


Остановите войну!
for scientists:


default search action
Yingjiu Li
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j80]Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control. IEEE Trans. Dependable Secur. Comput. 20(1): 53-67 (2023) - [j79]Shengmin Xu
, Xinyi Huang
, Jiaming Yuan, Yingjiu Li
, Robert H. Deng
:
Accountable and Fine-Grained Controllable Rewriting in Blockchains. IEEE Trans. Inf. Forensics Secur. 18: 101-116 (2023) - 2022
- [j78]Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng, Zheng Yang:
Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification. Comput. J. 65(10): 2570-2588 (2022) - [j77]Shengmin Xu, Yingjiu Li
, Robert H. Deng
, Yinghui Zhang
, Xiangyang Luo
, Ximeng Liu
:
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things. IEEE Trans. Cloud Comput. 10(1): 474-490 (2022) - [j76]Yao Cheng
, Chang Xu
, Zhen Hai
, Yingjiu Li
:
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model. IEEE Trans. Dependable Secur. Comput. 19(1): 77-90 (2022) - [j75]Shengmin Xu
, Jianting Ning
, Yingjiu Li
, Yinghui Zhang
, Guowen Xu
, Xinyi Huang
, Robert H. Deng
:
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. IEEE Trans. Dependable Secur. Comput. 19(2): 1064-1077 (2022) - [j74]Jiayun Xu
, Yingjiu Li
, Robert H. Deng
, Ke Xu
:
SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering. IEEE Trans. Dependable Secur. Comput. 19(2): 1149-1163 (2022) - [j73]Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Yingjiu Li
, Guowen Xu
:
Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud. IEEE Trans. Dependable Secur. Comput. 19(6): 3759-3773 (2022) - [j72]Zhuoran Ma
, Jianfeng Ma
, Yinbin Miao
, Yingjiu Li
, Robert H. Deng
:
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning. IEEE Trans. Inf. Forensics Secur. 17: 1639-1654 (2022) - [c101]Bowen Zhao, Yingjiu Li, Ximeng Liu, Hwee Hua Pang, Robert H. Deng:
FREED: An Efficient Privacy-Preserving Solution for Person Re-IDentification. DSC 2022: 1-8 - [c100]Jiaming Yuan
, Yingjiu Li
, Jianting Ning
, Robert H. Deng
:
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption. ISPEC 2022: 606-623 - [c99]Li Song, Qiongxiao Wang, Jingqiang Lin, Shijie Jia, Yingjiu Li, Yikai Chen:
Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme. WCNC 2022: 1010-1015 - [i13]Shaoying Cai, Yingjiu Li, Changshe Ma, Sherman S. M. Chow, Robert H. Deng:
Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication. CoRR abs/2210.10244 (2022) - 2021
- [j71]Yangguang Tian, Yingjiu Li, Yi Mu, Guomin Yang
:
Unlinkable and Revocable Secret Handshake. Comput. J. 64(8): 1303-1314 (2021) - [j70]Kai Bu
, Avery Laird, Yutian Yang, Linfeng Cheng, Jiaqing Luo, Yingjiu Li, Kui Ren:
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation. ACM Comput. Surv. 53(5): 104:1-104:34 (2021) - [j69]Yangguang Tian, Yingjiu Li, Robert H. Deng
, Binanda Sengupta
, Guomin Yang
:
Lattice-based remote user authentication from reusable fuzzy signature. J. Comput. Secur. 29(3): 273-298 (2021) - [j68]Yan Li
, Yao Cheng, Weizhi Meng
, Yingjiu Li
, Robert H. Deng
:
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices. IEEE Trans. Inf. Forensics Secur. 16: 307-321 (2021) - [c98]Ximing Liu, Yingjiu Li, Robert H. Deng
:
UltraPIN: Inferring PIN Entries via Ultrasound. AsiaCCS 2021: 944-957 - [c97]Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan
, Yingjiu Li, Jian Weng, Robert H. Deng
:
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. CCS 2021: 2307-2320 - [c96]Jiayun Xu, Yingjiu Li, Robert H. Deng:
Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection. NDSS 2021 - [i12]Peizhuo Lv, Pan Li
, Shengzhi Zhang, Kai Chen, Ruigang Liang, Yue Zhao, Yingjiu Li:
HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks. CoRR abs/2103.13628 (2021) - [i11]Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou:
Accountable Fine-grained Blockchain Rewriting in the Permissionless Setting. CoRR abs/2104.13543 (2021) - [i10]Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen:
A Practical Forward-Secure DualRing. IACR Cryptol. ePrint Arch. 2021: 1483 (2021) - 2020
- [j67]Yangguang Tian, Yingjiu Li, Robert H. Deng
, Nan Li
, Guomin Yang
, Zheng Yang:
A New Construction for Linkable Secret Handshake. Comput. J. 63(4): 536-548 (2020) - [j66]Binanda Sengupta
, Yingjiu Li, Yangguang Tian, Robert H. Deng
:
Editing-Enabled Signatures: A New Tool for Editing Authenticated Data. IEEE Internet Things J. 7(6): 4997-5007 (2020) - [j65]Shengmin Xu, Jiaming Yuan
, Guowen Xu, Yingjiu Li, Ximeng Liu
, Yinghui Zhang
, Zuobin Ying
:
Efficient ciphertext-policy attribute-based encryption with blackbox traceability. Inf. Sci. 538: 19-38 (2020) - [j64]Yangguang Tian, Yingjiu Li, Robert H. Deng
, Nan Li
, Pengfei Wu
, Anyi Liu:
A new framework for privacy-preserving biometric-based remote user authentication. J. Comput. Secur. 28(4): 469-498 (2020) - [j63]Yangguang Tian, Yingjiu Li, Binanda Sengupta
, Nan Li
, Chunhua Su:
Leakage-resilient biometric-based remote user authentication with fuzzy extractors. Theor. Comput. Sci. 814: 223-233 (2020) - [j62]Yang Yang
, Ximeng Liu
, Robert H. Deng
, Yingjiu Li
:
Lightweight Sharable and Traceable Secure Mobile Health System. IEEE Trans. Dependable Secur. Comput. 17(1): 78-91 (2020) - [j61]Binanda Sengupta
, Yingjiu Li, Kai Bu, Robert H. Deng
:
Privacy-preserving Network Path Validation. ACM Trans. Internet Techn. 20(1): 5:1-5:27 (2020) - [c95]Tao Xue, Yu Wen, Bo Luo, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li
, Dan Meng:
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. ACSAC 2020: 582-596 - [c94]Yangguang Tian, Nan Li
, Yingjiu Li, Pawel Szalachowski, Jianying Zhou
:
Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability. ACSAC 2020: 813-828 - [i9]Yao Cheng, Chang Xu, Zhen Hai, Yingjiu Li:
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model. CoRR abs/2006.13462 (2020)
2010 – 2019
- 2019
- [j60]Ximing Liu, Yingjiu Li, Robert H. Deng
, Bing Chang, Shujun Li:
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Comput. Secur. 80: 90-107 (2019) - [j59]Yangguang Tian, Yingjiu Li, Guomin Yang
, Willy Susilo
, Yi Mu, Hui Cui
, Yinghui Zhang:
DABKE: Secure deniable attribute-based key exchange framework. J. Comput. Secur. 27(2): 259-275 (2019) - [j58]Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, Robert Huijie Deng
:
Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin. J. Comput. Secur. 27(3): 375-403 (2019) - [j57]Anyi Liu, Selena Haidar, Yuan Cheng
, Yingjiu Li:
Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log. EAI Endorsed Trans. Security Safety 6(20): e3 (2019) - [j56]Hui Cui
, Robert H. Deng
, Yingjiu Li
, Guowei Wu:
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud. IEEE Trans. Big Data 5(3): 330-342 (2019) - [j55]Anyi Liu
, Huirong Fu, Yuan Hong
, Jigang Liu, Yingjiu Li
:
LiveForen: Ensuring Live Forensic Integrity in the Cloud. IEEE Trans. Inf. Forensics Secur. 14(10): 2749-2764 (2019) - [c93]Yangguang Tian, Yingjiu Li, Binanda Sengupta
, Nan Li
, Yong Yu:
Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion. CANS 2019: 512-524 - [c92]Yan Li, Zilong Wang, Yingjiu Li, Robert H. Deng
, Binbin Chen
, Weizhi Meng, Hui Li:
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication. AsiaCCS 2019: 241-246 - [c91]Shengmin Xu, Jiaming Yuan
, Yingjiu Li, Ximeng Liu, Yinghui Zhang:
Super Payment Channel for Decentralized Cryptocurrencies. DSC 2019: 1-8 - [c90]Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen, Jiayun Xu:
DroidEvolver: Self-Evolving Android Malware Detection System. EuroS&P 2019: 47-62 - [c89]Pamela Hui Ting Chua, Yingjiu Li, Wei He:
Adopting Hyperledger Fabric Blockchain for EPCglobal Network. RFID 2019: 1-8 - [c88]Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang
:
Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy. SecureComm (2) 2019: 184-204 - [i8]Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng:
Privacy-Preserving Network Path Validation. IACR Cryptol. ePrint Arch. 2019: 407 (2019) - [i7]Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang:
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature. IACR Cryptol. ePrint Arch. 2019: 743 (2019) - 2018
- [j54]Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen Tao Zhu, Yingjiu Li, Zhan Wang:
User-friendly deniable storage for mobile devices. Comput. Secur. 72: 163-174 (2018) - [j53]Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen Tao Zhu, Robert H. Deng
:
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch. Cybersecur. 1(1): 7 (2018) - [j52]Hui Cui
, Robert H. Deng
, Yingjiu Li:
Attribute-based cloud storage with secure provenance over encrypted data. Future Gener. Comput. Syst. 79: 461-472 (2018) - [j51]Yan Li, Yingjiu Li, Ke Xu, Qiang Yan, Robert H. Deng
:
Empirical Study of Face Authentication Systems Under OSNFD Attacks. IEEE Trans. Dependable Secur. Comput. 15(2): 231-245 (2018) - [j50]Hui Cui
, Zhiguo Wan
, Robert H. Deng
, Guilin Wang, Yingjiu Li:
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud. IEEE Trans. Dependable Secur. Comput. 15(3): 409-422 (2018) - [j49]Kai Bu
, Yingjiu Li:
Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths. IEEE Trans. Inf. Forensics Secur. 13(4): 834-849 (2018) - [j48]Hui Cui
, Robert H. Deng
, Joseph K. Liu
, Xun Yi
, Yingjiu Li:
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices. IEEE Trans. Ind. Informatics 14(8): 3724-3732 (2018) - [c87]Ximing Liu, Yingjiu Li, Robert H. Deng
:
Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings. ACSAC 2018: 53-65 - [c86]Yangguang Tian, Yingjiu Li, Binanda Sengupta
, Robert Huijie Deng
, Albert Ching, Weiwei Liu:
Privacy-Preserving Remote User Authentication with k-Times Untraceability. Inscrypt 2018: 647-657 - [c85]Daoyuan Wu, Yao Cheng, Debin Gao
, Yingjiu Li, Robert H. Deng
:
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. CODASPY 2018: 299-306 - [c84]Yangguang Tian, Yingjiu Li, Ximeng Liu, Robert H. Deng
, Binanda Sengupta
:
PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication. DSC 2018: 1-8 - [c83]Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen Tao Zhu, Yangguang Tian, Zhan Wang, Albert Ching:
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices. DSN 2018: 454-465 - [c82]Ke Xu, Yingjiu Li, Robert H. Deng
, Kai Chen:
DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks. EuroS&P 2018: 473-487 - [c81]Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li
, Guomin Yang
, Yong Yu:
DSH: Deniable Secret Handshake Framework. ISPEC 2018: 341-353 - [c80]Yangguang Tian, Yingjiu Li, Rongmao Chen, Nan Li
, Ximeng Liu, Bing Chang, Xingjie Yu:
Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience. SecureComm (1) 2018: 112-132 - [e5]Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 254, Springer 2018, ISBN 978-3-030-01700-2 [contents] - [e4]Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 255, Springer 2018, ISBN 978-3-030-01703-3 [contents] - [i6]Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng:
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. CoRR abs/1801.04372 (2018) - [i5]Kai Bu, Yutian Yang, Avery Laird, Jiaqing Luo, Yingjiu Li, Kui Ren:
What's (Not) Validating Network Paths: A Survey. CoRR abs/1804.03385 (2018) - [i4]Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li:
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. CoRR abs/1810.07665 (2018) - 2017
- [j47]Xingjie Yu, Zhan Wang, Yingjiu Li, Liang Li, Wen Tao Zhu, Li Song:
EvoPass: Evolvable graphical password against shoulder-surfing attacks. Comput. Secur. 70: 179-198 (2017) - [j46]Yao Cheng, Yingjiu Li, Robert H. Deng
, Lingyun Ying, Wei He:
A study on a feasible no-root approach on Android. J. Comput. Secur. 25(3): 231-253 (2017) - [j45]Chunhua Su, Bagus Santoso
, Yingjiu Li, Robert H. Deng
, Xinyi Huang:
Universally Composable RFID Mutual Authentication. IEEE Trans. Dependable Secur. Comput. 14(1): 83-94 (2017) - [j44]Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng
:
A Secure, Usable, and Transparent Middleware for Permission Managers on Android. IEEE Trans. Dependable Secur. Comput. 14(4): 350-362 (2017) - [j43]Ximeng Liu, Baodong Qin, Robert H. Deng
, Yingjiu Li:
An Efficient Privacy-Preserving Outsourced Computation over Public Data. IEEE Trans. Serv. Comput. 10(5): 756-770 (2017) - [c79]Hui Cui
, Robert H. Deng
, Joseph K. Liu, Yingjiu Li:
Attribute-Based Encryption with Expressive and Authorized Keyword Search. ACISP (1) 2017: 106-126 - [c78]Yan Li, Yao Cheng, Yingjiu Li, Robert H. Deng
:
What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses. AsiaCCS 2017: 327-333 - [c77]Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, Robert Huijie Deng
:
Fair deposits against double-spending for Bitcoin transactions. DSC 2017: 44-51 - [c76]Zhi Yuan Poh, Hui Cui
, Robert H. Deng
, Yingjiu Li:
Attribute-Based Secure Messaging in the Public Cloud. SG-CRC 2017: 86-96 - [c75]Bing Chang, Ximing Liu, Yingjiu Li, Pingjian Wang, Wen Tao Zhu, Zhan Wang:
Employing Smartwatch for Enhanced Password Authentication. WASA 2017: 691-703 - 2016
- [j42]Lixian Liu, Junzuo Lai, Robert H. Deng
, Yingjiu Li:
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Secur. Commun. Networks 9(18): 4897-4913 (2016) - [j41]Ke Xu, Yingjiu Li, Robert H. Deng
:
ICCDetector: ICC-Based Malware Detection on Android. IEEE Trans. Inf. Forensics Secur. 11(6): 1252-1264 (2016) - [c74]Yao Cheng, Yingjiu Li, Robert H. Deng
:
A Feasible No-Root Approach on Android. ACISP (2) 2016: 481-489 - [c73]Hui Cui
, Robert H. Deng
, Yingjiu Li, Baodong Qin:
Server-Aided Revocable Attribute-Based Encryption. ESORICS (2) 2016: 570-587 - [c72]Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao:
Efficient Tag Path Authentication Protocol with Less Tag Memory. ISPEC 2016: 255-270 - [c71]Su Mon Kywe, Yingjiu Li, Jason I. Hong
, Cheng Yao:
Dissecting developer policy violating apps: characterization and detection. MALWARE 2016: 10-19 - [c70]Su Mon Kywe, Yingjiu Li, Kunal Petal, Michael Grace:
Attacking Android smartphone systems without permissions. PST 2016: 147-156 - [c69]Hui Cui
, Robert H. Deng
, Xuhua Ding
, Yingjiu Li:
Attribute-Based Encryption with Granular Revocation. SecureComm 2016: 165-181 - [i3]Daoyuan Wu, Debin Gao, Yingjiu Li, Robert H. Deng:
SecComp: Towards Practically Defending Against Component Hijacking in Android Applications. CoRR abs/1609.03322 (2016) - 2015
- [b2]Yingjiu Li, Qiang Yan, Robert H. Deng
:
Leakage Resilient Password Systems. Springer Briefs in Computer Science, Springer 2015, ISBN 978-3-319-17502-7, pp. 1-64 - [j40]Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou
, Robert H. Deng
:
Leakage-resilient password entry: Challenges, design, and evaluation. Comput. Secur. 48: 196-211 (2015) - [j39]Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng
:
Privacy leakage analysis in online social networks. Comput. Secur. 49: 239-254 (2015) - [j38]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri
, Yingjiu Li:
Statistical Database Auditing Without Query Denial Threat. INFORMS J. Comput. 27(1): 20-34 (2015) - [c68]Yan Li, Yingjiu Li, Qiang Yan, Hancong Kong, Robert H. Deng
:
Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication. CCS 2015: 1558-1569 - [c67]Baodong Qin, Robert H. Deng
, Yingjiu Li, Shengli Liu:
Server-Aided Revocable Identity-Based Encryption. ESORICS (1) 2015: 286-304 - [c66]Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng
:
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers. WISEC 2015: 6:1-6:6 - [i2]Roy Ka-Wei Lee, Yingjiu Li:
SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network. CoRR abs/1509.05582 (2015) - 2014
- [j37]Zheran Fang, Weili Han, Yingjiu Li:
Permission based Android security: Issues and countermeasures. Comput. Secur. 43: 205-218 (2014) - [j36]Hung-Yu Chien, Yingjiu Li, Nai-Wei Lo
:
Innovative Applications and Security of Internet of Things. Int. J. Distributed Sens. Networks 10 (2014) - [j35]Chengpo Mu, Meng Yu, Yingjiu Li, Wanyu Zang:
Risk balance defense approach against intrusions for network server. Int. J. Inf. Sec. 13(3): 255-269 (2014) - [j34]Junzuo Lai, Yingjiu Li, Robert H. Deng
, Jian Weng, Chaowen Guan, Qiang Yan:
Towards semantically secure outsourcing of association rule mining on categorical data. Inf. Sci. 267: 267-286 (2014) - [j33]Kuo-Hui Yeh, Nai-Wei Lo, Kuo-Yu Tsai, Yingjiu Li, Enrico Winata:
A Novel RFID Tag Identification Protocol: Adaptive $$n$$ n -Resolution and $$k$$ k -Collision Arbitration. Wirel. Pers. Commun. 77(3): 1775-1800 (2014) - [c65]Junzuo Lai, Robert H. Deng
, Yingjiu Li, Jian Weng:
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. AsiaCCS 2014: 239-248 - [c64]Yan Li, Ke Xu, Qiang Yan, Yingjiu Li, Robert H. Deng
:
Understanding OSN-based facial disclosure against face authentication systems. AsiaCCS 2014: 413-424 - [c63]Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng
, Jian Weng:
Authorized Keyword Search on Encrypted Data. ESORICS (1) 2014: 419-435 - [c62]Su Mon Kywe, Yingjiu Li, Robert H. Deng
, Jason I. Hong
:
Detecting Camouflaged Applications on Mobile Application Markets. ICISC 2014: 241-254 - [c61]Jie Shi, Su Mon Kywe, Yingjiu Li:
Batch Clone Detection in RFID-enabled supply chain. IEEE RFID 2014: 118-125 - [c60]Gaurang Torvekar, Yingjiu Li:
AnonEPC - making the querying user anonymous in EPCglobal network. RFID-TA 2014: 283-288 - [p4]Kevin Chiew, Yingjiu Li, Congfu Xu:
On RFID False Authentications. Big Data and Internet of Things 2014: 91-110 - [e3]Nai-Wei Lo, Yingjiu Li, Kuo-Hui Yeh:
Radio Frequency Identification System Security - RFIDsec'14 Asia Workshop Proceedings, Hualien, Taiwan, November 27-28, 2014. Cryptology and Information Security Series 12, IOS Press 2014, ISBN 978-1-61499-461-9 [contents] - 2013
- [b1]Yingjiu Li, Robert H. Deng
, Elisa Bertino:
RFID Security and Privacy. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013 - [c59]Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng
, Debin Gao
, Yingjiu Li, Jianying Zhou
:
Launching Generic Attacks on iOS with Approved Third-Party Applications. ACNS 2013: 272-289 - [c58]Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou
, Robert H. Deng
:
Designing leakage-resilient password entry on touchscreen mobile devices. AsiaCCS 2013: 37-48 - [c57]Junzuo Lai, Xuhua Zhou, Robert Huijie Deng
, Yingjiu Li, Kefei Chen:
Expressive search on encrypted data. AsiaCCS 2013: 243-252 - [c56]Divyan Munirathnam Konidala, Robert H. Deng
, Yingjiu Li, Hoong Chuin Lau
, Stephen E. Fienberg:
Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks. ISPEC 2013: 174-188 - [c55]Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng
:
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks. NSS 2013: 671-677 - [c54]Su Mon Kywe, Yingjiu Li, Jie Shi:
Attack and defense mechanisms of malicious EPC event injection in EPC discovery service. RFID-TA 2013: 1-6 - 2012
- [j32]Jie Shi, Yingjiu Li, Wei He, Darren Sim:
SecTTS: A secure track & trace system for RFID-enabled supply chains. Comput. Ind. 63(6): 574-585 (2012) - [j31]Jie Shi, Yingjiu Li, Robert H. Deng
:
A secure and efficient discovery service system in EPCglobal network. Comput. Secur. 31(8): 870-885 (2012) - [j30]