Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Ninghui
    Last name: Li
    DBLP: l/NinghuiLi
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 143  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu.
    Dimensions of Risk in Mobile Applications: A User Study.
    Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015 2015 (0) 2015
    Journal article
    Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin.
    Differentially Private $k$-Means Clustering.
    CoRR 2015, Volume 0 (0) 2015
    Journal article
    Dong Su, Jianneng Cao, Ninghui Li.
    Differentially Private Projected Histograms of Multi-Attribute Data for Classification.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Haining Chen, Omar Chowdhury, Jing Chen, Ninghui Li, Robert Proctor.
    Towards quantification of firewall policy complexity.
    Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015 2015 (0) 2015
    Conference paper
    Weining Yang, Jing Chen, Aiping Xiong, Robert W. Proctor, Ninghui Li.
    Effectiveness of a phishing warning in field settings.
    Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015 2015 (0) 2015
    Conference paper
    Wei-Yen Day, Ninghui Li.
    Differentially Private Publishing of High-dimensional Data Using Sensitivity Control.
    Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 2015 (0) 2015
    Conference paper
    Christopher S. Gates, Jing Chen, Ninghui Li, Robert W. Proctor.
    Effective Risk Communication for Android Apps.
    IEEE Trans. Dependable Sec. Comput. 2014, Volume 11 (0) 2014
    Conference paper
    Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Generating Summary Risk Scores for Mobile Applications.
    IEEE Trans. Dependable Sec. Comput. 2014, Volume 11 (0) 2014
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    PriView: practical differentially private release of marginal contingency tables.
    International Conference on Management of Data, SIGMOD 2014, Snowbird, UT, USA, June 22-27, 2014 2014 (0) 2014
    Conference paper
    Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh Chari, Ian Molloy, Youngja Park.
    Detecting Insider Information Theft Using Features from File Access Logs.
    Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II 2014 (0) 2014
    Conference paper
    Lei Cen, Luo Si, Ninghui Li, Hongxia Jin.
    User Comment Analysis for Android apps and CSPI Detection with Comment Expansion.
    Proceeding of the 1st International Workshop on Privacy-Preserving IR: When Information Retrieval Meets Privacy and Security co-located with 37th Annual International ACM SIGIR conference, PIR@SIGIR 2014, Gold Coast, Australia, July 11, 2014. 2014 (0) 2014
    Conference paper
    Jerry Ma, Weining Yang, Min Luo, Ninghui Li.
    A Study of Probabilistic Password Models.
    2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014 2014 (0) 2014
    Journal article
    Mahesh V. Tripunitara, Ninghui Li.
    The Foundational Work of Harrison-Ruzzo-Ullman Revisited.
    IEEE Trans. Dependable Sec. Comput. 2013, Volume 10 (0) 2013
    Conference paper
    Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, Elisa Bertino, Kian-Lee Tan.
    Efficient and accurate strategies for differentially-private sliding window queries.
    Joint 2013 EDBT/ICDT Conferences, EDBT '13 Proceedings, Genoa, Italy, March 18-22, 2013 2013 (0) 2013
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Differentially private grids for geospatial data.
    29th IEEE International Conference on Data Engineering, ICDE 2013, Brisbane, Australia, April 8-12, 2013 2013 (0) 2013
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Yi Wu, Weining Yang.
    Membership privacy: a unifying framework for privacy definitions.
    2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013 2013 (0) 2013
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Understanding Hierarchical Methods for Differentially Private Histograms.
    PVLDB 2012, Volume 6 (0) 2013
    Conference paper
    Tiancheng Li, Ninghui Li, Jian Zhang 0003, Ian Molloy.
    Slicing: A New Approach for Privacy Preserving Data Publishing.
    IEEE Trans. Knowl. Data Eng. 2012, Volume 24 (0) 2012
    Conference paper
    Ninghui Li, Haining Chen, Elisa Bertino.
    On practical specification and enforcement of obligations.
    Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012 2012 (0) 2012
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao.
    PrivBasis: Frequent Itemset Mining with Differential Privacy.
    PVLDB 2011, Volume 5 (0) 2012
    Conference paper
    Wahbeh H. Qardaji, Ninghui Li.
    Anonymizing Network Traces with Temporal Pseudonym Consistency.
    32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), Macau, China, June 18-21, 2012 2012 (0) 2012
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao.
    PrivBasis: Frequent Itemset Mining with Differential Privacy
    CoRR 2012, Volume 0 (0) 2012
    Journal article
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Differentially Private Grids for Geospatial Data
    CoRR 2012, Volume 0 (0) 2012
    Conference paper
    Bhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Android permissions: a perspective combining risks and benefits.
    17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012 2012 (0) 2012
    Conference paper
    Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Using probabilistic generative models for ranking risks of Android apps.
    the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012 2012 (0) 2012
    Show item 1 to 25 of 143  

    Your query returned 143 matches in the database.