Ting Yu Chirkova, R., & Yu, T. (2017). Exact Detection of Information Leakage: Decidability and Complexity. TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGE-CENTERED SYSTEMS XXXII, Vol. 10420, pp. 1–23. https://doi.org/10.1007/978-3-662-55608-5_1 Choo, E., Yu, T., & Chi, M. (2015). Detecting opinion spammer groups through community discovery and sentiment analysis. Data and applications security and privacy xxix, 9149, 170–187. Ong, N. R., Rojcewicz, S. E., Farnan, N. L., Lee, A. J., Chrysanthis, P. K., & Yu, T. (2015). Interactive preference-aware query optimization. 2015 ieee 31st international conference on data engineering (icde), 1512–1515. https://doi.org/10.1109/icde.2015.7113414 Wei, W., & Yu, T. (2014). Integrity assurance for outsourced databases without DBMS modification. Data and applications security and privacy xxviii, 8566, 1–16. Farnan, N. L., Lee, A. J., Chrysanthis, P. K., & Yu, T. (2014). PAQO: Preference-aware query optimization for decentralized database systems. 2014 ieee 30th international conference on data engineering (icde), 424–435. https://doi.org/10.1109/icde.2014.6816670 Du, J., Dean, D. J., Tan, Y., Gu, X., & Yu, T. (2014). Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 25(3), 730–739. https://doi.org/10.1109/tpds.2013.62 Yuan, M., Chen, L., Yu, P. S., & Yu, T. (2013). Protecting Sensitive Labels in Social Network Data Anonymization. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 25(3), 633–647. https://doi.org/10.1109/tkde.2011.259 Cormode, G., Srivastava, D., Yu, T., & Zhang, Q. (2010, February). Anonymizing bipartite graph data using safe groupings. VLDB JOURNAL, Vol. 19, pp. 115–139. https://doi.org/10.1007/s00778-009-0167-9 Deng, Z., Xie, L., Liu, B., Wu, K., Zhao, D., & Yu, T. (2009). Coupling winds to ocean surface currents over the global ocean. OCEAN MODELLING, 29(4), 261–268. https://doi.org/10.1016/j.ocemod.2009.05.003 Li, J., Li, N., Wang, X. F., & Yu, T. (2009, April). Denial of service attacks and defenses in decentralized trust management. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, Vol. 8, pp. 89–101. https://doi.org/10.1007/s10207-008-0068-8 Zhang, Q., Wei, W., & Yu, T. (2009). On the Modeling of Honest Players in Reputation Systems. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24(5), 808–819. https://doi.org/10.1007/s11390-009-9271-y Wei, W., Du, J., Yu, T., & Gu, X. (2009). SecureMR: A Service Integrity Assurance Framework for Map Reduce. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 73–82. https://doi.org/10.1109/acsac.2009.17 Zhang, Q., Yu, T., & Ning, P. (2008, March). A framework for identifying compromised nodes in wireless sensor networks. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 11. https://doi.org/10.1145/1341731.1341733 Anton, A. I., Bertino, E., Li, N., & Yu, T. (2007). A roadmap for COMPREHENSIVE online privacy policy management. COMMUNICATIONS OF THE ACM, 50(7), 109–116. https://doi.org/10.1145/1272516.1272522 Secure data management in decentralized systems. (2007). https://doi.org/10.1007/978-0-387-27696-0 Li, N., Yu, T., & Anton, A. (2006). A semantics based approach to privacy languages. Computer Systems Science and Engineering, 21(5), 339–352. Guha, S., Jagadish, H. V., Koudas, N., Srivastava, D., & Yu, T. (2006). Integrating XML data sources using approximate joins. ACM TRANSACTIONS ON DATABASE SYSTEMS, 31(1), 161–207. https://doi.org/10.1145/1132863.1132868 Yu, T., Srivastava, D., Lakshmanan, L. V. S., & Jagadish, H. V. (2004). A compressed accessibility map for XML. ACM TRANSACTIONS ON DATABASE SYSTEMS, 29(2), 363–402. https://doi.org/10.1145/1005566.1005570