Works (18)

Updated: July 5th, 2023 15:58

2017 article

Exact Detection of Information Leakage: Decidability and Complexity

TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGE-CENTERED SYSTEMS XXXII, Vol. 10420, pp. 1–23.

By: R. Chirkova n & T. Yu*

co-author countries: Qatar πŸ‡ΆπŸ‡¦ United States of America πŸ‡ΊπŸ‡Έ
author keywords: Privacy and security in data-intensive systems; Information leakage; Data exchange
Source: Web Of Science
Added: December 3, 2018

2015 conference paper

Detecting opinion spammer groups through community discovery and sentiment analysis

Data and applications security and privacy xxix, 9149, 170–187.

By: E. Choo, T. Yu & M. Chi

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Interactive preference-aware query optimization

2015 ieee 31st international conference on data engineering (icde), 1512–1515.

By: N. Ong *, S. Rojcewicz*, N. Farnan*, A. Lee*, P. Chrysanthis * & T. Yu n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

Integrity assurance for outsourced databases without DBMS modification

Data and applications security and privacy xxviii, 8566, 1–16.

By: W. Wei & T. Yu

Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

PAQO: Preference-aware query optimization for decentralized database systems

2014 ieee 30th international conference on data engineering (icde), 424–435.

By: N. Farnan*, A. Lee *, P. Chrysanthis * & T. Yu n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 25(3), 730–739.

By: J. Du *, D. Dean n, Y. Tan*, X. Gu* & T. Yu n

co-author countries: Germany πŸ‡©πŸ‡ͺ United States of America πŸ‡ΊπŸ‡Έ
author keywords: Distributed service integrity attestation; cloud computing; secure distributed data processing
Source: Web Of Science
Added: August 6, 2018

2013 journal article

Protecting Sensitive Labels in Social Network Data Anonymization

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 25(3), 633–647.

co-author countries: China πŸ‡¨πŸ‡³ Hong Kong πŸ‡­πŸ‡° Saudi Arabia πŸ‡ΈπŸ‡¦ United States of America πŸ‡ΊπŸ‡Έ
author keywords: Social networks; privacy; anonymous
Source: Web Of Science
Added: August 6, 2018

2010 article

Anonymizing bipartite graph data using safe groupings

Cormode, G., Srivastava, D., Yu, T., & Zhang, Q. (2010, February). VLDB JOURNAL, Vol. 19, pp. 115–139.

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: Privacy; Microdata; Graph; Query answering
Source: Web Of Science
Added: August 6, 2018

2009 journal article

Coupling winds to ocean surface currents over the global ocean

OCEAN MODELLING, 29(4), 261–268.

co-author countries: China πŸ‡¨πŸ‡³ United States of America πŸ‡ΊπŸ‡Έ
author keywords: Wind-Current Coupled System; HYCOM; Wind stress; Heat flux; Ocean surface boundary layer; ESMF; Ocean current
Source: Web Of Science
Added: August 6, 2018

2009 article

Denial of service attacks and defenses in decentralized trust management

Li, J., Li, N., Wang, X. F., & Yu, T. (2009, April). INTERNATIONAL JOURNAL OF INFORMATION SECURITY, Vol. 8, pp. 89–101.

By: J. Li *, N. Li*, X. Wang* & T. Yu n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: Trust management; Denial of service; Access control; Trust negotiation; Game theory
Source: Web Of Science
Added: August 6, 2018

2009 journal article

On the Modeling of Honest Players in Reputation Systems

JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24(5), 808–819.

By: Q. Zhang *, W. Wei n & T. Yu n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: reputation; trust; user behavior modeling; collusion-resilient behavior testing
Source: Web Of Science
Added: August 6, 2018

2009 article

SecureMR: A Service Integrity Assurance Framework for Map Reduce

25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 73–82.

By: W. Wei n, J. Du n, T. Yu n & X. Gu n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: Web Of Science
Added: August 6, 2018

2008 article

A framework for identifying compromised nodes in wireless sensor networks

Zhang, Q., Yu, T., & Ning, P. (2008, March). ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 11.

By: Q. Zhang n, T. Yu n & P. Ning n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: algorithms; security; sensor networks; intrusion detection
Source: Web Of Science
Added: August 6, 2018

2007 journal article

A roadmap for COMPREHENSIVE online privacy policy management

COMMUNICATIONS OF THE ACM, 50(7), 109–116.

By: A. Anton n, E. Bertino *, N. Li* & T. Yu n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: Web Of Science
Added: August 6, 2018

2007 book

Secure data management in decentralized systems

Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

A semantics based approach to privacy languages

Computer Systems Science and Engineering, 21(5), 339–352.

By: N. Li, T. Yu & A. Anton

Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

Integrating XML data sources using approximate joins

ACM TRANSACTIONS ON DATABASE SYSTEMS, 31(1), 161–207.

By: S. Guha *, H. Jagadish*, N. Koudas *, D. Srivastava * & T. Yu n

co-author countries: Canada πŸ‡¨πŸ‡¦ United States of America πŸ‡ΊπŸ‡Έ
author keywords: algorithms; experimentation; performance; theory; data integration; tree edit distance; XML; joins; approximate joins
Source: Web Of Science
Added: August 6, 2018

2004 journal article

A compressed accessibility map for XML

ACM TRANSACTIONS ON DATABASE SYSTEMS, 29(2), 363–402.

By: T. Yu n, D. Srivastava *, L. Lakshmanan * & H. Jagadish*

co-author countries: Canada πŸ‡¨πŸ‡¦ United States of America πŸ‡ΊπŸ‡Έ
author keywords: algorithms; experimentation; performance; theory; access control; structural locality; XML
Source: Web Of Science
Added: August 6, 2018