What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yingjiu Li
Google Scholar
70
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
AuditPCH: Auditable Payment Channel Hub With Privacy Protection.
Yuxian Li
Jian Weng
Junzuo Lai
Yingjiu Li
Jiahe Wu
Ming Li
Jianfei Sun
Pengfei Wu
Robert H. Deng
2025
journals/tifs
DkvSSO: Delegatable Keyed-Verification Credentials for Efficient Anonymous Single Sign-On.
Wenyi Xue
Yang Yang
Minming Huang
Yingjiu Li
HweeHwa Pang
Robert H. Deng
2025
conf/uss
AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication.
Yang Yang
Guomin Yang
Yingjiu Li
Minming Huang
Zilin Shen
Imtiaz Karim
Ralf Sasse
David A. Basin
Elisa Bertino
Jian Weng
HweeHwa Pang
Robert H. Deng
2025
conf/uss
SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner.
Xunguang Wang
Daoyuan Wu
Zhenlan Ji
Zongjie Li
Pingchuan Ma
Shuai Wang
Yingjiu Li
Yang Liu
Ning Liu
Juergen Rahmel
2024
journals/tifs
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication.
Yang Yang
Wenyi Xue
Jianfei Sun
Guomin Yang
Yingjiu Li
HweeHwa Pang
Robert H. Deng
2024
journals/tifs
Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting.
Yangguang Tian
Bowen Liu
Yingjiu Li
Pawel Szalachowski
Jianying Zhou
2024
conf/asiaccs
SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks.
Sanidhay Arora
Yingjiu Li
Yebo Feng
Jiahua Xu
2024
conf/ndss
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications.
Yang Yang
Robert H. Deng
Guomin Yang
Yingjiu Li
HweeHwa Pang
Minming Huang
Rui Shi
Jian Weng
2023
journals/tifs
CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics.
Bowen Zhao
Xiaoguo Li
Ximeng Liu
Qingqi Pei
Yingjiu Li
Robert H. Deng
2023
journals/tifs
Accountable and Fine-Grained Controllable Rewriting in Blockchains.
Shengmin Xu
Xinyi Huang
Jiaming Yuan
Yingjiu Li
Robert H. Deng
2023
journals/tifs
ACB-Vote: Efficient, Flexible, and Privacy- Preserving Blockchain-Based Score Voting With Anonymously Convertible Ballots.
Wenyi Xue
Yang Yang
Yingjiu Li
HweeHwa Pang
Robert H. Deng
2023
conf/cans
A Practical Forward-Secure DualRing.
Nan Li
Yingjiu Li
Atsuko Miyaji
Yangguang Tian
Tsz Hon Yuen
2022
journals/tifs
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning.
Zhuoran Ma
Jianfeng Ma
Yinbin Miao
Yingjiu Li
Robert H. Deng
2021
journals/tifs
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices.
Yan Li
Yao Cheng
Weizhi Meng
Yingjiu Li
Robert H. Deng
2021
conf/ccs
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Jianting Ning
Xinyi Huang
Geong Sen Poh
Jiaming Yuan
Yingjiu Li
Jian Weng
Robert H. Deng
2021
conf/asiaccs
UltraPIN: Inferring PIN Entries via Ultrasound.
Ximing Liu
Yingjiu Li
Robert H. Deng
2021
conf/ndss
Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection.
Jiayun Xu
Yingjiu Li
Robert H. Deng
2020
conf/acsac
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
Tao Xue
Yu Wen
Bo Luo
Boyang Zhang
Yang Zheng
Yanfei Hu
Yingjiu Li
Gang Li
Dan Meng
2020
conf/acsac
Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability.
Yangguang Tian
Nan Li
Yingjiu Li
Pawel Szalachowski
Jianying Zhou
2019
journals/compsec
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks.
Ximing Liu
Yingjiu Li
Robert H. Deng
Bing Chang
Shujun Li
2019
journals/tifs
: Ensuring Live Forensic Integrity in the Cloud.
Anyi Liu
Huirong Fu
Yuan Hong
Jigang Liu
Yingjiu Li
2019
conf/ccs
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Yan Li
Zilong Wang
Yingjiu Li
Robert H. Deng
Binbin Chen
Weizhi Meng
Hui Li
2019
conf/eurosp
DroidEvolver: Self-Evolving Android Malware Detection System.
Ke Xu
Yingjiu Li
Robert H. Deng
Kai Chen
Jiayun Xu
2019
conf/cans
Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion.
Yangguang Tian
Yingjiu Li
Binanda Sengupta
Nan Li
Yong Yu
2018
journals/compsec
User-friendly deniable storage for mobile devices.
Bing Chang
Yao Cheng
Bo Chen
Fengwei Zhang
Wen Tao Zhu
Yingjiu Li
Zhan Wang
2018
journals/tifs
Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths.
Kai Bu
Yingjiu Li
2018
conf/eurosp
DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks.
Ke Xu
Yingjiu Li
Robert H. Deng
Kai Chen
2018
conf/dsn
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices.
Bing Chang
Fengwei Zhang
Bo Chen
Yingjiu Li
Wen Tao Zhu
Yangguang Tian
Zhan Wang
Albert Ching
2018
conf/acsac
Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings.
Ximing Liu
Yingjiu Li
Robert H. Deng
2017
journals/compsec
EvoPass: Evolvable graphical password against shoulder-surfing attacks.
Xingjie Yu
Zhan Wang
Yingjiu Li
Liang Li
Wen Tao Zhu
Li Song
2017
conf/ccs
What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses.
Yan Li
Yao Cheng
Yingjiu Li
Robert H. Deng
2017
conf/acisp
Attribute-Based Encryption with Expressive and Authorized Keyword Search.
Hui Cui
Robert H. Deng
Joseph K. Liu
Yingjiu Li
2016
journals/tifs
ICCDetector: ICC-Based Malware Detection on Android.
Ke Xu
Yingjiu Li
Robert H. Deng
2016
conf/acisp
A Feasible No-Root Approach on Android.
Yao Cheng
Yingjiu Li
Robert H. Deng
2016
conf/esorics
Server-Aided Revocable Attribute-Based Encryption.
Hui Cui
Robert H. Deng
Yingjiu Li
Baodong Qin
2015
journals/compsec
Leakage-resilient password entry: Challenges, design, and evaluation.
Qiang Yan
Jin Han
Yingjiu Li
Jianying Zhou
Robert H. Deng
2015
journals/compsec
Privacy leakage analysis in online social networks.
Yan Li
Yingjiu Li
Qiang Yan
Robert H. Deng
2015
conf/ccs
Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication.
Yan Li
Yingjiu Li
Qiang Yan
Hancong Kong
Robert H. Deng
2015
conf/esorics
Server-Aided Revocable Identity-Based Encryption.
Baodong Qin
Robert H. Deng
Yingjiu Li
Shengli Liu
2015
conf/wisec
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers.
Daibin Wang
Haixia Yao
Yingjiu Li
Hai Jin
Deqing Zou
Robert H. Deng
2014
journals/compsec
Permission based Android security: Issues and countermeasures.
Zheran Fang
Weili Han
Yingjiu Li
2014
conf/ccs
Understanding OSN-based facial disclosure against face authentication systems.
Yan Li
Ke Xu
Qiang Yan
Yingjiu Li
Robert H. Deng
2014
conf/ccs
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Junzuo Lai
Robert H. Deng
Yingjiu Li
Jian Weng
2014
conf/icisc
Detecting Camouflaged Applications on Mobile Application Markets.
Su Mon Kywe
Yingjiu Li
Robert H. Deng
Jason I. Hong
2014
conf/esorics
Authorized Keyword Search on Encrypted Data.
Jie Shi
Junzuo Lai
Yingjiu Li
Robert H. Deng
Jian Weng
2013
conf/ccs
Designing leakage-resilient password entry on touchscreen mobile devices.
Qiang Yan
Jin Han
Yingjiu Li
Jianying Zhou
Robert H. Deng
2013
conf/ccs
Expressive search on encrypted data.
Junzuo Lai
Xuhua Zhou
Robert Huijie Deng
Yingjiu Li
Kefei Chen
2013
conf/acns
Launching Generic Attacks on iOS with Approved Third-Party Applications.
Jin Han
Su Mon Kywe
Qiang Yan
Feng Bao
Robert H. Deng
Debin Gao
Yingjiu Li
Jianying Zhou
2012
journals/compsec
A secure and efficient discovery service system in EPCglobal network.
Jie Shi
Yingjiu Li
Robert H. Deng
2012
conf/ccs
Expressive CP-ABE with partially hidden access structures.
Junzuo Lai
Robert H. Deng
Yingjiu Li
2012
conf/sec
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains.
Shaoying Cai
Yingjiu Li
Yunlei Zhao
2012
conf/acns
A New Framework for Privacy of RFID Path Authentication.
Shaoying Cai
Robert H. Deng
Yingjiu Li
Yunlei Zhao
2012
conf/ndss
On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.
Qiang Yan
Jin Han
Yingjiu Li
Robert H. Deng
2011
conf/ccs
A software-based root-of-trust primitive on multicore platforms.
Qiang Yan
Jin Han
Yingjiu Li
Robert H. Deng
Tieyan Li
2010
conf/acns
Revisiting Unpredictability-Based RFID Privacy Models.
Junzuo Lai
Robert H. Deng
Yingjiu Li
2010
conf/iciss
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains.
Shaoying Cai
Chunhua Su
Yingjiu Li
Robert H. Deng
Tieyan Li
2010
conf/esorics
A New Framework for RFID Privacy.
Robert H. Deng
Yingjiu Li
Moti Yung
Yunlei Zhao
2009
conf/ccs
RFID privacy: relation between two notions, minimal condition, and efficient construction.
Changshe Ma
Yingjiu Li
Robert H. Deng
Tieyan Li
2009
conf/provsec
Self-enforcing Private Inference Control.
Yanjiang Yang
Yingjiu Li
Jian Weng
Jianying Zhou
Feng Bao
2009
conf/iciss
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.
Bing Liang
Yingjiu Li
Changshe Ma
Tieyan Li
Robert H. Deng
2009
conf/iciss
A Robust Damage Assessment Model for Corrupted Database Systems.
Ge Fu
Hong Zhu
Yingjiu Li
2009
conf/icics
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Shaoying Cai
Tieyan Li
Changshe Ma
Yingjiu Li
Robert H. Deng
2009
conf/wisec
Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
Shaoying Cai
Yingjiu Li
Tieyan Li
Robert H. Deng
2008
conf/esorics
Disclosure Analysis and Control in Statistical Databases.
Yingjiu Li
Haibing Lu
2007
conf/ccs
Protecting RFID communications in supply chains.
Yingjiu Li
Xuhua Ding
2006
conf/ccs
Publicly verifiable ownership protection for relational databases.
Yingjiu Li
Robert Huijie Deng
2006
conf/uss
On the Release of CRLs in Public Key Infrastructure.
Chengyu Ma
Nan Hu
Yingjiu Li
2006
conf/sp
Practical Inference Control for Data Cubes (Extended Abstract).
Yingjiu Li
Haibing Lu
Robert H. Deng
2006
conf/iciss
Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract).
Haibing Lu
Yingjiu Li
Xintao Wu
2003
conf/esorics
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches.
Lingyu Wang
Yingjiu Li
Duminda Wijesekera
Sushil Jajodia
Coauthors
Albert Ching
(1)
Anyi Liu
(1)
Atsuko Miyaji
(1)
Baodong Qin
(2)
Binanda Sengupta
(1)
Binbin Chen
(1)
Bing Chang
(3)
Bing Liang
(1)
Bo Chen
(2)
Bo Luo
(1)
Bowen Liu
(1)
Bowen Zhao
(1)
Boyang Zhang
(1)
Changshe Ma
(3)
Chengyu Ma
(1)
Chunhua Su
(1)
Daibin Wang
(1)
Dan Meng
(1)
Daoyuan Wu
(1)
David A. Basin
(1)
Debin Gao
(1)
Deqing Zou
(1)
Duminda Wijesekera
(1)
Elisa Bertino
(1)
Feng Bao
(2)
Fengwei Zhang
(2)
Gang Li
(1)
Ge Fu
(1)
Geong Sen Poh
(1)
Guomin Yang
(3)
Hai Jin
(1)
Haibing Lu
(3)
Haixia Yao
(1)
Hancong Kong
(1)
Hong Zhu
(1)
Hui Cui
(2)
Hui Li
(1)
Huirong Fu
(1)
HweeHwa Pang
(5)
Imtiaz Karim
(1)
Jason I. Hong
(1)
Jiahe Wu
(1)
Jiahua Xu
(1)
Jiaming Yuan
(2)
Jian Weng
(7)
Jianfei Sun
(2)
Jianfeng Ma
(1)
Jianting Ning
(1)
Jianying Zhou
(6)
Jiayun Xu
(2)
Jie Shi
(2)
Jigang Liu
(1)
Jin Han
(5)
Joseph K. Liu
(1)
Juergen Rahmel
(1)
Junzuo Lai
(6)
Kai Bu
(1)
Kai Chen
(2)
Ke Xu
(4)
Kefei Chen
(1)
Li Song
(1)
Liang Li
(1)
Lingyu Wang
(1)
Ming Li
(1)
Minming Huang
(3)
Moti Yung
(1)
Nan Hu
(1)
Nan Li
(3)
Ning Liu
(1)
Pawel Szalachowski
(2)
Pengfei Wu
(1)
Pingchuan Ma
(1)
Qiang Yan
(8)
Qingqi Pei
(1)
Ralf Sasse
(1)
Robert H. Deng
(47)
Robert Huijie Deng
(2)
Rui Shi
(1)
Sanidhay Arora
(1)
Shaoying Cai
(5)
Shengli Liu
(1)
Shengmin Xu
(1)
Shuai Wang
(1)
Shujun Li
(1)
Su Mon Kywe
(2)
Sushil Jajodia
(1)
Tao Xue
(1)
Tieyan Li
(6)
Tsz Hon Yuen
(1)
Weili Han
(1)
Weizhi Meng
(2)
Wen Tao Zhu
(3)
Wenyi Xue
(3)
Xiaoguo Li
(1)
Ximeng Liu
(1)
Ximing Liu
(3)
Xingjie Yu
(1)
Xintao Wu
(1)
Xinyi Huang
(2)
Xuhua Ding
(1)
Xuhua Zhou
(1)
Xunguang Wang
(1)
Yan Li
(6)
Yanfei Hu
(1)
Yang Liu
(1)
Yang Yang
(5)
Yang Zheng
(1)
Yangguang Tian
(5)
Yanjiang Yang
(1)
Yao Cheng
(4)
Yebo Feng
(1)
Yinbin Miao
(1)
Yingjiu Li
(70)
Yong Yu
(1)
Yu Wen
(1)
Yuan Hong
(1)
Yunlei Zhao
(3)
Yuxian Li
(1)
Zhan Wang
(3)
Zhenlan Ji
(1)
Zheran Fang
(1)
Zhuoran Ma
(1)
Zilin Shen
(1)
Zilong Wang
(1)
Zongjie Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to