Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Ninghui
    Last name: Li
    DBLP: l/NinghuiLi
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 130  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Mahesh V. Tripunitara, Ninghui Li.
    The Foundational Work of Harrison-Ruzzo-Ullman Revisited.
    IEEE Trans. Dependable Sec. Comput. 2013, Volume 10 (0) 2013
    Conference paper
    Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, Elisa Bertino, Kian-Lee Tan.
    Efficient and accurate strategies for differentially-private sliding window queries.
    Joint 2013 EDBT/ICDT Conferences, EDBT '13 Proceedings, Genoa, Italy, March 18-22, 2013 2013 (0) 2013
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Differentially private grids for geospatial data.
    29th IEEE International Conference on Data Engineering, ICDE 2013, Brisbane, Australia, April 8-12, 2013 2013 (0) 2013
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Yi Wu, Weining Yang.
    Membership privacy: a unifying framework for privacy definitions.
    2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013 2013 (0) 2013
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Understanding Hierarchical Methods for Differentially Private Histograms.
    PVLDB 2012, Volume 6 (0) 2013
    Conference paper
    Tiancheng Li, Ninghui Li, Jian Zhang 0003, Ian Molloy.
    Slicing: A New Approach for Privacy Preserving Data Publishing.
    IEEE Trans. Knowl. Data Eng. 2012, Volume 24 (0) 2012
    Conference paper
    Ninghui Li, Haining Chen, Elisa Bertino.
    On practical specification and enforcement of obligations.
    Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012 2012 (0) 2012
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao.
    PrivBasis: Frequent Itemset Mining with Differential Privacy.
    PVLDB 2011, Volume 5 (0) 2012
    Conference paper
    Wahbeh H. Qardaji, Ninghui Li.
    Anonymizing Network Traces with Temporal Pseudonym Consistency.
    32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), Macau, China, June 18-21, 2012 2012 (0) 2012
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao.
    PrivBasis: Frequent Itemset Mining with Differential Privacy
    CoRR 2012, Volume 0 (0) 2012
    Journal article
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Differentially Private Grids for Geospatial Data
    CoRR 2012, Volume 0 (0) 2012
    Conference paper
    Bhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Android permissions: a perspective combining risks and benefits.
    17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012 2012 (0) 2012
    Conference paper
    Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Using probabilistic generative models for ranking risks of Android apps.
    the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012 2012 (0) 2012
    Conference paper
    Weining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin, Patrick Drew McDaniel.
    Minimizing private data disclosures in the smart grid.
    the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012 2012 (0) 2012
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su.
    On sampling, anonymization, and differential privacy or,
    7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012 2012 (0) 2012
    Conference paper
    Wahbeh H. Qardaji, Ninghui Li.
    Recursive partitioning and summarization: a practical framework for differentially private data publishing.
    7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012 2012 (0) 2012
    Conference paper
    Christopher S. Gates, Ninghui Li, Jing Chen, Robert W. Proctor.
    CodeShield: towards personalized application whitelisting.
    28th Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL, USA, 3-7 December 2012 2012 (0) 2012
    Journal article
    Ninghui Li, Wahbeh H. Qardaji, Dong Su.
    Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy
    CoRR 2011, Volume 0 (0) 2011
    Journal article
    Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo.
    Fine-grained integration of access control policies.
    Computers Security 2011, Volume 30 (0) 2011
    Journal article
    Ninghui Li.
    Introduction to special section SACMAT'08.
    ACM Trans. Inf. Syst. Secur. 2011, Volume 14 (0) 2011
    Conference paper
    Yuqing Sun, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah.
    On the Complexity of Authorization in RBAC under Qualification and Security Constraints.
    IEEE Trans. Dependable Sec. Comput. 2011, Volume 8 (0) 2011
    Book chapter
    Ninghui Li.
    Trust Management.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Book chapter
    Ninghui Li.
    Discretionary Access Control.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Conference paper
    Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp.
    Security Risk Management Using Incentives.
    IEEE Security Privacy 2011, Volume 9 (0) 2011
    Conference paper
    Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang.
    Combining Discretionary Policy with Mandatory Information Flow in Operating Systems.
    ACM Trans. Inf. Syst. Secur. 2011, Volume 14 (0) 2011
    Show item 1 to 25 of 130  

    Your query returned 130 matches in the database.