D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 35 Citations 6,734 139 World Ranking 7520 National Ranking 12

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Operating system
  • Computer security

His primary areas of investigation include Computer security, Negotiation, Access control, Internet privacy and Digital credential. His studies in Computer security integrate themes in fields like Pointing device and Data science. He undertakes multidisciplinary investigations into Negotiation and Limiting in his work.

His Access control study incorporates themes from Security policy, Interpretation and Metamodeling. His Internet privacy research incorporates themes from Information sensitivity, The Internet, Authorization and Data Protection Act 1998. Ting Yu interconnects Trust management and Interoperability in the investigation of issues within Digital credential.

His most cited work include:

  • Aggregate Query Answering on Anonymized Tables (308 citations)
  • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation (287 citations)
  • Differentially Private Spatial Decompositions (264 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Computer security, Access control, Data mining, Theoretical computer science and Differential privacy. Within one scientific family, Ting Yu focuses on topics pertaining to Internet privacy under Computer security, and may sometimes address concerns connected to World Wide Web and Authorization. His work on Role-based access control as part of general Access control research is often related to Negotiation and Obligation, thus linking different fields of science.

His research integrates issues of Microdata, Graph, Set and Cluster analysis in his study of Data mining. His Theoretical computer science study combines topics from a wide range of disciplines, such as Soundness and Encryption. His work carried out in the field of Differential privacy brings together such families of science as Graph database and Information privacy.

He most often published in these fields:

  • Computer security (34.69%)
  • Access control (19.73%)
  • Data mining (14.97%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (34.69%)
  • Differential privacy (12.93%)
  • Data mining (14.97%)

In recent papers he was focusing on the following fields of study:

Ting Yu spends much of his time researching Computer security, Differential privacy, Data mining, Domain and Information sensitivity. Many of his research projects under Computer security are closely connected to Scale with Scale, tying the diverse disciplines of science together. His biological study spans a wide range of topics, including Machine learning, Theoretical computer science, Social graph and Artificial intelligence.

Ting Yu focuses mostly in the field of Theoretical computer science, narrowing it down to topics relating to Set and, in certain cases, Information privacy and Bloom filter. The concepts of his Data mining study are interwoven with issues in Graph, Scalability, Key and Inference. Ting Yu has included themes like Security policy, Information leakage, Data access, Crowdsourcing and Table in his Information sensitivity study.

Between 2016 and 2021, his most popular works were:

  • Generating Synthetic Decentralized Social Graphs with Local Differential Privacy (61 citations)
  • A Survey on Malicious Domains Detection through DNS Data Analysis (46 citations)
  • Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy (14 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Operating system
  • Database

His primary areas of investigation include Data mining, Differential privacy, Graph, Computer security and Inference. He has researched Differential privacy in several fields, including Information sensitivity and Social graph. His research in Information sensitivity intersects with topics in Theoretical computer science and Private information retrieval.

His work in the fields of Graph, such as Graph inference, overlaps with other areas such as Association scheme and Belief propagation. His study in Computer security is interdisciplinary in nature, drawing from both The Internet and Data analysis. The various areas that he examines in his Inference study include Crowdsourcing and Machine learning.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Aggregate Query Answering on Anonymized Tables

Qing Zhang;N. Koudas;D. Srivastava;Ting Yu.
international conference on data engineering (2007)

489 Citations

Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation

Ting Yu;Marianne Winslett;Kent E. Seamons.
ACM Transactions on Information and System Security (2003)

427 Citations

Differentially Private Spatial Decompositions

Graham Cormode;Cecilia Procopiuc;Divesh Srivastava;Entong Shen.
international conference on data engineering (2012)

403 Citations

Negotiating trust in the Web

M. Winslett;T. Yu;K.E. Seamons;A. Hess.
IEEE Internet Computing (2002)

335 Citations

A unified scheme for resource protection in automated trust negotiation

Ting Yu;M. Winslett.
ieee symposium on security and privacy (2003)

284 Citations

Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.

Kent E. Seamons;Marianne Winslett;Ting Yu.
network and distributed system security symposium (2001)

254 Citations

On mouse dynamics as a behavioral biometric for authentication

Zach Jorgensen;Ting Yu.
computer and communications security (2011)

250 Citations

Interoperable strategies in automated trust negotiation

Ting Yu;Marianne Winslett;Kent E. Seamons.
computer and communications security (2001)

249 Citations

Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy

Zhan Qin;Yin Yang;Ting Yu;Issa Khalil.
computer and communications security (2016)

243 Citations

Approximate XML joins

Sudipto Guha;H. V. Jagadish;Nick Koudas;Divesh Srivastava.
international conference on management of data (2002)

219 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Ting Yu

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 63

Pierangela Samarati

Pierangela Samarati

University of Milan

Publications: 51

Ninghui Li

Ninghui Li

Purdue University West Lafayette

Publications: 49

Marianne Winslett

Marianne Winslett

University of Illinois at Urbana-Champaign

Publications: 37

Xiaokui Xiao

Xiaokui Xiao

National University of Singapore

Publications: 33

Anna Cinzia Squicciarini

Anna Cinzia Squicciarini

Pennsylvania State University

Publications: 29

Li Xiong

Li Xiong

Emory University

Publications: 26

Gerome Miklau

Gerome Miklau

University of Massachusetts Amherst

Publications: 25

Divesh Srivastava

Divesh Srivastava

AT&T (United States)

Publications: 25

Fabio Massacci

Fabio Massacci

Vrije Universiteit Amsterdam

Publications: 24

Sabrina De Capitani di Vimercati

Sabrina De Capitani di Vimercati

University of Milan

Publications: 23

Sushil Jajodia

Sushil Jajodia

George Mason University

Publications: 22

Philip S. Yu

Philip S. Yu

University of Illinois at Chicago

Publications: 21

Stefano Paraboschi

Stefano Paraboschi

University of Bergamo

Publications: 20

Graham Cormode

Graham Cormode

University of Warwick

Publications: 20

Frédéric Cuppens

Frédéric Cuppens

Polytechnique Montréal

Publications: 19

Trending Scientists

Cesar Cadena

Cesar Cadena

ETH Zurich

Mark Ediger

Mark Ediger

University of Wisconsin–Madison

Keith S. Murray

Keith S. Murray

Monash University

Claude Férec

Claude Férec

University of Western Brittany

Angela T. Moles

Angela T. Moles

University of New South Wales

Chu Fang Lo

Chu Fang Lo

National Cheng Kung University

P. Richard Harrigan

P. Richard Harrigan

University of British Columbia

Cristina Postigo

Cristina Postigo

Spanish National Research Council

Sonja B. Hofer

Sonja B. Hofer

University College London

Stan B. Floresco

Stan B. Floresco

University of British Columbia

Emily Simonoff

Emily Simonoff

King's College London

Avani C. Modi

Avani C. Modi

Cincinnati Children's Hospital Medical Center

John F. Feldhusen

John F. Feldhusen

Purdue University West Lafayette

Juan Tamargo

Juan Tamargo

Complutense University of Madrid

Edward W. Gregg

Edward W. Gregg

Imperial College London

Mamoru Watanabe

Mamoru Watanabe

Tokyo Medical and Dental University

Something went wrong. Please try again later.