Works (18)
2017 article
Exact Detection of Information Leakage: Decidability and Complexity
Chirkova, R., & Yu, T. (2017, January 1). Lecture Notes in Computer Science, Vol. 1.
2015 conference paper
Detecting opinion spammer groups through community discovery and sentiment analysis
Data and applications security and privacy xxix, 9149, 170–187.
2015 article
Interactive preference-aware query optimization
Ong, N. R., Rojcewicz, S. E., Farnan, N. L., Lee, A. J., Chrysanthis, P. K., & Yu, T. (2015, April 1).
2014 conference paper
Integrity assurance for outsourced databases without DBMS modification
Data and applications security and privacy xxviii, 8566, 1–16.
2014 article
PAQO: Preference-aware query optimization for decentralized database systems
Farnan, N. L., Lee, A. J., Chrysanthis, P. K., & Yu, T. (2014, March 1).
2013 article
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
Du, N. J., Dean, D. J., Tan, N. Y., Gu, N. X., & Yu, N. T. (2013, October 28). IEEE Transactions on Parallel and Distributed Systems.
2011 article
Protecting Sensitive Labels in Social Network Data Anonymization
Yuan, M., Chen, L., Yu, P. S., & Yu, T. (2011, December 20). IEEE Transactions on Knowledge and Data Engineering.
2009 article
Anonymizing bipartite graph data using safe groupings
Cormode, G., Srivastava, D., Yu, T., & Zhang, Q. (2009, September 24). The VLDB Journal.
2009 article
Coupling winds to ocean surface currents over the global ocean
Deng, Z., Xie, L., Liu, B., Wu, K., Zhao, D., & Yu, T. (2009, January 1). Ocean Modelling, Vol. 29, pp. 261–268.
2009 article
On the Modeling of Honest Players in Reputation Systems
Zhang, Q., Wei, W., & Yu, T. (2009, September 1). Journal of Computer Science and Technology.
2009 article
SecureMR: A Service Integrity Assurance Framework for MapReduce
Wei, W., Du, J., Yu, T., & Gu, X. (2009, December 1).
2008 article
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
Zhang, Q., Yu, T., & Ning, P. (2008, March 1). ACM Transactions on Information and System Security.
2008 article
Denial of service attacks and defenses in decentralized trust management
Li, J., Li, N., Wang, X. F., & Yu, T. (2008, December 1). International Journal of Information Security.
2007 article
A roadmap for comprehensive online privacy policy management
Antón, A. I., Bertino, E., Li, N., & Yu, T. (2007, July 1). Communications of the ACM.
2007 article
Secure Data Management in Decentralized Systems
Yu, T., & Jajodia, S. (2007, January 1). Advances in Information Security.
2006 journal article
A semantics based approach to privacy languages
Computer Systems Science and Engineering, 21(5), 339–352.
2006 article
Integrating XML data sources using approximate joins
Guha, S., Jagadish, H. V., Koudas, N., Srivastava, D., & Yu, T. (2006, March 1). ACM Transactions on Database Systems.
2004 article
A compressed accessibility map for XML
Yu, T., Srivastava, D., Lakshmanan, L. V. S., & Jagadish, H. V. (2004, June 1). ACM Transactions on Database Systems.