| Discovering calendar-based temporal association rules Y Li, P Ning, XS Wang, S Jajodia Data & Knowledge Engineering 44 (2), 193-218, 2003 | 411 | 2003 |
| ShieldFL: Mitigating model poisoning attacks in privacy-preserving federated learning Z Ma, J Ma, Y Miao, Y Li, RH Deng IEEE Transactions on Information Forensics and Security 17, 1639-1654, 2022 | 328 | 2022 |
| Fully secure cipertext-policy hiding CP-ABE J Lai, RH Deng, Y Li Information Security Practice and Experience: 7th International Conference …, 2011 | 259 | 2011 |
| Expressive CP-ABE with partially hidden access structures J Lai, RH Deng, Y Li Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 252 | 2012 |
| ICCDetector: ICC-based malware detection on Android K Xu, Y Li, RH Deng IEEE Transactions on Information Forensics and Security 11 (6), 1252-1264, 2016 | 230 | 2016 |
| Fingerprinting relational databases: Schemes and specialties Y Li, V Swarup, S Jajodia IEEE Transactions on Dependable and Secure Computing 2 (1), 34-45, 2005 | 219 | 2005 |
| DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks K Xu, Y Li, RH Deng, K Chen 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 473-487, 2018 | 214 | 2018 |
| Permission based Android security: Issues and countermeasures Z Fang, W Han, Y Li Computers & Security 43, 205-218, 2014 | 214 | 2014 |
| DroidEvolver: Self-Evolving Android Malware Detection System K Xu, Y Li, RH Deng, K Chen, J Xu IEEE European Symposium on Security and Privacy, 47-62, 2019 | 212 | 2019 |
| Tamper detection and localization for categorical data using fragile watermarks Y Li, H Guo, S Jajodia Proceedings of the 4th ACM workshop on Digital rights management, 73-82, 2004 | 168 | 2004 |
| A fragile watermarking scheme for detecting malicious modifications of database relations H Guo, Y Li, A Liu, S Jajodia Information Sciences 176 (10), 1350-1378, 2006 | 154 | 2006 |
| Server-aided revocable attribute-based encryption H Cui, RH Deng, Y Li, B Qin Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 149 | 2016 |
| Lightweight sharable and traceable secure mobile health system Y Yang, X Liu, RH Deng, Y Li IEEE Transactions on Dependable and Secure Computing 17 (1), 78-91, 2017 | 148 | 2017 |
| Protecting RFID communications in supply chains Y Li, X Ding Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 145 | 2007 |
| Llm4vuln: A unified evaluation framework for decoupling and enhancing llms' vulnerability reasoning Y Sun, D Wu, Y Xue, H Liu, W Ma, L Zhang, Y Liu, Y Li arXiv preprint arXiv:2401.16185, 2024 | 137 | 2024 |
| Match in my way: Fine-grained bilateral access control for secure cloud-fog computing S Xu, J Ning, Y Li, Y Zhang, G Xu, X Huang, RH Deng IEEE Transactions on Dependable and Secure Computing 19 (2), 1064-1077, 2020 | 134 | 2020 |
| Efficient and expressive keyword search over encrypted data in cloud H Cui, Z Wan, RH Deng, G Wang, Y Li IEEE Transactions on Dependable and Secure Computing 15 (3), 409-422, 2016 | 128 | 2016 |
| Chaining watermarks for detecting malicious modifications to streaming data H Guo, Y Li, S Jajodia Information Sciences 177 (1), 281-298, 2007 | 127 | 2007 |
| Attribute-based storage supporting secure deduplication of encrypted data in cloud H Cui, RH Deng, Y Li, G Wu IEEE Transactions on Big Data 5 (3), 330-342, 2017 | 114 | 2017 |
| A new framework for RFID privacy RH Deng, Y Li, M Yung, Y Zhao European Symposium on Research in Computer Security, 1-18, 2010 | 114 | 2010 |