Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Ninghui
    Last name: Li
    DBLP: l/NinghuiLi
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 143  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu.
    Dimensions of Risk in Mobile Applications: A User Study.
    Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015 2015 (0) 2015
    Journal article
    Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin.
    Differentially Private $k$-Means Clustering.
    CoRR 2015, Volume 0 (0) 2015
    Journal article
    Dong Su, Jianneng Cao, Ninghui Li.
    Differentially Private Projected Histograms of Multi-Attribute Data for Classification.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Haining Chen, Omar Chowdhury, Jing Chen, Ninghui Li, Robert Proctor.
    Towards quantification of firewall policy complexity.
    Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015 2015 (0) 2015
    Conference paper
    Weining Yang, Jing Chen, Aiping Xiong, Robert W. Proctor, Ninghui Li.
    Effectiveness of a phishing warning in field settings.
    Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015 2015 (0) 2015
    Conference paper
    Wei-Yen Day, Ninghui Li.
    Differentially Private Publishing of High-dimensional Data Using Sensitivity Control.
    Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 2015 (0) 2015
    Conference paper
    Christopher S. Gates, Jing Chen, Ninghui Li, Robert W. Proctor.
    Effective Risk Communication for Android Apps.
    IEEE Trans. Dependable Sec. Comput. 2014, Volume 11 (0) 2014
    Conference paper
    Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Generating Summary Risk Scores for Mobile Applications.
    IEEE Trans. Dependable Sec. Comput. 2014, Volume 11 (0) 2014
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    PriView: practical differentially private release of marginal contingency tables.
    International Conference on Management of Data, SIGMOD 2014, Snowbird, UT, USA, June 22-27, 2014 2014 (0) 2014
    Conference paper
    Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh Chari, Ian Molloy, Youngja Park.
    Detecting Insider Information Theft Using Features from File Access Logs.
    Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II 2014 (0) 2014
    Show item 1 to 10 of 143  

    Your query returned 143 matches in the database.