Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Ninghui
    Last name: Li
    DBLP: l/NinghuiLi
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 149  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin.
    Differentially Private K-Means Clustering.
    Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016 2016 (0) 2016
    Journal article
    Min Lyu, Dong Su, Ninghui Li.
    Understanding the Sparse Vector Technique for Differential Privacy.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian Molloy, Youngja Park.
    Tri-Modularization of Firewall Policies.
    Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, SACMAT 2016, Shanghai, China, June 5-8, 2016 2016 (0) 2016
    Conference paper
    Wei-Yen Day, Ninghui Li, Min Lyu.
    Publishing Graph Degree Distribution with Node Differential Privacy.
    Proceedings of the 2016 International Conference on Management of Data, SIGMOD Conference 2016, San Francisco, CA, USA, June 26 - July 01, 2016 2016 (0) 2016
    Conference paper
    Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu.
    Dimensions of Risk in Mobile Applications: A User Study.
    Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015 2015 (0) 2015
    Journal article
    Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin.
    Differentially Private $k$-Means Clustering.
    CoRR 2015, Volume 0 (0) 2015
    Journal article
    Dong Su, Jianneng Cao, Ninghui Li.
    Differentially Private Projected Histograms of Multi-Attribute Data for Classification.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Haining Chen, Omar Chowdhury, Jing Chen, Ninghui Li, Robert Proctor.
    Towards quantification of firewall policy complexity.
    Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015 2015 (0) 2015
    Conference paper
    Weining Yang, Jing Chen, Aiping Xiong, Robert W. Proctor, Ninghui Li.
    Effectiveness of a phishing warning in field settings.
    Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015 2015 (0) 2015
    Conference paper
    Wei-Yen Day, Ninghui Li.
    Differentially Private Publishing of High-dimensional Data Using Sensitivity Control.
    Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 2015 (0) 2015
    Show item 1 to 10 of 149  

    Your query returned 149 matches in the database.