Ninghui Li
Ninghui Li
Professor of Computer Science, Purdue University
Dirección de correo verificada de - Página principal
Citado por
Citado por
t-closeness: Privacy beyond k-anonymity and l-diversity
N Li, T Li, S Venkatasubramanian
2007 IEEE 23rd international conference on data engineering, 106-115, 2006
Design of a role-based trust-management framework
N Li, JC Mitchell, WH Winsborough
Proceedings 2002 IEEE Symposium on Security and Privacy, 114-130, 2002
Purpose based access control of complex data for privacy protection
JW Byun, E Bertino, N Li
Proceedings of the tenth ACM symposium on Access control models and …, 2005
Delegation logic: A logic-based approach to distributed authorization
N Li, BN Grosof, J Feigenbaum
ACM Transactions on Information and System Security (TISSEC) 6 (1), 128-171, 2003
Distributed credential chain discovery in trust management
N Li, WH Winsborough, JC Mitchell
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
Locally differentially private protocols for frequency estimation
T Wang, J Blocki, N Li, S Jha
26th USENIX Security Symposium (USENIX Security 17), 729-745, 2017
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Efficient k-Anonymization Using Clustering Techniques
JW Byun, A Kamra, E Bertino, N Li
International conference on database systems for advanced applications, 188-200, 2007
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
Slicing: A new approach for privacy preserving data publishing
T Li, N Li, J Zhang, I Molloy
IEEE transactions on knowledge and data engineering 24 (3), 561-574, 2010
On the tradeoff between privacy and utility in data publishing
T Li, N Li
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
RT: A role-based trust-management framework
N Li, JC Mitchell
Proceedings DARPA Information Survivability Conference and Exposition 1, 201-212, 2003
Towards practical automated trust negotiation
WH Winsborough, N Li
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
Datalog with Constraints: A Foundation for Trust Management Languages
N Li, JC Mitchell
Practical Aspects of Declarative Languages: 5th International Symposium …, 2003
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy
N Li, W Qardaji, D Su
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
Purpose based access control for privacy protection in relational database systems
JW Byun, N Li
The VLDB Journal 17, 603-619, 2008
Differentially private grids for geospatial data
W Qardaji, W Yang, N Li
2013 IEEE 29th international conference on data engineering (ICDE), 757-768, 2013
A study of probabilistic password models
J Ma, W Yang, M Luo, N Li
2014 IEEE Symposium on Security and Privacy, 689-704, 2014
Security analysis in role-based access control
N Li, MV Tripunitara
ACM Transactions on Information and System Security (TISSEC) 9 (4), 391-420, 2006
Privacy at scale: Local differential privacy in practice
G Cormode, S Jha, T Kulkarni, N Li, D Srivastava, T Wang
Proceedings of the 2018 International Conference on Management of Data, 1655 …, 2018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20