Data
Application Security and Privacy
Summary of research on Privacy Preserving Data
Analystics
Summary of research on
Data Application Security
Publications:
2017
- Xingjie Yu, Michael Thang
Shiwen, Yingjiu Li, Robert H. Deng: Fair Deposits against Double-Spending
for Bitcoin Transactions. 2017
IEEE Conference on Dependable and Secure Computing (DSC), Taipei,
Taiwan, August 7—10, 2017.
2015
- Yan Li, Yingjiu Li, Qiang Yan,
Robert H. Deng: Privacy Leakage Analysis in Online Social Networks. Computers
& Security, 49 (2015): 239-254, Elsevier, 2015.
2014
- Haibing Lu, Shengsheng
Huang, Yingjiu Li, Yanjiang Yang: Panel Data
Analysis via Variable Selection and Subject Clustering. Book chapter in Data
Mining for Services, pages 61-78, edited by Katsutoshi
Yada, Springer, 2014.
- Haibing Lu, Jaideep
Vaidya, Vijay Atluri, Yingjiu Li: Statistical
Database Auditing Without Query Denial Threat. INFORMS Journal of
Computing, 27(1): 20-34, 2014.
2013
- Yan Li, Yingjiu Li, Qiang Yan,
Robert Deng: Think twice before you share: Analyzing privacy leakage under
privacy control in online social network (short paper). The 7th International Conference on
Network and System Security (NSS), pages 671-677, Madrid, Spain, June
3-4, 2013.
2011
- Yingjiu Li, Haibing
Lu: Privacy Risk
Assessment with Bounds Deduced from Bounds. International Journal of
Uncertainty, Fuzziness and Knowledge-Based Systems (IJUFKS), 19(4),
685-715, World Scientific, 2011.
2010
- Hasan Cavusoglu, Nan Hu,
Yingjiu Li, Dan Ma: Information Technology Diffusion with Influentials, Imitators, and Opponents: Model and
Preliminary Evidence. Journal of
Management Information Systems (JMIS), 27(2), pages 305-334, 2010.
- Bing Liang, Kevin Chiew, Yingjiu Li, Yanjiang
Yang: Privacy Disclosure Analysis and Control for 2D Contingency Tables
Containing Inaccurate Data. Privacy in Statistical
Databases (PSD), pages 1-16, Corfu, Greece, September 22-24, 2010.
2009
- Nan Hu, Giri
K. Tayi, Chengyu Ma,
Yingjiu Li: Certificate Revocation Release Policies. Journal of
Computer Security (JCS) , 17(2): 127-157,
IOS Press, 2009.
- Nan Hu, Jianhui Huang, Ling
Liu, Yingjiu Li, Dan Ma: Wake up or Fall Asleep -- Value Implication of
Trusted Computing. Information
Technology and Management, 10(4):177-192, Springer, 2009.
- Ge Fu, Hong Zhu, Yingjiu Li:
Robust Damage Assessment for Corrupted Database Systems Based on
Inter-Transaction Dependencies. The 5th International Conference
on Information Systems Security (ICISS), pages 237-251, Kolkata,
India, December 14-18, 2009. (acceptance ratio 18/91=19.8%)
- Haibing Lu, Yingjiu Li, Jaideep Vaidya, Vijay Atluri:
An Efficient Online Auditing Approach to Limit Private Data Disclosure. 12th International Conference on Extending Database
Technology (EDBT), pages
636-647, Saint-Petersburg, Russia, March 23-26, 2009.
2008
- Yingjiu Li, Huiping Guo, Shuhong Wang: A Multiple Bits Watermark for Relational
Data. Journal
of Database Management (JDM), 19(3):1-21, IGI Global, 2008 (collected
in Database Technologies: Concepts, Methodologies, Tools, and Applications
2009: 2223-2244, and in Principle Advancements in Database Management
Technologies 2010: 1-22).
- Daryl Walleck,
Yingjiu Li, Shouhuai Xu: Empirical Analysis of
Certificate Revocation Lists. The 22nd Annual IFIP WG
11.3 Working Conference on Data and Applications Security (DBSEC),
pages 159-174, LNCS 5094, Strand Palace Hotel, UK, July 13-16, 2008.
- Yingjiu Li, Haibing
Lu: Disclosure analysis and control in statistical databases. The 13th European Symposium on
Research in Computer Security (ESORICS), pages 146-160, LNCS 5283,
Malaga, Spain, October 6-8, 2008. (acceptance ratio 37/176=21%).
- Haibing Lu, Yingjiu Li: Practical
Inference Control for Data Cubes. IEEE
Transactions on Dependable and Secure Computing (TDSC), 5(2):87-98,
IEEE, 2008.
- Songtao Guo, Xintao
Wu, Yingjiu Li: Determining Error Bounds for Spectral Filtering Based
Reconstruction Methods in Privacy Preserving Data Mining. Knowledge and
Information Systems, An International Journal (KAIS), 17(2):217-240,
Springer, 2008.
- Ling Qiu, Yingjiu Li, Xintao Wu: Outsourcing Data Mining Tasks While
Protecting Business Intelligence and Customer Privacy. Knowledge and
Information Systems, An International Journal (KAIS), 17(1):99-120,
Springer, 2008.
2007
- Yingjiu Li: Database
Watermarking, A Systematic View (book chapter). Handbook
of Database Security: Applications and Trends, edited by Sushil Jajodia and Michael Gertz,
Springer, 2007.
- Huiping Guo, Yingjiu Li, Sushil Jajodia:
Chaining Watermarks for Detecting Malicious Modifications to Streaming
Data. Information
Sciences. 177(1):281-298, 2007.
- Yanjiang Yang, Yingjiu Li, Robert Deng:
New Paradigm of Inference Control with Trusted Computing. Data and
Applications Security (DBSEC) 2007, LNCS 4602, pages 243-258, Redondo
Beach, CA, USA, July 8-11, 2007.
- Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-Based Inference Control for
Multi-Dimensional Range Sum Queries. Journal of
Computer Security, 15(5):417-445, IOS
Press, 2007.
- Ling Qiu, Yingjiu Li, Xintao Wu: Preserving Privacy in Association Rule
Mining with Bloom Filters. Journal
of Intelligent Information Systems (JIIS), 29(3):253-278, Springer Netherlands, 2007.
2006
- Chengyu Ma, Nan Hu, Yingjiu Li: On
the Release of CRLs in Public Key Infrastructure. The 15th USENIX
Security Symposium (USENIX Security 2006), pages 17-28, Vancouver,
Canada, July 31-August 4, 2006 (acceptance ratio 22/179 = 12.3%).
- Jie Guo, Yingjiu Li, Robert
Deng, Kefei Chen: Rights Protection for Data
Cubes. The 9th
Information Security Conference (ISC'06), pages 359-372, Springer LNCS
4176/2006, Samos Island, Greece, August 30-September 2, 2006 (acceptance
ratio 38/188 = 20%).
- Huiping Guo, Yingjiu Li, Anyi Liu, Sushil
Jajodia: A Fragile Watermarking Scheme for Detecting Malicious
Modifications of Database Relations. Information
Sciences 176(10): 1350-1378, Elsevier, 2006.
- Yingjiu Li, Robert Deng:
Publicly Verifiable Ownership Protection for Relational Databases. ACM Symposium
on InformAtion, Computer, and Communication
Security (ASIACCS), pages 78-89, Taipei,
Taiwan,
March 21-24, 2006 (acceptance ratio 33/189 = 17.7%).
- Yingjiu Li, Sencun Zhu, X. Sean
Wang, Sushil Jajodia: Looking into the Seeds of Time: Discovering Temporal
Patterns in Large Transaction Sets. Information
Sciences, 176:1003–1031, Elsevier, 2006.
- Haibing Lu, Yingjiu Li, Xintao Wu: Disclosure Risk in Dynamic Two-Dimensional
Contingency Tables (Extended Abstract). The 2nd International Conference
on Information System Security (ICISS’06), pages 349-352, Kolkata,
India, December 17-21, 2006.
- Haibing Lu, Yingjiu Li, Xintao Wu: Disclosure
Analysis for Two-Way Contingency Tables. Privacy in Statistical
Databases (PSD'2006), pages 57-67, Springer LNCS 4302/2006, Rome,
December 13-15, 2006.
- Yingjiu Li, Haibing
Lu, Robert Deng: Practical Inference Control for Data Cubes (Extended
Abstract). IEEE
Symposium on Security and Privacy (S&P’06), pages 115-120, Oakland,
USA, May 21-24, 2006 (acceptance ratio 32/251=12.7%).
- Ling Qiu, Yingjiu Li, Xintao Wu: An Approach to Outsourcing Data Mining
Tasks While Protecting Business Intelligence and Customer Privacy. International Workshop on
Privacy Aspects of Data Mining (PADM 2006), pages 551-558, Hong Kong
Convention and Exhibition Centre, December 18, 2006.
- Songtao Guo, Xintao
Wu, Yingjiu Li: On the Lower Bound of Reconstruction Error for Spectral
Filtering. The 10th European
Conference on Principles and Practice of Knowledge Discovery in Databases
(PKDD 2006), pages 520-527, Berlin, Germany, September 18-22, 2006
(acceptance ratio 122/685 = 17.8%).
- Xintao Wu, Songtao
Guo, Yingjiu Li: Towards Statistical Modeling Based Value Disclosure
Analysis in General Databases. The 21st ACM Symposium
on Applied Computing (SAC’06), Track on Data Mining, pages 617-621,
Dijon, France, April 23-27, 2006.
- Songtao Guo, Xintao
Wu, Yingjiu Li: Deriving Private Information from Perturbed Data Using IQR
Based Approach. The 2nd International
Workshop on Privacy Data Management (PDM’06), Atlanta, USA, April 3-7,
2006.
2005
- Yingjiu Li, Vipin
Swarup, Sushil Jajodia:
Fingerprinting Relational Databases: Schemes and Specialties. IEEE
Transactions on Dependable and Secure Computing (TDSC), 2(1): 34-45,
2005.
- Xinwen Zhang, Yingjiu Li, Divya
Nalla: An Attribute-Based Access Matrix Model. Proceedings of the 2005 ACM Symposium
on Applied Computing (SAC), pages 359-363, Santa Fe, New Mexico, USA,
March 13-17, 2005. ACM, ISBN 1-58113-964-0
- Xintao Wu, Ying Wu, Yongge Wang, Yingjiu Li: Privacy Aware Market Basket
Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining. 2005
SIAM International Conference on Data Mining (SDM’05), pages 103-114,
Newport Beach, CA, USA, April 21-23, 2005.
2004
- Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Defending Against Additive Attacks with Maximal Errors in Watermarking
Relational Databases. DBSEC
2004: 81-94.
- Yingjiu Li, Huiping Guo, Sushil Jajodia: Tamper Detection and
Localization for Categorical Data Using Fragile Watermarks. ACM
Digital Rights Management Workshop (DRM 2004): 73-82.
2003
- Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Constructing a Virtual Primary Key for Fingerprinting Relational Data. ACM
Digital Rights Management Workshop (DRM 2003): 133-141
- Yingjiu Li, Vipin
Swarup, Sushil Jajodia:
A Robust Watermarking Scheme for Relational Data. The
13th Workshop on Information Technology and Systems (WITS), pages
195-200, Seattle, USA, December 2003.
- Yingjiu
Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
Discovering Calendar-Based Temporal Association Rules (preliminary version
appeared in TIME’01). Data
Knowl. Eng. 44(2): 193-218 (2003).
- Lingyu Wang, Yingjiu Li, Duminda Wijesekera,
Sushil Jajodia:
Precisely Answering Multi-dimensional Range Queries without Privacy
Breaches. ESORICS
2003: 100-115.
2002
- Yingjiu
Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia: Enhancing Profiles for
Anomaly Detection Using Time Granularities. Journal
of Computer Security 10(1/2): 137-158 (2002).
- Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia:
Auditing Interval-Based Inference. CAiSE 2002: 553-567.
- Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia:
A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159.
- Yingjiu Li, Lingyu Wang, Sushil Jajodia:
Preventing Interval-Based Inference by Random Data Perturbation. Privacy
Enhancing Technologies 2002: 160-170.
2001
- Yingjiu
Li, Peng Ning, X. Sean Wang, Sushil Jajodia: Generating Market Basket Data
with Temporal Information (poster paper). ACM
Workshop on Temporal Data Mining, San Francisco, CA, USA, August 2001.
- Yingjiu Li, Peng Ning, X. Sean
Wang, Sushil Jajodia: Discovering Calendar-based Temporal Association
Rules. The
8th International Symposium on Temporal Representation and Reasoning
(TIME), pages 111-118, Cividale, Italy, June
2001.
2000
- Yingjiu
Li, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Temporal
Patterns in Multiple Granularities. TSDM
2000: 5-19.
Last updated: Jan 2012.