default search action
Ninghui Li
Person information
- affiliation: Purdue University, West Lafayette, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j68]Ninghui Li, Xiaokuan Zhang, Fan Lv, Binfeng Zong:
Direction-of-Arrival Estimation via Sparse Bayesian Learning Exploiting Hierarchical Priors with Low Complexity. Sensors 24(7): 2336 (2024) - [j67]Ninghui Li, Xiaokuan Zhang, Binfeng Zong, Fan Lv, Jiahua Xu, Zhaolong Wang:
An off-grid direction-of-arrival estimator based on sparse Bayesian learning with three-stage hierarchical Laplace priors. Signal Process. 218: 109371 (2024) - [j66]Mengdie Huang, Hyunwoo Lee, Ashish Kundu, Xiaofeng Chen, Anand Mudgerikar, Ninghui Li, Elisa Bertino:
ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks. ACM Trans. Internet Things 5(3): 15:1-15:34 (2024) - [c142]Jiacheng Li, Ninghui Li, Bruno Ribeiro:
MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training. USENIX Security Symposium 2024 - [e10]João P. Vilela, Haya Schulmann, Ninghui Li:
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2024, Porto, Portugal, June 19-21, 2024. ACM 2024 [contents] - [i33]Yuntao Du, Ninghui Li:
Towards Principled Assessment of Tabular Data Synthesis Algorithms. CoRR abs/2402.06806 (2024) - [i32]Xiaoguang Li, Zitao Li, Ninghui Li, Wenhai Sun:
On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks. CoRR abs/2403.19510 (2024) - [i31]Joshua C. Zhao, Saurabh Bagchi, Salman Avestimehr, Kevin S. Chan, Somali Chaterji, Dimitris Dimitriadis, Jiacheng Li, Ninghui Li, Arash Nourian, Holger R. Roth:
Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape - A Survey. CoRR abs/2405.03636 (2024) - 2023
- [j65]Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. ACM Comput. Surv. 55(2): 3:1-3:36 (2023) - [j64]Warut Khern-am-nuai, Matthew J. Hashim, Alain Pinsonneault, Weining Yang, Ninghui Li:
Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments. Inf. Syst. Res. 34(1): 157-177 (2023) - [j63]Ninghui Li, Lei Guan, Hong Gao:
Sun Glint Correction Based on BRDF Model for Improving the HY-1C/COCTS Clear-Sky Coverage. IEEE Geosci. Remote. Sens. Lett. 20: 1-5 (2023) - [j62]Zitao Li, Tianhao Wang, Ninghui Li:
Differentially Private Vertical Federated Clustering. Proc. VLDB Endow. 16(6): 1277-1290 (2023) - [c141]Weicheng Wang, Hyunwoo Lee, Yan Huang, Elisa Bertino, Ninghui Li:
Towards Efficient Privacy-Preserving Deep Packet Inspection. ESORICS (2) 2023: 166-192 - [c140]Jiacheng Li, Ninghui Li, Bruno Ribeiro:
Effective passive membership inference attacks in federated learning against overparameterized models. ICLR 2023 - [c139]Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li:
Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation. USENIX Security Symposium 2023: 1739-1756 - [e9]Mohamed Shehab, Maribel Fernández, Ninghui Li:
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023. ACM 2023 [contents] - [i30]Yu Tsung Lee, Haining Chen, William Enck, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage. CoRR abs/2302.13506 (2023) - [i29]Jiacheng Li, Ninghui Li, Bruno Ribeiro:
MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training. CoRR abs/2311.00919 (2023) - 2022
- [j61]Jing Chen, Huangyi Ge, Ninghui Li, Robert W. Proctor:
What I Say Means What I Do: Risk Concerns and Mobile Application-Selection Behaviors. Hum. Factors 64(8): 1331-1350 (2022) - [c138]Hyunwoo Lee, Imtiaz Karim, Ninghui Li, Elisa Bertino:
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol. AsiaCCS 2022: 182-195 - [c137]Ninghui Li:
Differentially Private Data Synthesis: State of the Art and Challenges. AsiaCCS 2022: 815 - [c136]Hyunwoo Lee, Anand Mudgerikar, Ashish Kundu, Ninghui Li, Elisa Bertino:
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks. ESORICS (2) 2022: 549-568 - [c135]Ninghui Li, Lei Guan, Hong Gao:
SUN Glint Correction of HY-1C/COCTS Imagery. IGARSS 2022: 6860-6863 - [c134]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. USENIX Security Symposium 2022: 4579-4596 - [c133]Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li:
Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy. WPES@CCS 2022: 41-53 - [i28]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. CoRR abs/2201.09370 (2022) - [i27]Aiping Xiong, Chuhao Wu, Tianhao Wang, Robert W. Proctor, Jeremiah Blocki, Ninghui Li, Somesh Jha:
Using Illustrations to Communicate Differential Privacy Trust Models: An Investigation of Users' Comprehension, Perception, and Data Sharing Decision. CoRR abs/2202.10014 (2022) - [i26]Xiaoguang Li, Neil Zhenqiang Gong, Ninghui Li, Wenhai Sun, Hui Li:
Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation. CoRR abs/2205.11782 (2022) - [i25]Zitao Li, Tianhao Wang, Ninghui Li:
Differentially Private Vertical Federated Clustering. CoRR abs/2208.01700 (2022) - 2021
- [j60]Tianhao Wang, Ninghui Li, Zhikun Zhang:
DPSyn: Experiences in the NIST Differential Privacy Data Synthesis Challenges. J. Priv. Confidentiality 11(2) (2021) - [j59]Zitao Li, Bolin Ding, Ce Zhang, Ninghui Li, Jingren Zhou:
Federated Matrix Factorization with Privacy Guarantee. Proc. VLDB Endow. 15(4): 900-913 (2021) - [j58]Mingkun Liu, Lei Guan, Jianqiang Liu, Qingjun Song, Chaofei Ma, Ninghui Li:
First Assessment of HY-1C COCTS Thermal Infrared Calibration Using MetOp-B IASI. Remote. Sens. 13(4): 635 (2021) - [j57]Ninghui Li, Sujuan Wang, Lei Guan, Mingkun Liu:
Assessment of Global FY-3C/VIRR Sea Surface Temperature. Remote. Sens. 13(16): 3249 (2021) - [j56]Tianhao Wang, Ninghui Li, Somesh Jha:
Locally Differentially Private Heavy Hitter Identification. IEEE Trans. Dependable Secur. Comput. 18(2): 982-993 (2021) - [c132]Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha:
Continuous Release of Data Streams under both Centralized and Local Differential Privacy. CCS 2021: 1237-1253 - [c131]Jiacheng Li, Ninghui Li, Bruno Ribeiro:
Membership Inference Attacks and Defenses in Classification Models. CODASPY 2021: 5-16 - [c130]Qingqing Ye, Haibo Hu, Ninghui Li, Xiaofeng Meng, Huadi Zheng, Haotian Yan:
Beyond Value Perturbation: Local Differential Privacy in the Temporal Setting. INFOCOM 2021: 1-10 - [c129]Zitao Li, Trung Dang, Tianhao Wang, Ninghui Li:
MGD: A Utility Metric for Private Data Publication. NSysS 2021: 106-119 - [c128]Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. USENIX Security Symposium 2021: 929-946 - [c127]Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems. USENIX Security Symposium 2021: 2579-2596 - [i24]Ninghui Li, Zhikun Zhang, Tianhao Wang:
DPSyn: Experiences in the NIST Differential Privacy Data Synthesis Challenges. CoRR abs/2106.12949 (2021) - 2020
- [j55]Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino, Ninghui Li:
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks. Proc. Priv. Enhancing Technol. 2020(1): 126-142 (2020) - [j54]Tianhao Wang, Min Xu, Bolin Ding, Jingren Zhou, Cheng Hong, Zhicong Huang, Ninghui Li, Somesh Jha:
Improving Utility and Security of the Shuffler-based Differential Privacy. Proc. VLDB Endow. 13(13): 3545-3558 (2020) - [j53]Jianyu Yang, Tianhao Wang, Ninghui Li, Xiang Cheng, Sen Su:
Answering Multi-Dimensional Range Queries under Local Differential Privacy. Proc. VLDB Endow. 14(3): 378-390 (2020) - [c126]Huangyi Ge, Sze Yiu Chau, Bruno Ribeiro, Ninghui Li:
Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples. CODASPY 2020: 85-96 - [c125]Tianhao Wang, Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Locally Differentially Private Frequency Estimation with Consistency. NDSS 2020 - [c124]Zitao Li, Tianhao Wang, Milan Lopuhaä-Zwakenberg, Ninghui Li, Boris Skoric:
Estimating Numerical Distributions under Local Differential Privacy. SIGMOD Conference 2020: 621-635 - [c123]Aiping Xiong, Tianhao Wang, Ninghui Li, Somesh Jha:
Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension. SP 2020: 392-410 - [c122]Huangyi Ge, Sze Yiu Chau, Ninghui Li:
MoNet: Impressionism As A Defense Against Adversarial Examples. TPS-ISA 2020: 246-255 - [c121]Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, Ninghui Li:
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy. WISEC 2020: 133-143 - [c120]Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Improving Frequency Estimation under Local Differential Privacy. WPES@CCS 2020: 123-135 - [e8]Liqun Chen, Ninghui Li, Kaitai Liang, Steve A. Schneider:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12308, Springer 2020, ISBN 978-3-030-58950-9 [contents] - [e7]Liqun Chen, Ninghui Li, Kaitai Liang, Steve A. Schneider:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12309, Springer 2020, ISBN 978-3-030-59012-3 [contents] - [i23]Jiacheng Li, Ninghui Li, Bruno Ribeiro:
Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap. CoRR abs/2002.12062 (2020) - [i22]Aiping Xiong, Tianhao Wang, Ninghui Li, Somesh Jha:
Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension. CoRR abs/2003.13922 (2020) - [i21]Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha:
Continuous Release of Data Streams under both Centralized and Local Differential Privacy. CoRR abs/2005.11753 (2020) - [i20]Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Daimeng Wang, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Triage Android Systems. CoRR abs/2008.03593 (2020) - [i19]Jianyu Yang, Tianhao Wang, Ninghui Li, Xiang Cheng, Sen Su:
Answering Multi-Dimensional Range Queries under Local Differential Privacy. CoRR abs/2009.06538 (2020) - [i18]Shagufta Mehnaz, Ninghui Li, Elisa Bertino:
Black-box Model Inversion Attribute Inference Attacks on Classification Models. CoRR abs/2012.03404 (2020) - [i17]Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. CoRR abs/2012.09520 (2020) - [i16]Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. CoRR abs/2012.15128 (2020)
2010 – 2019
- 2019
- [j52]Somali Chaterji, Jinkyu Koo, Ninghui Li, Folker Meyer, Ananth Grama, Saurabh Bagchi:
Federation in genomics pipelines: techniques and challenges. Briefings Bioinform. 20(1): 235-244 (2019) - [j51]Aiping Xiong, Robert W. Proctor, Weining Yang, Ninghui Li:
Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages. Hum. Factors 61(4) (2019) - [j50]Scott R. Moore, Huangyi Ge, Ninghui Li, Robert W. Proctor:
Cybersecurity for Android Applications: Permissions in Android 5 and 6. Int. J. Hum. Comput. Interact. 35(7): 630-640 (2019) - [c119]Huangyi Ge, Sze Yiu Chau, Victor E. Gonsalves, Huian Li, Tianhao Wang, Xukai Zou, Ninghui Li:
Koinonia: verifiable e-voting with long-term privacy. ACSAC 2019: 270-285 - [c118]Ninghui Li, Qingqing Ye:
Mobile Data Collection and Analysis with Local Differential Privacy. MDM 2019: 4-7 - [c117]Sze Yiu Chau, Moosa Yahyazadeh, Omar Chowdhury, Aniket Kate, Ninghui Li:
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification. NDSS 2019 - [c116]Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, Elisa Bertino:
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. NDSS 2019 - [c115]Tyler Phillips, Xukai Zou, Feng Li, Ninghui Li:
Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning. SACMAT 2019: 141-146 - [c114]Tianhao Wang, Bolin Ding, Jingren Zhou, Cheng Hong, Zhicong Huang, Ninghui Li, Somesh Jha:
Answering Multi-Dimensional Analytical Queries under Local Differential Privacy. SIGMOD Conference 2019: 159-176 - [i15]Tianhao Wang, Zitao Li, Ninghui Li, Milan Lopuhaä-Zwakenberg, Boris Skoric:
Consistent and Accurate Frequency Oracles under Local Differential Privacy. CoRR abs/1905.08320 (2019) - [i14]Tianhao Wang, Min Xu, Bolin Ding, Jingren Zhou, Ninghui Li, Somesh Jha:
Practical and Robust Privacy Amplification with Multi-Party Differential Privacy. CoRR abs/1908.11515 (2019) - [i13]Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li:
Information-theoretic metrics for Local Differential Privacy protocols. CoRR abs/1910.07826 (2019) - [i12]Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Four accuracy bounds and one estimator for frequency estimation under local differential privacy. CoRR abs/1911.10499 (2019) - [i11]Zitao Li, Tianhao Wang, Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li:
Estimating Numerical Distributions under Local Differential Privacy. CoRR abs/1912.01051 (2019) - 2018
- [j49]Steven Furnell, Warut Khern-am-nuai, Rawan Esmael, Weining Yang, Ninghui Li:
Enhancing security behaviour by supporting the user. Comput. Secur. 75: 1-9 (2018) - [j48]Isis Chong, Huangyi Ge, Ninghui Li, Robert W. Proctor:
Influence of privacy priming and security framing on mobile app selection. Comput. Secur. 78: 143-154 (2018) - [j47]Jing Chen, Scott Mishler, Bin Hu, Ninghui Li, Robert W. Proctor:
The description-experience gap in the effect of warning reliability on user trust and performance in a phishing-detection context. Int. J. Hum. Comput. Stud. 119: 35-47 (2018) - [j46]Dong Su, Jianneng Cao, Ninghui Li, Min Lyu:
PrivPfC: differentially private data publication for classification. VLDB J. 27(2): 201-223 (2018) - [c113]Sze Yiu Chau, Bincheng Wang, Jianxiong Wang, Omar Chowdhury, Aniket Kate, Ninghui Li:
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps. ACSAC 2018: 236-251 - [c112]Luke Deshotels, Razvan Deaconescu, Costin Carabas, Iulia Manda, William Enck, Mihai Chiroiu, Ninghui Li, Ahmad-Reza Sadeghi:
iOracle: Automated Evaluation of Access Control Policies in iOS. AsiaCCS 2018: 117-131 - [c111]Zhikun Zhang, Tianhao Wang, Ninghui Li, Shibo He, Jiming Chen:
CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy. CCS 2018: 212-229 - [c110]Yousra Aafer, Guanhong Tao, Jianjun Huang, Xiangyu Zhang, Ninghui Li:
Precise Android API Protection Mapping Derivation and Reasoning. CCS 2018: 1151-1164 - [c109]Ninghui Li:
Differential Privacy in the Local Setting. IWSPA@CODASPY 2018: 42 - [c108]Yousra Aafer, Jianjun Huang, Yi Sun, Xiangyu Zhang, Ninghui Li, Chen Tian:
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection. NDSS 2018 - [c107]Sze Yiu Chau, Omar Chowdhury, Victor E. Gonsalves, Huangyi Ge, Weining Yang, Sonia Fahmy, Ninghui Li:
Adaptive Deterrence of DNS Cache Poisoning. SecureComm (2) 2018: 171-191 - [c106]Graham Cormode, Somesh Jha, Tejas Kulkarni, Ninghui Li, Divesh Srivastava, Tianhao Wang:
Privacy at Scale: Local Differential Privacy in Practice. SIGMOD Conference 2018: 1655-1658 - [c105]Tianhao Wang, Ninghui Li, Somesh Jha:
Locally Differentially Private Frequent Itemset Mining. IEEE Symposium on Security and Privacy 2018: 127-143 - [r10]Ninghui Li:
Asymmetric Encryption. Encyclopedia of Database Systems (2nd ed.) 2018 - [r9]Ninghui Li:
Data Encryption. Encyclopedia of Database Systems (2nd ed.) 2018 - [r8]Ninghui Li:
Homomorphic Encryption. Encyclopedia of Database Systems (2nd ed.) 2018 - [r7]Ninghui Li:
Symmetric Encryption. Encyclopedia of Database Systems (2nd ed.) 2018 - [i10]Huangyi Ge, Sze Yiu Chau, Ninghui Li:
Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples. CoRR abs/1812.01804 (2018) - 2017
- [j45]Aiping Xiong, Robert W. Proctor, Weining Yang, Ninghui Li:
Is Domain Highlighting Actually Helpful in Identifying Phishing Web Pages? Hum. Factors 59(4): 640-660 (2017) - [j44]Min Lyu, Dong Su, Ninghui Li:
Understanding the Sparse Vector Technique for Differential Privacy. Proc. VLDB Endow. 10(6): 637-648 (2017) - [j43]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Min Lyu, Hongxia Jin:
Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization. ACM Trans. Priv. Secur. 20(4): 16:1-16:33 (2017) - [c104]Haining Chen, Ninghui Li, William Enck, Yousra Aafer, Xiangyu Zhang:
Analysis of SEAndroid Policies: Combining MAC and DAC in Android. ACSAC 2017: 553-565 - [c103]Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng:
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android. AsiaCCS 2017: 612-624 - [c102]Md. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, Cristina Nita-Rotaru, Ninghui Li:
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs. DSN 2017: 627-638 - [c101]Warut Khern-am-nuai, Weining Yang, Ninghui Li:
Using Context-Based Password Strength Meter to Nudge Users' Password Generating Behavior: A Randomized Experiment. HICSS 2017: 1-10 - [c100]Weining Yang, Aiping Xiong, Jing Chen, Robert W. Proctor, Ninghui Li:
Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment. HotSoS 2017: 52-61 - [c99]Sze Yiu Chau, Omar Chowdhury, Md. Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li:
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations. IEEE Symposium on Security and Privacy 2017: 503-520 - [c98]Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha:
Locally Differentially Private Protocols for Frequency Estimation. USENIX Security Symposium 2017: 729-745 - [i9]Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha:
Optimizing Locally Differentially Private Protocols. CoRR abs/1705.04421 (2017) - [i8]Tianhao Wang, Ninghui Li, Somesh Jha:
Locally Differentially Private Heavy Hitter Identification. CoRR abs/1708.06674 (2017) - 2016
- [b3]Ninghui Li, Min Lyu, Dong Su, Weining Yang:
Differential Privacy: From Theory to Practice. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2016, ISBN 978-3-031-01222-8, pp. 1-138 - [c97]Tianhao Wang, Huangyi Ge, Omar Chowdhury, Hemanta K. Maji, Ninghui Li:
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols. CCS 2016: 603-615 - [c96]Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor:
An Empirical Study of Mnemonic Sentence-based Password Generation Strategies. CCS 2016: 1216-1229 - [c95]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin:
Differentially Private K-Means Clustering. CODASPY 2016: 26-37 - [c94]Weining Yang, Ninghui Li, Ian M. Molloy, Youngja Park, Suresh N. Chari:
Comparing Password Ranking Algorithms on Real-World Password Datasets. ESORICS (1) 2016: 69-90 - [c93]Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian M. Molloy, Youngja Park:
Tri-Modularization of Firewall Policies. SACMAT 2016: 37-48 - [c92]Wei-Yen Day, Ninghui Li, Min Lyu:
Publishing Graph Degree Distribution with Node Differential Privacy. SIGMOD Conference 2016: 123-138 - [i7]Min Lyu, Dong Su, Ninghui Li:
Understanding the Sparse Vector Technique for Differential Privacy. CoRR abs/1603.01699 (2016) - 2015
- [j42]Lei Cen, Christopher S. Gates, Luo Si, Ninghui Li:
A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code. IEEE Trans. Dependable Secur. Comput. 12(4): 400-412 (2015) - [c91]Wei-Yen Day, Ninghui Li:
Differentially Private Publishing of High-dimensional Data Using Sensitivity Control. AsiaCCS 2015: 451-462 - [c90]Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu:
Dimensions of Risk in Mobile Applications: A User Study. CODASPY 2015: 49-60 - [c89]Youngja Park, Ian M. Molloy, Suresh N. Chari, Zenglin Xu, Christopher S. Gates, Ninghui Li:
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users. ESORICS (2) 2015: 396-414 - [c88]Weining Yang, Jing Chen, Aiping Xiong,