Seguir
Ninghui Li
Ninghui Li
Professor of Computer Science, Purdue University
Dirección de correo verificada de cs.purdue.edu - Página principal
Título
Citado por
Citado por
Año
t-closeness: Privacy beyond k-anonymity and l-diversity
N Li, T Li, S Venkatasubramanian
2007 IEEE 23rd international conference on data engineering, 106-115, 2006
48362006
Design of a role-based trust-management framework
N Li, JC Mitchell, WH Winsborough
Proceedings 2002 IEEE Symposium on Security and Privacy, 114-130, 2002
11202002
Purpose based access control of complex data for privacy protection
JW Byun, E Bertino, N Li
Proceedings of the tenth ACM symposium on Access control models and …, 2005
6822005
Delegation logic: A logic-based approach to distributed authorization
N Li, BN Grosof, J Feigenbaum
ACM Transactions on Information and System Security (TISSEC) 6 (1), 128-171, 2003
5992003
Locally differentially private protocols for frequency estimation
T Wang, J Blocki, N Li, S Jha
26th USENIX Security Symposium (USENIX Security 17), 729-745, 2017
5892017
Distributed credential chain discovery in trust management
N Li, WH Winsborough, JC Mitchell
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
5782001
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
5472012
Efficient k-Anonymization Using Clustering Techniques
JW Byun, A Kamra, E Bertino, N Li
International conference on database systems for advanced applications, 188-200, 2007
5222007
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
4582012
On the tradeoff between privacy and utility in data publishing
T Li, N Li
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
4292009
Slicing: A new approach for privacy preserving data publishing
T Li, N Li, J Zhang, I Molloy
IEEE transactions on knowledge and data engineering 24 (3), 561-574, 2010
4222010
RT: A role-based trust-management framework
N Li, JC Mitchell
Proceedings DARPA Information Survivability Conference and Exposition 1, 201-212, 2003
3692003
Towards practical automated trust negotiation
WH Winsborough, N Li
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
3682002
Datalog with Constraints: A Foundation for Trust Management Languages
N Li, JC Mitchell
Practical Aspects of Declarative Languages: 5th International Symposium …, 2003
3522003
Differentially private grids for geospatial data
W Qardaji, W Yang, N Li
2013 IEEE 29th international conference on data engineering (ICDE), 757-768, 2013
3482013
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy
N Li, W Qardaji, D Su
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
3452012
Purpose based access control for privacy protection in relational database systems
JW Byun, N Li
The VLDB Journal 17, 603-619, 2008
3422008
A study of probabilistic password models
J Ma, W Yang, M Luo, N Li
2014 IEEE Symposium on Security and Privacy, 689-704, 2014
3252014
Security analysis in role-based access control
N Li, MV Tripunitara
ACM Transactions on Information and System Security (TISSEC) 9 (4), 391-420, 2006
3072006
Privacy at scale: Local differential privacy in practice
G Cormode, S Jha, T Kulkarni, N Li, D Srivastava, T Wang
Proceedings of the 2018 International Conference on Management of Data, 1655 …, 2018
2992018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20