Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Ting Yu
2010 – today
- 2013
[j24]Nicholas L. Farnan, Adam J. Lee, Panos Chyrsanthis, Ting Yu: PAQO: A Preference-Aware Query Optimizer for PostgreSQL. PVLDB 6(12): 1334-1337 (2013)
[j23]Mingxuan Yuan, Lei Chen, Philip S. Yu, Ting Yu: Protecting Sensitive Labels in Social Network Data Anonymization. IEEE Trans. Knowl. Data Eng. 25(3): 633-647 (2013)
[c103]Wei Wei, Ting Yu, Rui Xue: iBigTable: practical data integrity for bigtable in public cloud. CODASPY 2013: 341-352
[c102]Graham Cormode, Cecilia M. Procopiuc, Entong Shen, Divesh Srivastava, Ting Yu: Empirical privacy and empirical utility of anonymized data. ICDE Workshops 2013: 77-82
[c101]Ting Yu, Martin D. F. Wong: A novel and efficient method for power pad placement optimization. ISQED 2013: 158-163
[c100]
[c99]Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu: Enabling intensional access control via preference-aware query optimization. SACMAT 2013: 189-192
[c98]Xi Gong, Ting Yu, Adam J. Lee: Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems. WAIM 2013: 643-648
[i4]Entong Shen, Ting Yu: Mining Frequent Graph Patterns with Differential Privacy. CoRR abs/1301.7015 (2013)- 2012
[j22]Ting Yu, Julien Ugon, Wei Yu: A modified parallel optimization system for updating large-size time-evolving flow matrix. Inf. Sci. 194: 57-67 (2012)
[c97]Xi Gong, Ting Yu, Adam J. Lee: Bounding trust in reputation systems with incomplete information. CODASPY 2012: 125-132
[c96]Li Guan, Ting Yu, Peter H. Tu, Ser-Nam Lim: Simultaneous image segmentation and 3D plane fitting for RGB-D sensors - An iterative framework. CVPR Workshops 2012: 49-56
[c95]Dashan Gao, Yi Yao, Feng Pan, Ting Yu, Bing Yu, Li Guan, Walter Dixon, Brian Yanoff, Tai-Peng Tian, Nils Krahnstoever: Computer vision aided target linked radiation imaging. CVPR 2012: 1162-1169
[c94]Ting Yu, Xiaorun Li: Automatic remote sensing image registration based on VTS-PCMIC algorithm. FSKD 2012: 48-52
[c93]Ting Yu, Zigang Xiao, Martin D. F. Wong: Efficient parallel power grid analysis via Additive Schwarz Method. ICCAD 2012: 399-406
[c92]Ting Yu, Martin D. F. Wong: PGT_SOLVER: An efficient solver for power grid transient analysis. ICCAD 2012: 647-652
[c91]Graham Cormode, Cecilia M. Procopiuc, Divesh Srivastava, Entong Shen, Ting Yu: Differentially Private Spatial Decompositions. ICDE 2012: 20-31
[c90]Graham Cormode, Divesh Srivastava, Entong Shen, Ting Yu: Aggregate Query Answering on Possibilistic Data with Cardinality Constraints. ICDE 2012: 258-269
[c89]Peter H. Tu, Dashan Gao, Ting Yu, Yi Yao: Action based video summarization for convenience stores. ICIP 2012: 45-48
[c88]Omar Chowdhury, Murillo Pontual, William H. Winsborough, Ting Yu, Keith Irwin, Jianwei Niu: Ensuring authorization privileges for cascading user obligations. SACMAT 2012: 33-44
[c87]Jianchun Jiang, Liping Ding, Ennan Zhai, Ting Yu: VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking in SOA. SERE 2012: 61-70
[c86]Peter H. Tu, Ting Yu, Dashan Gao, Ram Nevatia, Sung Chun Lee, Hale Kim, Phill Kyu Rhee, Joong-Hwan Baek: A systems level approach to perimeter protection. WACV 2012: 257-262
[e6]Ting Yu, George Danezis, Virgil D. Gligor (Eds.): the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012. ACM 2012, ISBN 978-1-4503-1651-4
[e5]Ting Yu, V. N. Venkatakrishan, Apu Kapadia (Eds.): Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012. ACM 2012, ISBN 978-1-4503-1664-4
[e4]Ting Yu, Srdjan Capkun, Seny Kamara (Eds.): Proceedings of the 2012 ACM Workshop on Cloud computing security, CCSW 2012, Raleigh, NC, USA, October 19, 2012. ACM 2012, ISBN 978-1-4503-1665-1
[e3]Ting Yu, Nikita Borisov (Eds.): Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, WPES 2012, Raleigh, NC, USA, October 15, 2012. ACM 2012, ISBN 978-1-4503-1663-7- 2011
[j21]Jie Ding, Zhigui Lin, Ting Yu: On reaction-diffusion equations derived from a PEPA model. Appl. Math. Lett. 24(12): 2072-2076 (2011)
[c85]Ting Yu, Yi Yao, Dashan Gao, Peter H. Tu: Learning to recognize people in a smart environment. AVSS 2011: 379-384
[c84]Peter H. Tu, Ting Yu, Dashan Gao, Ram Nevatia, Sung Chun Lee, Hale Kim, Phill Kyu Rhee, Joong-Hwan Baek: AVSS 2011 demo session: A systems level approach to perimeter protection. AVSS 2011: 517-518
[c83]Zach Jorgensen, Ting Yu: On mouse dynamics as a behavioral biometric for authentication. ASIACCS 2011: 476-482
[c82]Xi Gong, Ting Yu, Adam J. Lee: Poster: on trust evaluation with missing information in reputation systems. ACM Conference on Computer and Communications Security 2011: 773-776
[c81]Kevin W. Hamlen, Peng Liu, Murat Kantarcioglu, Bhavani M. Thuraisingham, Ting Yu: Identity management for cloud computing: developments and directions. CSIIRW 2011: 32
[c80]Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu: Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing. ESORICS 2011: 628-647
[c79]Ting Yu, Xiaoming Liu, Ser-Nam Lim, Nils Krahnstoever, Peter H. Tu: Automatic surveillance video matting using a shape prior. ICCV Workshops 2011: 1761-1768
[c78]Xinfeng Lei, Rui Xue, Ting Yu: Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles. ICICS 2011: 29-41
[c77]Jagan Srinivasan, Wei Wei, Xiaosong Ma, Ting Yu: EMFS: Email-based Personal Cloud Storage. NAS 2011: 248-257
[c76]Ting Yu, Xingqiang Lu, Fengqi Yu: Dual-bottom-electrode CMUT based on standard CMOS process. NEMS 2011: 21-24
[c75]Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin: On the management of user obligations. SACMAT 2011: 175-184
[c74]Yuhong Liu, Yan Lindsay Sun, Ting Yu: Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems. SocialCom/PASSAT 2011: 425-434
[i3]Graham Cormode, Magda Procopiuc, Entong Shen, Divesh Srivastava, Ting Yu: Differentially Private Spatial Decompositions. CoRR abs/1103.5170 (2011)- 2010
[j20]
[j19]Ting Yu, Simeon J. Simoff, Tony Jan: VQSVM: A case study for incorporating prior domain knowledge into inductive machine learning. Neurocomputing 73(13-15): 2614-2623 (2010)
[j18]Graham Cormode, Divesh Srivastava, Ting Yu, Qing Zhang: Anonymizing bipartite graph data using safe groupings. VLDB J. 19(1): 115-139 (2010)
[c73]Ming-Ching Chang, Nils Krahnstoever, Ser-Nam Lim, Ting Yu: Group Level Activity Recognition in Crowded Environments across Multiple Cameras. AVSS 2010: 56-63
[c72]Adam J. Lee, Ting Yu, Yann Le Gall: Effective trust management through a hybrid logical and relational approach. ASIACCS 2010: 169-179
[c71]Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin: Toward practical authorization-dependent user obligation systems. ASIACCS 2010: 180-191
[c70]Juan Du, Wei Wei, Xiaohui Gu, Ting Yu: RunTest: assuring integrity of dataflow processing in cloud computing infrastructures. ASIACCS 2010: 293-304
[c69]Juan Du, Xiaohui Gu, Ting Yu: On verifying stateful dataflow processing services in large-scale cloud systems. ACM Conference on Computer and Communications Security 2010: 672-674
[c68]Qinyuan Feng, Ling Liu, Yan Sun, Ting Yu, Yafei Dai: Enhancing personalized ranking quality through multidimensional modeling of inter-item competition. CollaborateCom 2010: 1-10
[c67]
[c66]Adam J. Lee, Ting Yu: Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques. CSF 2010: 139-153
[c65]Rong Chen, Ting Yu, Yuchun Feng, Dasong Peng, Fengqi Yu: Thermal design and analysis of uncooled infrared senor in standard CMOS. NEMS 2010: 475-478
[c64]Benxian Peng, Ting Yu, Fengqi Yu, Yuchun Feng: A compact force sensor with low temperature drift design using a standard CMOS process. NEMS 2010: 806-809
[c63]Murillo Pontual, Keith Irwin, Omar Chowdhury, William H. Winsborough, Ting Yu: Failure Feedback for User Obligation Systems. SocialCom/PASSAT 2010: 713-720
[c62]Wei Wei, Ting Yu: The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition. SocialCom/PASSAT 2010: 873-880
[c61]Nicholas L. Farnan, Adam J. Lee, Ting Yu: Investigating privacy-aware distributed query evaluation. WPES 2010: 43-52
[i2]Xinfeng Lei, Rui Xue, Ting Yu: Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles. IACR Cryptology ePrint Archive 2010: 467 (2010)
[i1]Xinfeng Lei, Rui Xue, Ting Yu: A Timed Logic for Modeling and Reasoning about Security Protocols. IACR Cryptology ePrint Archive 2010: 645 (2010)
2000 – 2009
- 2009
[j17]Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu: Denial of service attacks and defenses in decentralized trust management. Int. J. Inf. Sec. 8(2): 89-101 (2009)
[j16]Qing Zhang, Wei Wei, Ting Yu: On the Modeling of Honest Players in Reputation Systems. J. Comput. Sci. Technol. 24(5): 808-819 (2009)
[j15]Nick Koudas, Divesh Srivastava, Ting Yu, Qing Zhang: Distribution-based Microdata Anonymization. PVLDB 2(1): 958-969 (2009)
[c60]Wei Wei, Juan Du, Ting Yu, Xiaohui Gu: SecureMR: A Service Integrity Assurance Framework for MapReduce. ACSAC 2009: 73-82
[c59]Nils Krahnstoever, Peter H. Tu, Ting Yu, Kedar A. Patwardhan, D. Hamilton, Bing Yu, C. Greco, Gianfranco Doretto: Intelligent Video for Protecting Crowded Sports Venues. AVSS 2009: 116-121
[c58]Juan Du, Wei Wei, Xiaohui Gu, Ting Yu: Towards secure dataflow processing in open distributed systems. STC 2009: 67-72
[c57]Ting Yu, Dhivya Sivasubramanian, Tao Xie: Security policy testing via automated program code generation. CSIIRW 2009: 13
[c56]Ting Yu, Ser-Nam Lim, Kedar A. Patwardhan, Nils Krahnstoever: Monitoring, recognizing and discovering social networks. CVPR 2009: 1462-1469
[c55]Ting Yu, Manfred Lenzen, Blanca Gallego, John K. Debenham: A Data Mining System for Estimating a Largesize Matrix for the Environmental Accounting. AIAI Workshops 2009: 260-269
[c54]Ting Yu, Manfred Lenzen, Chris Dey, Jeremy Badcock: Automatically Estimating and Updating Input-Output Tables. KES (2) 2009: 42-49
[c53]
[c52]Ting Yu: An Integrated Intelligent System for Estimating and Updating a Large-size Matrix. SMC 2009: 3066-3072
[r1]- 2008
[j14]Graham Cormode, Divesh Srivastava, Ting Yu, Qing Zhang: Anonymizing bipartite graph data using safe groupings. PVLDB 1(1): 833-844 (2008)
[j13]Adam J. Lee, Ting Yu: Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007). SIGMOD Record 37(1): 56-58 (2008)
[j12]Qing Zhang, Ting Yu, Peng Ning: A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3) (2008)
[c51]Xiaoming Liu, Ting Yu, Thomas Sebastian, Peter H. Tu: Boosted deformable model for human body alignment. CVPR 2008
[c50]Ting Yu, Ying Wu, Nils Krahnstoever, Peter H. Tu: Distributed data association and filtering for multiple target tracking. CVPR 2008
[c49]Peter H. Tu, Thomas Sebastian, Gianfranco Doretto, Nils Krahnstoever, Jens Rittscher, Ting Yu: Unified Crowd Segmentation. ECCV (4) 2008: 691-704
[c48]Qing Zhang, Ting Yu: On the Modeling of Honest Players in Reputation Systems. ICDCS Workshops 2008: 249-254
[c47]Keith Irwin, Ting Yu, William H. Winsborough: Enforcing security properties in task-based systems. SACMAT 2008: 41-50
[c46]Heshan Lin, Xiaosong Ma, Jiangtian Li, Ting Yu, Nagiza F. Samatova: Adaptive Request Scheduling for Parallel Scientific Web Services. SSDBM 2008: 276-294
[c45]Han Wan, Xiaopeng Gao, Libo Deng, Ting Yu: Design and Implementation of a Simulation Framework for the ARM Embedded System. UKSim 2008: 714-719
[c44]Keith Irwin, Ting Yu, William H. Winsborough: Avoiding information leakage in security-policy-aware planning. WPES 2008: 85-94- 2007
[j11]Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu: A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007)
[j10]Ting Yu, J. H. Eberly: Evolution from entanglement to decoherence of bipartite mixed "X" states. Quantum Information & Computation 7(5): 459-468 (2007)
[c43]Xiaoming Liu, Nils Krahnstoever, Ting Yu, Peter H. Tu: What are customers looking at? AVSS 2007: 405-410
[c42]Yuming Ou, Longbing Cao, Ting Yu, Chengqi Zhang: Detecting Turning Points of Trading Price and Return Volatility for Market Surveillance Agents. Web Intelligence/IAT Workshops 2007: 491-494
[c41]
[c40]
[c39]Qing Zhang, Nick Koudas, Divesh Srivastava, Ting Yu: Aggregate Query Answering on Anonymized Tables. ICDE 2007: 116-125
[c38]Ting Yu, Tony Jan, Simeon J. Simoff, John K. Debenham: A Hierarchical VQSVM for Imbalanced Data Sets. IJCNN 2007: 518-523
[c37]Ting Yu, Simeon J. Simoff, Donald Stokes: Incorporating Prior Domain Knowledge into a Kernel Based Feature Selection Algorithm. PAKDD 2007: 1064-1071
[c36]Benxian Peng, Ting Yu, Fengqi Yu: Low-voltage vibration sensor in standard CMOS process. ROBIO 2007: 1512-1516
[c35]Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun: On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566
[p2]Sushil Jajodia, Ting Yu: Basic Security Concepts. Secure Data Management in Decentralized Systems 2007: 3-20
[p1]Adam J. Lee, Kent E. Seamons, Marianne Winslett, Ting Yu: Automated Trust Negotiation in Open Systems. Secure Data Management in Decentralized Systems 2007: 217-258
[e2]
[e1]Ting Yu, Sushil Jajodia (Eds.): Secure Data Management in Decentralized Systems. Advances in Information Security 33, Springer 2007, ISBN 978-0-387-27694-6- 2006
[j9]Ninghui Li, Ting Yu, Annie I. Antón: A semantics based approach to privacy languages. Comput. Syst. Sci. Eng. 21(5) (2006)
[j8]Ying Wu, Ting Yu: A Field Model for Human Detection and Tracking. IEEE Trans. Pattern Anal. Mach. Intell. 28(5): 753-765 (2006)
[j7]Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, Ting Yu: Integrating XML data sources using approximate joins. ACM Trans. Database Syst. 31(1): 161-207 (2006)
[c34]Keith Irwin, Ting Yu, William H. Winsborough: On the modeling and analysis of obligations. ACM Conference on Computer and Communications Security 2006: 134-143
[c33]Zhimin Fan, Ming Yang, Ying Wu, Gang Hua, Ting Yu: Efficient Optimal Kernel Placement for Reliable Visual Tracking. CVPR (1) 2006: 658-665
[c32]Ting Yu, Ying Wu: Differential Tracking based on Spatial-Appearance Model (SAM). CVPR (1) 2006: 720-727
[c31]Evan Martin, Tao Xie, Ting Yu: Defining and Measuring Policy Coverage in Testing Access Control Policies. ICICS 2006: 139-158
[c30]Ting Yu, John K. Debenham, Tony Jan, Simeon J. Simoff: Combine Vector Quantization and Support Vector Machine for Imbalanced Datasets. IFIP AI 2006: 81-88
[c29]Ting Yu, Tony Jan, John K. Debenham, Simeon J. Simoff: Classify Unexpected News Impacts to Stock Price by Incorporating Time Series Analysis into Support Vector Machine. IJCNN 2006: 2993-2998
[c28]Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu: Denial of Service Attacks and Defenses in Decentralized Trust Management. SecureComm 2006: 1-12
[c27]Qing Zhang, Ting Yu, Peng Ning: A Framework for Identifying Compromised Nodes in Sensor Networks. SecureComm 2006: 1-10- 2005
[c26]Keith Irwin, Ting Yu: Preventing attribute information leakage in automated trust negotiation. ACM Conference on Computer and Communications Security 2005: 36-45
[c25]Ting Yu, Ying Wu: Decentralized Multiple Target Tracking Using Netted Collaborative Autonomous Trackers. CVPR (1) 2005: 939-946
[c24]Ying Wu, Ting Yu, Gang Hua: A Statistical Field Model for Pedestrian Detection. CVPR (1) 2005: 1023-1030
[c23]Ting Yu, Ying Wu: Collaborative visual tracking of multiple identical targets. Storage and Retrieval Methods and Applications for Multimedia 2005: 137-149
[c22]Keith Irwin, Ting Yu: Determining user privacy preferences by asking the right questions: an automated approach. WPES 2005: 47-50- 2004
[j6]Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan, H. V. Jagadish: A compressed accessibility map for XML. ACM Trans. Database Syst. 29(2): 363-402 (2004)
[c21]
[c20]
[c19]Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, Charles C. Zhang: How to Exploit Ontologies for Trust Negotiation. ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004
[c18]Qing Zhang, Ting Yu: A Classification Scheme for Trust Functions in Reputation-Based Trust Management. ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004
[c17]
[c16]Keith Irwin, Ting Yu: An identifiability-based access control model for privacy protection in open systems. WPES 2004: 43- 2003
[j5]Ting Yu, Marianne Winslett, Jason E. Holt: Two Security Symposia. IEEE Security & Privacy 1(4): 50-52 (2003)
[j4]
[j3]Ting Yu, Marianne Winslett, Kent E. Seamons: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6(1): 1-42 (2003)
[c15]Ying Wu, Gang Hua, Ting Yu: Switching Observation Models for Contour Tracking in Clutter. CVPR (1) 2003: 295-304
[c14]
[c13]Kent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu: Trust Negotiation in Dynamic Coalitions. DISCEX (2) 2003: 240-245
[c12]
[c11]Sudipto Guha, Nick Koudas, Divesh Srivastava, Ting Yu: Index-Based Approximate XML Joins. ICDE 2003: 708-710
[c10]Ting Yu, Marianne Winslett: A Unified Scheme for Resource Protection in Automated Trust Negotiation. IEEE Symposium on Security and Privacy 2003: 110-122
[c9]Ting Yu, Marianne Winslett: Policy migration for sensitive credentials in trust negotiation. WPES 2003: 9-20- 2002
[j2]Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, Lina Yu: Negotiating Trust on the Web. IEEE Internet Computing 6(6): 30-37 (2002)
[c8]Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis: Protecting Privacy during On-Line Trust Negotiation. Privacy Enhancing Technologies 2002: 129-143
[c7]Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, Lina Yu: Requirements for Policy Languages for Trust Negotiation. POLICY 2002: 68-79
[c6]Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, Ting Yu: Approximate XML joins. SIGMOD Conference 2002: 287-298
[c5]Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan, H. V. Jagadish: Compressed Accessibility Map: Efficient Access Control for XML. VLDB 2002: 478-489- 2001
[c4]Ting Yu, Marianne Winslett, Kent E. Seamons: Interoperable strategies in automated trust negotiation. ACM Conference on Computer and Communications Security 2001: 146-155
[c3]Kent E. Seamons, Marianne Winslett, Ting Yu: Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. NDSS 2001- 2000
[c2]Ting Yu, Xiaosong Ma, Marianne Winslett: PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet. ACM Conference on Computer and Communications Security 2000: 210-219
1990 – 1999
- 1997
[j1]Ting Yu, Owen Kaser: A Note on "On the Conversion of Indirect to Direct Recursion". ACM Trans. Program. Lang. Syst. 19(6): 1085-1087 (1997)- 1995
[c1]Benjamin W. Wah, Arthur Ieumwananonthachai, Shu Yao, Ting Yu: Statistical generalization: theory and applications. ICCD 1995: 4-
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-15 21:38 CEST by the dblp team



