default search action
Ninghui Li
Person information
- affiliation: Purdue University, West Lafayette, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j68]Ninghui Li, Xiaokuan Zhang, Fan Lv, Binfeng Zong:
Direction-of-Arrival Estimation via Sparse Bayesian Learning Exploiting Hierarchical Priors with Low Complexity. Sensors 24(7): 2336 (2024) - [j67]Ninghui Li, Xiaokuan Zhang, Binfeng Zong, Fan Lv, Jiahua Xu, Zhaolong Wang:
An off-grid direction-of-arrival estimator based on sparse Bayesian learning with three-stage hierarchical Laplace priors. Signal Process. 218: 109371 (2024) - [j66]Mengdie Huang, Hyunwoo Lee, Ashish Kundu, Xiaofeng Chen, Anand Mudgerikar, Ninghui Li, Elisa Bertino:
ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks. ACM Trans. Internet Things 5(3): 15:1-15:34 (2024) - [c142]Jiacheng Li, Ninghui Li, Bruno Ribeiro:
MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training. USENIX Security Symposium 2024 - [e10]João P. Vilela, Haya Schulmann, Ninghui Li:
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2024, Porto, Portugal, June 19-21, 2024. ACM 2024 [contents] - [i33]Yuntao Du, Ninghui Li:
Towards Principled Assessment of Tabular Data Synthesis Algorithms. CoRR abs/2402.06806 (2024) - [i32]Xiaoguang Li, Zitao Li, Ninghui Li, Wenhai Sun:
On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks. CoRR abs/2403.19510 (2024) - [i31]Joshua C. Zhao, Saurabh Bagchi, Salman Avestimehr, Kevin S. Chan, Somali Chaterji, Dimitris Dimitriadis, Jiacheng Li, Ninghui Li, Arash Nourian, Holger R. Roth:
Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape - A Survey. CoRR abs/2405.03636 (2024) - 2023
- [j65]Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. ACM Comput. Surv. 55(2): 3:1-3:36 (2023) - [j64]Warut Khern-am-nuai, Matthew J. Hashim, Alain Pinsonneault, Weining Yang, Ninghui Li:
Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments. Inf. Syst. Res. 34(1): 157-177 (2023) - [j63]Ninghui Li, Lei Guan, Hong Gao:
Sun Glint Correction Based on BRDF Model for Improving the HY-1C/COCTS Clear-Sky Coverage. IEEE Geosci. Remote. Sens. Lett. 20: 1-5 (2023) - [j62]Zitao Li, Tianhao Wang, Ninghui Li:
Differentially Private Vertical Federated Clustering. Proc. VLDB Endow. 16(6): 1277-1290 (2023) - [c141]Weicheng Wang, Hyunwoo Lee, Yan Huang, Elisa Bertino, Ninghui Li:
Towards Efficient Privacy-Preserving Deep Packet Inspection. ESORICS (2) 2023: 166-192 - [c140]Jiacheng Li, Ninghui Li, Bruno Ribeiro:
Effective passive membership inference attacks in federated learning against overparameterized models. ICLR 2023 - [c139]Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li:
Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation. USENIX Security Symposium 2023: 1739-1756 - [e9]Mohamed Shehab, Maribel Fernández, Ninghui Li:
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023. ACM 2023 [contents] - [i30]Yu Tsung Lee, Haining Chen, William Enck, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage. CoRR abs/2302.13506 (2023) - [i29]Jiacheng Li, Ninghui Li, Bruno Ribeiro:
MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training. CoRR abs/2311.00919 (2023) - 2022
- [j61]Jing Chen, Huangyi Ge, Ninghui Li, Robert W. Proctor:
What I Say Means What I Do: Risk Concerns and Mobile Application-Selection Behaviors. Hum. Factors 64(8): 1331-1350 (2022) - [c138]Hyunwoo Lee, Imtiaz Karim, Ninghui Li, Elisa Bertino:
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol. AsiaCCS 2022: 182-195 - [c137]Ninghui Li:
Differentially Private Data Synthesis: State of the Art and Challenges. AsiaCCS 2022: 815 - [c136]Hyunwoo Lee, Anand Mudgerikar, Ashish Kundu, Ninghui Li, Elisa Bertino:
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks. ESORICS (2) 2022: 549-568 - [c135]Ninghui Li, Lei Guan, Hong Gao:
SUN Glint Correction of HY-1C/COCTS Imagery. IGARSS 2022: 6860-6863 - [c134]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. USENIX Security Symposium 2022: 4579-4596 - [c133]Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li:
Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy. WPES@CCS 2022: 41-53 - [i28]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. CoRR abs/2201.09370 (2022) - [i27]Aiping Xiong, Chuhao Wu, Tianhao Wang, Robert W. Proctor, Jeremiah Blocki, Ninghui Li, Somesh Jha:
Using Illustrations to Communicate Differential Privacy Trust Models: An Investigation of Users' Comprehension, Perception, and Data Sharing Decision. CoRR abs/2202.10014 (2022) - [i26]Xiaoguang Li, Neil Zhenqiang Gong, Ninghui Li, Wenhai Sun, Hui Li:
Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation. CoRR abs/2205.11782 (2022) - [i25]Zitao Li, Tianhao Wang, Ninghui Li:
Differentially Private Vertical Federated Clustering. CoRR abs/2208.01700 (2022) - 2021
- [j60]Tianhao Wang, Ninghui Li, Zhikun Zhang:
DPSyn: Experiences in the NIST Differential Privacy Data Synthesis Challenges. J. Priv. Confidentiality 11(2) (2021) - [j59]Zitao Li, Bolin Ding, Ce Zhang, Ninghui Li, Jingren Zhou:
Federated Matrix Factorization with Privacy Guarantee. Proc. VLDB Endow. 15(4): 900-913 (2021) - [j58]Mingkun Liu, Lei Guan, Jianqiang Liu, Qingjun Song, Chaofei Ma, Ninghui Li:
First Assessment of HY-1C COCTS Thermal Infrared Calibration Using MetOp-B IASI. Remote. Sens. 13(4): 635 (2021) - [j57]Ninghui Li, Sujuan Wang, Lei Guan, Mingkun Liu:
Assessment of Global FY-3C/VIRR Sea Surface Temperature. Remote. Sens. 13(16): 3249 (2021) - [j56]Tianhao Wang, Ninghui Li, Somesh Jha:
Locally Differentially Private Heavy Hitter Identification. IEEE Trans. Dependable Secur. Comput. 18(2): 982-993 (2021) - [c132]Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha:
Continuous Release of Data Streams under both Centralized and Local Differential Privacy. CCS 2021: 1237-1253 - [c131]Jiacheng Li, Ninghui Li, Bruno Ribeiro:
Membership Inference Attacks and Defenses in Classification Models. CODASPY 2021: 5-16 - [c130]Qingqing Ye, Haibo Hu, Ninghui Li, Xiaofeng Meng, Huadi Zheng, Haotian Yan:
Beyond Value Perturbation: Local Differential Privacy in the Temporal Setting. INFOCOM 2021: 1-10 - [c129]Zitao Li, Trung Dang, Tianhao Wang, Ninghui Li:
MGD: A Utility Metric for Private Data Publication. NSysS 2021: 106-119 - [c128]Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. USENIX Security Symposium 2021: 929-946 - [c127]Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems. USENIX Security Symposium 2021: 2579-2596 - [i24]Ninghui Li, Zhikun Zhang, Tianhao Wang:
DPSyn: Experiences in the NIST Differential Privacy Data Synthesis Challenges. CoRR abs/2106.12949 (2021) - 2020
- [j55]Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino, Ninghui Li:
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks. Proc. Priv. Enhancing Technol. 2020(1): 126-142 (2020) - [j54]Tianhao Wang, Min Xu, Bolin Ding, Jingren Zhou, Cheng Hong, Zhicong Huang, Ninghui Li, Somesh Jha:
Improving Utility and Security of the Shuffler-based Differential Privacy. Proc. VLDB Endow. 13(13): 3545-3558 (2020) - [j53]Jianyu Yang, Tianhao Wang, Ninghui Li, Xiang Cheng, Sen Su:
Answering Multi-Dimensional Range Queries under Local Differential Privacy. Proc. VLDB Endow. 14(3): 378-390 (2020) - [c126]Huangyi Ge, Sze Yiu Chau, Bruno Ribeiro, Ninghui Li:
Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples. CODASPY 2020: 85-96 - [c125]Tianhao Wang, Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Locally Differentially Private Frequency Estimation with Consistency. NDSS 2020 - [c124]Zitao Li, Tianhao Wang, Milan Lopuhaä-Zwakenberg, Ninghui Li, Boris Skoric:
Estimating Numerical Distributions under Local Differential Privacy. SIGMOD Conference 2020: 621-635 - [c123]Aiping Xiong, Tianhao Wang, Ninghui Li, Somesh Jha:
Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension. SP 2020: 392-410 - [c122]Huangyi Ge, Sze Yiu Chau, Ninghui Li:
MoNet: Impressionism As A Defense Against Adversarial Examples. TPS-ISA 2020: 246-255 - [c121]Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, Ninghui Li:
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy. WISEC 2020: 133-143 - [c120]Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Improving Frequency Estimation under Local Differential Privacy. WPES@CCS 2020: 123-135 - [e8]Liqun Chen, Ninghui Li, Kaitai Liang, Steve A. Schneider:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12308, Springer 2020, ISBN 978-3-030-58950-9 [contents] - [e7]Liqun Chen, Ninghui Li, Kaitai Liang, Steve A. Schneider:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12309, Springer 2020, ISBN 978-3-030-59012-3 [contents] - [i23]Jiacheng Li, Ninghui Li, Bruno Ribeiro:
Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap. CoRR abs/2002.12062 (2020) - [i22]Aiping Xiong, Tianhao Wang, Ninghui Li, Somesh Jha:
Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension. CoRR abs/2003.13922 (2020) - [i21]Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha:
Continuous Release of Data Streams under both Centralized and Local Differential Privacy. CoRR abs/2005.11753 (2020) - [i20]Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Daimeng Wang, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Triage Android Systems. CoRR abs/2008.03593 (2020) - [i19]Jianyu Yang, Tianhao Wang, Ninghui Li, Xiang Cheng, Sen Su:
Answering Multi-Dimensional Range Queries under Local Differential Privacy. CoRR abs/2009.06538 (2020) - [i18]Shagufta Mehnaz, Ninghui Li, Elisa Bertino:
Black-box Model Inversion Attribute Inference Attacks on Classification Models. CoRR abs/2012.03404 (2020) - [i17]Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. CoRR abs/2012.09520 (2020) - [i16]Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. CoRR abs/2012.15128 (2020)
2010 – 2019
- 2019
- [j52]Somali Chaterji, Jinkyu Koo, Ninghui Li, Folker Meyer, Ananth Grama, Saurabh Bagchi:
Federation in genomics pipelines: techniques and challenges. Briefings Bioinform. 20(1): 235-244 (2019) - [j51]Aiping Xiong, Robert W. Proctor, Weining Yang, Ninghui Li:
Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages. Hum. Factors 61(4) (2019) - [j50]Scott R. Moore, Huangyi Ge, Ninghui Li, Robert W. Proctor:
Cybersecurity for Android Applications: Permissions in Android 5 and 6. Int. J. Hum. Comput. Interact. 35(7): 630-640 (2019) - [c119]Huangyi Ge, Sze Yiu Chau, Victor E. Gonsalves, Huian Li, Tianhao Wang, Xukai Zou, Ninghui Li:
Koinonia: verifiable e-voting with long-term privacy. ACSAC 2019: 270-285 - [c118]Ninghui Li, Qingqing Ye:
Mobile Data Collection and Analysis with Local Differential Privacy. MDM 2019: 4-7 - [c117]Sze Yiu Chau, Moosa Yahyazadeh, Omar Chowdhury, Aniket Kate, Ninghui Li:
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification. NDSS 2019 - [c116]Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, Elisa Bertino:
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. NDSS 2019 - [c115]Tyler Phillips, Xukai Zou, Feng Li, Ninghui Li:
Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning. SACMAT 2019: 141-146 - [c114]Tianhao Wang, Bolin Ding, Jingren Zhou, Cheng Hong, Zhicong Huang, Ninghui Li, Somesh Jha:
Answering Multi-Dimensional Analytical Queries under Local Differential Privacy. SIGMOD Conference 2019: 159-176 - [i15]Tianhao Wang, Zitao Li, Ninghui Li, Milan Lopuhaä-Zwakenberg, Boris Skoric:
Consistent and Accurate Frequency Oracles under Local Differential Privacy. CoRR abs/1905.08320 (2019) - [i14]Tianhao Wang, Min Xu, Bolin Ding, Jingren Zhou, Ninghui Li, Somesh Jha:
Practical and Robust Privacy Amplification with Multi-Party Differential Privacy. CoRR abs/1908.11515 (2019) - [i13]Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li:
Information-theoretic metrics for Local Differential Privacy protocols. CoRR abs/1910.07826 (2019) - [i12]Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Four accuracy bounds and one estimator for frequency estimation under local differential privacy. CoRR abs/1911.10499 (2019) - [i11]Zitao Li, Tianhao Wang, Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li:
Estimating Numerical Distributions under Local Differential Privacy. CoRR abs/1912.01051 (2019) - 2018
- [j49]Steven Furnell, Warut Khern-am-nuai, Rawan Esmael, Weining Yang, Ninghui Li:
Enhancing security behaviour by supporting the user. Comput. Secur. 75: 1-9 (2018) - [j48]Isis Chong, Huangyi Ge, Ninghui Li, Robert W. Proctor:
Influence of privacy priming and security framing on mobile app selection. Comput. Secur. 78: 143-154 (2018) - [j47]Jing Chen, Scott Mishler, Bin Hu, Ninghui Li, Robert W. Proctor:
The description-experience gap in the effect of warning reliability on user trust and performance in a phishing-detection context. Int. J. Hum. Comput. Stud. 119: 35-47 (2018) - [j46]Dong Su, Jianneng Cao, Ninghui Li, Min Lyu:
PrivPfC: differentially private data publication for classification. VLDB J. 27(2): 201-223 (2018) - [c113]Sze Yiu Chau, Bincheng Wang, Jianxiong Wang, Omar Chowdhury, Aniket Kate, Ninghui Li:
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps. ACSAC 2018: 236-251 - [c112]Luke Deshotels, Razvan Deaconescu, Costin Carabas, Iulia Manda, William Enck, Mihai Chiroiu, Ninghui Li, Ahmad-Reza Sadeghi:
iOracle: Automated Evaluation of Access Control Policies in iOS. AsiaCCS 2018: 117-131 - [c111]Zhikun Zhang, Tianhao Wang, Ninghui Li, Shibo He, Jiming Chen:
CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy. CCS 2018: 212-229 - [c110]Yousra Aafer, Guanhong Tao, Jianjun Huang, Xiangyu Zhang, Ninghui Li:
Precise Android API Protection Mapping Derivation and Reasoning. CCS 2018: 1151-1164 - [c109]Ninghui Li:
Differential Privacy in the Local Setting. IWSPA@CODASPY 2018: 42 - [c108]Yousra Aafer, Jianjun Huang, Yi Sun, Xiangyu Zhang, Ninghui Li, Chen Tian:
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection. NDSS 2018 - [c107]Sze Yiu Chau, Omar Chowdhury, Victor E. Gonsalves, Huangyi Ge, Weining Yang, Sonia Fahmy, Ninghui Li:
Adaptive Deterrence of DNS Cache Poisoning. SecureComm (2) 2018: 171-191 - [c106]Graham Cormode, Somesh Jha, Tejas Kulkarni, Ninghui Li, Divesh Srivastava, Tianhao Wang:
Privacy at Scale: Local Differential Privacy in Practice. SIGMOD Conference 2018: 1655-1658 - [c105]Tianhao Wang, Ninghui Li, Somesh Jha:
Locally Differentially Private Frequent Itemset Mining. IEEE Symposium on Security and Privacy 2018: 127-143 - [r10]Ninghui Li:
Asymmetric Encryption. Encyclopedia of Database Systems (2nd ed.) 2018 - [r9]Ninghui Li:
Data Encryption. Encyclopedia of Database Systems (2nd ed.) 2018 - [r8]Ninghui Li:
Homomorphic Encryption. Encyclopedia of Database Systems (2nd ed.) 2018 - [r7]Ninghui Li:
Symmetric Encryption. Encyclopedia of Database Systems (2nd ed.) 2018 - [i10]Huangyi Ge, Sze Yiu Chau, Ninghui Li:
Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples. CoRR abs/1812.01804 (2018) - 2017
- [j45]Aiping Xiong, Robert W. Proctor, Weining Yang, Ninghui Li:
Is Domain Highlighting Actually Helpful in Identifying Phishing Web Pages? Hum. Factors 59(4): 640-660 (2017) - [j44]Min Lyu, Dong Su, Ninghui Li:
Understanding the Sparse Vector Technique for Differential Privacy. Proc. VLDB Endow. 10(6): 637-648 (2017) - [j43]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Min Lyu, Hongxia Jin:
Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization. ACM Trans. Priv. Secur. 20(4): 16:1-16:33 (2017) - [c104]Haining Chen, Ninghui Li, William Enck, Yousra Aafer, Xiangyu Zhang:
Analysis of SEAndroid Policies: Combining MAC and DAC in Android. ACSAC 2017: 553-565 - [c103]Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng:
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android. AsiaCCS 2017: 612-624 - [c102]Md. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, Cristina Nita-Rotaru, Ninghui Li:
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs. DSN 2017: 627-638 - [c101]Warut Khern-am-nuai, Weining Yang, Ninghui Li:
Using Context-Based Password Strength Meter to Nudge Users' Password Generating Behavior: A Randomized Experiment. HICSS 2017: 1-10 - [c100]Weining Yang, Aiping Xiong, Jing Chen, Robert W. Proctor, Ninghui Li:
Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment. HotSoS 2017: 52-61 - [c99]Sze Yiu Chau, Omar Chowdhury, Md. Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li:
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations. IEEE Symposium on Security and Privacy 2017: 503-520 - [c98]Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha:
Locally Differentially Private Protocols for Frequency Estimation. USENIX Security Symposium 2017: 729-745 - [i9]Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha:
Optimizing Locally Differentially Private Protocols. CoRR abs/1705.04421 (2017) - [i8]Tianhao Wang, Ninghui Li, Somesh Jha:
Locally Differentially Private Heavy Hitter Identification. CoRR abs/1708.06674 (2017) - 2016
- [b3]Ninghui Li, Min Lyu, Dong Su, Weining Yang:
Differential Privacy: From Theory to Practice. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2016, ISBN 978-3-031-01222-8, pp. 1-138 - [c97]Tianhao Wang, Huangyi Ge, Omar Chowdhury, Hemanta K. Maji, Ninghui Li:
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols. CCS 2016: 603-615 - [c96]Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor:
An Empirical Study of Mnemonic Sentence-based Password Generation Strategies. CCS 2016: 1216-1229 - [c95]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin:
Differentially Private K-Means Clustering. CODASPY 2016: 26-37 - [c94]Weining Yang, Ninghui Li, Ian M. Molloy, Youngja Park, Suresh N. Chari:
Comparing Password Ranking Algorithms on Real-World Password Datasets. ESORICS (1) 2016: 69-90 - [c93]Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian M. Molloy, Youngja Park:
Tri-Modularization of Firewall Policies. SACMAT 2016: 37-48 - [c92]Wei-Yen Day, Ninghui Li, Min Lyu:
Publishing Graph Degree Distribution with Node Differential Privacy. SIGMOD Conference 2016: 123-138 - [i7]Min Lyu, Dong Su, Ninghui Li:
Understanding the Sparse Vector Technique for Differential Privacy. CoRR abs/1603.01699 (2016) - 2015
- [j42]Lei Cen, Christopher S. Gates, Luo Si, Ninghui Li:
A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code. IEEE Trans. Dependable Secur. Comput. 12(4): 400-412 (2015) - [c91]Wei-Yen Day, Ninghui Li:
Differentially Private Publishing of High-dimensional Data Using Sensitivity Control. AsiaCCS 2015: 451-462 - [c90]Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu:
Dimensions of Risk in Mobile Applications: A User Study. CODASPY 2015: 49-60 - [c89]Youngja Park, Ian M. Molloy, Suresh N. Chari, Zenglin Xu, Christopher S. Gates, Ninghui Li:
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users. ESORICS (2) 2015: 396-414 - [c88]Weining Yang, Jing Chen, Aiping Xiong, Robert W. Proctor, Ninghui Li:
Effectiveness of a phishing warning in field settings. HotSoS 2015: 14:1-14:2 - [c87]Haining Chen, Omar Chowdhury, Jing Chen, Ninghui Li, Robert W. Proctor:
Towards quantification of firewall policy complexity. HotSoS 2015: 18:1-18:2 - [e6]Indrajit Ray, Ninghui Li, Christopher Kruegel:
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015. ACM 2015, ISBN 978-1-4503-3832-5 [contents] - [i6]Dong Su, Jianneng Cao, Ninghui Li:
Differentially Private Projected Histograms of Multi-Attribute Data for Classification. CoRR abs/1504.05997 (2015) - [i5]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin:
Differentially Private $k$-Means Clustering. CoRR abs/1504.05998 (2015) - 2014
- [j41]Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Generating Summary Risk Scores for Mobile Applications. IEEE Trans. Dependable Secur. Comput. 11(3): 238-251 (2014) - [j40]Christopher S. Gates, Jing Chen, Ninghui Li, Robert W. Proctor:
Effective Risk Communication for Android Apps. IEEE Trans. Dependable Secur. Comput. 11(3): 252-265 (2014) - [c86]Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh N. Chari, Ian M. Molloy, Youngja Park:
Detecting Insider Information Theft Using Features from File Access Logs. ESORICS (2) 2014: 383-400 - [c85]Lei Cen, Luo Si, Ninghui Li, Hongxia Jin:
User Comment Analysis for Android apps and CSPI Detection with Comment Expansion. PIR@SIGIR 2014: 25-30 - [c84]Wahbeh H. Qardaji, Weining Yang, Ninghui Li:
PriView: practical differentially private release of marginal contingency tables. SIGMOD Conference 2014: 1435-1446 - [c83]Jerry Ma, Weining Yang, Min Luo, Ninghui Li:
A Study of Probabilistic Password Models. IEEE Symposium on Security and Privacy 2014: 689-704 - [e5]Gail-Joon Ahn, Moti Yung, Ninghui Li:
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014. ACM 2014, ISBN 978-1-4503-2957-6 [contents] - 2013
- [j39]Wahbeh H. Qardaji, Weining Yang, Ninghui Li:
Understanding Hierarchical Methods for Differentially Private Histograms. Proc. VLDB Endow. 6(14): 1954-1965 (2013) - [j38]Mahesh V. Tripunitara, Ninghui Li:
The Foundational Work of Harrison-Ruzzo-Ullman Revisited. IEEE Trans. Dependable Secur. Comput. 10(1): 28-39 (2013) - [c82]Ninghui Li, Wahbeh H. Qardaji, Dong Su, Yi Wu, Weining Yang:
Membership privacy: a unifying framework for privacy definitions. CCS 2013: 889-900 - [c81]Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, Elisa Bertino, Kian-Lee Tan:
Efficient and accurate strategies for differentially-private sliding window queries. EDBT 2013: 191-202 - [c80]Wahbeh H. Qardaji, Weining Yang, Ninghui Li:
Differentially private grids for geospatial data. ICDE 2013: 757-768 - [e4]Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, Wen-Guey Tzeng:
8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013. ACM 2013, ISBN 978-1-4503-1767-2 [contents] - 2012
- [j37]Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao:
PrivBasis: Frequent Itemset Mining with Differential Privacy. Proc. VLDB Endow. 5(11): 1340-1351 (2012) - [j36]Tiancheng Li, Ninghui Li, Jian Zhang, Ian M. Molloy:
Slicing: A New Approach for Privacy Preserving Data Publishing. IEEE Trans. Knowl. Data Eng. 24(3): 561-574 (2012) - [c79]Christopher S. Gates, Ninghui Li, Jing Chen, Robert W. Proctor:
CodeShield: towards personalized application whitelisting. ACSAC 2012: 279-288 - [c78]Ninghui Li, Wahbeh H. Qardaji, Dong Su:
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. AsiaCCS 2012: 32-33 - [c77]Wahbeh H. Qardaji, Ninghui Li:
Recursive partitioning and summarization: a practical framework for differentially private data publishing. AsiaCCS 2012: 38-39 - [c76]Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Using probabilistic generative models for ranking risks of Android apps. CCS 2012: 241-252 - [c75]Weining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin, Patrick D. McDaniel:
Minimizing private data disclosures in the smart grid. CCS 2012: 415-427 - [c74]Ninghui Li, Haining Chen, Elisa Bertino:
On practical specification and enforcement of obligations. CODASPY 2012: 71-82 - [c73]Wahbeh H. Qardaji, Ninghui Li:
Anonymizing Network Traces with Temporal Pseudonym Consistency. ICDCS Workshops 2012: 622-633 - [c72]Bhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Android permissions: a perspective combining risks and benefits. SACMAT 2012: 13-22 - [c71]Omar Chowdhury, Haining Chen, Jianwei Niu, Ninghui Li, Elisa Bertino:
On XACML's Adequacy to Specify and to Enforce HIPAA. HealthSec 2012 - [i4]Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao:
PrivBasis: Frequent Itemset Mining with Differential Privacy. CoRR abs/1208.0093 (2012) - [i3]Wahbeh H. Qardaji, Weining Yang, Ninghui Li:
Differentially Private Grids for Geospatial Data. CoRR abs/1209.1322 (2012) - 2011
- [j35]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
Fine-grained integration of access control policies. Comput. Secur. 30(2-3): 91-107 (2011) - [j34]Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp:
Security Risk Management Using Incentives. IEEE Secur. Priv. 9(6): 20-28 (2011) - [j33]Yuqing Sun, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah:
On the Complexity of Authorization in RBAC under Qualification and Security Constraints. IEEE Trans. Dependable Secur. Comput. 8(6): 883-897 (2011) - [j32]Ninghui Li:
Introduction to special section SACMAT'08. ACM Trans. Inf. Syst. Secur. 14(1): 1:1 (2011) - [j31]Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang:
Combining Discretionary Policy with Mandatory Information Flow in Operating Systems. ACM Trans. Inf. Syst. Secur. 14(3): 24:1-24:27 (2011) - [c70]Ian M. Molloy, Ninghui Li:
Attack on the GridCode one-time password. AsiaCCS 2011: 306-315 - [c69]Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp:
Beyond Risk-Based Access Control: Towards Incentive-Based Access Control. Financial Cryptography 2011: 102-112 - [r6]Ninghui Li:
Discretionary Access Control. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 353-356 - [r5]Ninghui Li:
Trust Management. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1323-1325 - [i2]Ninghui Li, Wahbeh H. Qardaji, Dong Su:
Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy. CoRR abs/1101.2604 (2011) - 2010
- [b2]Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas W. Reps:
Analysis Techniques for Information Security. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2010, ISBN 978-3-031-01206-8 - [j30]Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo:
EXAM: a comprehensive environment for the analysis of access control policies. Int. J. Inf. Sec. 9(4): 253-273 (2010) - [j29]Graham Cormode, Ninghui Li, Tiancheng Li, Divesh Srivastava:
Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data. Proc. VLDB Endow. 3(1): 1045-1056 (2010) - [j28]Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:
Mining Roles with Multiple Objectives. ACM Trans. Inf. Syst. Secur. 13(4): 36:1-36:35 (2010) - [j27]Qihua Wang, Ninghui Li:
Satisfiability and Resiliency in Workflow Authorization Systems. ACM Trans. Inf. Syst. Secur. 13(4): 40:1-40:35 (2010) - [j26]Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian:
Closeness: A New Privacy Measure for Data Publishing. IEEE Trans. Knowl. Data Eng. 22(7): 943-956 (2010) - [c68]Hong Chen, Ninghui Li, Christopher S. Gates, Ziqing Mao:
Towards analyzing complex operating system access control configurations. SACMAT 2010: 13-22 - [c67]Ian M. Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo, Luke Dickens:
Mining roles with noisy data. SACMAT 2010: 45-54 - [c66]Nan Ding, Yuan (Alan) Qi, Rongjing Xiang, Ian M. Molloy, Ninghui Li:
Nonparametric Bayesian Matrix Factorization by Power-EP. AISTATS 2010: 169-176
2000 – 2009
- 2009
- [j25]Elisa Bertino, Carolyn Brodie, Seraphin B. Calo, Lorrie Faith Cranor, Clare-Marie Karat, John Karat, Ninghui Li, Dan Lin, Jorge Lobo, Qun Ni, Prathima Rao, Xiping Wang:
Analysis of privacy and security policies. IBM J. Res. Dev. 53(2): 3 (2009) - [j24]John Karat, Clare-Marie Karat, Elisa Bertino, Ninghui Li, Qun Ni, Carolyn Brodie, Jorge Lobo, Seraphin B. Calo, Lorrie Faith Cranor, Ponnurangam Kumaraguru, Robert W. Reeder:
Policy framework for security and privacy management. IBM J. Res. Dev. 53(2): 4 (2009) - [j23]Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu:
Denial of service attacks and defenses in decentralized trust management. Int. J. Inf. Sec. 8(2): 89-101 (2009) - [j22]Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn:
Privacy-preserving incremental data dissemination. J. Comput. Secur. 17(1): 43-68 (2009) - [j21]Chenyun Dai, Gabriel Ghinita, Elisa Bertino, Ji-Won Byun, Ninghui Li:
TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques. Proc. VLDB Endow. 2(2): 1618-1621 (2009) - [j20]Ninghui Li, Qihua Wang, Mahesh V. Tripunitara:
Resiliency Policies in Access Control. ACM Trans. Inf. Syst. Secur. 12(4): 20:1-20:34 (2009) - [j19]Jiangtao Li, Ninghui Li, William H. Winsborough:
Automated trust negotiation using cryptographic credentials. ACM Trans. Inf. Syst. Secur. 13(1): 2:1-2:35 (2009) - [c65]Qihua Wang, Hongxia Jin, Ninghui Li:
Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging. ESORICS 2009: 268-284 - [c64]Tiancheng Li, Xiaonan Ma, Ninghui Li:
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance. ESORICS 2009: 472-488 - [c63]Ziqing Mao, Ninghui Li, Ian M. Molloy:
Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. Financial Cryptography 2009: 238-255 - [c62]Tiancheng Li, Ninghui Li, Jian Zhang:
Modeling and Integrating Background Knowledge in Data Anonymization. ICDE 2009: 6-17 - [c61]Ian M. Molloy, Ninghui Li, Tiancheng Li:
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining. ICDM 2009: 872-877 - [c60]Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic:
Assured Information Sharing Life Cycle. ISI 2009: 307-309 - [c59]Tiancheng Li, Ninghui Li:
On the tradeoff between privacy and utility in data publishing. KDD 2009: 517-526 - [c58]Hong Chen, Ninghui Li, Ziqing Mao:
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems. NDSS 2009 - [c57]Guneshi T. Wickramaarachchi, Wahbeh H. Qardaji, Ninghui Li:
An efficient framework for user authorization queries in RBAC systems. SACMAT 2009: 23-32 - [c56]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
An algebra for fine-grained integration of XACML policies. SACMAT 2009: 63-72 - [c55]Ian M. Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo:
Evaluating role mining algorithms. SACMAT 2009: 95-104 - [c54]Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin:
Access control policy combining: theory meets practice. SACMAT 2009: 135-144 - [c53]Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang:
Trojan horse resistant discretionary access control. SACMAT 2009: 237-246 - [e3]Elena Ferrari, Ninghui Li, Elisa Bertino, Yücel Karabulut:
Trust Management III, Third IFIP WG 11.11 International Conference, IFIPTM 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings. IFIP Advances in Information and Communication Technology 300, Springer 2009, ISBN 978-3-642-02055-1 [contents] - [r4]Ninghui Li:
Asymmetric Encryption. Encyclopedia of Database Systems 2009: 142 - [r3]Ninghui Li:
Data Encryption. Encyclopedia of Database Systems 2009: 574 - [r2]Ninghui Li:
Homomorphic Encryption. Encyclopedia of Database Systems 2009: 1320 - [r1]Ninghui Li:
Symmetric Encryption. Encyclopedia of Database Systems 2009: 2897-2898 - [i1]Tiancheng Li, Ninghui Li, Jian Zhang, Ian M. Molloy:
Slicing: A New Approach to Privacy Preserving Data Publishing. CoRR abs/0909.2290 (2009) - 2008
- [j18]Tiancheng Li, Ninghui Li:
Towards optimal k-anonymization. Data Knowl. Eng. 65(1): 22-39 (2008) - [j17]Ninghui Li, Qihua Wang:
Beyond separation of duty: An algebra for specifying high-level security policies. J. ACM 55(3): 12:1-12:46 (2008) - [j16]Rui Xue, Ninghui Li, Jiangtao Li:
Algebraic Construction for Zero-Knowledge Sets. J. Comput. Sci. Technol. 23(2): 166-175 (2008) - [j15]Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough:
Towards Formal Verification of Role-Based Access Control Policies. IEEE Trans. Dependable Secur. Comput. 5(4): 242-255 (2008) - [j14]Ji-Won Byun, Ninghui Li:
Purpose based access control for privacy protection in relational database systems. VLDB J. 17(4): 603-619 (2008) - [c52]Hong Chen, Xiaonan Ma, Windsor W. Hsu, Ninghui Li, Qihua Wang:
Access Control Friendly Query Verification for Outsourced Data Publishing. ESORICS 2008: 177-191 - [c51]Qihua Wang, Ninghui Li, Hong Chen:
On the Security of Delegation in Access Control Systems. ESORICS 2008: 317-332 - [c50]Tiancheng Li, Ninghui Li:
Injector: Mining Background Knowledge for Data Anonymization. ICDE 2008: 446-455 - [c49]Ninghui Li:
How to make Discretionary Access Control secure against trojan horses. IPDPS 2008: 1-3 - [c48]XiaoFeng Wang, Zhuowei Li, Ninghui Li, Jong Youl Choi:
PRECIP: Towards Practical and Retrofittable Confidential Information Protection. NDSS 2008 - [c47]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
EXAM: An Environment for Access Control Policy Analysis and Management. POLICY 2008: 238-240 - [c46]Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:
Mining roles with semantic meanings. SACMAT 2008: 21-30 - [c45]Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo:
Policy decomposition for collaborative access control. SACMAT 2008: 103-112 - [e2]Indrakshi Ray, Ninghui Li:
13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings. ACM 2008, ISBN 978-1-60558-129-3 [contents] - 2007
- [j13]Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu:
A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007) - [j12]Ninghui Li, Ji-Won Byun, Elisa Bertino:
A Critique of the ANSI Standard on Role-Based Access Control. IEEE Secur. Priv. 5(6): 41-49 (2007) - [j11]Mahesh V. Tripunitara, Ninghui Li:
A theory for comparing the expressive power of access control models. J. Comput. Secur. 15(2): 231-272 (2007) - [j10]Ninghui Li, Mahesh V. Tripunitara, Ziad Bizri:
On mutually exclusive roles and separation-of-duty. ACM Trans. Inf. Syst. Secur. 10(2): 5 (2007) - [c44]Jiangtao Li, Ninghui Li, Rui Xue:
Universal Accumulators with Efficient Nonmembership Proofs. ACNS 2007: 253-269 - [c43]Ninghui Li, Ziqing Mao:
Administration in role-based access control. AsiaCCS 2007: 127-138 - [c42]Qihua Wang, Ninghui Li:
Direct static enforcement of high-level security policies. AsiaCCS 2007: 214-225 - [c41]Ji-Won Byun, Ashish Kamra, Elisa Bertino, Ninghui Li:
Efficient k -Anonymization Using Clustering Techniques. DASFAA 2007: 188-200 - [c40]Qihua Wang, Ninghui Li:
Satisfiability and Resiliency in Workflow Systems. ESORICS 2007: 90-105 - [c39]Ian M. Molloy, Jiangtao Li, Ninghui Li:
Dynamic Virtual Credit Card Numbers. Financial Cryptography 2007: 208-223 - [c38]Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian:
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. ICDE 2007: 106-115 - [c37]Ninghui Li, Ziqing Mao, Hong Chen:
Usable Mandatory Integrity Protection for Operating Systems. S&P 2007: 164-178 - [c36]Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun:
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566 - 2006
- [j9]Ninghui Li, Ting Yu, Annie I. Antón:
A semantics based approach to privacy languages. Comput. Syst. Sci. Eng. 21(5) (2006) - [j8]Ninghui Li, John C. Mitchell:
Understanding SPKI/SDSI using first-order logic. Int. J. Inf. Sec. 5(1): 48-64 (2006) - [j7]Jiangtao Li, Ninghui Li:
OACerts: Oblivious Attribute Certificates. IEEE Trans. Dependable Secur. Comput. 3(4): 340-352 (2006) - [j6]William H. Winsborough, Ninghui Li:
Safety in automated trust negotiation. ACM Trans. Inf. Syst. Secur. 9(3): 352-390 (2006) - [j5]Ninghui Li, Mahesh V. Tripunitara:
Security analysis in role-based access control. ACM Trans. Inf. Syst. Secur. 9(4): 391-420 (2006) - [c35]Ninghui Li, Mahesh V. Tripunitara, Qihua Wang:
Resiliency policies in access control. CCS 2006: 113-123 - [c34]Ninghui Li, Qihua Wang:
Beyond separation of duty: an algebra for specifying high-level security policies. CCS 2006: 356-369 - [c33]Tiancheng Li, Ninghui Li:
Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching. ICDM Workshops 2006: 518-523 - [c32]Jiangtao Li, Ninghui Li:
A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. ICICS 2006: 122-138 - [c31]Ziqing Mao, Ninghui Li, William H. Winsborough:
Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). ICICS 2006: 159-173 - [c30]Hong Chen, Ninghui Li:
Constraint generation for separation of duty. SACMAT 2006: 130-138 - [c29]Xiaoxin Wu, Ninghui Li:
Achieving privacy in mesh networks. SASN 2006: 13-22 - [c28]Ji-Won Byun, Yonglak Sohn, Elisa Bertino, Ninghui Li:
Secure Anonymization for Incremental Datasets. Secure Data Management 2006: 48-63 - [c27]Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu:
Denial of Service Attacks and Defenses in Decentralized Trust Management. SecureComm 2006: 1-12 - [e1]Peng Ning, Sihan Qing, Ninghui Li:
Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings. Lecture Notes in Computer Science 4307, Springer 2006, ISBN 3-540-49496-0 [contents] - 2005
- [j4]Ninghui Li, Wenliang Du, Dan Boneh:
Oblivious signature-based envelope. Distributed Comput. 17(4): 293-302 (2005) - [j3]Ninghui Li, John C. Mitchell, William H. Winsborough:
Beyond proof-of-compliance: security analysis in trust management. J. ACM 52(3): 474-514 (2005) - [c26]Jiangtao Li, Ninghui Li:
OACerts: Oblivious Attribute Certificates. ACNS 2005: 301-317 - [c25]Jiangtao Li, Ninghui Li, William H. Winsborough:
Automated trust negotiation using cryptographic credentials. CCS 2005: 46-57 - [c24]Elisa Bertino, Ji-Won Byun, Ninghui Li:
Privacy-Preserving Database Systems. FOSAD 2005: 178-206 - [c23]Jiangtao Li, Ninghui Li:
Policy-hiding access control in open environment. PODC 2005: 29-38 - [c22]Ji-Won Byun, Elisa Bertino, Ninghui Li:
Purpose based access control of complex data for privacy protection. SACMAT 2005: 102-110 - [c21]Ninghui Li, Mahesh V. Tripunitara:
On Safety in Discretionary Access Control. S&P 2005: 96-109 - 2004
- [c20]Cristina Nita-Rotaru, Ninghui Li:
A Framework for Role-Based Access Control in Group Communication Systems. PDCS 2004: 522-529 - [c19]Ninghui Li, John C. Mitchell, Derrick Tong:
Securing Java RMI-Based Distributed Applications. ACSAC 2004: 262-271 - [c18]Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara:
On mutually-exclusive roles and separation of duty. CCS 2004: 42-51 - [c17]Mahesh V. Tripunitara, Ninghui Li:
Comparing the expressive power of access control models. CCS 2004: 62-71 - [c16]Ninghui Li, Mahesh V. Tripunitara:
Security analysis in role-based access control. SACMAT 2004: 126-135 - [c15]William H. Winsborough, Ninghui Li:
Safety in Automated Trust Negotiation. S&P 2004: 147-160 - [c14]Ting Yu, Ninghui Li, Annie I. Antón:
A formal semantics for P3P. SWS 2004: 1-8 - 2003
- [j2]Ninghui Li, William H. Winsborough, John C. Mitchell:
Distributed Credential Chain Discovery in Trust Management. J. Comput. Secur. 11(1): 35-86 (2003) - [j1]Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum:
Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur. 6(1): 128-171 (2003) - [c13]Ninghui Li, John C. Mitchell:
Understanding SPKI/SDSI Using First-Order Logic. CSFW 2003: 89- - [c12]Ninghui Li, John C. Mitchell:
A Role-based Trust-management Framework. DISCEX (1) 2003: 201- - [c11]Ninghui Li, John C. Mitchell:
DATALOG with Constraints: A Foundation for Trust Management Languages. PADL 2003: 58-73 - [c10]Ninghui Li, Wenliang Du, Dan Boneh:
Oblivious signature-based envelope. PODC 2003: 182-189 - [c9]Ninghui Li, William H. Winsborough, John C. Mitchell:
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. S&P 2003: 123-139 - 2002
- [c8]William H. Winsborough, Ninghui Li:
Towards Practical Automated Trust Negotiation. POLICY 2002: 92-103 - [c7]Ninghui Li, John C. Mitchell, William H. Winsborough:
Design of a Role-Based Trust-Management Framework. S&P 2002: 114-130 - [c6]William H. Winsborough, Ninghui Li:
Protecting sensitive attributes in automated trust negotiation. WPES 2002: 41-51 - 2001
- [c5]Ninghui Li, William H. Winsborough, John C. Mitchell:
Distributed credential chain discovery in trust management: extended abstract. CCS 2001: 156-165 - [c4]Ninghui Li, Joan Feigenbaum:
Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. Financial Cryptography 2001: 157-168 - 2000
- [b1]Ninghui Li:
Delegation Logic: A Logic-based Approach to Distrbuted Authorization. New York University, USA, 2000 - [c3]Ninghui Li:
Local Names in SPKI/SDSI. CSFW 2000: 2-15 - [c2]Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum:
A Practically Implementable and Tractable Delegation Logic. S&P 2000: 27-42
1990 – 1999
- 1999
- [c1]Ninghui Li, Joan Feigenbaum, Benjamin N. Grosof:
A Logic-based Knowledge Representation for Authorization with Delegation. CSFW 1999: 162-174
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint