Follow
Ting Yu
Ting Yu
Qatar Computing Research Institute (QCRI)
Verified email at ncsu.edu
Title
Cited by
Cited by
Year
Aggregate query answering on anonymized tables
Q Zhang, N Koudas, D Srivastava, T Yu
2007 IEEE 23rd international conference on data engineering, 116-125, 2007
5012007
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
T Yu, M Winslett, KE Seamons
ACM Transactions on Information and System Security (TISSEC) 6 (1), 1-42, 2003
4192003
Differentially private spatial decompositions
G Cormode, C Procopiuc, D Srivastava, E Shen, T Yu
2012 IEEE 28th International Conference on Data Engineering, 20-31, 2012
4142012
Negotiating trust in the Web
M Winslett, T Yu, KE Seamons, A Hess, J Jacobson, R Jarvis, B Smith, ...
IEEE Internet Computing 6 (6), 30-37, 2002
3122002
Heavy hitter estimation over set-valued data with local differential privacy
Z Qin, Y Yang, T Yu, I Khalil, X Xiao, K Ren
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2902016
A unified scheme for resource protection in automated trust negotiation
T Yu, M Winslett
2003 Symposium on Security and Privacy, 2003., 110-122, 2003
2812003
On mouse dynamics as a behavioral biometric for authentication
Z Jorgensen, T Yu
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
2532011
Limiting the disclosure of access control policies during automated trust negotiation.
KE Seamons, M Winslett, T Yu
NDSS, 2001
2472001
Interoperable strategies in automated trust negotiation
T Yu, M Winslett, KE Seamons
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
2412001
Approximate XML joins
S Guha, HV Jagadish, N Koudas, D Srivastava, T Yu
Proceedings of the 2002 ACM SIGMOD international conference on Management of …, 2002
218*2002
Anonymizing bipartite graph data using safe groupings
G Cormode, D Srivastava, T Yu, Q Zhang
Proceedings of the VLDB Endowment 1 (1), 833-844, 2008
2162008
Requirements for policy languages for trust negotiation
KE Seamons, M Winslett, T Yu, B Smith, E Child, J Jacobson, H Mills, L Yu
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
2112002
Prunes: an efficient and complete strategy for automated trust negotiation over the internet
T Yu, X Ma, M Winslett
Proceedings of the 7th ACM conference on Computer and communications …, 2000
1942000
Conservative or liberal? Personalized differential privacy
Z Jorgensen, T Yu, G Cormode
2015 IEEE 31St international conference on data engineering, 1023-1034, 2015
1772015
Securemr: A service integrity assurance framework for mapreduce
W Wei, J Du, T Yu, X Gu
2009 Annual Computer Security Applications Conference, 73-82, 2009
1632009
Protecting privacy during on-line trust negotiation
KE Seamons, M Winslett, T Yu, L Yu, R Jarvis
International Workshop on Privacy Enhancing Technologies, 129-143, 2002
1462002
A survey on malicious domains detection through DNS data analysis
Y Zhauniarovich, I Khalil, T Yu, M Dacier
ACM Computing Surveys (CSUR) 51 (4), 1-36, 2018
1422018
Protecting sensitive labels in social network data anonymization
M Yuan, L Chen, SY Philip, T Yu
IEEE Transactions on Knowledge and Data Engineering 25 (3), 633-647, 2011
1422011
Generating synthetic decentralized social graphs with local differential privacy
Z Qin, T Yu, Y Yang, I Khalil, X Xiao, K Ren
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1382017
On the modeling and analysis of obligations
K Irwin, T Yu, WH Winsborough
Proceedings of the 13th ACM conference on Computer and communications …, 2006
1382006
The system can't perform the operation now. Try again later.
Articles 1–20