Ting Yu's Publications
Ph.D. Thesis
Ting Yu: "Automated Trust Establishment In Open Systems”. University of
Illinois at Urbana-Champaign, October, 2003.
Edited Books and Book Chapters
- Ting Yu and Sushil Jajodia (eds.) “Secure Data Management in
Decentralized Systems”. Springer 2007.
- Sushil Jajodia and Ting Yu: “Basic Security Concepts”. In Secure Data
Management in Decentralized Systems, Springer 2007.
- Adam J. Lee, Kent E. Seamons, Marianne Winslett and Ting Yu:
“Automated Trust Negotiation in Open Systems”. In Secure Data Management
in Decentralized Systems, Springer 2007.
Refereed Journal and Conference Papers
2025
-
Bowen He, Xiaohui Hu, Yufeng Hu, Ting Yu, Rui Chang, Lei Wu, and Yajin Zhou:
"Phishing Tactics Are Evolving: An Empirical Study of Phishing Contracts
on Ethereum,"
Abstracts of the 2025 ACM SIGMETRICS International Conference
on Measurement and Modeling of Computer Systems, SIGMETRICS 2025,
Stony Brook, NY, USA, June 9-13, 2025.
2024
-
Chaojie Lv, Xiaokui Xiao, Lan Zhang, and Ting Yu:
"Publishing Common Neighbors Histograms of Social Networks under Edge
Differential Privacy,"
Proceedings of the 19th ACM Asia Conference on Computer and Communications
Security, ASIA CCS 2024, Singapore, July 1-5, 2024.
-
Euijin Choo, Mohamed Nabeel, Doowon Kim, Ravindu De Silva, Ting Yu, and Issa Khalil:
"A Large Scale Study and Classification of VirusTotal Reports on Phishing
and Malware URLs,"
Abstracts of the 2024 ACM SIGMETRICS/IFIP PERFORMANCE Joint
International Conference on Measurement and Modeling of Computer Systems,
SIGMETRICS/PERFORMANCE 2024, Venice, Italy, June 10-14, 2024.
-
Saravanan Thirumuruganathan, Fatih Deniz, Issa Khalil, Ting Yu, Mohamed Nabeel, and Mourad Ouzzani:
"Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled
Data,"
33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia,
PA, USA, August 14-16, 2024.
2023
-
Euijin Choo, Mohamed Nabeel, Doowon Kim, Ravindu De Silva, Ting Yu, and Issa Khalil:
"A Large Scale Study and Classification of VirusTotal Reports on Phishing
and Malware URLs,"
Proc. ACM Meas. Anal. Comput. Syst., 2023, 7(3), 59:1--59:26.
-
Euijin Choo, Mohamed Nabeel, Mashael AlSabah, Issa Khalil, Ting Yu, and Wei Wang:
"DeviceWatch: A Data-Driven Network Analysis Approach to Identifying
Compromised Mobile Devices with Graph-Inference,"
ACM Trans. Priv. Secur., 2023, 26(1), 9:1--9:32.
2022
-
Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, and Gianluca Stringhini:
"Finding MNEMON: Reviving Memories of Node Embeddings,"
Proceedings of the 2022 ACM SIGSAC Conference on Computer and
Communications Security, CCS 2022, Los Angeles, CA, USA, November
7-11, 2022.
-
Saravanan Thirumuruganathan, Mohamed Nabeel, Euijin Choo, Issa Khalil, and Ting Yu:
"SIRAJ: A Unified Framework for Aggregation of Malicious Entity
Detectors,"
43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
CA, USA, May 22-26, 2022.
2021
-
Pengcheng Xia, Mohamed Nabeel, Issa Khalil, Haoyu Wang, and Ting Yu:
"Identifying and Characterizing COVID-19 Themed Malicious Domain
Campaigns,"
CODASPY '21: Eleventh ACM Conference on Data and Application Security
and Privacy, Virtual Event, USA, April 26-28, 2021.
-
Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, and Sencun Zhu:
"Time-Window Based Group-Behavior Supported Method for Accurate Detection
of Anomalous Users,"
51st Annual IEEE/IFIP International Conference on Dependable Systems
and Networks, DSN 2021, Taipei, Taiwan, June 21-24, 2021.
-
Mohamed Nabeel, Enes Altinisik, Haipei Sun, Issa Khalil, Wendy Hui Wang, and Ting Yu:
"CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise
Security,"
RAID '21: 24th International Symposium on Research in Attacks, Intrusions
and Defenses, San Sebastian, Spain, October 6-8, 2021.
-
Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, and Xuxian Jiang:
"EOSAFE: Security Analysis of EOSIO Smart Contracts,"
30th USENIX Security Symposium, USENIX Security 2021, August 11-13,
2021.
-
Ravindu De Silva, Mohamed Nabeel, Charith Elvitigala, Issa Khalil, Ting Yu, and Chamath Keppitiyagama:
"Compromised or Attacker-Owned: A Large Scale Classification and
Study of Hosting Domains of Malicious URLs,"
30th USENIX Security Symposium, USENIX Security 2021, August 11-13,
2021.
2020 and older
-
Mohamed Nabeel, Issa M. Khalil, Bei Guan, and Ting Yu:
"Following Passive DNS Traces to Detect Stealthy Malicious Domains
Via Graph Inference,"
ACM Trans. Priv. Secur., 2020, 23(4), 17:1--17:36.
-
Cong Shi, Xiaonan Guo, Ting Yu, Yingying Chen, Yucheng Xie, and Jian Liu:
"Mobile Device Usage Recommendation based on User Context Inference
Using Embedded Sensors,"
29th International Conference on Computer Communications and Networks,
ICCCN 2020, Honolulu, HI, USA, August 3-6, 2020.
-
Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Wendy Hui Wang, and Ting Yu:
"Analyzing Subgraph Statistics from Extended Local Views with Decentralized
Differential Privacy,"
Proceedings of the 2019 ACM SIGSAC Conference on Computer and
Communications Security, CCS 2019, London, UK, November 11-15, 2019.
-
Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, and Sencun Zhu:
"Towards Large-Scale Hunting for Android Negative-Day Malware,"
22nd International Symposium on Research in Attacks, Intrusions and
Defenses, RAID 2019, Chaoyang District, Beijing, China, September
23-25, 2019.
-
Yury Zhauniarovich, Issa Khalil, Ting Yu, and Marc Dacier:
"A Survey on Malicious Domains Detection through DNS Data Analysis,"
ACM Comput. Surv., 2018, 51(4), 67:1--67:36.
-
Ling Chen, Ting Yu, and Rada Chirkova:
"k-Skyband query answering with differential privacy,"
J. Comput. Secur., 2018, 26(5), 647--676.
-
Haipei Sun, Boxiang Dong, Wendy Hui Wang, Ting Yu, and Zhan Qin:
"Truth Inference on Sparse Crowdsourcing Data with Local Differential
Privacy,"
IEEE International Conference on Big Data (IEEE BigData 2018),
Seattle, WA, USA, December 10-13, 2018.
-
Issa M. Khalil, Bei Guan, Mohamed Nabeel, and Ting Yu:
"A Domain is only as Good as its Buddies: Detecting Stealthy Malicious
Domains via Graph Inference,"
Proceedings of the Eighth ACM Conference on Data and Application
Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21,
2018.
-
Euijin Choo, Ting Yu, and Min Chi:
"Detecting opinion spammer groups and spam targets through community
discovery and sentiment analysis,"
J. Comput. Secur., 2017, 25(3), 283--318.
-
Rada Chirkova, and Ting Yu:
"Exact Detection of Information Leakage: Decidability and Complexity,"
Trans. Large Scale Data Knowl. Centered Syst., 2017, 32, 1--23.
-
Zhan Qin, Ting Yu, Yin Yang, Issa Khalil, Xiaokui Xiao, and Kui Ren:
"Generating Synthetic Decentralized Social Graphs with Local Differential
Privacy,"
Proceedings of the 2017 ACM SIGSAC Conference on Computer and
Communications Security, CCS 2017, Dallas, TX, USA, October 30 -
November 03, 2017.
-
Ling Chen, Ting Yu, and Rada Chirkova:
"Differentially Private K-Skyband Query Answering Through Adaptive
Spatial Decomposition,"
Data and Applications Security and Privacy XXXI - 31st Annual IFIP
WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
2017, Proceedings.
-
Rade Stanojevic, Mohamed Nabeel, and Ting Yu:
"Distributed Cardinality Estimation of Set Operations with Differential
Privacy,"
IEEE Symposium on Privacy-Aware Computing, PAC 2017, Washington,
DC, USA, August 1-4, 2017.
-
Zhan Qin, Kui Ren, Ting Yu, and Jian Weng:
"DPcode: Privacy-Preserving Frequent Visual Patterns Publication on
Cloud,"
IEEE Trans. Multim., 2016, 18(5), 929--939.
-
Rui Zhang, Rui Xue, Ting Yu, and Ling Liu:
"Dynamic and Efficient Private Keyword Search over Inverted Index-Based
Encrypted Data,"
ACM Trans. Internet Techn., 2016, 16(3), 21:1--21:20.
-
Zhan Qin, Yin Yang, Ting Yu, Issa Khalil, Xiaokui Xiao, and Kui Ren:
"Heavy Hitter Estimation over Set-Valued Data with Local Differential
Privacy,"
Proceedings of the 2016 ACM SIGSAC Conference on Computer and
Communications Security, Vienna, Austria, October 24-28, 2016.
-
Issa Khalil, Ting Yu, and Bei Guan:
"Discovering Malicious Domains through Passive DNS Data Graph Analysis,"
Proceedings of the 11th ACM on Asia Conference on Computer and Communications
Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016.
-
Rui Zhang, Rui Xue, Ting Yu, and Ling Liu:
"PVSAE: A Public Verifiable Searchable Encryption Service Framework
for Outsourced Encrypted Data,"
IEEE International Conference on Web Services, ICWS 2016, San
Francisco, CA, USA, June 27 - July 2, 2016.
-
Zach Jorgensen, Ting Yu, and Graham Cormode:
"Publishing Attributed Social Graphs with Formal Privacy Guarantees,"
Proceedings of the 2016 International Conference on Management of
Data, SIGMOD Conference 2016, San Francisco, CA, USA, June 26 -
July 01, 2016.
-
Ling Chen, Ting Yu, and Rada Chirkova:
"Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned
Data,"
Information Security Theory and Practice - 10th IFIP WG 11.2 International
Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27,
2016, Proceedings.
-
Ling Chen, Ting Yu, and Rada Chirkova:
"WaveCluster with Differential Privacy,"
Proceedings of the 24th ACM International Conference on Information
and Knowledge Management, CIKM 2015, Melbourne, VIC, Australia,
October 19 - 23, 2015.
-
Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, and Ting Yu:
"Dimensions of Risk in Mobile Applications: A User Study,"
Proceedings of the 5th ACM Conference on Data and Application Security
and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015.
-
Farid Alborzi, Rada Chirkova, and Ting Yu:
"Exact Detection of Information Leakage in Database Access Control,"
Big Data Analytics and Knowledge Discovery - 17th International Conference,
DaWaK 2015, Valencia, Spain, September 1-4, 2015, Proceedings.
-
Euijin Choo, Ting Yu, and Min Chi:
"Detecting Opinion Spammer Groups Through Community Discovery and Sentiment
Analysis,"
Data and Applications Security and Privacy XXIX - 29th Annual IFIP
WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15,
2015, Proceedings.
-
Zach Jorgensen, Ting Yu, and Graham Cormode:
"Conservative or liberal? Personalized differential privacy,"
31st IEEE International Conference on Data Engineering, ICDE 2015,
Seoul, South Korea, April 13-17, 2015.
-
N. R. Ong, S. E. Rojcewicz, Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, and Ting Yu:
"Interactive preference-aware query optimization,"
31st IEEE International Conference on Data Engineering, ICDE 2015,
Seoul, South Korea, April 13-17, 2015.
-
Anna Cinzia Squicciarini, and Ting Yu:
"Privacy and Access Control: How are These Two concepts Related?,"
Proceedings of the 20th ACM Symposium on Access Control Models and
Technologies, Vienna, Austria, June 1-3, 2015.
-
Juan Du, Daniel Joseph Dean, Yongmin Tan, Xiaohui Gu, and Ting Yu:
"Scalable Distributed Service Integrity Attestation for Software-as-a-Service
Clouds,"
IEEE Trans. Parallel Distributed Syst., 2014, 25(3), 730--739.
-
Euijin Choo, Jianchun Jiang, and Ting Yu:
"COMPARS: toward an empirical approach for comparing the resilience
of reputation systems,"
Fourth ACM Conference on Data and Application Security and Privacy,
CODASPY'14, San Antonio, TX, USA - March 03 - 05, 2014.
-
Wei Wei, and Ting Yu:
"Integrity Assurance for Outsourced Databases without DBMS Modification,"
Data and Applications Security and Privacy XXVIII - 28th Annual
IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria,
July 14-16, 2014. Proceedings.
-
Ting Yu:
"Data Anonymization: The Challenge from Theory to Practice,"
Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference
(EDBT/ICDT 2014), Athens, Greece, March 28, 2014.
-
Zach Jorgensen, and Ting Yu:
"A Privacy-Preserving Framework for Personalized, Social Recommendations,"
Proceedings of the 17th International Conference on Extending Database
Technology, EDBT 2014, Athens, Greece, March 24-28, 2014.
-
Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, and Ting Yu:
"PAQO: Preference-aware query optimization for decentralized database
systems,"
IEEE 30th International Conference on Data Engineering, Chicago,
ICDE 2014, IL, USA, March 31 - April 4, 2014.
-
Euijin Choo, Ting Yu, Min Chi, and Yan Sun:
"Revealing and incorporating implicit communities to improve recommender
systems,"
ACM Conference on Economics and Computation, EC '14, Stanford, CA, USA, June 8-12, 2014.
-
Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, and Ting Yu:
"PAQO: A Preference-Aware Query Optimizer for PostgreSQL,"
Proc. VLDB Endow., 2013, 6(12), 1334--1337.
-
Mingxuan Yuan, Lei Chen, Philip S. Yu, and Ting Yu:
"Protecting Sensitive Labels in Social Network Data Anonymization,"
IEEE Trans. Knowl. Data Eng., 2013, 25(3), 633--647.
-
Graham Cormode, Entong Shen, Xi Gong, Ting Yu, Cecilia M. Procopiuc, and Divesh Srivastava:
"UMicS: from anonymized data to usable microdata,"
22nd ACM International Conference on Information and Knowledge Management,
CIKM'13, San Francisco, CA, USA, October 27 - November 1, 2013.
-
Wei Wei, Ting Yu, and Rui Xue:
"iBigTable: practical data integrity for bigtable in public cloud,"
Third ACM Conference on Data and Application Security and Privacy,
CODASPY'13, San Antonio, TX, USA, February 18-20, 2013.
-
Graham Cormode, Cecilia M. Procopiuc, Entong Shen, Divesh Srivastava, and Ting Yu:
"Empirical privacy and empirical utility of anonymized data,"
Workshops Proceedings of the 29th IEEE International Conference
on Data Engineering, ICDE 2013, Brisbane, Australia, April 8-12,
2013.
-
Entong Shen, and Ting Yu:
"Mining frequent graph patterns with differential privacy,"
The 19th ACM SIGKDD International Conference on Knowledge Discovery
and Data Mining, KDD 2013, Chicago, IL, USA, August 11-14, 2013.
-
Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, and Ting Yu:
"Enabling intensional access control via preference-aware query optimization,"
18th ACM Symposium on Access Control Models and Technologies, SACMAT
'13, Amsterdam, The Netherlands, June 12-14, 2013.
-
Xi Gong, Ting Yu, and Adam J. Lee:
"Bounding Trust under Uncertain Topology Information in Reputation-Based
Trust Systems,"
Web-Age Information Management - 14th International Conference, WAIM
2013, Beidaihe, China, June 14-16, 2013. Proceedings.
-
Xi Gong, Ting Yu, and Adam J. Lee:
"Bounding trust in reputation systems with incomplete information,"
Second ACM Conference on Data and Application Security and Privacy,
CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012.
-
Graham Cormode, Cecilia M. Procopiuc, Divesh Srivastava, Entong Shen, and Ting Yu:
"Differentially Private Spatial Decompositions,"
IEEE 28th International Conference on Data Engineering (ICDE 2012),
Washington, DC, USA (Arlington, Virginia), 1-5 April, 2012.
-
Graham Cormode, Divesh Srivastava, Entong Shen, and Ting Yu:
"Aggregate Query Answering on Possibilistic Data with Cardinality Constraints,"
IEEE 28th International Conference on Data Engineering (ICDE 2012),
Washington, DC, USA (Arlington, Virginia), 1-5 April, 2012.
-
Omar Chowdhury, Murillo Pontual, William H. Winsborough, Ting Yu, Keith Irwin, and Jianwei Niu:
"Ensuring authorization privileges for cascading user obligations,"
17th ACM Symposium on Access Control Models and Technologies, SACMAT
'12, Newark, NJ, USA - June 20 - 22, 2012.
-
Jianchun Jiang, Liping Ding, Ennan Zhai, and Ting Yu:
"VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking
in SOA,"
Sixth International Conference on Software Security and Reliability,
SERE 2012, Gaithersburg, Maryland, USA, 20-22 June 2012.
-
Zach Jorgensen, and Ting Yu:
"On mouse dynamics as a behavioral biometric for authentication,"
Proceedings of the 6th ACM Symposium on Information, Computer and
Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24,
2011.
-
Xi Gong, Ting Yu, and Adam J. Lee:
"Poster: on trust evaluation with missing information in reputation
systems,"
Proceedings of the 18th ACM Conference on Computer and Communications
Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011.
-
Kevin W. Hamlen, Peng Liu, Murat Kantarcioglu, Bhavani Thuraisingham, and Ting Yu:
"Identity management for cloud computing: developments and directions,"
Proceedings of the 7th Cyber Security and Information Intelligence
Research Workshop, CSIIRW 2011, Oak Ridge, TN, USA, October 12-14,
2011.
-
Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, and Ting Yu:
"Don't Reveal My Intension: Protecting User Privacy Using Declarative
Preferences during Distributed Query Processing,"
Computer Security - ESORICS 2011 - 16th European Symposium on Research
in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings.
-
Xinfeng Lei, Rui Xue, and Ting Yu:
"Computational Soundness about Formal Encryption in the Presence of
Secret Shares and Key Cycles,"
Information and Communications Security - 13th International Conference,
ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings.
-
Jagan Srinivasan, Wei Wei, Xiaosong Ma, and Ting Yu:
"EMFS: Email-based Personal Cloud Storage,"
Sixth International Conference on Networking, Architecture, and Storage,
NAS 2011, Dalian, China, 28-30 July, 2011.
-
Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, and Keith Irwin:
"On the management of user obligations,"
16th ACM Symposium on Access Control Models and Technologies, SACMAT
2011, Innsbruck, Austria, June 15-17, 2011, Proceedings.
-
Yuhong Liu, Yan Sun, and Ting Yu:
"Defending Multiple-User-Multiple-Target Attacks in Online Reputation
Systems,"
PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
2011 IEEE Third International Conference on and 2011 IEEE Third
International Conference on Social Computing (SocialCom), Boston,
MA, USA, 9-11 Oct., 2011.
-
Graham Cormode, Divesh Srivastava, Ting Yu, and Qing Zhang:
"Anonymizing bipartite graph data using safe groupings,"
VLDB J., 2010, 19(1), 115--139.
-
Adam J. Lee, Ting Yu, and Yann Le Gall:
"Effective trust management through a hybrid logical and relational
approach,"
Proceedings of the 5th ACM Symposium on Information, Computer and
Communications Security, ASIACCS 2010, Beijing, China, April 13-16,
2010.
-
Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, and Keith Irwin:
"Toward practical authorization-dependent user obligation systems,"
Proceedings of the 5th ACM Symposium on Information, Computer and
Communications Security, ASIACCS 2010, Beijing, China, April 13-16,
2010.
-
Juan Du, Wei Wei, Xiaohui Gu, and Ting Yu:
"RunTest: assuring integrity of dataflow processing in cloud computing
infrastructures,"
Proceedings of the 5th ACM Symposium on Information, Computer and
Communications Security, ASIACCS 2010, Beijing, China, April 13-16,
2010.
-
Juan Du, Xiaohui Gu, and Ting Yu:
"On verifying stateful dataflow processing services in large-scale
cloud systems,"
Proceedings of the 17th ACM Conference on Computer and Communications
Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010.
-
Qinyuan Feng, Ling Liu, Yan Sun, Ting Yu, and Yafei Dai:
"Enhancing personalized ranking quality through multidimensional modeling
of inter-item competition,"
The 6th International Conference on Collaborative Computing: Networking,
Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA,
9-12 October 2010.
-
Adam J. Lee, and Ting Yu:
"Towards Quantitative Analysis of Proofs of Authorization: Applications,
Framework, and Techniques,"
Proceedings of the 23rd IEEE Computer Security Foundations Symposium,
CSF 2010, Edinburgh, United Kingdom, July 17-19, 2010.
-
Murillo Pontual, Keith Irwin, Omar Chowdhury, William H. Winsborough, and Ting Yu:
"Failure Feedback for User Obligation Systems,"
Proceedings of the 2010 IEEE Second International Conference on
Social Computing, SocialCom / IEEE International Conference on Privacy,
Security, Risk and Trust, PASSAT 2010, Minneapolis, Minnesota, USA,
August 20-22, 2010.
-
Wei Wei, and Ting Yu:
"The Design and Enforcement of a Rule-based Constraint Policy Language
for Service Composition,"
Proceedings of the 2010 IEEE Second International Conference on
Social Computing, SocialCom / IEEE International Conference on Privacy,
Security, Risk and Trust, PASSAT 2010, Minneapolis, Minnesota, USA,
August 20-22, 2010.
-
Nicholas L. Farnan, Adam J. Lee, and Ting Yu:
"Investigating privacy-aware distributed query evaluation,"
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic
Society, WPES 2010, Chicago, Illinois, USA, October 4, 2010.
-
Xinfeng Lei, Rui Xue, and Ting Yu:
"Computational Soundness about Formal Encryption in the Presence of
Secret Shares and Key Cycles,"
IACR Cryptol. ePrint Arch., 2010, 467.
-
Xinfeng Lei, Rui Xue, and Ting Yu:
"A Timed Logic for Modeling and Reasoning about Security Protocols,"
IACR Cryptol. ePrint Arch., 2010, 645.
-
Jiangtao Li, Ninghui Li, XiaoFeng Wang, and Ting Yu:
"Denial of service attacks and defenses in decentralized trust management,"
Int. J. Inf. Sec., 2009, 8(2), 89--101.
-
Qing Zhang, Wei Wei, and Ting Yu:
"On the Modeling of Honest Players in Reputation Systems,"
J. Comput. Sci. Technol., 2009, 24(5), 808--819.
-
Nick Koudas, Divesh Srivastava, Ting Yu, and Qing Zhang:
"Distribution-based Microdata Anonymization,"
Proc. VLDB Endow., 2009, 2(1), 958--969.
-
Wei Wei, Juan Du, Ting Yu, and Xiaohui Gu:
"SecureMR: A Service Integrity Assurance Framework for MapReduce,"
Twenty-Fifth Annual Computer Security Applications Conference, ACSAC
2009, Honolulu, Hawaii, USA, 7-11 December 2009.
-
Juan Du, Wei Wei, Xiaohui Gu, and Ting Yu:
"Towards secure dataflow processing in open distributed systems,"
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing,
STC 2009, Chicago, Illinois, USA, November 13, 2009.
-
Ting Yu, Dhivya Sivasubramanian, and Tao Xie:
"Security policy testing via automated program code generation,"
Fifth Cyber Security and Information Intelligence Research Workshop,
CSIIRW '09, Knoxville, TN, USA, April 13-15, 2009.
-
Adam J. Lee, and Ting Yu:
"Towards a dynamic and composable model of trust,"
14th ACM Symposium on Access Control Models and Technologies, SACMAT
2009, Stresa, Italy, June 3-5, 2009, Proceedings.
-
Graham Cormode, Divesh Srivastava, Ting Yu, and Qing Zhang:
"Anonymizing bipartite graph data using safe groupings,"
Proc. VLDB Endow., 2008, 1(1), 833--844.
-
Adam J. Lee, and Ting Yu:
"Report on the Sixth ACM Workshop on Privacy in the Electronic Society
(WPES 2007),"
SIGMOD Rec., 2008, 37(1), 56--58.
-
Qing Zhang, Ting Yu, and Peng Ning:
"A Framework for Identifying Compromised Nodes in Wireless Sensor Networks,"
ACM Trans. Inf. Syst. Secur., 2008, 11(3), 12:1--12:37.
-
Qing Zhang, and Ting Yu:
"On the Modeling of Honest Players in Reputation Systems,"
28th IEEE International Conference on Distributed Computing Systems
Workshops (ICDCS 2008 Workshops), 17-20 June 2008, Beijing, China.
-
Keith Irwin, Ting Yu, and William H. Winsborough:
"Assigning Responsibility for Failed Obligations,"
Trust Management II - Proceedings of IFIPTM 2008: Joint iTrust
and PST Conferences on Privacy, Trust Management and Security, June
18-20, 2008, Trondheim, Norway.
-
Keith Irwin, Ting Yu, and William H. Winsborough:
"Enforcing security properties in task-based systems,"
13th ACM Symposium on Access Control Models and Technologies, SACMAT
2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings.
-
Heshan Lin, Xiaosong Ma, Jiangtian Li, Ting Yu, and Nagiza F. Samatova:
"Adaptive Request Scheduling for Parallel Scientific Web Services,"
Scientific and Statistical Database Management, 20th International
Conference, SSDBM 2008, Hong Kong, China, July 9-11, 2008, Proceedings.
-
Keith Irwin, Ting Yu, and William H. Winsborough:
"Avoiding information leakage in security-policy-aware planning,"
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic
Society, WPES 2008, Alexandria, VA, USA, October 27, 2008.
-
Annie I. Ant\'on, Elisa Bertino, Ninghui Li, and Ting Yu:
"A roadmap for comprehensive online privacy policy management,"
Commun. ACM, 2007, 50(7), 109--116.
-
Qing Zhang, Nick Koudas, Divesh Srivastava, and Ting Yu:
"Aggregate Query Answering on Anonymized Tables,"
Proceedings of the 23rd International Conference on Data Engineering,
ICDE 2007, The Marmara Hotel, Istanbul, Turkey, April 15-20, 2007.
-
Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, and Ji-Won Byun:
"On the Correctness Criteria of Fine-Grained Access Control in Relational
Databases,"
Proceedings of the 33rd International Conference on Very Large Data
Bases, University of Vienna, Austria, September 23-27, 2007.
-
Ninghui Li, Ting Yu, and Annie I. Ant\'on:
"A semantics based approach to privacy languages,"
Comput. Syst. Sci. Eng., 2006, 21(5).
-
Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, and Ting Yu:
"Integrating XML data sources using approximate joins,"
ACM Trans. Database Syst., 2006, 31(1), 161--207.
-
Keith Irwin, Ting Yu, and William H. Winsborough:
"On the modeling and analysis of obligations,"
Proceedings of the 13th ACM Conference on Computer and Communications
Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3,
2006.
-
Evan Martin, Tao Xie, and Ting Yu:
"Defining and Measuring Policy Coverage in Testing Access Control Policies,"
Information and Communications Security, 8th International Conference,
ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings.
-
Jiangtao Li, Ninghui Li, XiaoFeng Wang, and Ting Yu:
"Denial of Service Attacks and Defenses in Decentralized Trust Management,"
Second International Conference on Security and Privacy in Communication
Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
2, 2006 - September 1, 2006.
-
Qing Zhang, Ting Yu, and Peng Ning:
"A Framework for Identifying Compromised Nodes in Sensor Networks,"
Second International Conference on Security and Privacy in Communication
Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
2, 2006 - September 1, 2006.
-
Keith Irwin, and Ting Yu:
"Preventing attribute information leakage in automated trust negotiation,"
Proceedings of the 12th ACM Conference on Computer and Communications
Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005.
-
Keith Irwin, and Ting Yu:
"Determining user privacy preferences by asking the right questions:
an automated approach,"
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic
Society, WPES 2005, Alexandria, VA, USA, November 7, 2005.
-
Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan, and H. V. Jagadish:
"A compressed accessibility map for XML,"
ACM Trans. Database Syst., 2004, 29(2), 363--402.
-
Nick Koudas, Michael Rabinovich, Divesh Srivastava, and Ting Yu:
"Routing XML Queries,"
Proceedings of the 20th International Conference on Data Engineering,
ICDE 2004, 30 March - 2 April 2004, Boston, MA, USA.
-
Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, and Charles C. Zhang:
"How to Exploit Ontologies for Trust Negotiation,"
Proceedings of the ISWC*04 Workshop on Trust, Security, and Reputation
on the Semantic Web, Hiroshima, Japan, November 7, 2004.
-
Qing Zhang, and Ting Yu:
"A Classification Scheme for Trust Functions in Reputation-Based Trust
Management,"
Proceedings of the ISWC*04 Workshop on Trust, Security, and Reputation
on the Semantic Web, Hiroshima, Japan, November 7, 2004.
-
Ting Yu, Ninghui Li, and Annie I. Ant\'on:
"A formal semantics for P3P,"
Proceedings of the 1st ACM Workshop On Secure Web Services, SWS
2004, Fairfax, VA, USA, October 29, 2004.
-
Keith Irwin, and Ting Yu:
"An identifiability-based access control model for privacy protection
in open systems,"
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic
Society, WPES 2004, Washington, DC, USA, October 28, 2004.
-
Ting Yu, Marianne Winslett, and Jason E. Holt:
"Two Security Symposia,"
IEEE Secur. Priv., 2003, 1(4), 50--52.
-
Marianne Winslett, Xiaosong Ma, and Ting Yu:
"Two-Body Job Searches,"
SIGMOD Rec., 2003, 32(2), 107--112.
-
Ting Yu, Marianne Winslett, and Kent E. Seamons:
"Supporting structured credentials and sensitive policies through interoperable
strategies for automated trust negotiation,"
ACM Trans. Inf. Syst. Secur., 2003, 6(1), 1--42.
-
Kent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, and Lina Yu:
"Trust Negotiation in Dynamic Coalitions,"
3rd DARPA Information Survivability Conference and Exposition (DISCEX-III
2003), 22-24 April 2003, Washington, DC, USA.
-
Sudipto Guha, Nick Koudas, Divesh Srivastava, and Ting Yu:
"Index-Based Approximate XML Joins,"
Proceedings of the 19th International Conference on Data Engineering,
March 5-8, 2003, Bangalore, India.
-
Ting Yu, and Marianne Winslett:
"A Unified Scheme for Resource Protection in Automated Trust Negotiation,"
2003 IEEE Symposium on Security and Privacy (S\&P 2003), 11-14
May 2003, Berkeley, CA, USA.
-
Ting Yu, and Marianne Winslett:
"Policy migration for sensitive credentials in trust negotiation,"
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic
Society, WPES 2003, Washington, DC, USA, October 30, 2003.
-
Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, and Lina Yu:
"Negotiating Trust on the Web,"
IEEE Internet Comput., 2002, 6(6), 30--37.
-
Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, and Ryan Jarvis:
"Protecting Privacy during On-Line Trust Negotiation,"
Privacy Enhancing Technologies, Second International Workshop, PET
2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers.
-
Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, and Lina Yu:
"Requirements for Policy Languages for Trust Negotiation,"
3rd International Workshop on Policies for Distributed Systems and
Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA.
-
Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, and Ting Yu:
"Approximate XML joins,"
Proceedings of the 2002 ACM SIGMOD International Conference on
Management of Data, Madison, Wisconsin, USA, June 3-6, 2002.
-
Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan, and H. V. Jagadish:
"Compressed Accessibility Map: Efficient Access Control for XML,"
Proceedings of 28th International Conference on Very Large Data Bases,
VLDB 2002, Hong Kong, August 20-23, 2002.
-
Ting Yu, Marianne Winslett, and Kent E. Seamons:
"Interoperable strategies in automated trust negotiation,"
CCS 2001, Proceedings of the 8th ACM Conference on Computer and
Communications Security, Philadelphia, Pennsylvania, USA, November
6-8, 2001.
-
Kent E. Seamons, Marianne Winslett, and Ting Yu:
"Limiting the Disclosure of Access Control Policies during Automated
Trust Negotiation,"
Proceedings of the Network and Distributed System Security Symposium,
NDSS 2001, San Diego, California, USA.
-
Ting Yu, Xiaosong Ma, and Marianne Winslett:
"PRUNES: an efficient and complete strategy for automated trust negotiation
over the Internet,"
CCS 2000, Proceedings of the 7th ACM Conference on Computer and
Communications Security, Athens, Greece, November 1-4, 2000.