default search action
Yingjiu Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j93]Yangguang Tian, Yingjiu Li, Robert H. Deng, Guomin Yang, Nan Li:
Policy-Based Remote User Authentication From Multi-Biometrics. Comput. J. 67(5): 1814-1825 (2024) - [j92]Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, HweeHwa Pang, Robert H. Deng:
AnoPas: Practical anonymous transit pass from group signatures with time-bound keys. J. Syst. Archit. 153: 103184 (2024) - [j91]Yang Yang, Wenyi Xue, Yonghua Zhan, Minming Huang, Yingjiu Li, Robert H. Deng:
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential. IEEE Trans. Dependable Secur. Comput. 21(4): 1621-1638 (2024) - [j90]Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, Guozhen Shi, HweeHwa Pang, Robert H. Deng:
Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures. IEEE Trans. Dependable Secur. Comput. 21(4): 2585-2602 (2024) - [j89]Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou:
Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting. IEEE Trans. Inf. Forensics Secur. 19: 1756-1766 (2024) - [j88]Yang Yang, Wenyi Xue, Jianfei Sun, Guomin Yang, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication. IEEE Trans. Inf. Forensics Secur. 19: 6097-6112 (2024) - [c104]Sanidhay Arora, Yingjiu Li, Yebo Feng, Jiahua Xu:
SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks. AsiaCCS 2024 - [c103]Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng:
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. NDSS 2024 - [i15]Sanidhay Arora, Yingjiu Li, Yebo Feng, Jiahua Xu:
SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks. CoRR abs/2401.08520 (2024) - [i14]Xunguang Wang, Daoyuan Wu, Zhenlan Ji, Zongjie Li, Pingchuan Ma, Shuai Wang, Yingjiu Li, Yang Liu, Ning Liu, Juergen Rahmel:
SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner. CoRR abs/2406.05498 (2024) - 2023
- [j87]Yuxian Li, Jian Weng, Wei Wu, Ming Li, Yingjiu Li, Haoxin Tu, Yongdong Wu, Robert H. Deng:
PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability. J. Parallel Distributed Comput. 180: 104721 (2023) - [j86]Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control. IEEE Trans. Dependable Secur. Comput. 20(1): 53-67 (2023) - [j85]Tao Xue, Yu Wen, Bo Luo, Gang Li, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng:
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. IEEE Trans. Dependable Secur. Comput. 20(2): 1104-1123 (2023) - [j84]Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Hualong Ma, Yue Zhao, Yingjiu Li:
A Robustness-Assured White-Box Watermark in Neural Networks. IEEE Trans. Dependable Secur. Comput. 20(6): 5214-5229 (2023) - [j83]Shengmin Xu, Xinyi Huang, Jiaming Yuan, Yingjiu Li, Robert H. Deng:
Accountable and Fine-Grained Controllable Rewriting in Blockchains. IEEE Trans. Inf. Forensics Secur. 18: 101-116 (2023) - [j82]Wenyi Xue, Yang Yang, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
ACB-Vote: Efficient, Flexible, and Privacy- Preserving Blockchain-Based Score Voting With Anonymously Convertible Ballots. IEEE Trans. Inf. Forensics Secur. 18: 3720-3734 (2023) - [j81]Bowen Zhao, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Yingjiu Li, Robert H. Deng:
CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics. IEEE Trans. Inf. Forensics Secur. 18: 5416-5430 (2023) - [j80]Bowen Zhao, Yingjiu Li, Ximeng Liu, Xiaoguo Li, HweeHwa Pang, Robert H. Deng:
Identifiable, But Not Visible: A Privacy-Preserving Person Reidentification Scheme. IEEE Trans. Reliab. 72(4): 1295-1307 (2023) - [j79]Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
Threshold Attribute-Based Credentials With Redactable Signature. IEEE Trans. Serv. Comput. 16(5): 3751-3765 (2023) - [c102]Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen:
A Practical Forward-Secure DualRing. CANS 2023: 516-537 - 2022
- [j78]Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng, Zheng Yang:
Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification. Comput. J. 65(10): 2570-2588 (2022) - [j77]Shengmin Xu, Yingjiu Li, Robert H. Deng, Yinghui Zhang, Xiangyang Luo, Ximeng Liu:
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things. IEEE Trans. Cloud Comput. 10(1): 474-490 (2022) - [j76]Yao Cheng, Chang Xu, Zhen Hai, Yingjiu Li:
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model. IEEE Trans. Dependable Secur. Comput. 19(1): 77-90 (2022) - [j75]Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. IEEE Trans. Dependable Secur. Comput. 19(2): 1064-1077 (2022) - [j74]Jiayun Xu, Yingjiu Li, Robert H. Deng, Ke Xu:
SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering. IEEE Trans. Dependable Secur. Comput. 19(2): 1149-1163 (2022) - [j73]Shengmin Xu, Jianting Ning, Xinyi Huang, Yingjiu Li, Guowen Xu:
Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud. IEEE Trans. Dependable Secur. Comput. 19(6): 3759-3773 (2022) - [j72]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Yingjiu Li, Robert H. Deng:
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning. IEEE Trans. Inf. Forensics Secur. 17: 1639-1654 (2022) - [c101]Bowen Zhao, Yingjiu Li, Ximeng Liu, HweeHwa Pang, Robert H. Deng:
FREED: An Efficient Privacy-Preserving Solution for Person Re-IDentification. DSC 2022: 1-8 - [c100]Jiaming Yuan, Yingjiu Li, Jianting Ning, Robert H. Deng:
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption. ISPEC 2022: 606-623 - [c99]Li Song, Qiongxiao Wang, Jingqiang Lin, Shijie Jia, Yingjiu Li, Yikai Chen:
Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme. WCNC 2022: 1010-1015 - [i13]Shaoying Cai, Yingjiu Li, Changshe Ma, Sherman S. M. Chow, Robert H. Deng:
Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication. CoRR abs/2210.10244 (2022) - 2021
- [j71]Yangguang Tian, Yingjiu Li, Yi Mu, Guomin Yang:
Unlinkable and Revocable Secret Handshake. Comput. J. 64(8): 1303-1314 (2021) - [j70]Kai Bu, Avery Laird, Yutian Yang, Linfeng Cheng, Jiaqing Luo, Yingjiu Li, Kui Ren:
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation. ACM Comput. Surv. 53(5): 104:1-104:34 (2021) - [j69]Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang:
Lattice-based remote user authentication from reusable fuzzy signature. J. Comput. Secur. 29(3): 273-298 (2021) - [j68]Yan Li, Yao Cheng, Weizhi Meng, Yingjiu Li, Robert H. Deng:
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices. IEEE Trans. Inf. Forensics Secur. 16: 307-321 (2021) - [c98]Ximing Liu, Yingjiu Li, Robert H. Deng:
UltraPIN: Inferring PIN Entries via Ultrasound. AsiaCCS 2021: 944-957 - [c97]Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, Robert H. Deng:
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. CCS 2021: 2307-2320 - [c96]Jiayun Xu, Yingjiu Li, Robert H. Deng:
Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection. NDSS 2021 - [i12]Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Yue Zhao, Yingjiu Li:
HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks. CoRR abs/2103.13628 (2021) - [i11]Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou:
Accountable Fine-grained Blockchain Rewriting in the Permissionless Setting. CoRR abs/2104.13543 (2021) - [i10]Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen:
A Practical Forward-Secure DualRing. IACR Cryptol. ePrint Arch. 2021: 1483 (2021) - 2020
- [j67]Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Guomin Yang, Zheng Yang:
A New Construction for Linkable Secret Handshake. Comput. J. 63(4): 536-548 (2020) - [j66]Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng:
Editing-Enabled Signatures: A New Tool for Editing Authenticated Data. IEEE Internet Things J. 7(6): 4997-5007 (2020) - [j65]Shengmin Xu, Jiaming Yuan, Guowen Xu, Yingjiu Li, Ximeng Liu, Yinghui Zhang, Zuobin Ying:
Efficient ciphertext-policy attribute-based encryption with blackbox traceability. Inf. Sci. 538: 19-38 (2020) - [j64]Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Pengfei Wu, Anyi Liu:
A new framework for privacy-preserving biometric-based remote user authentication. J. Comput. Secur. 28(4): 469-498 (2020) - [j63]Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Chunhua Su:
Leakage-resilient biometric-based remote user authentication with fuzzy extractors. Theor. Comput. Sci. 814: 223-233 (2020) - [j62]Yang Yang, Ximeng Liu, Robert H. Deng, Yingjiu Li:
Lightweight Sharable and Traceable Secure Mobile Health System. IEEE Trans. Dependable Secur. Comput. 17(1): 78-91 (2020) - [j61]Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng:
Privacy-preserving Network Path Validation. ACM Trans. Internet Techn. 20(1): 5:1-5:27 (2020) - [c95]Tao Xue, Yu Wen, Bo Luo, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li, Dan Meng:
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. ACSAC 2020: 582-596 - [c94]Yangguang Tian, Nan Li, Yingjiu Li, Pawel Szalachowski, Jianying Zhou:
Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability. ACSAC 2020: 813-828 - [i9]Yao Cheng, Chang Xu, Zhen Hai, Yingjiu Li:
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model. CoRR abs/2006.13462 (2020)
2010 – 2019
- 2019
- [j60]Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li:
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Comput. Secur. 80: 90-107 (2019) - [j59]Yangguang Tian, Yingjiu Li, Guomin Yang, Willy Susilo, Yi Mu, Hui Cui, Yinghui Zhang:
DABKE: Secure deniable attribute-based key exchange framework. J. Comput. Secur. 27(2): 259-275 (2019) - [j58]Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, Robert Huijie Deng:
Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin. J. Comput. Secur. 27(3): 375-403 (2019) - [j57]Anyi Liu, Selena Haidar, Yuan Cheng, Yingjiu Li:
Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log. EAI Endorsed Trans. Security Safety 6(20): e3 (2019) - [j56]Hui Cui, Robert H. Deng, Yingjiu Li, Guowei Wu:
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud. IEEE Trans. Big Data 5(3): 330-342 (2019) - [j55]Anyi Liu, Huirong Fu, Yuan Hong, Jigang Liu, Yingjiu Li:
LiveForen: Ensuring Live Forensic Integrity in the Cloud. IEEE Trans. Inf. Forensics Secur. 14(10): 2749-2764 (2019) - [c93]Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Yong Yu:
Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion. CANS 2019: 512-524 - [c92]Yan Li, Zilong Wang, Yingjiu Li, Robert H. Deng, Binbin Chen, Weizhi Meng, Hui Li:
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication. AsiaCCS 2019: 241-246 - [c91]Shengmin Xu, Jiaming Yuan, Yingjiu Li, Ximeng Liu, Yinghui Zhang:
Super Payment Channel for Decentralized Cryptocurrencies. DSC 2019: 1-8 - [c90]Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen, Jiayun Xu:
DroidEvolver: Self-Evolving Android Malware Detection System. EuroS&P 2019: 47-62 - [c89]Pamela Hui Ting Chua, Yingjiu Li, Wei He:
Adopting Hyperledger Fabric Blockchain for EPCglobal Network. RFID 2019: 1-8 - [c88]Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang:
Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy. SecureComm (2) 2019: 184-204 - [i8]Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng:
Privacy-Preserving Network Path Validation. IACR Cryptol. ePrint Arch. 2019: 407 (2019) - [i7]Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang:
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature. IACR Cryptol. ePrint Arch. 2019: 743 (2019) - 2018
- [j54]Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen Tao Zhu, Yingjiu Li, Zhan Wang:
User-friendly deniable storage for mobile devices. Comput. Secur. 72: 163-174 (2018) - [j53]Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen Tao Zhu, Robert H. Deng:
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch. Cybersecur. 1(1): 7 (2018) - [j52]Hui Cui, Robert H. Deng, Yingjiu Li:
Attribute-based cloud storage with secure provenance over encrypted data. Future Gener. Comput. Syst. 79: 461-472 (2018) - [j51]Yan Li, Yingjiu Li, Ke Xu, Qiang Yan, Robert H. Deng:
Empirical Study of Face Authentication Systems Under OSNFD Attacks. IEEE Trans. Dependable Secur. Comput. 15(2): 231-245 (2018) - [j50]Hui Cui, Zhiguo Wan, Robert H. Deng, Guilin Wang, Yingjiu Li:
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud. IEEE Trans. Dependable Secur. Comput. 15(3): 409-422 (2018) - [j49]Kai Bu, Yingjiu Li:
Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths. IEEE Trans. Inf. Forensics Secur. 13(4): 834-849 (2018) - [j48]Hui Cui, Robert H. Deng, Joseph K. Liu, Xun Yi, Yingjiu Li:
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices. IEEE Trans. Ind. Informatics 14(8): 3724-3732 (2018) - [c87]Ximing Liu, Yingjiu Li, Robert H. Deng:
Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings. ACSAC 2018: 53-65 - [c86]Yangguang Tian, Yingjiu Li, Binanda Sengupta, Robert Huijie Deng, Albert Ching, Weiwei Liu:
Privacy-Preserving Remote User Authentication with k-Times Untraceability. Inscrypt 2018: 647-657 - [c85]Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng:
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. CODASPY 2018: 299-306 - [c84]Yangguang Tian, Yingjiu Li, Ximeng Liu, Robert H. Deng, Binanda Sengupta:
PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication. DSC 2018: 1-8 - [c83]Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen Tao Zhu, Yangguang Tian, Zhan Wang, Albert Ching:
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices. DSN 2018: 454-465 - [c82]Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen:
DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks. EuroS&P 2018: 473-487 - [c81]Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu:
DSH: Deniable Secret Handshake Framework. ISPEC 2018: 341-353 - [c80]Yangguang Tian, Yingjiu Li, Rongmao Chen, Nan Li, Ximeng Liu, Bing Chang, Xingjie Yu:
Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience. SecureComm (1) 2018: 112-132 - [e5]Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 254, Springer 2018, ISBN 978-3-030-01700-2 [contents] - [e4]Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 255, Springer 2018, ISBN 978-3-030-01703-3 [contents] - [i6]Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng:
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. CoRR abs/1801.04372 (2018) - [i5]Kai Bu, Yutian Yang, Avery Laird, Jiaqing Luo, Yingjiu Li, Kui Ren:
What's (Not) Validating Network Paths: A Survey. CoRR abs/1804.03385 (2018) - [i4]Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li:
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. CoRR abs/1810.07665 (2018) - 2017
- [j47]Xingjie Yu, Zhan Wang, Yingjiu Li, Liang Li, Wen Tao Zhu, Li Song:
EvoPass: Evolvable graphical password against shoulder-surfing attacks. Comput. Secur. 70: 179-198 (2017) - [j46]Yao Cheng, Yingjiu Li, Robert H. Deng, Lingyun Ying, Wei He:
A study on a feasible no-root approach on Android. J. Comput. Secur. 25(3): 231-253 (2017) - [j45]Chunhua Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, Xinyi Huang:
Universally Composable RFID Mutual Authentication. IEEE Trans. Dependable Secur. Comput. 14(1): 83-94 (2017) - [j44]Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng:
A Secure, Usable, and Transparent Middleware for Permission Managers on Android. IEEE Trans. Dependable Secur. Comput. 14(4): 350-362 (2017) - [j43]Ximeng Liu, Baodong Qin, Robert H. Deng, Yingjiu Li:
An Efficient Privacy-Preserving Outsourced Computation over Public Data. IEEE Trans. Serv. Comput. 10(5): 756-770 (2017) - [c79]Hui Cui, Robert H. Deng, Joseph K. Liu, Yingjiu Li:
Attribute-Based Encryption with Expressive and Authorized Keyword Search. ACISP (1) 2017: 106-126 - [c78]Yan Li, Yao Cheng, Yingjiu Li, Robert H. Deng:
What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses. AsiaCCS 2017: 327-333 - [c77]Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, Robert Huijie Deng:
Fair deposits against double-spending for Bitcoin transactions. DSC 2017: 44-51 - [c76]Zhi Yuan Poh, Hui Cui, Robert H. Deng, Yingjiu Li:
Attribute-Based Secure Messaging in the Public Cloud. SG-CRC 2017: 86-96 - [c75]Bing Chang, Ximing Liu, Yingjiu Li, Pingjian Wang, Wen Tao Zhu, Zhan Wang:
Employing Smartwatch for Enhanced Password Authentication. WASA 2017: 691-703 - 2016
- [j42]Lixian Liu, Junzuo Lai, Robert H. Deng, Yingjiu Li:
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Secur. Commun. Networks 9(18): 4897-4913 (2016) - [j41]Ke Xu, Yingjiu Li, Robert H. Deng:
ICCDetector: ICC-Based Malware Detection on Android. IEEE Trans. Inf. Forensics Secur. 11(6): 1252-1264 (2016) - [c74]Yao Cheng, Yingjiu Li, Robert H. Deng:
A Feasible No-Root Approach on Android. ACISP (2) 2016: 481-489 - [c73]Hui Cui, Robert H. Deng, Yingjiu Li, Baodong Qin:
Server-Aided Revocable Attribute-Based Encryption. ESORICS (2) 2016: 570-587 - [c72]Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao:
Efficient Tag Path Authentication Protocol with Less Tag Memory. ISPEC 2016: 255-270 - [c71]Su Mon Kywe, Yingjiu Li, Jason I. Hong, Cheng Yao:
Dissecting developer policy violating apps: characterization and detection. MALWARE 2016: 10-19 - [c70]Su Mon Kywe, Yingjiu Li, Kunal Petal, Michael Grace:
Attacking Android smartphone systems without permissions. PST 2016: 147-156 - [c69]Hui Cui, Robert H. Deng, Xuhua Ding, Yingjiu Li:
Attribute-Based Encryption with Granular Revocation. SecureComm 2016: 165-181 - [i3]Daoyuan Wu, Debin Gao, Yingjiu Li, Robert H. Deng:
SecComp: Towards Practically Defending Against Component Hijacking in Android Applications. CoRR abs/1609.03322 (2016) - 2015
- [b2]Yingjiu Li, Qiang Yan, Robert H. Deng:
Leakage Resilient Password Systems. Springer Briefs in Computer Science, Springer 2015, ISBN 978-3-319-17502-7, pp. 1-64 - [j40]Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou, Robert H. Deng:
Leakage-resilient password entry: Challenges, design, and evaluation. Comput. Secur. 48: 196-211 (2015) - [j39]Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng:
Privacy leakage analysis in online social networks. Comput. Secur. 49: 239-254 (2015) - [j38]Haibing Lu,