Follow
Weiqing Li
Title
Cited by
Cited by
Year
{CoVisor}: a compositional hypervisor for {software-defined} networks
X Jin, J Gossels, J Rexford, D Walker
12th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2015
346*2015
Structural data de-anonymization: Quantification, practice, and implications
S Ji, W Li, M Srivatsa, R Beyah
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1362014
On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge.
S Ji, W Li, NZ Gong, P Mittal, RA Beyah
NDSS, 2015
1132015
Structure based data de-anonymization of social networks and mobility traces
S Ji, W Li, M Srivatsa, JS He, R Beyah
Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014
712014
General graph data de-anonymization: From mobility traces to social networks
S Ji, W Li, M Srivatsa, JS He, R Beyah
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-29, 2016
442016
Seed-based de-anonymizability quantification of social networks
S Ji, W Li, NZ Gong, P Mittal, R Beyah
IEEE Transactions on Information Forensics and Security 11 (7), 1398-1411, 2016
362016
Structural data de-anonymization: Theory and practice
S Ji, W Li, M Srivatsa, R Beyah
IEEE/ACM Transactions on Networking 24 (6), 3523-3536, 2016
322016
De-sag: On the de-anonymization of structure-attribute graph data
S Ji, T Wang, J Chen, W Li, P Mittal, R Beyah
IEEE Transactions on Dependable and Secure Computing 16 (4), 594-607, 2017
292017
On the relative de-anonymizability of graph data: Quantification and evaluation
S Ji, W Li, S Yang, P Mittal, R Beyah
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
232016
Poster: Optimization based data de-anonymization, 2014
S Ji, W Li, J He, M Srivatsa, R Beyah
Poster presented at the 35th IEEE Symposium on Security and Privacy, May 18, 21, 2014
72014
Poster: optimization based data de-anonymization
S Ji, W Li, J He, M Srivatsa, R Beyah
Poster Presented at the 35th IEEE Symposium on Security and Privacy, May, 18-21, 0
1
DE-ANONYMIZING SOCIAL NETWORKS AND MOBILITY TRACES
W Li
Georgia Institute of Technology, 2016
2016
Supplementary File of “Structural Data De-anonymization: Theory and Practice”
S Ji, W Li, M Srivatsa, R Beyah
Prateek Mittal Princeton University
S Ji, W Li, R Beyah, NZ Gong
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes.......
Z Liu, H Seo, J Großschädl, H Kim, S Ji, W Li, NZ Gong, P Mittal, R Beyah, ...
Data De-anonymization: From Mobility Traces to On-line Social Networks
S Ji, W Li, M Srivatsa, JS He, R Beyah
Poster: De-anonymizing Mobility Traces and Social Data using Social Auxiliary Information
S Ji, W Li, M Srivatsa, JS He, R Beyah
The system can't perform the operation now. Try again later.
Articles 1–17