Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Ninghui
    Last name: Li
    DBLP: l/NinghuiLi
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 162  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Min Lyu, Dong Su, Ninghui Li.
    Understanding the Sparse Vector Technique for Differential Privacy.
    PVLDB 2016, Volume 10 (0) 2017
    Conference paper
    Warut Khern-am-nuai, Weining Yang, Ninghui Li.
    Using Context-Based Password Strength Meter to Nudge Users' Password Generating Behavior: A Randomized Experiment.
    50th Hawaii International Conference on System Sciences, HICSS 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017 2017 (0) 2017
    Conference paper
    Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng.
    SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
    Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017 2017 (0) 2017
    Conference paper
    Weining Yang, Aiping Xiong, Jing Chen, Robert W. Proctor, Ninghui Li.
    Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment.
    Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, Hanover, MD, USA, April 4-5, 2017 2017 (0) 2017
    Conference paper
    Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha.
    Optimizing Locally Differentially Private Protocols.
    CoRR 2017, Volume 0 (0) 2017
    Conference paper
    Sze Yiu Chau, Omar Chowdhury, Md. Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li.
    SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
    2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017 2017 (0) 2017
    Conference paper
    Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha.
    Locally Differentially Private Protocols for Frequency Estimation.
    26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017. 2017 (0) 2017
    Conference paper
    Tianhao Wang, Ninghui Li, Somesh Jha.
    Locally Differentially Private Heavy Hitter Identification.
    CoRR 2017, Volume 0 (0) 2017
    Conference paper
    Md. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, Cristina Nita-Rotaru, Ninghui Li.
    Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs.
    47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017, Denver, CO, USA, June 26-29, 2017 2017 (0) 2017
    Conference paper
    Aiping Xiong, Robert W. Proctor, Weining Yang, Ninghui Li.
    Is Domain Highlighting Actually Helpful in Identifying Phishing Web Pages?
    Human Factors 2017, Volume 59 (0) 2017
    Conference paper
    Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin.
    Differentially Private K-Means Clustering.
    Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016 2016 (0) 2016
    Conference paper
    Min Lyu, Dong Su, Ninghui Li.
    Understanding the Sparse Vector Technique for Differential Privacy.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian Molloy, Youngja Park.
    Tri-Modularization of Firewall Policies.
    Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, SACMAT 2016, Shanghai, China, June 5-8, 2016 2016 (0) 2016
    Conference paper
    Wei-Yen Day, Ninghui Li, Min Lyu.
    Publishing Graph Degree Distribution with Node Differential Privacy.
    Proceedings of the 2016 International Conference on Management of Data, SIGMOD Conference 2016, San Francisco, CA, USA, June 26 - July 01, 2016 2016 (0) 2016
    Conference paper
    Weining Yang, Ninghui Li, Ian Molloy, Youngja Park, Suresh Chari.
    Comparing Password Ranking Algorithms on Real-World Password Datasets.
    Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I 2016 (0) 2016
    Conference paper
    Tianhao Wang, Huangyi Ge, Omar Chowdhury, Hemanta K. Maji, Ninghui Li.
    On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 2016 (0) 2016
    Conference paper
    Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor.
    An Empirical Study of Mnemonic Sentence-based Password Generation Strategies.
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 2016 (0) 2016
    Conference paper
    Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu.
    Dimensions of Risk in Mobile Applications: A User Study.
    Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015 2015 (0) 2015
    Journal article
    Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin.
    Differentially Private $k$-Means Clustering.
    CoRR 2015, Volume 0 (0) 2015
    Journal article
    Dong Su, Jianneng Cao, Ninghui Li.
    Differentially Private Projected Histograms of Multi-Attribute Data for Classification.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Haining Chen, Omar Chowdhury, Jing Chen, Ninghui Li, Robert Proctor.
    Towards quantification of firewall policy complexity.
    Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015 2015 (0) 2015
    Conference paper
    Weining Yang, Jing Chen, Aiping Xiong, Robert W. Proctor, Ninghui Li.
    Effectiveness of a phishing warning in field settings.
    Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015 2015 (0) 2015
    Conference paper
    Wei-Yen Day, Ninghui Li.
    Differentially Private Publishing of High-dimensional Data Using Sensitivity Control.
    Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 2015 (0) 2015
    Conference paper
    Youngja Park, Ian Molloy, Suresh Chari, Zenglin Xu, Christopher S. Gates, Ninghui Li.
    Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users.
    Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II 2015 (0) 2015
    Conference paper
    Lei Cen, Christopher S. Gates, Luo Si, Ninghui Li.
    A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code.
    IEEE Trans. Dependable Sec. Comput. 2015, Volume 12 (0) 2015
    Show item 1 to 25 of 162  

    Your query returned 162 matches in the database.