Seguir
Ninghui Li
Ninghui Li
Professor of Computer Science, Purdue University
Dirección de correo verificada de cs.purdue.edu - Página principal
Título
Citado por
Citado por
Año
t-closeness: Privacy beyond k-anonymity and l-diversity
N Li, T Li, S Venkatasubramanian
2007 IEEE 23rd international conference on data engineering, 106-115, 2006
48132006
Design of a role-based trust-management framework
N Li, JC Mitchell, WH Winsborough
Proceedings 2002 IEEE Symposium on Security and Privacy, 114-130, 2002
11202002
Purpose based access control of complex data for privacy protection
JW Byun, E Bertino, N Li
Proceedings of the tenth ACM symposium on Access control models and …, 2005
6832005
Delegation logic: A logic-based approach to distributed authorization
N Li, BN Grosof, J Feigenbaum
ACM Transactions on Information and System Security (TISSEC) 6 (1), 128-171, 2003
5942003
Distributed credential chain discovery in trust management
N Li, WH Winsborough, JC Mitchell
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
5802001
Locally differentially private protocols for frequency estimation
T Wang, J Blocki, N Li, S Jha
26th USENIX Security Symposium (USENIX Security 17), 729-745, 2017
5712017
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
5512012
Efficient k-Anonymization Using Clustering Techniques
JW Byun, A Kamra, E Bertino, N Li
International conference on database systems for advanced applications, 188-200, 2007
5232007
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
4562012
Slicing: A new approach for privacy preserving data publishing
T Li, N Li, J Zhang, I Molloy
IEEE transactions on knowledge and data engineering 24 (3), 561-574, 2010
4252010
On the tradeoff between privacy and utility in data publishing
T Li, N Li
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
4232009
RT: A role-based trust-management framework
N Li, JC Mitchell
Proceedings DARPA Information Survivability Conference and Exposition 1, 201-212, 2003
3692003
Towards practical automated trust negotiation
WH Winsborough, N Li
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
3652002
Datalog with Constraints: A Foundation for Trust Management Languages
N Li, JC Mitchell
Practical Aspects of Declarative Languages: 5th International Symposium …, 2003
3532003
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy
N Li, W Qardaji, D Su
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
3462012
Purpose based access control for privacy protection in relational database systems
JW Byun, N Li
The VLDB Journal 17, 603-619, 2008
3462008
Differentially private grids for geospatial data
W Qardaji, W Yang, N Li
2013 IEEE 29th international conference on data engineering (ICDE), 757-768, 2013
3412013
A study of probabilistic password models
J Ma, W Yang, M Luo, N Li
2014 IEEE Symposium on Security and Privacy, 689-704, 2014
3282014
Security analysis in role-based access control
N Li, MV Tripunitara
ACM Transactions on Information and System Security (TISSEC) 9 (4), 391-420, 2006
3062006
Privacy at scale: Local differential privacy in practice
G Cormode, S Jha, T Kulkarni, N Li, D Srivastava, T Wang
Proceedings of the 2018 International Conference on Management of Data, 1655 …, 2018
2902018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20