Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Ninghui
    Last name: Li
    DBLP: l/NinghuiLi
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 137  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Christopher S. Gates, Jing Chen, Ninghui Li, Robert W. Proctor.
    Effective Risk Communication for Android Apps.
    IEEE Trans. Dependable Sec. Comput. 2014, Volume 11 (0) 2014
    Conference paper
    Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Generating Summary Risk Scores for Mobile Applications.
    IEEE Trans. Dependable Sec. Comput. 2014, Volume 11 (0) 2014
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    PriView: practical differentially private release of marginal contingency tables.
    International Conference on Management of Data, SIGMOD 2014, Snowbird, UT, USA, June 22-27, 2014 2014 (0) 2014
    Conference paper
    Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh Chari, Ian Molloy, Youngja Park.
    Detecting Insider Information Theft Using Features from File Access Logs.
    Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II 2014 (0) 2014
    Conference paper
    Lei Cen, Luo Si, Ninghui Li, Hongxia Jin.
    User Comment Analysis for Android apps and CSPI Detection with Comment Expansion.
    Proceeding of the 1st International Workshop on Privacy-Preserving IR: When Information Retrieval Meets Privacy and Security co-located with 37th Annual International ACM SIGIR conference, PIR@SIGIR 2014, Gold Coast, Australia, July 11, 2014. 2014 (0) 2014
    Conference paper
    Jerry Ma, Weining Yang, Min Luo, Ninghui Li.
    A Study of Probabilistic Password Models.
    2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014 2014 (0) 2014
    Journal article
    Mahesh V. Tripunitara, Ninghui Li.
    The Foundational Work of Harrison-Ruzzo-Ullman Revisited.
    IEEE Trans. Dependable Sec. Comput. 2013, Volume 10 (0) 2013
    Conference paper
    Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, Elisa Bertino, Kian-Lee Tan.
    Efficient and accurate strategies for differentially-private sliding window queries.
    Joint 2013 EDBT/ICDT Conferences, EDBT '13 Proceedings, Genoa, Italy, March 18-22, 2013 2013 (0) 2013
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Differentially private grids for geospatial data.
    29th IEEE International Conference on Data Engineering, ICDE 2013, Brisbane, Australia, April 8-12, 2013 2013 (0) 2013
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Yi Wu, Weining Yang.
    Membership privacy: a unifying framework for privacy definitions.
    2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013 2013 (0) 2013
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Understanding Hierarchical Methods for Differentially Private Histograms.
    PVLDB 2012, Volume 6 (0) 2013
    Conference paper
    Tiancheng Li, Ninghui Li, Jian Zhang 0003, Ian Molloy.
    Slicing: A New Approach for Privacy Preserving Data Publishing.
    IEEE Trans. Knowl. Data Eng. 2012, Volume 24 (0) 2012
    Conference paper
    Ninghui Li, Haining Chen, Elisa Bertino.
    On practical specification and enforcement of obligations.
    Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012 2012 (0) 2012
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao.
    PrivBasis: Frequent Itemset Mining with Differential Privacy.
    PVLDB 2011, Volume 5 (0) 2012
    Conference paper
    Wahbeh H. Qardaji, Ninghui Li.
    Anonymizing Network Traces with Temporal Pseudonym Consistency.
    32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), Macau, China, June 18-21, 2012 2012 (0) 2012
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao.
    PrivBasis: Frequent Itemset Mining with Differential Privacy
    CoRR 2012, Volume 0 (0) 2012
    Journal article
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Differentially Private Grids for Geospatial Data
    CoRR 2012, Volume 0 (0) 2012
    Conference paper
    Bhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Android permissions: a perspective combining risks and benefits.
    17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012 2012 (0) 2012
    Conference paper
    Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Using probabilistic generative models for ranking risks of Android apps.
    the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012 2012 (0) 2012
    Conference paper
    Weining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin, Patrick Drew McDaniel.
    Minimizing private data disclosures in the smart grid.
    the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012 2012 (0) 2012
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su.
    On sampling, anonymization, and differential privacy or,
    7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012 2012 (0) 2012
    Conference paper
    Wahbeh H. Qardaji, Ninghui Li.
    Recursive partitioning and summarization: a practical framework for differentially private data publishing.
    7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012 2012 (0) 2012
    Conference paper
    Christopher S. Gates, Ninghui Li, Jing Chen, Robert W. Proctor.
    CodeShield: towards personalized application whitelisting.
    28th Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL, USA, 3-7 December 2012 2012 (0) 2012
    Conference paper
    Omar Chowdhury, Haining Chen, Jianwei Niu, Ninghui Li, Elisa Bertino.
    On XACML's Adequacy to Specify and to Enforce HIPAA.
    3rd USENIX Workshop on Health Security and Privacy, HealthSec'12, Bellevue, WA, USA, August 6-7, 2012 2012 (0) 2012
    Journal article
    Ninghui Li, Wahbeh H. Qardaji, Dong Su.
    Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy
    CoRR 2011, Volume 0 (0) 2011
    Show item 1 to 25 of 137  

    Your query returned 137 matches in the database.