Discovering calendar-based temporal association rules Y Li, P Ning, XS Wang, S Jajodia Data & Knowledge Engineering 44 (2), 193-218, 2003 | 368 | 2003 |
Fingerprinting relational databases: Schemes and specialties Y Li, V Swarup, S Jajodia IEEE Transactions on Dependable and Secure Computing 2 (1), 34-45, 2005 | 178 | 2005 |
Fully secure cipertext-policy hiding CP-ABE J Lai, RH Deng, Y Li International Conference on Information Security Practice and Experience, 24-39, 2011 | 147 | 2011 |
Tamper detection and localization for categorical data using fragile watermarks Y Li, H Guo, S Jajodia Proceedings of the 4th ACM workshop on Digital rights management, 73-82, 2004 | 141 | 2004 |
Protecting RFID communications in supply chains Y Li, X Ding Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 140 | 2007 |
Permission based Android security: Issues and countermeasures Z Fang, W Han, Y Li Computers & Security 43, 205-218, 2014 | 136 | 2014 |
Expressive CP-ABE with partially hidden access structures J Lai, RH Deng, Y Li Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 133 | 2012 |
A fragile watermarking scheme for detecting malicious modifications of database relations H Guo, Y Li, A Liu, S Jajodia Information Sciences 176 (10), 1350-1378, 2006 | 132 | 2006 |
ICCDetector: ICC-based malware detection on Android K Xu, Y Li, RH Deng IEEE Transactions on Information Forensics and Security 11 (6), 1252-1264, 2016 | 117 | 2016 |
A new framework for RFID privacy RH Deng, Y Li, M Yung, Y Zhao European Symposium on Research in Computer Security, 1-18, 2010 | 99 | 2010 |
Chaining watermarks for detecting malicious modifications to streaming data H Guo, Y Li, S Jajodia Information Sciences 177 (1), 281-298, 2007 | 98 | 2007 |
An attribute-based access matrix model X Zhang, Y Li, D Nalla Proceedings of the 2005 ACM symposium on Applied computing, 359-363, 2005 | 88 | 2005 |
Attacks and improvements to an RIFD mutual authentication protocol and its extensions S Cai, Y Li, T Li, RH Deng Proceedings of the second ACM conference on Wireless network security, 51-58, 2009 | 85 | 2009 |
Two robust remote user authentication protocols using smart cards KH Yeh, C Su, NW Lo, Y Li, YX Hung Journal of Systems and Software 83 (12), 2556-2565, 2010 | 80 | 2010 |
Protecting business intelligence and customer privacy while outsourcing data mining tasks L Qiu, Y Li, X Wu Knowledge and information systems 17 (1), 99-120, 2008 | 76 | 2008 |
RFID privacy: relation between two notions, minimal condition, and efficient construction C Ma, Y Li, RH Deng, T Li Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 75 | 2009 |
An intrusion response decision-making model based on hierarchical task network planning C Mu, Y Li Expert systems with applications 37 (3), 2465-2472, 2010 | 74 | 2010 |
Information technology diffusion with influentials, imitators, and opponents H Cavusoglu, N Hu, Y Li, D Ma Journal of Management Information Systems 27 (2), 305-334, 2010 | 73 | 2010 |
Constructing a virtual primary key for fingerprinting relational data Y Li, V Swarup, S Jajodia Proceedings of the 3rd ACM workshop on Digital rights management, 133-141, 2003 | 72 | 2003 |
On limitations of designing leakage-resilient password systems: Attacks, principles and usability Q Yan, J Han, Y Li, RH Deng | 69 | 2012 |