Data Application Security and Privacy

 

Summary of research on Privacy Preserving Data Analystics

Summary of research on Data Application Security

 

Publications:

 

2017

  1. Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, Robert H. Deng: Fair Deposits against Double-Spending for Bitcoin Transactions. 2017 IEEE Conference on Dependable and Secure Computing (DSC), Taipei, Taiwan, August 7—10, 2017.

 

2015

  1. Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng: Privacy Leakage Analysis in Online Social Networks. Computers & Security, 49 (2015): 239-254, Elsevier, 2015.

 

2014

  1. Haibing Lu, Shengsheng Huang, Yingjiu Li, Yanjiang Yang: Panel Data Analysis via Variable Selection and Subject Clustering. Book chapter in Data Mining for Services, pages 61-78, edited by Katsutoshi Yada, Springer, 2014.
  2. Haibing Lu, Jaideep Vaidya, Vijay Atluri, Yingjiu Li: Statistical Database Auditing Without Query Denial Threat. INFORMS Journal of Computing, 27(1): 20-34, 2014.

 

2013

  1. Yan Li, Yingjiu Li, Qiang Yan, Robert Deng: Think twice before you share: Analyzing privacy leakage under privacy control in online social network (short paper). The 7th International Conference on Network and System Security (NSS), pages 671-677, Madrid, Spain, June 3-4, 2013.

 

2011

  1. Yingjiu Li, Haibing Lu: Privacy Risk Assessment with Bounds Deduced from Bounds. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (IJUFKS), 19(4), 685-715, World Scientific, 2011.

 

2010 

  1. Hasan Cavusoglu, Nan Hu, Yingjiu Li, Dan Ma: Information Technology Diffusion with Influentials, Imitators, and Opponents: Model and Preliminary Evidence.  Journal of Management Information Systems (JMIS), 27(2), pages 305-334, 2010.
  2. Bing Liang, Kevin Chiew, Yingjiu Li, Yanjiang Yang: Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data. Privacy in Statistical Databases (PSD), pages 1-16, Corfu, Greece, September 22-24, 2010.

 

2009

  1. Nan Hu, Giri K. Tayi, Chengyu Ma, Yingjiu Li: Certificate Revocation Release Policies. Journal of Computer Security (JCS) , 17(2): 127-157, IOS Press, 2009.
  2. Nan Hu, Jianhui Huang, Ling Liu, Yingjiu Li, Dan Ma: Wake up or Fall Asleep -- Value Implication of Trusted Computing. Information Technology and Management, 10(4):177-192, Springer, 2009.
  3. Ge Fu, Hong Zhu, Yingjiu Li: Robust Damage Assessment for Corrupted Database Systems Based on Inter-Transaction Dependencies. The 5th International Conference on Information Systems Security (ICISS), pages 237-251, Kolkata, India, December 14-18, 2009. (acceptance ratio 18/91=19.8%)
  4. Haibing Lu, Yingjiu Li, Jaideep Vaidya, Vijay Atluri: An Efficient Online Auditing Approach to Limit Private Data Disclosure.  12th International Conference on Extending Database Technology (EDBT), pages 636-647, Saint-Petersburg, Russia, March 23-26, 2009.

 

2008

  1. Yingjiu Li, Huiping Guo, Shuhong Wang: A Multiple Bits Watermark for Relational Data. Journal of Database Management (JDM), 19(3):1-21, IGI Global, 2008 (collected in Database Technologies: Concepts, Methodologies, Tools, and Applications 2009: 2223-2244, and in Principle Advancements in Database Management Technologies 2010: 1-22).
  2. Daryl Walleck, Yingjiu Li, Shouhuai Xu: Empirical Analysis of Certificate Revocation Lists. The 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC), pages 159-174, LNCS 5094, Strand Palace Hotel, UK, July 13-16, 2008.
  3. Yingjiu Li, Haibing Lu: Disclosure analysis and control in statistical databases. The 13th European Symposium on Research in Computer Security (ESORICS), pages 146-160, LNCS 5283, Malaga, Spain, October 6-8, 2008. (acceptance ratio 37/176=21%).
  4. Haibing Lu, Yingjiu Li: Practical Inference Control for Data Cubes. IEEE Transactions on Dependable and Secure Computing (TDSC), 5(2):87-98, IEEE, 2008.
  5. Songtao Guo, Xintao Wu, Yingjiu Li: Determining Error Bounds for Spectral Filtering Based Reconstruction Methods in Privacy Preserving Data Mining.   Knowledge and Information Systems, An International Journal (KAIS), 17(2):217-240, Springer, 2008.
  6. Ling Qiu, Yingjiu Li, Xintao Wu: Outsourcing Data Mining Tasks While Protecting Business Intelligence and Customer Privacy. Knowledge and Information Systems, An International Journal (KAIS), 17(1):99-120, Springer, 2008.

 

2007

  1. Yingjiu Li: Database Watermarking, A Systematic View (book chapter). Handbook of Database Security: Applications and Trends, edited by Sushil Jajodia and Michael Gertz, Springer, 2007.
  2. Huiping Guo, Yingjiu Li, Sushil Jajodia: Chaining Watermarks for Detecting Malicious Modifications to Streaming Data. Information Sciences. 177(1):281-298, 2007.
  3. Yanjiang Yang, Yingjiu Li, Robert Deng: New Paradigm of Inference Control with Trusted Computing. Data and Applications Security (DBSEC) 2007, LNCS 4602, pages 243-258, Redondo Beach, CA, USA, July 8-11, 2007.
  4. Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-Based Inference Control for Multi-Dimensional Range Sum Queries. Journal of Computer Security, 15(5):417-445, IOS Press, 2007.
  5. Ling Qiu, Yingjiu Li, Xintao Wu: Preserving Privacy in Association Rule Mining with Bloom Filters. Journal of Intelligent Information Systems (JIIS), 29(3):253-278, Springer Netherlands, 2007.

 

2006

  1. Chengyu Ma, Nan Hu, Yingjiu Li:  On the Release of CRLs in Public Key Infrastructure.  The 15th USENIX Security Symposium (USENIX Security 2006), pages 17-28, Vancouver, Canada, July 31-August 4, 2006 (acceptance ratio 22/179 = 12.3%).
  2. Jie Guo, Yingjiu Li, Robert Deng, Kefei Chen: Rights Protection for Data Cubes. The 9th Information Security Conference (ISC'06), pages 359-372, Springer LNCS 4176/2006, Samos Island, Greece, August 30-September 2, 2006 (acceptance ratio 38/188 = 20%).
  3. Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia: A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations. Information Sciences 176(10): 1350-1378, Elsevier, 2006.
  4. Yingjiu Li, Robert Deng: Publicly Verifiable Ownership Protection for Relational Databases.  ACM Symposium on InformAtion, Computer, and Communication Security (ASIACCS), pages 78-89, Taipei, Taiwan, March 21-24, 2006 (acceptance ratio 33/189 = 17.7%).
  5. Yingjiu Li, Sencun Zhu, X. Sean Wang, Sushil Jajodia: Looking into the Seeds of Time: Discovering Temporal Patterns in Large Transaction Sets. Information Sciences, 176:1003–1031, Elsevier, 2006.
  6. Haibing Lu, Yingjiu Li, Xintao Wu: Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract). The 2nd International Conference on Information System Security (ICISS’06), pages 349-352, Kolkata, India, December 17-21, 2006.
  7. Haibing Lu, Yingjiu Li, Xintao Wu: Disclosure Analysis for Two-Way Contingency Tables. Privacy in Statistical Databases (PSD'2006), pages 57-67, Springer LNCS 4302/2006, Rome, December 13-15, 2006.
  8. Yingjiu Li, Haibing Lu, Robert Deng: Practical Inference Control for Data Cubes (Extended Abstract). IEEE Symposium on Security and Privacy (S&P’06), pages 115-120, Oakland, USA, May 21-24, 2006 (acceptance ratio 32/251=12.7%).
  9. Ling Qiu, Yingjiu Li, Xintao Wu: An Approach to Outsourcing Data Mining Tasks While Protecting Business Intelligence and Customer Privacy. International Workshop on Privacy Aspects of Data Mining (PADM 2006), pages 551-558, Hong Kong Convention and Exhibition Centre, December 18, 2006.
  10. Songtao Guo, Xintao Wu, Yingjiu Li: On the Lower Bound of Reconstruction Error for Spectral Filtering. The 10th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD 2006), pages 520-527, Berlin, Germany, September 18-22, 2006 (acceptance ratio 122/685 = 17.8%).
  11. Xintao Wu, Songtao Guo, Yingjiu Li: Towards Statistical Modeling Based Value Disclosure Analysis in General Databases.  The 21st ACM Symposium on Applied Computing (SAC’06), Track on Data Mining, pages 617-621, Dijon, France, April 23-27, 2006.
  12. Songtao Guo, Xintao Wu, Yingjiu Li: Deriving Private Information from Perturbed Data Using IQR Based Approach.  The 2nd International Workshop on Privacy Data Management (PDM’06), Atlanta, USA, April 3-7, 2006.

 

2005

  1. Yingjiu Li, Vipin Swarup, Sushil Jajodia: Fingerprinting Relational Databases: Schemes and Specialties. IEEE Transactions on Dependable and Secure Computing (TDSC), 2(1): 34-45, 2005.
  2. Xinwen Zhang, Yingjiu Li, Divya Nalla: An Attribute-Based Access Matrix Model. Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), pages 359-363, Santa Fe, New Mexico, USA, March 13-17, 2005. ACM, ISBN 1-58113-964-0
  3. Xintao Wu, Ying Wu, Yongge Wang, Yingjiu Li: Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining. 2005 SIAM International Conference on Data Mining (SDM’05), pages 103-114, Newport Beach, CA, USA, April 21-23, 2005.

 

2004

  1. Yingjiu Li, Vipin Swarup, Sushil Jajodia: Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. DBSEC 2004: 81-94.
  2. Yingjiu Li, Huiping Guo, Sushil Jajodia: Tamper Detection and Localization for Categorical Data Using Fragile Watermarks. ACM Digital Rights Management Workshop (DRM 2004): 73-82.

 

2003

  1. Yingjiu Li, Vipin Swarup, Sushil Jajodia: Constructing a Virtual Primary Key for Fingerprinting Relational Data. ACM Digital Rights Management Workshop (DRM 2003): 133-141
  2. Yingjiu Li, Vipin Swarup, Sushil Jajodia: A Robust Watermarking Scheme for Relational Data. The 13th Workshop on Information Technology and Systems (WITS), pages 195-200, Seattle, USA, December 2003.
  3. Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Calendar-Based Temporal Association Rules (preliminary version appeared in TIME’01). Data Knowl. Eng. 44(2): 193-218 (2003).
  4. Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115.

 

2002

  1. Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia: Enhancing Profiles for Anomaly Detection Using Time Granularities. Journal of Computer Security 10(1/2): 137-158 (2002).
  2. Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Auditing Interval-Based Inference. CAiSE 2002: 553-567.
  3. Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159.
  4. Yingjiu Li, Lingyu Wang, Sushil Jajodia: Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170.

 

2001

  1. Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia: Generating Market Basket Data with Temporal Information (poster paper). ACM Workshop on Temporal Data Mining, San Francisco, CA, USA, August 2001.
  2. Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia: Discovering Calendar-based Temporal Association Rules. The 8th International Symposium on Temporal Representation and Reasoning (TIME), pages 111-118, Cividale, Italy, June 2001.

 

2000

  1. Yingjiu Li, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Temporal Patterns in Multiple Granularities. TSDM 2000: 5-19.

 

Last updated: Jan 2012.