Follow
Yi Hu
Yi Hu
Verified email at nku.edu
Title
Cited by
Cited by
Year
A data mining approach for database intrusion detection
Y Hu, B Panda
Proceedings of the 2004 ACM symposium on Applied computing, 711-716, 2004
2572004
Identification of malicious transactions in database systems
Y Hu, B Panda
Seventh International Database Engineering and Applications Symposium, 2003 …, 2003
1052003
Insider threat in database systems: Preventing malicious users' activities in databases
M Chagarlamudi, B Panda, Y Hu
2009 Sixth International Conference on Information Technology: New …, 2009
452009
Reversible data hiding in homomorphically encrypted image using interpolation technique
A Malik, H Wang, T Chen, T Yang, AN Khan, H Wu, Y Chen, Y Hu
Journal of Information Security and Applications 48, 102374, 2019
292019
Design and analysis of techniques for detection of malicious activities in database systems
Y Hu, B Panda
Journal of Network and Systems Management 13, 269-291, 2005
282005
Penetration testing in a box
L Epling, B Hinkel, Y Hu
Proceedings of the 2015 information security curriculum development …, 2015
272015
Detecting collaborative insider attacks in information systems
K Viet, B Panda, Y Hu
2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2012
192012
Mining inter-transaction data dependencies for database intrusion detection
Y Hu, B Panda
Innovations and advances in computer sciences and engineering, 67-72, 2010
182010
A dual fragile watermarking scheme for speech authentication
Q Qian, HX Wang, Y Hu, LN Zhou, JF Li
Multimedia Tools and Applications 75, 13431-13450, 2016
172016
Profiling file repository access patterns for identifying data exfiltration activities
Y Hu, C Frank, J Walden, E Crawford, D Kasturiratna
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS …, 2011
172011
An agent based approach to perform damage assessment and recovery efficiently after a cyber attack to ensure E-government database security
K Kurra, B Panda, WN Li, Y Hu
2015 48th Hawaii International Conference on System Sciences, 2272-2279, 2015
152015
An effective log mining approach for database intrusion detection
Y Hu, A Campan, J Walden, I Vorobyeva, J Shelton
2010 IEEE International Conference on Systems, Man and Cybernetics, 2299-2306, 2010
142010
The usability of end user cryptographic products
M Sweikata, G Watson, C Frank, C Christensen, Y Hu
2009 Information Security Curriculum Development Conference, 55-59, 2009
112009
Intra-frame error concealment scheme using 3D reversible data hiding in mobile cloud environment
YL Chen, H Wang, Y Hu, A Malik
IEEE Access 6, 77004-77013, 2018
102018
Modeling deceptive information dissemination using a holistic approach
Y Hu, Z Xiao, B Panda
Proceedings of the 2007 ACM symposium on Applied computing, 1591-1598, 2007
102007
Succinct and fast accessible data structures for database damage assessment
J Zhou, B Panda, Y Hu
International Conference on Distributed Computing and Internet Technology …, 2004
102004
Mining data relationships for database damage assessment in a post information warfare scenario
Y Hu, B Panda
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
102004
A novel NMF-based authentication scheme for encrypted speech in cloud computing
C Shi, H Wang, Y Hu, X Li
Multimedia Tools and Applications 80 (17), 25773-25798, 2021
92021
A speech homomorphic encryption scheme with less data expansion in cloud computing
C Shi, H Wang, Y Hu, Q Qian, H Zhao
KSII Transactions on Internet and Information Systems (TIIS) 13 (5), 2588-2609, 2019
82019
A log independent distributed database damage assessment model
J Zhou, B Panda, Y Hu
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop …, 2005
82005
The system can't perform the operation now. Try again later.
Articles 1–20