![]() | 2010 | |
---|---|---|
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Graham Cormode, Divesh Srivastava, Ting Yu, Qing Zhang: Anonymizing bipartite graph data using safe groupings. VLDB J. 19(1): 115-139 (2010) |
2009 | ||
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Wei, Juan Du, Ting Yu, Xiaohui Gu: SecureMR: A Service Integrity Assurance Framework for MapReduce. ACSAC 2009: 73-82 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Manfred Lenzen, Blanca Gallego, John K. Debenham: A Data Mining System for Estimating a Largesize Matrix for the Environmental Accounting. AIAI Workshops 2009: 260-269 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Nils Krahnstoever, Peter H. Tu, Ting Yu, Kedar A. Patwardhan, D. Hamilton, B. Yu, C. Greco, Gianfranco Doretto: Intelligent Video for Protecting Crowded Sports Venues. AVSS 2009: 116-121 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Ser Nam Lim, Kedar A. Patwardhan, Nils Krahnstoever: Monitoring, recognizing and discovering social networks. CVPR 2009: 1462-1469 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Manfred Lenzen, Chris Dey, Jeremy Badcock: Automatically Estimating and Updating Input-Output Tables. KES (2) 2009: 42-49 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Adam J. Lee, Ting Yu: Towards a dynamic and composable model of trust. SACMAT 2009: 217-226 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Juan Du, Wei Wei, Xiaohui Gu, Ting Yu: Towards secure dataflow processing in open distributed systems. STC 2009: 67-72 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Dongwon Lee, Ting Yu: XML Access Control. Encyclopedia of Database Systems 2009: 3573-3576 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu: Denial of service attacks and defenses in decentralized trust management. Int. J. Inf. Sec. 8(2): 89-101 (2009) |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Qing Zhang, Wei Wei, Ting Yu: On the Modeling of Honest Players in Reputation Systems. J. Comput. Sci. Technol. 24(5): 808-819 (2009) |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Nick Koudas, Divesh Srivastava, Ting Yu, Qing Zhang: Distribution-based Microdata Anonymization. PVLDB 2(1): 958-969 (2009) |
2008 | ||
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaoming Liu, Ting Yu, Thomas Sebastian, Peter H. Tu: Boosted deformable model for human body alignment. CVPR 2008 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Ying Wu, Nils Krahnstoever, Peter H. Tu: Distributed data association and filtering for multiple target tracking. CVPR 2008 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter H. Tu, Thomas Sebastian, Gianfranco Doretto, Nils Krahnstoever, Jens Rittscher, Ting Yu: Unified Crowd Segmentation. ECCV (4) 2008: 691-704 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Qing Zhang, Ting Yu: On the Modeling of Honest Players in Reputation Systems. ICDCS Workshops 2008: 249-254 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith Irwin, Ting Yu, William H. Winsborough: Enforcing security properties in task-based systems. SACMAT 2008: 41-50 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Heshan Lin, Xiaosong Ma, Jiangtian Li, Ting Yu, Nagiza F. Samatova: Adaptive Request Scheduling for Parallel Scientific Web Services. SSDBM 2008: 276-294 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith Irwin, Ting Yu, William H. Winsborough: Avoiding information leakage in security-policy-aware planning. WPES 2008: 85-94 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Qing Zhang, Ting Yu, Peng Ning: A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): (2008) |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Graham Cormode, Divesh Srivastava, Ting Yu, Qing Zhang: Anonymizing bipartite graph data using safe groupings. PVLDB 1(1): 833-844 (2008) |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Adam J. Lee, Ting Yu: Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007). SIGMOD Record 37(1): 56-58 (2008) |
2007 | ||
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Ting Yu: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007 ACM 2007 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Sushil Jajodia: Secure Data Management in Decentralized Systems Springer 2007 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaoming Liu, Nils Krahnstoever, Ting Yu, Peter H. Tu: What are customers looking at? AVSS 2007: 405-410 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Ming Yang, Ting Yu, Ying Wu: Game-Theoretic Multiple Target Tracking. ICCV 2007: 1-8 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaoming Liu, Ting Yu: Gradient Feature Selection for Online Boosting. ICCV 2007: 1-8 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Qing Zhang, Nick Koudas, Divesh Srivastava, Ting Yu: Aggregate Query Answering on Anonymized Tables. ICDE 2007: 116-125 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Tony Jan, Simeon J. Simoff, John K. Debenham: A Hierarchical VQSVM for Imbalanced Data Sets. IJCNN 2007: 518-523 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Simeon J. Simoff, Donald Stokes: Incorporating Prior Domain Knowledge into a Kernel Based Feature Selection Algorithm. PAKDD 2007: 1064-1071 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun: On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuming Ou, Longbing Cao, Ting Yu, Chengqi Zhang: Detecting Turning Points of Trading Price and Return Volatility for Market Surveillance Agents. Web Intelligence/IAT Workshops 2007: 491-494 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Adam J. Lee, Kent E. Seamons, Marianne Winslett, Ting Yu: Automated Trust Negotiation in Open Systems. Secure Data Management in Decentralized Systems 2007: 217-258 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Sushil Jajodia, Ting Yu: Basic Security Concepts. Secure Data Management in Decentralized Systems 2007: 3-20 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu: A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007) |
2006 | ||
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith Irwin, Ting Yu, William H. Winsborough: On the modeling and analysis of obligations. ACM Conference on Computer and Communications Security 2006: 134-143 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhimin Fan, Ming Yang, Ying Wu, Gang Hua, Ting Yu: Efficient Optimal Kernel Placement for Reliable Visual Tracking. CVPR (1) 2006: 658-665 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Ying Wu: Differential Tracking based on Spatial-Appearance Model (SAM). CVPR (1) 2006: 720-727 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Evan Martin, Tao Xie, Ting Yu: Defining and Measuring Policy Coverage in Testing Access Control Policies. ICICS 2006: 139-158 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, John K. Debenham, Tony Jan, Simeon J. Simoff: Combine Vector Quantization and Support Vector Machine for Imbalanced Datasets. IFIP AI 2006: 81-88 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Tony Jan, John K. Debenham, Simeon J. Simoff: Classify Unexpected News Impacts to Stock Price by Incorporating Time Series Analysis into Support Vector Machine. IJCNN 2006: 2993-2998 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, Ting Yu: Integrating XML data sources using approximate joins. ACM Trans. Database Syst. 31(1): 161-207 (2006) |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Ying Wu, Ting Yu: A Field Model for Human Detection and Tracking. IEEE Trans. Pattern Anal. Mach. Intell. 28(5): 753-765 (2006) |
2005 | ||
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith Irwin, Ting Yu: Preventing attribute information leakage in automated trust negotiation. ACM Conference on Computer and Communications Security 2005: 36-45 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Ying Wu, Ting Yu, Gang Hua: A Statistical Field Model for Pedestrian Detection. CVPR (1) 2005: 1023-1030 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Ying Wu: Decentralized Multiple Target Tracking Using Netted Collaborative Autonomous Trackers. CVPR (1) 2005: 939-946 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith Irwin, Ting Yu: Determining user privacy preferences by asking the right questions: an automated approach. WPES 2005: 47-50 |
2004 | ||
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Ying Wu: Collaborative Tracking of Multiple Targets. CVPR (1) 2004: 834-841 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Nick Koudas, Michael Rabinovich, Divesh Srivastava, Ting Yu: Routing XML Queries. ICDE 2004: 844 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Qing Zhang, Ting Yu: A Classification Scheme for Trust Functions in Reputation-Based Trust Management. ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, Charles C. Zhang: How to Exploit Ontologies for Trust Negotiation. ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Ninghui Li, Annie I. Antón: A formal semantics for P3P. SWS 2004: 1-8 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith Irwin, Ting Yu: An identifiability-based access control model for privacy protection in open systems. WPES 2004: 43 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan, H. V. Jagadish: A compressed accessibility map for XML. ACM Trans. Database Syst. 29(2): 363-402 (2004) |
2003 | ||
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Ying Wu, Gang Hua, Ting Yu: Switching Observation Models for Contour Tracking in Clutter. CVPR (1) 2003: 295-304 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Ying Wu, Ting Yu, Gang Hua: Tracking Appearances with Occlusions. CVPR (1) 2003: 789-795 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Kent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu: Trust Negotiation in Dynamic Coalitions. DISCEX (2) 2003: 240-245 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Ying Wu, Gang Hua, Ting Yu: Tracking Articulated Body by Dynamic Markov Network. ICCV 2003: 1094-1101 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Sudipto Guha, Nick Koudas, Divesh Srivastava, Ting Yu: Index-Based Approximate XML Joins. ICDE 2003: 708-710 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Marianne Winslett: A Unified Scheme for Resource Protection in Automated Trust Negotiation. IEEE Symposium on Security and Privacy 2003: 110-122 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Marianne Winslett: Policy migration for sensitive credentials in trust negotiation. WPES 2003: 9-20 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Marianne Winslett, Kent E. Seamons: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6(1): 1-42 (2003) |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Marianne Winslett, Jason E. Holt: Two Security Symposia. IEEE Security & Privacy 1(4): 50-52 (2003) |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Marianne Winslett, Xiaosong Ma, Ting Yu: Two-Body Job Searches. SIGMOD Record 32(2): 107-112 (2003) |
2002 | ||
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, Lina Yu: Requirements for Policy Languages for Trust Negotiation. POLICY 2002: 68-79 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis: Protecting Privacy during On-Line Trust Negotiation. Privacy Enhancing Technologies 2002: 129-143 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, Ting Yu: Approximate XML joins. SIGMOD Conference 2002: 287-298 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan, H. V. Jagadish: Compressed Accessibility Map: Efficient Access Control for XML. VLDB 2002: 478-489 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, Lina Yu: Negotiating Trust on the Web. IEEE Internet Computing 6(6): 30-37 (2002) |
2001 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Marianne Winslett, Kent E. Seamons: Interoperable strategies in automated trust negotiation. ACM Conference on Computer and Communications Security 2001: 146-155 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Kent E. Seamons, Marianne Winslett, Ting Yu: Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. NDSS 2001 |
2000 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Xiaosong Ma, Marianne Winslett: PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet. ACM Conference on Computer and Communications Security 2000: 210-219 |
1997 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Ting Yu, Owen Kaser: A Note on "On the Conversion of Indirect to Direct Recursion". ACM Trans. Program. Lang. Syst. 19(6): 1085-1087 (1997) |
1995 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Benjamin W. Wah, Arthur Ieumwananonthachai, Shu Yao, Ting Yu: Statistical generalization: theory and applications. ICCD 1995: 4- |