D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 36 Citations 4,979 178 World Ranking 5720 National Ranking 2777

Research.com Recognitions

Awards & Achievements

2009 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer security
  • The Internet

Computer security, Data mining, Artificial intelligence, Authentication and Protocol are his primary areas of study. His Computer security research is multidisciplinary, incorporating elements of Control and Internet privacy. His studies in Data mining integrate themes in fields like Cover, Tuple and Robustness.

His work carried out in the field of Artificial intelligence brings together such families of science as Mobile malware, Android, Malware, Machine learning and Measure. His Protocol research incorporates elements of Construct, Overhead, Relation and Pseudorandom function family. His work on Apriori algorithm is typically connected to Schema as part of general Association rule learning study, connecting several disciplines of science.

His most cited work include:

  • Discovering calendar-based temporal association rules (165 citations)
  • Fingerprinting relational databases: schemes and specialties (136 citations)
  • Protecting RFID communications in supply chains (102 citations)

What are the main themes of his work throughout his whole career to date?

Yingjiu Li mainly investigates Computer security, Authentication, Data mining, Computer network and Access control. His study focuses on the intersection of Computer security and fields such as Android with connections in the field of Malware. The concepts of his Authentication study are interwoven with issues in Adversary, Liveness and Key.

His Data mining research is multidisciplinary, incorporating perspectives in Tuple and Inference, Artificial intelligence. His study in the field of Network packet, Cryptographic protocol and Protocol is also linked to topics like Path. Yingjiu Li studied Encryption and Cloud computing that intersect with Cryptography.

He most often published in these fields:

  • Computer security (54.71%)
  • Authentication (16.59%)
  • Data mining (15.70%)

What were the highlights of his more recent work (between 2018-2021)?

  • Computer security (54.71%)
  • Authentication (16.59%)
  • Cloud computing (6.28%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Computer security, Authentication, Cloud computing, Encryption and Computer network. His research investigates the connection between Computer security and topics such as Handshake that intersect with issues in Anonymity. The various areas that he examines in his Authentication study include Mobile device, Key, Usability and Keystroke logging.

His Cloud computing research integrates issues from Database, Cryptography, Cryptographic primitive, Confidentiality and Server. When carried out as part of a general Computer network research project, his work on Protocol and Network packet is frequently linked to work in Path, Open problem and Overhead, therefore connecting diverse disciplines of study. Yingjiu Li interconnects Cryptosystem and Distributed computing in the investigation of issues within Attribute-based encryption.

Between 2018 and 2021, his most popular works were:

  • Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud (35 citations)
  • Lightweight Sharable and Traceable Secure Mobile Health System (31 citations)
  • Lightweight and Expressive Fine-grained Access Control for Healthcare Internet-of-Things (11 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

His main research concerns Encryption, Computer security, Cloud computing, Authentication and Mobile device. Yingjiu Li is interested in Attribute-based encryption, which is a branch of Encryption. His research links Computer data storage with Computer security.

As a part of the same scientific study, he usually deals with the Cloud computing, concentrating on Access control and frequently concerns with Cryptography, Server, Edge computing, Random oracle and Upload. His study in the fields of Keystroke dynamics under the domain of Authentication overlaps with other disciplines such as Cognitive model. His biological study spans a wide range of topics, including Augmented reality, Face, Computer vision, Password and Liveness.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Discovering calendar-based temporal association rules

Yingjiu Li;Peng Ning;X. Sean Wang;Sushil Jajodia.
data and knowledge engineering (2003)

370 Citations

Fingerprinting relational databases: schemes and specialties

Yingjiu Li;V. Swarup;S. Jajodia.
IEEE Transactions on Dependable and Secure Computing (2005)

187 Citations

Fully secure cipertext-policy hiding CP-ABE

Junzuo Lai;Robert H. Deng;Yingjiu Li.
information security practice and experience (2011)

161 Citations

Discovering calendar-based temporal association rules

Yingjiu Li;Peng Ning;X.S. Wang;S. Jajodia.
international symposium on temporal representation and reasoning (2001)

153 Citations

Tamper detection and localization for categorical data using fragile watermarks

Yingjiu Li;Huiping Guo;Sushil Jajodia.
digital rights management (2004)

147 Citations

Permission based Android security: Issues and countermeasures

Zheran Fang;Weili Han;Yingjiu Li.
Computers & Security (2014)

147 Citations

Expressive CP-ABE with partially hidden access structures

Junzuo Lai;Robert H. Deng;Yingjiu Li.
computer and communications security (2012)

146 Citations

Protecting RFID communications in supply chains

Yingjiu Li;Xuhua Ding.
computer and communications security (2007)

144 Citations

A fragile watermarking scheme for detecting malicious modifications of database relations

Huiping Guo;Yingjiu Li;Anyi Liu;Sushil Jajodia.
Information Sciences (2006)

138 Citations

ICCDetector: ICC-Based Malware Detection on Android

Ke Xu;Yingjiu Li;Robert H. Deng.
IEEE Transactions on Information Forensics and Security (2016)

134 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Yingjiu Li

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 32

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 30

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 18

Yi Mu

Yi Mu

Fujian Normal University

Publications: 16

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 15

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 13

Xingming Sun

Xingming Sun

Nanjing University of Information Science and Technology

Publications: 11

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 11

Tzung-Pei Hong

Tzung-Pei Hong

National University of Kaohsiung

Publications: 11

Abdenour Hadid

Abdenour Hadid

University of Oulu

Publications: 10

Jian Weng

Jian Weng

Jinan University

Publications: 10

Yunhao Liu

Yunhao Liu

Tsinghua University

Publications: 10

Xintao Wu

Xintao Wu

University of Arkansas at Fayetteville

Publications: 9

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 9

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 9

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 9

Something went wrong. Please try again later.