Follow
Ting Yu
Ting Yu
Mohamed bin Zayed University of Artificial Intelligence
Verified email at acm.org
Title
Cited by
Cited by
Year
Aggregate query answering on anonymized tables
Q Zhang, N Koudas, D Srivastava, T Yu
2007 IEEE 23rd international conference on data engineering, 116-125, 2006
5332006
Differentially private spatial decompositions
G Cormode, C Procopiuc, D Srivastava, E Shen, T Yu
2012 IEEE 28th International Conference on Data Engineering, 20-31, 2012
4982012
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
T Yu, M Winslett, KE Seamons
ACM Transactions on Information and System Security (TISSEC) 6 (1), 1-42, 2003
4282003
Heavy hitter estimation over set-valued data with local differential privacy
Z Qin, Y Yang, T Yu, I Khalil, X Xiao, K Ren
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
3902016
Negotiating trust in the Web
M Winslett, T Yu, KE Seamons, A Hess, J Jacobson, R Jarvis, B Smith, ...
IEEE Internet Computing 6 (6), 30-37, 2002
3162002
A unified scheme for resource protection in automated trust negotiation
T Yu, M Winslett
2003 Symposium on Security and Privacy, 2003., 110-122, 2003
2902003
On mouse dynamics as a behavioral biometric for authentication
Z Jorgensen, T Yu
Proceedings of the 6th ACM symposium on information, computer and …, 2011
2832011
Conservative or liberal? Personalized differential privacy
Z Jorgensen, T Yu, G Cormode
2015 IEEE 31St international conference on data engineering, 1023-1034, 2015
2712015
Generating synthetic decentralized social graphs with local differential privacy
Z Qin, T Yu, Y Yang, I Khalil, X Xiao, K Ren
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
2512017
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
KE Seamons, M Winslett, T Yu
NDSS, 2001
2452001
Interoperable strategies in automated trust negotiation
T Yu, M Winslett, KE Seamons
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
2432001
A survey on malicious domains detection through DNS data analysis
Y Zhauniarovich, I Khalil, T Yu, M Dacier
ACM Computing Surveys (CSUR) 51 (4), 1-36, 2018
2272018
Anonymizing bipartite graph data using safe groupings
G Cormode, D Srivastava, T Yu, Q Zhang
Proceedings of the VLDB Endowment 1 (1), 833-844, 2008
2252008
Approximate XML joins
S Guha, HV Jagadish, N Koudas, D Srivastava, T Yu
Proceedings of the 2002 ACM SIGMOD international conference on Management of …, 2002
2232002
Requirements for policy languages for trust negotiation
KE Seamons, M Winslett, T Yu, B Smith, E Child, J Jacobson, H Mills, L Yu
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
2172002
PRUNES: an efficient and complete strategy for automated trust negotiation over the internet
T Yu, X Ma, M Winslett
Proceedings of the 7th ACM conference on Computer and communications …, 2000
1942000
Protecting sensitive labels in social network data anonymization
M Yuan, L Chen, SY Philip, T Yu
IEEE Transactions on Knowledge and Data Engineering 25 (3), 633-647, 2011
1682011
Securemr: A service integrity assurance framework for mapreduce
W Wei, J Du, T Yu, X Gu
2009 Annual Computer Security Applications Conference, 73-82, 2009
1642009
A framework for identifying compromised nodes in wireless sensor networks
Q Zhang, T Yu, P Ning
ACM Transactions on Information and System Security (TISSEC) 11 (3), 1-37, 2008
1502008
Protecting privacy during on-line trust negotiation
KE Seamons, M Winslett, T Yu, L Yu, R Jarvis
Privacy Enhancing Technologies: Second International Workshop, PET 2002 San …, 2003
1492003
The system can't perform the operation now. Try again later.
Articles 1–20