Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Hongxia
    Last name: Jin
    DBLP: 55/2789
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 100 of 104  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Mohammad Shokoohi-Yekta, Bing Hu 0001, Hongxia Jin, Jun Wang, Eamonn J. Keogh.
    Generalizing DTW to the multi-dimensional case requires an adaptive approach.
    Data Min. Knowl. Discov. 2017, Volume 31 (0) 2017
    Conference paper
    Neil Zhenqiang Gong, Altay Ozen, Yu Wu, Xiaoyu Cao, Richard Shin, Dawn Xiaodong Song, Hongxia Jin, Xuan Bao.
    PIANO: Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices.
    CoRR 2017, Volume 0 (0) 2017
    Conference paper
    Shiva Prasad Kasiviswanathan, Kobbi Nissim, Hongxia Jin.
    Private Incremental Regression.
    Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, PODS 2017, Chicago, IL, USA, May 14-19, 2017 2017 (0) 2017
    Conference paper
    Yilin Shen, Yanping Chen 0005, Eamonn J. Keogh, Hongxia Jin.
    Searching Time Series with Invariance to Large Amounts of Uniform Scaling.
    33rd IEEE International Conference on Data Engineering, ICDE 2017, San Diego, CA, USA, April 19-22, 2017 2017 (0) 2017
    Conference paper
    Pengfei Hu, Parth H. Pathak, Yilin Shen, Hongxia Jin, Prasant Mohapatra.
    PCASA: Proximity Based Continuous and Secure Authentication of Personal Devices.
    14th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2017, San Diego, CA, USA, June 12-14, 2017 2017 (0) 2017
    Conference paper
    Neil Zhenqiang Gong, Altay Ozen, Yu Wu, Xiaoyu Cao, Richard Shin, Dawn Xiaodong Song, Hongxia Jin, Xuan Bao.
    PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices.
    37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-8, 2017 2017 (0) 2017
    Conference paper
    Shiva Prasad Kasiviswanathan, Kobbi Nissim, Hongxia Jin.
    Private Incremental Regression.
    CoRR 2017, Volume 0 (0) 2017
    Conference paper
    Yue Deng, Yilin Shen, Hongxia Jin.
    Disguise Adversarial Networks for Click-through Rate Prediction.
    Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, IJCAI 2017, Melbourne, Australia, August 19-25, 2017 2017 (0) 2017
    Conference paper
    Wei-Han Lee, Xiaochen Liu, Yilin Shen, Hongxia Jin, Ruby B. Lee.
    Secure Pick Up: Implicit Authentication When You Start Using the Smartphone.
    Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2017, Indianapolis, IN, USA, June 21-23, 2017 2017 (0) 2017
    Conference paper
    Luca Bonomi, Liyue Fan, Hongxia Jin.
    An Information-Theoretic Approach to Individual Sequential Data Sanitization.
    Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, San Francisco, CA, USA, February 22-25, 2016 2016 (0) 2016
    Conference paper
    Jing Wang, Na Wang, Hongxia Jin.
    Context Matters?: How Adding the Obfuscation Option Affects End Users' Data Disclosure Decisions.
    Proceedings of the 21st International Conference on Intelligent User Interfaces, IUI 2016, Sonoma, CA, USA, March 7-10, 2016 2016 (0) 2016
    Conference paper
    Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin.
    Differentially Private K-Means Clustering.
    Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016 2016 (0) 2016
    Conference paper
    Lam Tran, Deguang Kong, Hongxia Jin, Ji Liu 0002.
    Privacy-CNH: A Framework to Detect Photo Privacy with Convolutional Neural Network using Hierarchical Features.
    Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona, USA. 2016 (0) 2016
    Conference paper
    Rui Chen, Haoran Li, A. K. Qin, Shiva Prasad Kasiviswanathan, Hongxia Jin.
    Private spatial data aggregation in the local setting.
    32nd IEEE International Conference on Data Engineering, ICDE 2016, Helsinki, Finland, May 16-20, 2016 2016 (0) 2016
    Conference paper
    Cailing Dong, Hongxia Jin, Bart P. Knijnenburg.
    PPM: A Privacy Prediction Model for Online Social Networks.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    Shiva Prasad Kasiviswanathan, Hongxia Jin.
    Efficient Private Empirical Risk Minimization for High-dimensional Learning.
    Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, June 19-24, 2016 2016 (0) 2016
    Conference paper
    Yilin Shen, Rui Chen, Hongxia Jin.
    Differentially Private User Data Perturbation with Multi-level Privacy Controls.
    Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2016, Riva del Garda, Italy, September 19-23, 2016, Proceedings, Part II 2016 (0) 2016
    Conference paper
    Yonghui Xiao, Yilin Shen, Jinfei Liu, Li Xiong 0001, Hongxia Jin, Xiaofeng Xu.
    DPHMM: Customizable Data Release with Differential Privacy via Hidden Markov Model.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, George Kesidis.
    PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing.
    46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016, Toulouse, France, June 28 - July 1, 2016 2016 (0) 2016
    Conference paper
    Yilin Shen, Hongxia Jin.
    EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation.
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 2016 (0) 2016
    Conference paper
    Cailing Dong, Hongxia Jin, Bart P. Knijnenburg.
    PPM: A Privacy Prediction Model for Online Social Networks.
    Social Informatics - 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part II 2016 (0) 2016
    Conference paper
    Cailing Dong, Yilin Shen, Bin Zhou, Hongxia Jin.
    I
    Social, Cultural, and Behavioral Modeling, 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Bin Liu 0020, Deguang Kong, Lei Cen, Neil Zhenqiang Gong, Hongxia Jin, Hui Xiong.
    Personalized Mobile App Recommendation: Reconciling App Functionality and User Privacy Preference.
    Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, WSDM 2015, Shanghai, China, February 2-6, 2015 2015 (0) 2015
    Journal article
    Gökay Saldamli, Richard Chow, Hongxia Jin.
    Albatross: a Privacy-Preserving Location Sharing System.
    CoRR 2015, Volume 0 (0) 2015
    Journal article
    Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin.
    Differentially Private $k$-Means Clustering.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Gökay Saldamli, Richard Chow, Hongxia Jin.
    Albatross: A Privacy-Preserving Location Sharing System.
    Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 2015 (0) 2015
    Conference paper
    Bin Liu 0004, Bin Liu 0017, Hongxia Jin, Ramesh Govindan.
    Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps.
    Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2015, Florence, Italy, May 19-22, 2015 2015 (0) 2015
    Conference paper
    Liyue Fan, Hongxia Jin.
    A Practical Framework for Privacy-Preserving Data Analytics.
    Proceedings of the 24th International Conference on World Wide Web, WWW 2015, Florence, Italy, May 18-22, 2015 2015 (0) 2015
    Conference paper
    Cailing Dong, Hongxia Jin, Bart P. Knijnenburg.
    Predicting Privacy Behavior on Online Social Networks.
    Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, May 26-29, 2015 2015 (0) 2015
    Conference paper
    Jianping He, Bin Liu, Xuan Bao, Hongxia Jin, George Kesidis.
    On Privacy Preserving Partial Image Sharing.
    35th IEEE International Conference on Distributed Computing Systems, ICDCS 2015, Columbus, OH, USA, June 29 - July 2, 2015 2015 (0) 2015
    Conference paper
    Na Wang, Bo Zhang, Bin Liu, Hongxia Jin.
    Investigating Effects of Control and Ads Awareness on Android Users' Privacy Behaviors and Perceptions.
    Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI 2015, Copenhagen, Denmark, August 24-27, 2015 2015 (0) 2015
    Conference paper
    Deguang Kong, Lei Cen, Hongxia Jin.
    AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications.
    Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-6, 2015 2015 (0) 2015
    Conference paper
    Rui Chen, Yilin Shen, Hongxia Jin.
    Private Analysis of Infinite Data Streams via Retroactive Grouping.
    Proceedings of the 24th ACM International Conference on Information and Knowledge Management, CIKM 2015, Melbourne, VIC, Australia, October 19 - 23, 2015 2015 (0) 2015
    Conference paper
    Bing Hu, Bin Liu, Neil Zhenqiang Gong, Deguang Kong, Hongxia Jin.
    Protecting Your Children from Inappropriate Content in Mobile Apps: An Automatic Maturity Rating Framework.
    Proceedings of the 24th ACM International Conference on Information and Knowledge Management, CIKM 2015, Melbourne, VIC, Australia, October 19 - 23, 2015 2015 (0) 2015
    Conference paper
    Deguang Kong, Hongxia Jin.
    Towards Permission Request Prediction on Mobile Apps via Structure Feature Learning.
    Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, April 30 - May 2, 2015 2015 (0) 2015
    Conference paper
    Lei Cen, Deguang Kong, Hongxia Jin, Luo Si.
    Mobile App Security Risk Assessment: A Crowdsourcing Ranking Approach from User Comments.
    Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, April 30 - May 2, 2015 2015 (0) 2015
    Conference paper
    Xuan Bao, Bin Liu, Bo Tang, Bing Hu 0001, Deguang Kong, Hongxia Jin.
    PinPlace: associate semantic meanings with indoor locations without active fingerprinting.
    Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2015, Osaka, Japan, September 7-11, 2015 2015 (0) 2015
    Conference paper
    Jierui Xie, Bart P. Knijnenburg, Hongxia Jin.
    Location sharing privacy preference: analysis and personalized recommendation.
    19th International Conference on Intelligent User Interfaces, IUI 2014, Haifa, Israel, February 24-27, 2014 2014 (0) 2014
    Conference paper
    Yilin Shen, Fengjiao Wang, Hongxia Jin.
    Defending against user identity linkage attack across multiple online social networks.
    23rd International World Wide Web Conference, WWW '14, Seoul, Republic of Korea, April 7-11, 2014, Companion Volume 2014 (0) 2014
    Conference paper
    Xuan Bao, Yilin Shen, Neil Zhenqiang Gong, Hongxia Jin, Bing Hu.
    Connect the dots by understanding user status and transitions.
    The 2014 ACM Conference on Ubiquitous Computing, UbiComp '14 Adjunct, Seattle, WA, USA - September 13 - 17, 2014 2014 (0) 2014
    Conference paper
    Lei Cen, Luo Si, Ninghui Li, Hongxia Jin.
    User Comment Analysis for Android apps and CSPI Detection with Comment Expansion.
    Proceeding of the 1st International Workshop on Privacy-Preserving IR: When Information Retrieval Meets Privacy and Security co-located with 37th Annual International ACM SIGIR conference, PIR@SIGIR 2014, Gold Coast, Australia, July 11, 2014. 2014 (0) 2014
    Conference paper
    Yilin Shen, Hongxia Jin.
    Controllable Information Sharing for User Accounts Linkage across Multiple Online Social Networks.
    Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, CIKM 2014, Shanghai, China, November 3-7, 2014 2014 (0) 2014
    Conference paper
    Bo Zhang, Na Wang, Hongxia Jin.
    Privacy Concerns in Online Recommender Systems: Influences of Control and User Data Input.
    Tenth Symposium on Usable Privacy and Security, SOUPS 2014, Menlo Park, CA, USA, July 9-11, 2014 2014 (0) 2014
    Conference paper
    Yilin Shen, Hongxia Jin.
    Privacy-Preserving Personalized Recommendation: An Instance-Based Approach via Differential Privacy.
    2014 IEEE International Conference on Data Mining, ICDM 2014, Shenzhen, China, December 14-17, 2014 2014 (0) 2014
    Conference paper
    Gökay Saldamli, Richard Chow, Hongxia Jin, Bart P. Knijnenburg.
    Private proximity testing with an untrusted server.
    Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013 2013 (0) 2013
    Conference paper
    Bart P. Knijnenburg, Alfred Kobsa, Hongxia Jin.
    Preference-based location sharing: are more privacy options really better?
    2013 ACM SIGCHI Conference on Human Factors in Computing Systems, CHI '13, Paris, France, April 27 - May 2, 2013 2013 (0) 2013
    Conference paper
    Hongxia Jin, Gökay Saldamli, Richard Chow, Bart P. Knijnenburg.
    Recommendations-based location privacy control.
    2013 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM 2013 Workshops, San Diego, CA, USA, March 18-22, 2013 2013 (0) 2013
    Conference paper
    Richard Chow, Hongxia Jin, Bart P. Knijnenburg, Gökay Saldamli.
    Differential data analysis for recommender systems.
    Seventh ACM Conference on Recommender Systems, RecSys '13, Hong Kong, China, October 12-16, 2013 2013 (0) 2013
    Journal article
    Richard Chow, Hongxia Jin, Bart P. Knijnenburg, Gökay Saldamli.
    Differential Data Analysis for Recommender Systems.
    CoRR 2013, Volume 0 (0) 2013
    Conference paper
    Bart P. Knijnenburg, Alfred Kobsa, Hongxia Jin.
    Dimensionality of information disclosure behavior.
    Int. J. Hum.-Comput. Stud. 2013, Volume 71 (0) 2013
    Conference paper
    Bart P. Knijnenburg, Alfred Kobsa, Hongxia Jin.
    Counteracting the Negative Effect of Form Auto-completion on the Privacy Calculus.
    Proceedings of the International Conference on Information Systems, ICIS 2013, Milano, Italy, December 15-18, 2013 2013 (0) 2013
    Conference paper
    Qihua Wang, Hongxia Jin.
    An analytical solution for consent management in patient privacy preservation.
    ACM International Health Informatics Symposium, IHI '12, Miami, FL, USA, January 28-30, 2012 2012 (0) 2012
    Conference paper
    Wenjun Zhou, Hongxia Jin, Yan Liu.
    Community discovery and profiling with social messages.
    The 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '12, Beijing, China, August 12-16, 2012 2012 (0) 2012
    Conference paper
    Hongxia Jin.
    Content Recommendation for Attention Management in Unified Social Messaging.
    Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, July 22-26, 2012, Toronto, Ontario, Canada. 2012 (0) 2012
    Conference paper
    Hongxia Jin.
    User activity profiling with multi-layer analysis.
    21st ACM International Conference on Information and Knowledge Management, CIKM'12, Maui, HI, USA, October 29 - November 02, 2012 2012 (0) 2012
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech.
    Efficient traitor tracing for clone attack in content protection.
    Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011 2011 (0) 2011
    Conference paper
    Qihua Wang, Hongxia Jin.
    Data leakage mitigation for discretionary access control in collaboration clouds.
    16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings 2011 (0) 2011
    Conference paper
    Qihua Wang, Hongxia Jin.
    Social Analytics for Personalization in Work Environments.
    Web-Age Information Management - 12th International Conference, WAIM 2011, Wuhan, China, September 14-16, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Qihua Wang, Hongxia Jin.
    Decision Support for Patient Consent Management.
    2011 IEEE International Conference on Healthcare Informatics, Imaging and Systems Biology, HISB 2011, San Jose, CA, USA, July 26-29, 2011 2011 (0) 2011
    Conference paper
    Qihua Wang, Hongxia Jin.
    Quantified risk-adaptive access control for patient privacy protection in health information systems.
    Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011 2011 (0) 2011
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech.
    Piracy Protection for Streaming Content in Home Networks.
    Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings 2011 (0) 2011
    Journal article
    Hongxia Jin, Jeffrey B. Lotspiech, Serdar Pehlivanoglu.
    Defending against the pirate evolution attack.
    IJACT 2010, Volume 2 (0) 2010
    Conference paper
    Dulce B. Ponceleon, Jeff Lostpiech, Hongxia Jin, Eric Wilcox.
    SCOTT: set cover tracing technology.
    Proceedings of the 18th International Conference on Multimedia 2010, Firenze, Italy, October 25-29, 2010 2010 (0) 2010
    Conference paper
    Qihua Wang, Hongxia Jin, Yan Liu.
    Collaboration analytics: mining work patterns from collaboration activities.
    Proceedings of the 19th ACM Conference on Information and Knowledge Management, CIKM 2010, Toronto, Ontario, Canada, October 26-30, 2010 2010 (0) 2010
    Conference paper
    Qihua Wang, Hongxia Jin.
    Exploring online social activities for adaptive search personalization.
    Proceedings of the 19th ACM Conference on Information and Knowledge Management, CIKM 2010, Toronto, Ontario, Canada, October 26-30, 2010 2010 (0) 2010
    Conference paper
    Gideon Myles, Hongxia Jin.
    A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems.
    Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Hongxia Jin.
    Can i play the movie i (or you) bought? new trends in DRM.
    Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, ICME 2009, June 28 - July 2, 2009, New York City, NY, USA 2009 (0) 2009
    Conference paper
    Jeffrey B. Lotspiech, Hongxia Jin.
    Practical tracing traitors.
    Media Forensics and Security I, part of the IST-SPIE Electronic Imaging Symposium, San Jose, CA, USA, January 19-21, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech.
    Unifying Broadcast Encryption and Traitor Tracing for Content Protection.
    Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, 7-11 December 2009 2009 (0) 2009
    Conference paper
    Qihua Wang, Hongxia Jin.
    Selective message distribution with people-tagging in user-collaborative environments.
    Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Extended Abstracts Volume, Boston, MA, USA, April 4-9, 2009 2009 (0) 2009
    Conference paper
    Qihua Wang, Hongxia Jin, Ninghui Li.
    Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging.
    Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech.
    Defending against the Pirate Evolution Attack.
    Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Hongxia Jin, Serdar Pehlivanoglu.
    Traitor Tracing without A Priori Bound on the Coalition Size.
    Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech.
    Broadcast Encryption for Differently Privileged.
    Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Hongxia Jin.
    Efficient Traitor Tracing for Content Protection.
    SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2009 (0) 2009
    Conference paper
    Hongxia Jin.
    Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution.
    IJDCF 2009, Volume 1 (0) 2009
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech, Michael Nelson, Nimrod Megiddo.
    Adaptive traitor tracing for large anonymous attack.
    Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008 2008 (0) 2008
    Conference paper
    Avinash L. Varna, Hongxia Jin.
    Generalized traitor tracing for nested codes.
    Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, ICME 2008, June 23-26 2008, Hannover, Germany 2008 (0) 2008
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech, Nimrod Megiddo.
    Efficient Coalition Detection in Traitor Tracing.
    Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy 2008 (0) 2008
    Conference paper
    Hongxia Jin.
    Traitor Tracing for Anonymous Attack in Content Protection.
    SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2008 (0) 2008
    Conference paper
    Hongxia Jin, Vladimir Zbarsky.
    Enabling secure digital marketplace.
    Proceedings of the 17th International Conference on World Wide Web, WWW 2008, Beijing, China, April 21-25, 2008 2008 (0) 2008
    Conference paper
    Qihua Wang, Hongxia Jin, Stefan Nusser.
    Automatic Categorization of Tags in Collaborative Environments.
    Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers 2009 (0) 2008
    Conference paper
    Philip Zigoris, Hongxia Jin.
    Adaptive Traitor Tracing with Bayesian Networks.
    Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, July 22-26, 2007, Vancouver, British Columbia, Canada 2007 (0) 2007
    Conference paper
    Philip Zigoris, Hongxia Jin.
    Bayesian Methods for Practical Traitor Tracing.
    Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Hongxia Jin, Ginger Myles.
    A technique for self-certifying tamper resistant software.
    Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007 2007 (0) 2007
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech.
    Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack.
    Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Hongxia Jin.
    A Closer Look at Broadcast Encryption and Traitor Tracing for Content Protection.
    SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2007 (0) 2007
    Conference paper
    Hongxia Jin, Jianna Zhao, Xiaoxuan Chen.
    The Application of Neuro-Fuzzy Decision Tree in Optimal Selection of Teconological Innovation Projects.
    Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China 2007 (0) 2007
    Conference paper
    Hongxia Jin, Mario Blaum.
    Combinatorial Properties for Traceability Codes Using Error Correcting Codes.
    IEEE Transactions on Information Theory 2007, Volume 53 (0) 2007
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech.
    Hybrid Traitor Tracing.
    Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, ICME 2006, July 9-12 2006, Toronto, Ontario, Canada 2006 (0) 2006
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech.
    Practical Forensic Analysis in Advanced Access Content System.
    Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings 2006 (0) 2006
    Conference paper
    Hongxia Jin.
    Privacy, traceability, and anonymity for content protection.
    Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006 2006 (0) 2006
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech, Mario Blaum.
    Traitor Tracing for Subscription-Based Systems.
    SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2006 (0) 2006
    Conference paper
    Hongxia Jin.
    Higher Dependability and Security for Mobile Applications.
    Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings 2006 (0) 2006
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech.
    Flexible Traitor Tracing for Anonymous Attacks.
    Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings 2005 (0) 2005
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech.
    Attacks and Forensic Analysis for Multimedia Content Protection.
    Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, ICME 2005, July 6-9, 2005, Amsterdam, The Netherlands 2005 (0) 2005
    Conference paper
    Ginger Myles, Hongxia Jin.
    Self-validating Branch-Based Software Watermarking.
    Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers 2005 (0) 2005
    Conference paper
    Hongxia Jin, Ginger Myles, Jeffrey B. Lotspiech.
    Towards Better Software Tamper Resistance.
    Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings 2005 (0) 2005
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech, Stefan Nusser.
    Traitor tracing for prerecorded and recordable media.
    Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004 2004 (0) 2004
    Conference paper
    Hongxia Jin, Jeffrey B. Lotspiech.
    Forensic Analysis for Tamper Resistant Software.
    14th International Symposium on Software Reliability Engineering (ISSRE 2003), 17-20 November 2003, Denver, CO, USA 2003 (0) 2003
    Show item 1 to 100 of 104  

    Your query returned 104 matches in the database.