His primary areas of investigation include Computer security, Negotiation, Access control, Internet privacy and Digital credential. His studies in Computer security integrate themes in fields like Pointing device and Data science. He undertakes multidisciplinary investigations into Negotiation and Limiting in his work.
His Access control study incorporates themes from Security policy, Interpretation and Metamodeling. His Internet privacy research incorporates themes from Information sensitivity, The Internet, Authorization and Data Protection Act 1998. Ting Yu interconnects Trust management and Interoperability in the investigation of issues within Digital credential.
The scientist’s investigation covers issues in Computer security, Access control, Data mining, Theoretical computer science and Differential privacy. Within one scientific family, Ting Yu focuses on topics pertaining to Internet privacy under Computer security, and may sometimes address concerns connected to World Wide Web and Authorization. His work on Role-based access control as part of general Access control research is often related to Negotiation and Obligation, thus linking different fields of science.
His research integrates issues of Microdata, Graph, Set and Cluster analysis in his study of Data mining. His Theoretical computer science study combines topics from a wide range of disciplines, such as Soundness and Encryption. His work carried out in the field of Differential privacy brings together such families of science as Graph database and Information privacy.
Ting Yu spends much of his time researching Computer security, Differential privacy, Data mining, Domain and Information sensitivity. Many of his research projects under Computer security are closely connected to Scale with Scale, tying the diverse disciplines of science together. His biological study spans a wide range of topics, including Machine learning, Theoretical computer science, Social graph and Artificial intelligence.
Ting Yu focuses mostly in the field of Theoretical computer science, narrowing it down to topics relating to Set and, in certain cases, Information privacy and Bloom filter. The concepts of his Data mining study are interwoven with issues in Graph, Scalability, Key and Inference. Ting Yu has included themes like Security policy, Information leakage, Data access, Crowdsourcing and Table in his Information sensitivity study.
His primary areas of investigation include Data mining, Differential privacy, Graph, Computer security and Inference. He has researched Differential privacy in several fields, including Information sensitivity and Social graph. His research in Information sensitivity intersects with topics in Theoretical computer science and Private information retrieval.
His work in the fields of Graph, such as Graph inference, overlaps with other areas such as Association scheme and Belief propagation. His study in Computer security is interdisciplinary in nature, drawing from both The Internet and Data analysis. The various areas that he examines in his Inference study include Crowdsourcing and Machine learning.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Aggregate Query Answering on Anonymized Tables
Qing Zhang;N. Koudas;D. Srivastava;Ting Yu.
international conference on data engineering (2007)
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
Ting Yu;Marianne Winslett;Kent E. Seamons.
ACM Transactions on Information and System Security (2003)
Differentially Private Spatial Decompositions
Graham Cormode;Cecilia Procopiuc;Divesh Srivastava;Entong Shen.
international conference on data engineering (2012)
Negotiating trust in the Web
M. Winslett;T. Yu;K.E. Seamons;A. Hess.
IEEE Internet Computing (2002)
A unified scheme for resource protection in automated trust negotiation
Ting Yu;M. Winslett.
ieee symposium on security and privacy (2003)
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
Kent E. Seamons;Marianne Winslett;Ting Yu.
network and distributed system security symposium (2001)
On mouse dynamics as a behavioral biometric for authentication
Zach Jorgensen;Ting Yu.
computer and communications security (2011)
Interoperable strategies in automated trust negotiation
Ting Yu;Marianne Winslett;Kent E. Seamons.
computer and communications security (2001)
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy
Zhan Qin;Yin Yang;Ting Yu;Issa Khalil.
computer and communications security (2016)
Approximate XML joins
Sudipto Guha;H. V. Jagadish;Nick Koudas;Divesh Srivastava.
international conference on management of data (2002)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
AT&T (United States)
University of Illinois at Urbana-Champaign
University of Warwick
Purdue University West Lafayette
University of Pittsburgh
Georgia Institute of Technology
North Carolina State University
University of Toronto
Google (United States)
University of Michigan–Ann Arbor
ETH Zurich
University of Wisconsin–Madison
Monash University
University of Western Brittany
University of New South Wales
National Cheng Kung University
University of British Columbia
Spanish National Research Council
University College London
University of British Columbia
King's College London
Cincinnati Children's Hospital Medical Center
Purdue University West Lafayette
Complutense University of Madrid
Imperial College London
Tokyo Medical and Dental University