DOI: 10.1016/J.Ins.2005.06.003  0.566
2006 Li Y, Zhu S, Wang XS, Jajodia S. Looking into the seeds of time: Discovering temporal patterns in large transaction sets Information Sciences. 176: 1003-1031. DOI: 10.1016/J.Ins.2005.01.019  0.513
2005 Li Y, Swarup V, Jajodia S. Fingerprinting relational databases: schemes and specialties Ieee Transactions On Dependable and Secure Computing. 2: 34-45. DOI: 10.1109/Tdsc.2005.12  0.545
2005 Li Y, Zhang X. Securing credit card transactions with one-time payment scheme Electronic Commerce Research and Applications. 4: 413-426. DOI: 10.1016/J.Elerap.2005.06.002  0.423
2002 Li Y, Wu N, Sean Wang X, Jajodia S. Enhancing profiles for anomaly detection using time granularities Journal of Computer Security. 10: 137-157. DOI: 10.3233/Jcs-2002-101-206  0.61
Show low-probability matches.